Showing posts with label Proxy Servers. Show all posts
Showing posts with label Proxy Servers. Show all posts

Tuesday, October 11, 2011

How to Stay Anonymous on the Internet Using Tor ? #Security Tips

Why you should hide yourself?
Internet is risky place to surf, here your privacy is not secure as you think.  Others can track what you are searching or what is your interest(Based on that , scammers can scam you).  Some websites store your real IP. An attacker can get the IP from the website by attacking that website.  Using your IP , he can take control of your System(using Open Port).  Two weeks back, we explained about the Facebook Privacy Ris.  If you want to secure your privacy, this article will help you. 

What is Tor and Usage?
Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy.

For Individual: They use Tor to keep websites from tracking them and their family members, or to connect to news sites, instant messaging services, or the like when these are blocked by their local Internet providers. Tor's hidden services let users publish web sites and other services without needing to reveal the location of the site. Individuals also use Tor for socially sensitive communication: chat rooms and web forums for rape and abuse survivors, or people with illnesses.

For Journalists: They use Tor to communicate more safely with whistleblowers and dissidents. Non-governmental organizations (NGOs) use Tor to allow their workers to connect to their home website while they're in a foreign country, without notifying everybody nearby that they're working with that organization.

For Groups such as Indymedia recommend Tor for safeguarding their members' online privacy and security. Activist groups like the Electronic Frontier Foundation (EFF) recommend Tor as a mechanism for maintaining civil liberties online. Corporations use Tor as a safe way to conduct competitive analysis, and to protect sensitive procurement patterns from eavesdroppers. They also use it to replace traditional VPNs, which reveal the exact amount and timing of communication. Which locations have employees working late? Which locations have employees consulting job-hunting websites? Which research divisions are communicating with the company's patent lawyers?

A branch of the U.S. Navy uses Tor for open source intelligence gathering, and one of its teams used Tor while deployed in the Middle East recently. Law enforcement uses Tor for visiting or surveilling web sites without leaving government IP addresses in their web logs, and for security during sting operations.

Continue   Reading>>

Friday, August 5, 2011

A Guide to Online Anonymity - How can i be completely untraceable ?

The act of keeping your identity hidden online by using connection methods and encryption methods, to make yourself untraceable to a person, website, company, school or whatever else you are doing/connecting to.

Continue   Reading>>

Wednesday, August 3, 2011

How to Setup your own Proxy Server For Free using Hamachi and Privoxy?

Read this post to know  What is proxy server?

Why should i use Proxy server?

Open Wi-Fi Connections:
It is possible for anyone to monitor everything you do on an Open Wi-Fi Network. Not all sites that you visit may use HTTPS Encryption. Sometimes even sites that do use HTTPS only do so for certain actions and then revert to regular unencrypted HTTP connections, which are visible by anyone on the network. Using a proxy server will direct all web traffic through a secure and encrypted tunnel making all of your browsing safe and unseeable.

Bypass Firewalls and Corporate Web Filtering:
Users who wish to bypass web monitoring and restrictions imposed by their employer may utilize Proxy Servers. This is great for users and dangerous for IT Professionals as it may pose a danger to network security.

How to Set up the proxy server using Hamachi and Privoxy? 

  1. 2 computers. One works proxy server. Other one use the proxy server(client). Both system should have Internet connection.
  2. Hamachi: A free (for non-commercial use), cross-platform VPN service that, gives you secure access to your home network no matter where you are. Download it from here:
  3. Privoxy: A free, Privoxy is a non-caching web proxy with advanced filtering capabilities for enhancing privacy, modifying web page data and HTTP headers, controlling access, and removing ads and other obnoxious Internet junk. Privoxy has a flexible configuration and can be customized to suit individual needs and tastes. It has application for both stand-alone systems and multi-user networks. Download it from here:
Installing Hamachi and Set up the Server
Step 1: 
 Decide which Computer is going to work as Proxy Server.  Install the Hamachi in that computer.
Step 2:
Once you installed, run the application.  It will open small Hamachi application window with thanks message.

Step 3:
Click the Power Button.  It will automatically detect the host name and ask you to register the client.

Once you registered, it will show some IP address like near to the power button.  Note this is our proxy ip Address.

Step 4:
Now you will get two options. 1. Create New Network 2.Join an existing Network.
This is server Computer, we have to create network to used by client.
So click the Create a New Network button.

Step 5:
It will ask you to enter network id and password(i entered id as proxy_BreakTheSecurity).   Enter your desire id and password(Should be strong password).
Click the Create button.

That's all your server is ready to be used.

Using Our Proxy Server in client Side
Now move to your client system( i mean any other computer).  Install Hamachi in your that system.
Follow the first three step mentioned above.
Step 4:
Now you will get two options. 1. Create New Network 2.Join an existing Network.
This is Client System, right? so Click the Join an Existing network.

Step 5:
Enter the Network id and password that you used to create network.  (in my case, network id i entered is proxy_BreakTheSecurity)

You can rinse and repeat this on every machine you want to do this with, for up to 16 clients (that’s the limit for Hamachi’s free-for-non-commercial-use version)

Installing the Privoxy in the client system:
Install the privoxy and run.
Step 1:
In system tray, you can see P icon. right click on the P
and select Edit->Main Configuration.

Step 2:
It will open the config.txt file in notepad.
Search for the "listen-address"
Replace the with our proxy ip address(address that displayed in server hamachi apps) created in server side.
For example listent-address
Save the file.

That's all you finished.  Restart the privoxy.
Now we have to use the Proxy server.

Set Up Your Web Browser to Use Your New Secure Proxy:
Open the Mozilla Firefox
Open Tools->Preferences.
It will open the preference window of Firefox.
Select Advanced->Network tab.
Click the Settings button near to the "Configure how Firefox connects to the Internet”
Select the Manual proxy configuration.
Enter our Server Proxy Address( and port as 8118.
click ok.

Test the Proxy Server.
Now we have to test whether our proxy is working or not.

Visit It will detect whether you use proxy or not.

If proxy is used, you’ll see a message like “This is Privoxy 3.0.17 on Windows (, port 8118, enabled.”

If not, you’ll see a page that reads “Privoxy is not being used”.

Also, if you’re on a public Wi-Fi connection and you navigate to something like with your proxy turned off, you should see a different IP when you reload the page with your proxy turned on.
(Essentially, when turned on, your home’s public IP address should be showing.)

Even though your proxy is running over an HTTP connection, Hamachi is encrypting everything that runs between your computers, so it’s still a secure option
Continue   Reading>>

Sunday, July 31, 2011

What are the Risks of using Proxy Servers?

We are using Proxy Server in order to Protect your Privacy.  But sometimes this proxy can be danger for your Privacy and Confidential data.  Here I listed the risks of Proxy servers.
Continue   Reading>>

Friday, July 8, 2011

Today working anonymous and high anonymous proxy IP server list

Here is list of anonymous and high anonymous proxy server. There proxy ip address are manually checked by me. :8080 :8090 :8080 :808 :8080 :80 :80 :80 :80
Continue   Reading>>

Wednesday, March 9, 2011

Anonymous surfing using Proxy Switcher Add on

Hi friends i have explained how to use the proxy ip address list with mozilla firefox in this post:How to use proxy server to hide ip?. Now it is more simple to use the proxy server using mozilla firefox premium proxy switcher add on.

Continue   Reading>>

Sunday, January 23, 2011

Register with another ip in forum,if you banned

Is your ip address banned in any forum or website? Can not you create account or login to your account?   Don't worry i am here to help you to create a new account.   Also You can have multiple accounts in forum.

How can you register after banned?
You can change your ip address. Visit from another ip and register the account.  Whenever you want to login to that forum or website hide ip address in simple way.

Don't use your old mail id or any other old details.  Create new one.
Continue   Reading>>

Friday, December 31, 2010

How to Use Proxy IP address ?-Change the Ip address

Hi friends, i give a list of proxy servers about 100.  But i forget to tell how it will be useful ,how to use it. In this post, i will explain how to use the proxy server.

What is the Use of The Proxy?
Hide your IP.  Browse the Internet anonymously. 

Continue   Reading>>

Thursday, December 23, 2010

200 Proxy sites -Hide your ip

Hi friends, today i am going to give you 200 proxy servers.  Hide your ip and browser internet anonymously.  If you don't know what is proxy server and how it is useful to hacking,then read these articles.
Access Blocked Websites in school
How proxy is working?

Continue   Reading>>

Thursday, December 2, 2010

100 percentage working proxy server ip address list

Here is the list of proxy server address. use it and enjoy.
Continue   Reading>>

Friday, November 26, 2010


1. Open your browser (ex. Mozilla Firefox).
2. Redirect to this site (
3. Choose your category (ex. Socks).
4. Now find the IP of your choice and the port (keep it for later use).
Continue   Reading>>

Wednesday, November 24, 2010

IP HIDING Tools| Different Types of Proxy Servers and their usage

1. Transparent Proxy Server
This type of proxy server identifies itself as a proxy server and also makes the original IP address available through the http headers. These are generally used to speedup the web browsing since thay have a very good ability to cache websites. But they do not conceal the IP of it’s users. It is widely known as transparent proxy because it will expose your real IP address to the web. This type of proxy server does not hide your IP address.

Continue   Reading>>

How the Proxy servers working ? How it hides our IP Address.

You know that Proxy Servers is able to hide your IP address.   But you may not know what is the process of Server and How it hides the IP address.  This Post will explain it in details.

When we visit website using Proxy Server ,the request is send to Proxy server first.  Then from Proxy server the request will be send to the original Server.    So  The Sever assumes  that  request come from IP address of Proxy server.
Continue   Reading>>

Sunday, November 21, 2010

Access blocked website in college or school or net center-Proxy Server

In your college or school they restrict to see some sites ? You can access without any restrictions using the proxy server. 

What is Proxy?

Proxy server is some kind of a buffer between your computer and the designated internet destination. When you use a proxy server , your computer will send a request to the proxy server , then the proxy server will send it to the destination (for example a website), the destination will answer the request the proxy has sent and finally the proxy will return the data to you computer.

Continue   Reading>>
Older Post Home

© Break The Security. Copyright 2008 All Rights Reserved Revolution Two Church theme by Brian Gardner Converted into Blogger Template by Bloganol dot com