Skip to main content

How to hide ip?

Use Web Proxies
One of the most common and easiest ways to hide your IP address is to use a web proxy.
Some of the most popular, and better web proxies are:
HideMyAss
kproxy
daveproxy
Proxify
anonymouse
Please use these sites at your own risk!
Connect to a VPN Network
By connecting to a VPN network such as your workplace or educational institute, when you browse the internet, your external IP address would be the place to which you are connected to. Once you connect to a VPN network, the rules of what you can do on the network will depend on the network you connect to. For example, they may block access to torrents and adult materials through their internet server.
So that is an overview on how you can mask yourself and use a fake IP address. However, please be very careful when you use these services, especially from other websites as you do not know what malicious code they may have put on their sites.
In Firefox: Tools ““> Options ““> Advance ““> Network ““> Settings
Then just select Manual proxy configuration and enter the  proxy IP address in HTTP Proxy and the Port number. Hit OK.
In Internet Explorer: Tools ““> Internet Options ““> Connections ““> LAN Settings. Tick Use a proxy server for your LAN and enter the Address and Port number.
Hit OK. Once that is done, you can go to CanYouSeeMe and check that your IP is different to the one before you made the changes.
If you use a proxy, which one do you use? please tell us in the comments.

Comments

Popular posts from this blog

How to crack iOS device password.

Cracking iOS Passwords I’d venture to guess that many phone and tablet passwords ( really, they’re just 4-digit PINs) can be guessed outright. A mobile device gets lost or stolen and all the person recovering it has to do is try some basic number combinations such as 1234, 1212, or 0000. Soon, voilĂ ! — the system is unlocked. Many phones and tablets running iOS, Android, and Blackberry OS are configured to wipe the device if the incorrect password is entered X number of times (often 10 failed attempts). A reasonable security control indeed. But what else can be done? Some commercial tools can be used to crack simple passwords/PINs and recover information from lost or stolen devices or devices undergoing a forensics investigation.

How to Trace Location

Tracing the Location You would need to know the IP address of the webserver in order to trace the exact location. There are several methods to figure it out. We will use the simplest one, that is, the ping command. Ping command sends icmp echo requests to check if the website is up. It’s used for network troubleshooting purposes.

MAC address

What Is a MAC Address? The MAC address is a unique value associated with a network  adapter . MAC addresses are also known as  hardware addresses or  physical addresses. They uniquely identify an adapter on a LAN . MAC addresses are 12-digit hexadecimal numbers (48 bits in length). By convention, MAC addresses are usually written in one of the following two formats: MM:MM:MM:SS:SS:SS MM-MM-MM-SS-SS-SS The first half of a MAC address contains the ID number of the adapter manufacturer. These IDs are regulated by an Internet standards body (see sidebar). The second half of a MAC address represents the serial number assigned to the adapter by the manufacturer. In the example, 00:A0:C9:14:C8:29 The prefix 00A0C9 indicates the manufacturer is Intel Corporation. Why MAC Addresses? Recall that TCP/IP and other mainstream networking architectures generally adopt the  OSI model . In this model, network functionality is subdivided into layers. MAC address...