-
Hiding on the net
I am not sure were this is going?
There are a number of ways to hide on the net.
third party proxy servers are one way to go.
tools such as multi proxy or a new one on the market is stealther
http://www.multiproxy.org
http://www.stealther.com
What is the "Stealther" ?
* Features: Absolute anonymous Internet surfing
* No trace-back possible
* Automatically updated proxy-database
* Possibility to check proxies for availability
* LAN-Gateway with Content Control
* New identity on every website you open
* Protects you from data-spying
* ->> Absolutely protected privacy <<-
Stealther is a program which you use together with your web browser to ensure your anonymity when you surf the Internet and download files.
It allows you to hide your real identity from the websites you visit, block cookies and modify any information about your computer that is sent out by your web browser.
How Stealther works
Stealther is a proxy server agent that lets you travel the Internet with maximum possible privacy. It contains a large autoupdated database of anonymous proxy servers and allows you to easily logon to them and test their anonymity. This network of publicly accessible servers shield your current connection when you visit websites, download files, or use web-based e-mail accounts.
You can also block cookies with a single click of your mouse, watch the statistics of the current connection and explore the information sent out by your browser (great for learning more about how the Internet works!).
You can scan each proxy server, check its response time, confirm its anonymity and IP isolation factors. Stealther changes the proxy for each page automatically to ensure the maximum of security!
You can also SHARE your anonymous Internet connection with others over a LAN! Yes, you can use Stealther as a gate to the Internet. Install it on the computer connected to the Internet and set up web browsers on other computers on the LAN to use it as a proxy. If you are a network administrator working in an environment with special security requirements, you may be interested in some advanced features Stealther offers: modification of any HTTP variables, monitoring client requests, stop lists for clients and remote hosts, and much more. This is a complete and expandable solution for both individual users and businesses concerned with their security and privacy of Web communications.
IRC
There a number of socks / proxy applications to deal with this
Socks2http as an example
or just by using one proxy through your web browser - this is not the safest way to go.
You do have to check the qualty of the proxy you are going to use, but this is a whole other thread..
http://www.photono-software.de/Steal...ks-website.gif
-
Did you ever see TriangleBoy - it's similar but if you can't access the proxy for whatever reason it kicks into a pseudo P2P mode and bounces your data through other peoples connections to the proxies..
Everythings encrypted so you don't need to worry about people running packet sniffers etc..
http://www.safeweb.com/tboy_service.html
-
will have to check this out over the next few days.. my head
Due to the suspension of SafeWeb's online consumer privacy service, Triangle Boy usage is currently limited to our project with Voice of America to free the Internet in China. Therefore, all volunteers who have downloaded Triangle Boy will now have their computers point to servers that we have set up for Voice of America.
-
not sure about running throught their servers?
http://www.safeweb.com/images/diag_tboy.pdf
-
Unclex can you use programs such as Accsessdiver, through Stealther, and would this then make it pretty safe to use such a program ?
-
why would you want to do that - Accessdiver has a very good proxy soloution in it already.
Maybe you want to filter through a number at a time mmmmmmmmm
not tried this
set AD Proxy as local host of say multiproxy
maybe it will work - tell me
-
-
Yes I was hoping to filter through 2 sets of proxies, just to be sure. I really want to use access diver, but want to be sure myself that I am pretty untracable, (who doesn't ?).
If it works unclex can you give me a quick step by step, thx in advance.
-
check the other threads here