Skip to main content

How to hide ip?

Use Web Proxies
One of the most common and easiest ways to hide your IP address is to use a web proxy.
Some of the most popular, and better web proxies are:
HideMyAss
kproxy
daveproxy
Proxify
anonymouse
Please use these sites at your own risk!
Connect to a VPN Network
By connecting to a VPN network such as your workplace or educational institute, when you browse the internet, your external IP address would be the place to which you are connected to. Once you connect to a VPN network, the rules of what you can do on the network will depend on the network you connect to. For example, they may block access to torrents and adult materials through their internet server.
So that is an overview on how you can mask yourself and use a fake IP address. However, please be very careful when you use these services, especially from other websites as you do not know what malicious code they may have put on their sites.
In Firefox: Tools ““> Options ““> Advance ““> Network ““> Settings
Then just select Manual proxy configuration and enter the  proxy IP address in HTTP Proxy and the Port number. Hit OK.
In Internet Explorer: Tools ““> Internet Options ““> Connections ““> LAN Settings. Tick Use a proxy server for your LAN and enter the Address and Port number.
Hit OK. Once that is done, you can go to CanYouSeeMe and check that your IP is different to the one before you made the changes.
If you use a proxy, which one do you use? please tell us in the comments.

Comments

Popular posts from this blog

How to crack iOS device password.

Cracking iOS Passwords I’d venture to guess that many phone and tablet passwords ( really, they’re just 4-digit PINs) can be guessed outright. A mobile device gets lost or stolen and all the person recovering it has to do is try some basic number combinations such as 1234, 1212, or 0000. Soon, voilĂ ! — the system is unlocked. Many phones and tablets running iOS, Android, and Blackberry OS are configured to wipe the device if the incorrect password is entered X number of times (often 10 failed attempts). A reasonable security control indeed. But what else can be done? Some commercial tools can be used to crack simple passwords/PINs and recover information from lost or stolen devices or devices undergoing a forensics investigation.

BackTrack and how to install it.

What Is BackTrack? So now that you are familiar with Linux, let me introduce you to BackTrack. BackTrack is a Linux penetration testing distro developed by Offensive Security especially for ethical hackers and penetration testers. It contains all the popular tools and software used for pen testing a variety of services, networks, and devices. BackTrack 5 is the latest version of the Linux penetration testing distro at the time of writing this chapter. It comes in two flavors: Gnome and KDE. Gnome is an Ubuntu-based Linux operating system that has officially been introduced only in the latest version of BackTrack. Here is a screenshot of BackTrack 5.

How to activate your windows

RemoveWat       Windows 7  Build 7600  This copy of windows is not genuine This is because your windows is not activated. To solve this you need activation key, which is not free. In this article i'll show you how to activate your window without paying  single bucks. All you need is one small application.