Skip to main content

How to hide ip?

Use Web Proxies
One of the most common and easiest ways to hide your IP address is to use a web proxy.
Some of the most popular, and better web proxies are:
HideMyAss
kproxy
daveproxy
Proxify
anonymouse
Please use these sites at your own risk!
Connect to a VPN Network
By connecting to a VPN network such as your workplace or educational institute, when you browse the internet, your external IP address would be the place to which you are connected to. Once you connect to a VPN network, the rules of what you can do on the network will depend on the network you connect to. For example, they may block access to torrents and adult materials through their internet server.
So that is an overview on how you can mask yourself and use a fake IP address. However, please be very careful when you use these services, especially from other websites as you do not know what malicious code they may have put on their sites.
In Firefox: Tools ““> Options ““> Advance ““> Network ““> Settings
Then just select Manual proxy configuration and enter the  proxy IP address in HTTP Proxy and the Port number. Hit OK.
In Internet Explorer: Tools ““> Internet Options ““> Connections ““> LAN Settings. Tick Use a proxy server for your LAN and enter the Address and Port number.
Hit OK. Once that is done, you can go to CanYouSeeMe and check that your IP is different to the one before you made the changes.
If you use a proxy, which one do you use? please tell us in the comments.

Comments

Popular posts from this blog

How to crack iOS device password.

Cracking iOS Passwords I’d venture to guess that many phone and tablet passwords ( really, they’re just 4-digit PINs) can be guessed outright. A mobile device gets lost or stolen and all the person recovering it has to do is try some basic number combinations such as 1234, 1212, or 0000. Soon, voilĂ ! — the system is unlocked. Many phones and tablets running iOS, Android, and Blackberry OS are configured to wipe the device if the incorrect password is entered X number of times (often 10 failed attempts). A reasonable security control indeed. But what else can be done? Some commercial tools can be used to crack simple passwords/PINs and recover information from lost or stolen devices or devices undergoing a forensics investigation.

How to Trace Location

Tracing the Location You would need to know the IP address of the webserver in order to trace the exact location. There are several methods to figure it out. We will use the simplest one, that is, the ping command. Ping command sends icmp echo requests to check if the website is up. It’s used for network troubleshooting purposes.

Linux basics

File Permission in Linux Although there are already a lot of good security features built into Linux-based systems, based upon the need for proper permissions, I will go over the ways to assign permissions and show you some examples where modification may be necessary. Wrong file permission may open a door for attackers in your system. Group Permission Owner —The Owner permissions apply only the owner of the file or directory; they will not impact the actions of other users. Group —The Group permissions apply only to the group that has been assigned to the file or directory; they will not affect the actions of other users. All User/Other —The All Users permissions apply to all other users on the system; this is the permission group that you want to watch the most. Each file or directory has three basic permission types: Read —The Read permission refers to a user’s capability to read the contents of the file. Write —The Write permissions refer to a user’s capability ...