Please Scroll Down to See Forums Below
How to install the app on iOS

Follow along with the video below to see how to install our site as a web app on your home screen.

Note: This feature may not be available in some browsers.

napsgear
genezapharmateuticals
domestic-supply
puritysourcelabs
Research Chemical SciencesUGFREAKeudomestic
napsgeargenezapharmateuticals domestic-supplypuritysourcelabsResearch Chemical SciencesUGFREAKeudomestic

anonymous proxy

Schwarzenyeater

New member
Since most are using encrypted email do you guys use annonymous proxy servers. I have a friend who does this and I dont know if they are fully annonymous or partial but I heard they hid your IP from all. I would like to get some input on this since we research AS on here. Also how about turning off cookies and java very sneaky shit they have. I heard java tries to steal info off you computer and sends back to web sites as well as opens ports to hackers.

Any takers ?
 
Thanks guys I guess I will be checking more into this when I get a high speed data line or sooner right now Im on a dial up. Pretty slow !!!
 
Schwarzenyeater said:
Since most are using encrypted email do you guys use annonymous proxy servers. I have a friend who does this and I dont know if they are fully annonymous or partial but I heard they hid your IP from all. I would like to get some input on this since we research AS on here. Also how about turning off cookies and java very sneaky shit they have. I heard java tries to steal info off you computer and sends back to web sites as well as opens ports to hackers.

Any takers ?

Yes it's true that by using JavaScript info of your computer like IP
address, OS that you use, referring URL, domain and some others can be taken, but if you would turn it off you wouldn't be able to
view many sites.
You can use software like Anonimity4Proxy or Freedom(freedom.net) if you want...
 
Does anyone know anything about Virtual Firewalls. I just got XP and wonder if it has the capeability of createing a firewall. I know theres software out for that purpose just seems expensive!
 
<ul> <li><a href="http://www.elitefitness.com/go/hidemyip" target="_blank">Hide-My-IP.com</a></li> <li><a href="http://www.elitefitness.com/go/proxify" target="_blank">Proxify</a></li> <li> <a href="http://www.elitefitness.com/go/ghostsurf" target="_blank">Ghost Surf Platinum</a></li> <li> <a href="http://www.elitefitness.com/go/hidemyip" target="_blank"></a><a href="http://www.elitefitness.com/go/spyse" target="_blank">XoftSpySE</a></li> <li> <a href="http://www.elitefitness.com/go/cyberscrub" target="_blank">CyberScrub</a></li> <li> <a href="http://www.elitefitness.com/go/privacycontrol" target="_blank">Privacy Control</a></li> </ul>
 

There is also a good software called JAP/JONDO that is free and easy to learn to use.
How it works

Instead of connecting directly to a webserver, users take a detour, connecting with encryption through several intermediaries, so-called Mixes. JAP uses a predetermined sequence for the mixes. Such a sequence of linked mixes is called a Mix Cascade. Users can choose between different mix cascades.

Download

Here is a site that will test you anonymity.
http://www.0privacy.com/proxychecker.php

Other ways to hide your ISP:
VPN
VPN stands for Virtual Private Network, and is an increasingly popular form of proxy for security and to stay anonymous on net. VPN is a tunnel over the Internet. Each VPN connection is totally anonymous on the internet and it helps to keep your activities anonymous and safe. VPN internet access is an attractive option for people worried about their security and privacy.

SSH
SSH, the Secure Shell, is a standard protocol that encrypts communications between your computer and a server. The computer being connected to must be running an ssh daemon, or server, process. The computer which is attempting to connect must be running an SSH client. The encryption prevents these communications from being viewed or modified by network operators.

IPV6
IP, the Internet Protocol, is one of the pillars which supports the Internet. Almost 20 years old, first specified in a remarkably concise 45 pages in RFC 791, IP is the network-layer protocol for the Internet.

In 1991, the IETF decided that the current version of IP, called IPv4, had outlived its design. The new version of IP, called either IPng (Next Generation) or IPv6 (version 6), was the result of a long and tumultuous process which came to a head in 1994, when the IETF gave a clear direction for IPv6. IPv6 is designed to solve the problems of IPv4. It does so by creating a new version of the protocol which serves the function of IPv4, but without the same limitations of IPv4. IPv6 is not totally different from IPv4: what you have learned in IPv4 will be valuable when you deploy IPv6. The differences between IPv6 and IPv4 are in five major areas: addressing and routing, security, network address translation, administrative workload, and support for mobile devices. IPv6 also includes an important feature: a set of possible migration and transition plans from IPv4.

Here are some other interesting sites:
privacy.net » Privacy.net
Stay Invisible - Proxy Servers, Proxy List, Free Anonymous Proxy, Proxy Checker - Anonymous Surfing
Hiding Your IP Address, Anonymous Internet Surfing HOWTO
 
Last edited:
Top Bottom