+ Reply to Thread
Page 1 of 2 12 LastLast
Results 1 to 15 of 20

Thread: Getting Anonymous

  1. #1

    Join Date
    03.09.09
    Posts
    277
    Activity Longevity
    0/20 18/20
    Today Posts
    0/5 ssssss277

    Getting Anonymous

    HOW TO GET ANONYMOUS ONLINE

    7 STEPS PROCEDURE

    1. INSTALL PROXIFIRE MASTER SUITE professional
    2. GET IP RANGES FORM My IP Address Location: Find IP Address Search - IP Lookup Locator of your choice
    3. Extract Anonymous L2 proxies
    4. Put them in Socks chain
    5. in Socks chain click proxy manager click test all that's it
    6. click services modify > select port of your choice e.g. 1081
    7. enter 127.0.0.1 and port 1081 in connection settings of any Internet
    application you want to browse internet with.

    Possibilities are endless;
    A) Internet explore/ FireFox
    B) IRC

    THE END





    Enjoy your freedom


    That was my way wot's yours ?








    NOTE: You can find Software mentioned above using google,
    Last edited by SBcheater; 19.09.09 at 23:07. Reason: correction in the port number
    Reply With QuoteReply With Quote
    Thanks

  2. Who Said Thanks:

    Renk (20.09.09) , Dynamic (20.09.09) , Nickname (19.09.09) , SealLion (19.09.09) , Empoleon (19.09.09) , anon (19.09.09)

  3. #2
    Moderator anon's Avatar
    Join Date
    01.02.08
    Posts
    39,498
    Activity Longevity
    13/20 19/20
    Today Posts
    1/5 ssss39498
    That was my way wot's yours ?
    When you'd rather not reveal your real IP, there are many possibilities:
    • Ultrasurf/JAP
    • Tor
    • Web (CGI, PHP) proxies
    • Free VPNs such as Hotspot Shield, UltraVPN, PacketiX, ItsHidden, CyberGhost, etc.
    • Using the AOL software (here's how)
    • Spoofing your MAC and wardriving through town every day to connect to unsecure Wi-Fi hotspots
    "I just remembered something that happened a long time ago."
    Reply With QuoteReply With Quote
    Thanks

  4. Who Said Thanks:

    Renk (21.09.09)

  5. #3

    Join Date
    23.07.09
    Posts
    110
    Activity Longevity
    0/20 18/20
    Today Posts
    0/5 ssssss110
    Handy guide there, not bad for a 3rd post.
    Reply With QuoteReply With Quote
    Thanks

  6. #4

    Join Date
    03.09.09
    Posts
    277
    Activity Longevity
    0/20 18/20
    Today Posts
    0/5 ssssss277
    Quote Originally Posted by anon View Post
    When you'd rather not reveal your real IP, there are many possibilities:

    You have mentioned great options dear ANON , but i personally like software such as socks chain , proxyfire and so on, because they are highly customizable you can define length of proxy chain ranging from 2 proxies to several hundred moreover you can also define session timeout (cycle btw proxy chain timeout) at your own , and this function really gives you an edge ...
    Reply With QuoteReply With Quote
    Thanks

  7. #5
    Moderator anon's Avatar
    Join Date
    01.02.08
    Posts
    39,498
    Activity Longevity
    13/20 19/20
    Today Posts
    1/5 ssss39498
    to several hundred
    Which probably kills your connection
    "I just remembered something that happened a long time ago."
    Reply With QuoteReply With Quote
    Thanks

  8. #6

    Join Date
    03.09.09
    Posts
    277
    Activity Longevity
    0/20 18/20
    Today Posts
    0/5 ssssss277
    Quote Originally Posted by anon View Post
    Which probably kills your connection

    you can also control this in Sockschain .. increase session time out and your connection will be alived .. but proxies are not the full and permanent solutions in case if you want to cheat tracker in order to get more then 1 account on them because sooner or later the proxies we extract from web perishes away and ultimately we have to start all over again to look for a new IP for ourself
    Reply With QuoteReply With Quote
    Thanks

  9. #7
    Moderator anon's Avatar
    Join Date
    01.02.08
    Posts
    39,498
    Activity Longevity
    13/20 19/20
    Today Posts
    1/5 ssss39498
    increase session time out and your connection will be alived ..
    You're right, but I meant speed - tunneling your traffic through 2 servers isn't the same as doing it through a hundred ones, specially if they're public.

    And yes, they also come and go...
    "I just remembered something that happened a long time ago."
    Reply With QuoteReply With Quote
    Thanks

  10. #8

    Join Date
    03.09.09
    Posts
    277
    Activity Longevity
    0/20 18/20
    Today Posts
    0/5 ssssss277
    Quote Originally Posted by anon View Post
    tunneling your traffic through 2 servers isn't the same as doing it through a hundred ones, specially if they're public.
    ^ Also its insecure unless you give above set the support of a wickedly excavated SSH tunnel. (open ssh /open ssh < - - - > putty)
    Reply With QuoteReply With Quote
    Thanks

  11. #9

    Join Date
    30.05.08
    Location
    Predator Planet
    Posts
    49
    Activity Longevity
    0/20 19/20
    Today Posts
    0/5 sssssss49
    I want to mention I2P. Just for the sake of completion of the list! It's another anon-network that has specified on p2p. It's under active development and i'm pretty sure it's going to grow real big!
    Reply With QuoteReply With Quote
    Thanks

  12. #10
    Moderator anon's Avatar
    Join Date
    01.02.08
    Posts
    39,498
    Activity Longevity
    13/20 19/20
    Today Posts
    1/5 ssss39498
    There are many anonymous P2P networks - AntsP2P, MUTE, WASTE, etc. The problem with them is often the amount of available content and also speeds, they're run by people with home connections and need a lot of encryption overhead.
    "I just remembered something that happened a long time ago."
    Reply With QuoteReply With Quote
    Thanks

  13. #11

    Join Date
    16.08.09
    Location
    YOU can guess bUT CANT CATCH
    P2P Client
    anything that meets me
    Posts
    455
    Activity Longevity
    0/20 18/20
    Today Posts
    0/5 ssssss455
    thats gud...but somewhere on sb i read abt SRWARE ICON...trust me..its works perfect......i loving it...

    just for protection i turn on incognito too..so dont have to worry

    hows this idea?
    Reply With QuoteReply With Quote
    Thanks

  14. #12
    Moderator anon's Avatar
    Join Date
    01.02.08
    Posts
    39,498
    Activity Longevity
    13/20 19/20
    Today Posts
    1/5 ssss39498
    I think you mean Iron? And this:

    just for protection i turn on incognito too..so dont have to worry
    Only doesn't record traces, it doesn't prevent sites from knowing your IP.
    "I just remembered something that happened a long time ago."
    Reply With QuoteReply With Quote
    Thanks

  15. #13

    Join Date
    16.08.09
    Location
    YOU can guess bUT CANT CATCH
    P2P Client
    anything that meets me
    Posts
    455
    Activity Longevity
    0/20 18/20
    Today Posts
    0/5 ssssss455
    yup...my mistake..iron..works grt..grt speed of surfing..love it..
    Reply With QuoteReply With Quote
    Thanks

  16. #14

    Join Date
    03.09.09
    Posts
    277
    Activity Longevity
    0/20 18/20
    Today Posts
    0/5 ssssss277
    Quote Originally Posted by anon View Post
    I think you mean Iron? And this:
    Only doesn't record traces, it doesn't prevent sites from knowing your IP.

    Sounds interesting I will also give it a try. when you really want to hide yourself on sacrifice of your speed you can use above method that i mentioned.


    I have successfully implemented above method in getting more then one invites to other trackers and distributing them among the person in need and joining again those tracker from where I was caught cheating
    Reply With QuoteReply With Quote
    Thanks

  17. #15
    Advanced User Renk's Avatar
    Join Date
    17.08.08
    Location
    Elsewhere
    P2P Client
    utorrent
    Posts
    581
    Activity Longevity
    1/20 19/20
    Today Posts
    0/5 ssssss581
    Quote Originally Posted by ovais View Post
    because they are highly customizable you can define length of proxy chain ranging from 2 proxies to several hundred
    The tools you are speaking about are very interesting on a technical point of view. But from a security and anonymity point of view, I think chaining proxies is not so great: Your anonymity/safety/security is compromised as soon as at least one of the proxy in the chain is spying, retaining data or worse injecting malicious code. So the global security level tends to decrease as the lenght of the chain increases. This issue is not the same as in Tor, in witch the data flow between the 2 or 3 proxies of the chain is layer encrypted.

    If you are concerned about on line anonymity, I advice you the latest beta verson of Jondo client (+ jondnym profile for the browser): One of the recent -experimental- feature consists to acces to Tor network through Jondo's cascades:

    https://www.jondos.de/en/help/services.html

    You could access to Tor through I2P as well (with a vpn).
    Last edited by Renk; 21.09.09 at 00:41.
    Reply With QuoteReply With Quote
    Thanks

+ Reply to Thread
Page 1 of 2 12 LastLast

Tags for this Thread

Posting Permissions

  • You may post new threads
  • You may post replies
  • You may not post attachments
  • You may not edit your posts
  •