Monday 7 December 2009

Wi-Fi security Advices

Bookmark and Share

Wireless networking can open up whole new attack vectors .It doesn’t mean that you can’t make it securely, however, and I aim to give you some helpful ideas.

  1. Change Default Administrator Passwords (and Usernames), and use a strong password

    At the core of most Wi-Fi home networks is an access point or router. To set up these pieces of equipment, manufacturers provide Web pages that allow owners to enter their network address and account information. These Web tools are protected with a login screen (username and password) so that only the rightful owner can do this. However, for any given piece of equipment, the logins provided are simple and very well-known to hackers on the Internet. Change these settings immediately.

  2. Encrypt your Wireless

    You can turn your WPA / WEP Encryption, it would give a basic encryption.
    WPA / WEP Encryption is not a good solution because with a free available tool like aircrack, you can sniff wireless traffic protected by WEP and crack security in a matter of minutes. You have to use a stronger Encryption tool Like Comodo WiFi Encrytpion or Kaspersky Internet Security when it's available to you.

  3. Stop broadcasting your SSID

    Dangerous crackers who know what they are doing will not be deterred by a hidden SSID — the “name” you give your wireless network. Configuring your wireless router so it doesn’t broadcast your SSID does not provide “real” security, but it does help play the “low hanging fruit” game pretty well. A lot of lower-tier security crackers and mobile malicious code like botnet worms will scan for easily discovered information about networks and computers, and attack those that have characteristics that make them appear easy to compromise. One of those is a broadcast SSID, and you can cut down on the amount of traffic your network gets from people trying to exploit vulnerabilities on random networks by hiding your SSID. Most commercial grade router/firewall devices provide a setting for this.

  4. Enable MAC Address Filtering

    Each piece of Wi-Fi gear possesses a unique identifier called the physical address or MAC address. Access points and routers keep track of the MAC addresses of all devices that connect to them. Many products offer the owner an option to key in the MAC addresses of their home equipment, that restricts the network to only allow connections from those devices. Do this, but also know that the feature is not so powerful as it may seem. Hackers and their software programs can fake MAC addresses easily.

  5. Change the Default SSID

    Access points and routers all use a network name called the SSID. Manufacturers normally ship their products with the same SSID set. For example, the SSID for Linksys devices is normally "linksys." True, knowing the SSID does not by itself allow your neighbors to break into your network, but it is a start. More importantly, when someone finds a default SSID, they see it is a poorly configured network and are much more likely to attack it. Change the default SSID immediately when configuring wireless security on your network.

  6. Shut down the network when it’s not being used

    This bit of advice is even more dependent on specific circumstances than most of them. If you have the sort of network that does not need to be running twenty-four hours a day, seven days a week, you can reduce the availability of it to security crackers by turning it off when it isn’t in use. While many of us run networks that never sleep, and cannot really put this suggestion into practice, it is worth mentioning if only because one of the greatest improvements to the security of a system you will ever encounter is to simply turn it off. Nobody can access what isn’t there.

  7. Shut down your wireless network interface, too

    If you have a mobile device such as a laptop that you carry around with you and use in public, you should have the wireless network interface turned off by default. Only turn it on when you actually need to connect to a wireless network. The rest of the time, an active wireless network interface is nothing more than another attack vector for malicious security crackers to use as a target.

  8. Do Not Auto-Connect to Open Wi-Fi Networks

    Connecting to an open Wi-Fi network such as a free wireless hotspot or your neighbor's router exposes your computer to security risks. Although not normally enabled, most computers have a setting available allowing these connections to happen automatically without notifying you (the user). This setting should not be enabled except in temporary situations.

  9. Assign Static IP Addresses to Devices

    Most home networkers gravitate toward using dynamic IP addresses. DHCP technology is indeed easy to set up. Unfortunately, this convenience also works to the advantage of network attackers, who can easily obtain valid IP addresses from your network's DHCP pool. Turn off DHCP on the router or access point, set a fixed IP address range instead, then configure each connected device to match. Use a private IP address range to prevent computers from being directly reached from the Internet.

  10. Enable Firewalls On Each Computer and the Router

    Modern network routers contain built-in firewall capability, but the option also exists to disable them. Ensure that your router's firewall is turned on. For extra protection, consider installing and running personal firewall software on each computer connected to the router.

  11. Position the Router or Access Point Safely

    Wi-Fi signals normally reach to the exterior of a home. A small amount of signal leakage outdoors is not a problem, but the further this signal reaches, the easier it is for others to detect and exploit. Wi-Fi signals often reach through neighboring homes and into streets, for example. When installing a wireless home network, the position of the access point or router determines its reach. Try to position these devices near the center of the home rather than near windows to minimize leakage.
Bookmark and Share

Monday 9 November 2009

The best free antivirus software

Bookmark and Share

There are lots of free antivirus applications. These antivirus software are free and very effective too. Why do these companies give away the best antivirus free? They all have paid versions with more features that they would like you to buy.

All programs offer Windows versions.
Only Avast has a version for Macs.
  1. Avast Home Edition Free Antivirus :

    Avast antivirus provides a friendly user interface, while also being very customizable and feature complete. avast Home Edition includes ANTI-SPYWARE protection, , and ANTI-ROOTKIT detection based on the best-in class GMER technology

    Avast also does scanning on boot up if you choose to do so.
  2. Avira Personal Free Antivirus

    Avira is another one of the best free antivirus products. But the free version gives you a basic protection against spyware, it also gives you: AntiPhishing protection ,AntiRootkit , AntiDialer ,an attractive interface.



  3. AVG Antivirus Free Edition

    AVG is very popular antivirus software product. AVG has a friendly interface to use. AVG free edition detects both viruses and spyware.



    If you need a higher level of security from AVG, you can go with their paid version which gives your Web Shield and Lets you download and exchange files without risking virus infections, Advanced Anti-Rootkit protection, Game Mode protection. Or you can go further and have AVG Internet Security

  4. Bitdefender 10 Free Edition

    This is only an on-demand scanner and doesn't offer "real time" protection, which all four of the other scanners offer. BitDefender Free Edition uses the same ICSA Labs certified scanning engines used in the payed version. I wouldn't recommend it for anyone who needs any level of regular virus protection, but it's still very fast and thorough.

  5. Comodo Antivirus

    Comodo
    Firewall is very popular. Comodo antivirus is kinda new one but still effective , and gives you a good level of protection for no cost at all. Comodo Antivirus protect you against viruses, trojans , and spaywares. When you use both Coomodo Firewall and antivirus ( you get them both in the same installation package), I believe you get a higher security level than using antivirus alone.



    If you need more protection behind the free edition gives you, Comodo offers a pro edition which includes : antivirus + firewall+ Wi-Fi encryption + Remote tech support 24/7 for only $39

  6. Microsoft Security Essentials

    Microsoft Security Essentials provides real-time protection for your home PC that protects you against viruses, spyware. It is a very good tool from Microsoft ans it is free :) .

Sunday 8 November 2009

Why reading email in plain text is better?

Bookmark and Share

For many reasons HTML email message has become popular , colored fonts, embedded images ...etc. No doubt HTML makes email attractive and easier to read, but from a security standpoint , plain text is better and safer.

Why HTML-rendered email is dangerous?

  1. HTML-rendered email can include invisible images, and a hacker can execute a malicious code while loading the image for example :

    img src="http://www.hackerdomain.com/getemailcoockie.asp"

    An image like this can be used to execute a server-side script to read your email cookie to get your password. HTML-rendered email to track the message and giving the sender the ability too know whether an email was read,when it was read, and if it is forwarded to others. Spammers use this technique to know whether an email address is valid or not, and if the recipient like to read their spam. Plain text does not support image, so this scenario cannot happen.

  2. HTML-rendered email can open or download attachments to the system. Plain text email prevents email attachments from opening automatically.

  3. HTML-rendered email allows miscreant marketers and criminals to obfuscate the links, making them appear to point to somewhere else other than the user expected. These techniques are common in phishing scams, which often use scare tactics to entice a user to click a link allegedly leading to their bank or a well-known eCommerce site. Instead, the link takes the user to a website controlled by the scammer. It may look and feel like the website the user expected, but it's not. And behind the scenes, their login details and personal financial information are quietly being recorded for the criminal's later use.
    In plain text email, there are no hidden commands - the link displayed is the actual link.
Bookmark and Share

Sunday 1 November 2009

Best and free online virus scanners


Bookmark and Share


Free on-demand online virus scanner which scans and automatically cleans viruses, spyware &
malware. An online virus scanner cannot be considered a replacement for an installed antivirus scanner. But you can consider it as a second option. Here is a list of the best and free online scanners:
  1. BitDefender Online Scanner (IE Only):

    Incorporating the BitDefender award-winning scanning engines, BitDefender Online Scanner is an on-demand antivirus and antispyware tool that shows how safe your PC is. Accessible from your browser, it will scan and automatically clean the system memory, all files and drives' boot sectors.

  2. Kaspersky Online Scanner:

    One of the best online scanners. can be configured to scan individual files, folders, and drives - or target all email related files found on local and mapped drives.

  3. Tend Micro HouseCall:

    HouseCall can quickly identify and fix a wide range of threats including viruses, worms, Trojans, and spyware. It is now faster, more powerful and browser independent!

  4. ESET Online Scanner (IE Only):

    ESET Online Scanner is a user friendly, free and powerful tool which you can use to remove malware from any PC utilizing only your web browser without having to install anti-virus software. ESET Online Scanner uses the same ThreatSense® technology and signatures as ESET Smart Security/ESET NOD32 Antivirus, and is always up-to-date.

    IMPORTANT: Administrator privileges are required to run ESET Online Scanner.

  5. Symantec Online Scanner /Norton Online Scanner (IE Only):

    Download and install Norton Security Scan. It will automatically scan your computer every week, replacing the need for you to manually scan using Symantec Security Check. It’s quick, easy, and best of all, it’s free!

  6. Comodo AV Scanner:

    Comodo AV Scanner is a free service that lets you quickly find out whether your computer is infected with viruses and spyware. The scanner requires the installation of a small browser plug-in. This is a one time operation and takes around 3- 4 minutes depending on your Internet connection speed.

Saturday 31 October 2009

What to do when your Windows is infected

Bookmark and Share

Removing a virus infection surely is a difficult job. Anti-virus software can be very helpful, removing most of viruses easily. But sometimes, your computer may get infected with a really annoying virus which will not be removed with ease. Well, is it a dead end?

Viruses always load themselves when windows starts. Adding themselves to windows registry start up keys, or register as the file handler for a certain file type so every time that file type is loaded the virus is loaded first. To solve this dilemma (Starting Windows system without invoking the virus), you have to boot your system from a Bootable Windows CD or DVD and use it to log on your infected system.

Now, you have started your windows system and the virus is dormant, so far so good. Running your anti-virus now is not the best option, I recommend using anti-virus from a USB Drive. Plug in the USB drive before booing, and make sure to disable "autorun" option just in case your the USB drive was infected with an autorun worm. Now, shut down the computer ,plug in the USB drive, and start up your computer. Note that the bootable CD will not recognize the USB drive if it was not plugged in before computer booting. Scan your system and get rid of the invader.

I will not recommend using system restore point to get your system back,because usually viruses infect it too.

Here you are the AutoStart Entry Points in Windows:
  1. WIN.INI file:

    it's a file belongs to old winows versions (3.x and 9x) to load applications and configuration settings at startup. The pertinent sections to check in the WIN.INI file are the and lines located under the [Windows] heading.

  2. System.ini File:

    The system.ini file was used in earlier versions of Windows to load device drivers and the explorer shell. It is no longer used by Windows XP and above. The pertinent line to check in the system.ini file is , located under the [boot] heading.

  3. Startup Folder:

    The Windows Startup folder of the current logged on user can view startup folder inclusions through the Start menu:
    Start | Programs | Startup .

    You can view items in the Startup folder by navigating to:

    %USERPROFILE%\Start Menu\Programs\Startup (where %USERPROFILE%) signals the username of the logged on user)

    The common startup folder, applicable to all users:

    %ALLUSERSPROFILE%\Start Menu\Programs\Startup

  4. System Registry Run Keys:

    Windows uses specific registry keys values to load applications (including malware) when starting up. The values to examine are located in subkeys Run, RunOnce, RunServices, and RunServicesOnce, located in either of the following registry keys:

    HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\

  5. ASEPS Specific to ME, 2000, XP:

    Users running Windows ME, 2000 or XP will also want to check the following registry keys for any unexpected values:

    HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
    HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run

    HKCU = HKEY_CURRENT_USER
    HKLM = HKEY_LOCAL_MACHINE

  6. System Registry - Winlogon:
    Winlogon is responsible for supporting the DLL responsible for managing the interactive logon when Windows starts. Pre-Vista, that DLL provides a customizable user interface and authentication process. Malware that hooks into Winlogon can be particularly difficult to remove, as even booting into Safe Mode will not deactivate it. The string values that customize the Winlogon process are located in the following registry key:

    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
    Windows NT\CurrentVersion\Winlogon

  7. Active Setup:

    Any program specified by the StubPath value will be loaded when Windows is started. Pertinent key location is:
    HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\

  8. Upgrades from Windows 9x:

    Users who installed an upgrade version of ME, 2000, or XP over an installation of Windows 9x will also want to check the following registry locations:

    HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion
    HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion

    These keys will contain items from the and lines of the win.ini file used by Windows 9x.
Loading Sequence:

Which key runs first when windows starts up:

  • RunServices / RunServicesOnce - HKEY_LOCAL_MACHINE and HKEY_CURRENT_USER RunServices/RunServicesOnce will be launched concurrently. In the event of a conflict, precedent is given to HKEY_LOCAL_MACHINE. These ASEPS may continue loading during and after the login dialog.

  • Login Dialog (Winlogon).

  • RunOnce / Run for HKEY_LOCAL_MACHINE hive.

  • Run key in HKEY_CURRENT_USER hive.

  • Startup Folder.

  • RunOnce in HKEY_CURRENT_USER hive


Kaspersky ®

Anti-Virus 2010 45 days money back warranty

This improved and easy-to-use solution provides complete antivirus protection that allows you to surf the web safely and keeps your PC free of viruses, Internet and email worms, and Trojans.

Only $39.95

Make your Internet Explorer safer

Bookmark and Share
Internet Explorer has a built-in mechanism for controlling threatens and spyware. The good news is it's free.

First of all, make sure that you have the latest version of IE and all necessary updates have been installed. To have the latest version visit Windows Update Center

To begin, ensure you have the latest version of Internet Explorer and that all necessary patches and updates have been applied. To obtain the latest version and required updates, visit the Windows Update Center.

To access the Security Zones, open Internet Explorer, choose Tools from the menu, select Internet Options, and click the Security tab.


Security Zones
Internet Explorer provides four distinct security zones, each of them can be configured to provide custom protection for safer Internet browsing.

  • Internet zone - The Internet zone is the default zone for all sites not listed in other zones.

  • Local Intranet - Typically for local files or those coming from local networks.

  • Trusted Sites zone - Use the Trusted Sites zone for sites you visit frequently which require downloading files, playing Flash animations, or active scripting .

  • Restricted Sites zone - Use the Restricted Sites zone to suppress pop-up advertising, minimize the use of cookies, or otherwise restrict the actions allowed by listed sites.
Each of security zones (Internet, Local intranet, Trusted sites, and Restricted sites) can be configured to either a Custom Level or Default Level. All sites not listed elsewhere will default to the Internet Zone.

The Internet Zone :


The simplest - but also the restrictive (and secure) - method is to change the Internet Zone to High. To access the Security Zones, open Internet Explorer, choose Tools from the menu, select Internet Options, and click the Security tab. Make sure Internet is highlighted, then click the Default button and move the slide bar it reflects High.


To Set to Default Level (Medium). Make sure Internet is highlighted, then click the Default button, slide the bar until it reflects Medium. This provides the best compromise between security and browsing comfort. Although , this setting will not stop pop-ups, it will stop active scripting and ActiveX controls that are deemed unsafe and/or are not signed.

After setting the security level to Medium, surf the internet as usual for few days and watch sites behavior .When you find sites that display annoying pop-ups or displaying unwanted active content, copy and paste the URL of these sites into the restricted sites zone. Also, when you find a trusted site that does not work as usual ,copy and paste the URL into your trusted sites zone.

The Trusted zone:

You can add sites you trust or usually visit to the Trusted zone. As I mentioned before, you can set the Trusted Sites zone to Medium or Low, according to your needs.

To add sites to the Trusted sites zone, highlight the desired zone, click the Sites button. In the dialog box, type in the desired site's URL and click Add. To remove a site from the list, simply highlight it in the list and choose Remove.



Restricted Sites Zone :

Highlight Restricted Sites and select the Default Level, make sure that the slide bar is set to High. Conversely, you can customize the settings by choosing Custom Level . For the maximum safety and suppression of pop-ups, all active scripting should be disabled for the Restricted Sites zone.

To add sites to this zone, highlight the desired zone, then click the Sites button. In the dialog box, type in the desired site's URL (or copy and paste it from the Notepad file you created) and click Add. To remove a site from the list, simply highlight it and choose Remove.

Bookmark and Share

Thursday 29 October 2009

Protect yourself from Phishing Sites /Attacks


Bookmark and Share


What is Phishing?

Phishing is an e-mail fraud method in which the hacker sends out legitimate-looking email in an attempt to collect personal and financial information from you. Typically, the messages appear to come from well known Web sites. Web sites that are usually targeted by phishers include PayPal, eBay, MSN, Yahoo, Facebook, and America Online.

How To protect yourself from Phishing Attacks?

Well, there are two methods you can use to protect yourself from phishing:

The first one is: Netcraft Toolbar . Netcraft tool bar is a free toolbar Internet Explorer and Firefox. This tool will definitely help you a lot to catch phishing site. You will get this alert when visiting a Phishing site:

The Toolbar also:
  • Catch suspicious URLs containing characters which have no common purpose other than to deceive.
  • Enforces display of browser navigational controls (toolbar & address bar) in all windows, to defend against pop up windows which attempt to hide the navigational controls.
  • Clearly displays sites’ hosting location, including country, helping you to evaluate fraudulent urls (e.g. the real citibank.com or barclays.co.uk sites are unlikely to be hosted in the former Soviet Union).
http://toolbar.netcraft.com/help/tutorials/installing.html

The Second one (works only for IE 8):SmartScreen Filter.SmartScreen Filter is an option in Internet Explorer 8 that helps you avoid socially harmful phishing Web sites and online fraud browsing the Web.

SmartScreen Filter:
  • Checks Web sites against a dynamically updated list of reported phishing and sites.

  • Checks software downloads against a dynamically updated list of reported malicious software sites.

  • Helps prevent you from visiting phishing Web sites and other Web sites that contain malware that can lead to identity theft.
When you have the SmartScreen Filter turned on, if you attempt to visit a Web site that has been reported, the screen below appears and advises you not to continue to the unsafe Web site.


The SmartScreen Filter also warns you when you download unsafe software. The above warning screen will warn you that the download has been blocked for your safety.

In order to turn on SmartScreen Filter :
  • Click the Safety button. Point to SmartScreen Filter, and then click Turn On SmartScreen Filter.
  • In the SmartScreen Filter dialog box, click OK.
SmartScreen source: Microsoft Website


What to do if you came across a new phishing website?


Report it at once to the Anti-Phishing Working Group, the U.S. Federal Trade Commission (FTC) and the FBI through the Internet Fraud Complaint Center. They would shut down the sites and catch the responsible.


Other resources:

Phishing - Wikipedia, the free encyclopedia
Explains some common phishing methods and dangers.
http://en.wikipedia.org/wiki/Phishing

Anti-Phishing Working Group
Our mission is to provide a resource for information on the problem and solutions for phishing and email fraud.
http://www.antiphishing.org/

OnGuard Online - Phishing
Phishing section of an informational website run by the US Federal Trade Commission. Offers advice on how to spot, avoid and report phishing attacks.
http://onguardonline.gov/phishing.html

Recognize phishing scams and fraudulent e-mails
Phishing is a type of e-mail scam designed to steal your identity. Learn more about how this scam works and what a phishing e-mail message may look like.
http://www.microsoft.com/protect/yourself/phishing/identify.mspx

Bookmark and Share

Friday 23 October 2009

Download free PHP proxy scripts

here you can find free PHP proxy scripts for you to download for free, and start your own proxy site.

PHPROXY SCRIPT

PHProxy is a Web HTTP proxy programmed in PHP. It has similarities to CGIProxy by Jim Marshall, however, doesn't generally permit logging in, which means myspace and other user based sites are out. Options available are: disable JavaScript, accept cookies, show images, etc.

Phproxy Demo

Download Phproxy

ZELUNE PROXY SCRIPT

Zelune is a proxy script that uses Curl instead of the usual PHP or CGI. It is the latest to come out and appears to be pretty quick!

Zelune Demo

Download Zelune

CGI PROXY SCRIPT

Cgi proxy is the most common proxy sofwtare available. It is literally available on thousands of proxy websites across the internet. It has the ability to allow logging into sites like myspace etc... It uses less bandwidth than PHProxy, but much more RAM!

CGI proxy Demo

Download CGI Proxy

GLYPE PROXY SCRIPT

Glype Proxy is a free web-based proxy script written in PHP. It allows webmasters to quickly and easily set up their own proxy site. Glype Proxy is intended to be a fast and reliable alternative to the widely used PHProxy and CGIProxy. Glype proxy has been coded with a strict emphasis on speed, performance and usability.

Glype proxy Demo

Download Glype Proxy

SURROGAFIER PROXY SCRIPT

Surrogafier is a PHP proxy script which is easy to install and provides a 3 tier web proxy. It's free to use and distribute! Features include the ability to remove cookies, the HTTP referer field, the HTTP user-agent field, scripts on the page, and objects, altering the user-agent string to whatever you please, and tunnelling your proxied traffic through a second proxy.

Download Surrogafier Proxy

Friday 9 October 2009

Firefox proxy addson

Hello, Here you are very useful proxy ad-dons for Firefox. With these tools you don't have to use any web proxy to surf the internet. These ad-dons do exactly the same what web proxies do, hide your IP, pass work or school firewall. Of course you have to install them first to your Firefox.
Works with Firefox: 1.5 – 3.0.*
  • ProxySel 1.3.12b

    Import proxy lists in different formats, available from http://proxy-list.org/en/ or
    http://www.checkedproxylists.com/
    or import Proxys from any webpage directly.


    The Proxy selection and processing utility is a Mozilla extension that let you select a proxy from a drop down menu. You may import proxy lists in different formats, available from
    http://www.checkedproxylists.com/ or
    http://proxy-list.org/
    Download the list you want, save it on disk and import it into ProxySel.


    Works with Firefox: 2.0 – 3.1b2

    Homepage http://www.lssystems.at/

  • Tor-Proxy.NET Toolbar 0.3.2
    Get Safety and Anonymity by using TOR-Proxy.NET for surfing! Tor-Proxy.NET is a CGI-Web-Proxy, which tunnels your traffic through different anonymization-networks. That way you get high anonymity.

    Works with Firefox: 1.0 – 3.5.*

    Homepage http://tor-proxy.net

    Install it

  • Phzilla (formerly PhProxy - InBasic) 3.5.1B
    PhZilla acts as a protective screener between the user and the internet. The server downloads the page into its memory, and then displays it to the user. From the point-of-view (in the technical sense) of the host hosting the target site, only the server visited. This means only the server's IP will be logged, and not the user's (Ref: wikipedia)

    Usage: After installation, in Status-bar 'P Icon' appears.

    Install It

  • Gladder 2.0.4.1
    A proxy tool works on a customizable sites list!
    with it, you can:
    * visit wikipedia.org and its sister sites
    * visit google cached page
    * visit gmail and orkut more stably (with https connection)
    * with one click, add a site to a list then any page in the site will be opened with a web proxy

    Install it

Wednesday 12 August 2009

Free Web Proxies For Anonymous Surfing

Free Web Proxies For Anonymous Surfing

  1. http://vtunnel.comVTunnel is more than just a web proxy; much more. Since secure SSL encryption (https://) is exceptionally harder to block than conventional http browsing, they’ve incorporated it as an option. Their SSL proxy can even be used to log into your MSN, AIM, Yahoo!, ICQ, GTalk, MySpace, FaceBook and eBuddy accounts, all within the browser. VTunnel even unblocks YouTube.com, without any noticeable lag in video streaming playback.

    As with most free web proxies, VTunnel incorporates advertisements into the service (including pop-unders), although they are easily blocked by using the AdBlock Plus addon for Firefox.

    Why VTunnel is #1 — Browsing is very speedy; you’ll hardly even notice you’re surfing anonymously, even on their SSL version. The anonymous web messaging is a huge plus, as well. Below is a look at MSN through VTunnel (in silent mode).

  2. http://hidemyass.comHideMyAss! offers quite a selection of anonymizing features, including disposable anonymous email accounts (for receiving only); free proxy lists (for importing into browsers as manual proxies); file and image hosting (up to 400 MB filesize); link anonymizer; anonymous Google searching; and, of course, an anonymous web proxy that supports YouTube, YouPorn.com, RedTube.com (yes… anonymous 18+ browsing), and social sites (Myspace - do people still really use this?; Gmail.com; Facebook.com, etc.).

    Why HideMyAss is #2 — Comes with a complete repertoire of options! If we were to choose a "best" feature, it would be the ability to filter working proxies from selected countries in the free proxy list. This is great for using (even temporarily) to sign up for services that aren’t available in your region (such as Spotify.com for U.S./Canadians).

  3. http://proxy.org — While Proxy.org isn’t in itself a web proxy, it contains the most complete and up-to-date listings of proxies found anywhere on the ‘Net. Proxies can be sorted by country, IP, ISP, software (PHProxy, CGI, Glyph, Surrogafier, cURL, etc.), SSL proxies, even Tor servers.

    Why Proxy.org is #3 — If you’re a fan of huge proxy lists, Proxy.org currently has 6,742 working proxies indexed. The best part is, users can enter in a URL of an intended site, and then click one of the proxies in which to surf anonymously with - this is great for anyone who needs to use a specific country proxy.

  4. www.xroxy.comXROXY allows users to browse through proxy criteria by using dropdown boxes, in order to filter between SSL, free & paid, cookie/scripts management - from their list of 525 proxies (509 of which are free). Additionally, "elite" users can subscribe to hand-picked proxy lists. Registered members (it’s free) are able to join in the Xorum (XROXY Forum) and browse the daily-updated lists of free, working proxies.


    Note
    : in order to use sites such as youtube.com you need to register at XROXY.

  5. http://evadefilters.comEvadeFilters is a brand-new startup that’s really taking off as of late. With a cool easy-to-use Web2.0 interface, browsing your favorite video or social bookmarking site is a breeze! Similar to VTunnel, it also supports messaging services (MSN, AIM, Yahoo, GTalk) in the browser.

    In our tests, YouTube streaming is perfect, not to mention catch-free. You won’t need to sign up - just click and go! Look for EvadeFilters.com to really take off.

  6. www.unblockall.netUnBlockAll is a regular CGI proxy, but it’s mainly marketed towards the unblocking of social bookmarking sites. Simply drag n’ drop a social bookmarking icon into the URL window, and click GO! - then just login to your account as usual.

    Similar to VTunnel, it also supports messaging services (MSN, AIM, Yahoo, GTalk) in the browser. One drawback to UnBlockAll is it doesn’t support SSL (yet?), so many users are still being blocked by aggressive work restrictions.

  7. www.the-cloak.comthe Cloak comes with a good array of features, although they really push towards the paid (subscribed) service. YouTube video streaming worked perfectly the first time; however, when leaving YouTube and trying to go back to it, we were blocked for 6 hours from accessing ANY sites through The Cloak. While fast, and free - it’s not for heavy proxy users.

  8. www.proxyboxonline.comProxyBoxOnline doesn’t offer any frills, but if you’re looking to unblock YouTube (with perfect playback), MySpace, Facebook and whatever else, then here’s a simple solution. It makes the list because it’s totally free, and offers SSL as an option.
  9. http://www.lekro.com With this free proxy site you can start surfing the Internet anonymously and privately. All you have to do is type in a website address into the proxy form just as you would in your browser window.

  10. http://anonymouse.org - Anonymouse has been around for over 10 years, and has become one of the most trusted sources for anonymous browsing. What sets Anonymouse apart from the rest is the ability to send anonymous emails and Usenet message posting - both of which when sent are randomly delayed up to 12 hours to maximize privacy.

Friday 24 July 2009

SurfSecret Privacy Protector | Safely Browse the Internet and Secure Your Identity

Privacy Protector

Everything you do online is being tracked.
Hide your Internet footprint.


Product Highlights:

  • Hides your Internet footprint
  • Clears histories, cookies, “recently used” lists
  • Keeps your PC running fast
  • Clears hard drive space
  • Advanced data destruction
  • Stealth mode

Purchase Now - $29.95


Privacy Protector Features & Benefits

Traces of Your Activity are being stored all over your computer every time you visit a website, go online, download a file, or simply play a media file. Privacy Protector actively erases these tracks and wipes your computer clean - protecting you from prying eyes.

  • Erase Your Tracks
    Automatically clean hundreds of locations on your computer and reliably remove temporary Internet files, image caches, search histories, website histories, index.dat files, cookies, recently used files, and many other revealing footprints.

  • Free Up Space and Speed on Your PC
    Privacy Protector removes hundreds of megabytes of files cluttering your PC, freeing your valuable hard drive space and optimizing your PC’s performance.

  • Works with Major Browsers, Media Players, and 3rd Party Apps
    Privacy Protector works with Internet Explorer, Firefox, Mozilla, Opera, AOL, Google Chrome, Windows Media Player, Real Player, QuickTime, Limewire and dozens of other 3rd party applications.

  • Advanced Features and Scheduling
    Privacy Protector includes automatic scheduled cleaning options, advanced data destruction for permanent removal of files, stealth mode and boss-key to operate invisibly.
Privacy Protector™ System Requirements
  • Microsoft Windows 95/98/NT/ME/2000/XP/Vista
  • 1Mb RAM
  • Takes up a super-small 750k (<1mb)>

Set a Proxy Server in Skype

Set a Proxy Server in Skype

It is very easy to do, simply follow the instructions for setting a Proxy Server in Internet Explorer and you should have no problems.

Configure YIM For Use With Proxy Servers

Setting Up YIM For The Proxy

  1. Click on Messenger (older versions click on Login) and then choose Preferences as shown below

  2. Follow these instructions :
    • Click on Connection.
    • Click into the radio button for Use proxies.
    • Put a check in the box Enable SOCKS proxy.
    • Type in the proxy ip address in the Server Name area.
    • Type the proxy port .
    • Select the radio button Ver 5 .
    • Check the box next to Authentication
    • Enter your proxy user name and password (if any).



  3. Socks 5 is the best protocol to use for YIM and other messenger type programs because the socks connections do not time out as easily as HTTP connections do. You can choose to use HTTP or HTTPS connections at your own risk, but this could cause your YIM or other messenger programs to instantly close their connections without warning.

  4. Restart your YIM by clicking on the Apply button and reconnect. It will now be using the socks 5 proxy.

Thursday 23 July 2009

Configure MSN Messenger For Use With Proxy Servers

How to configure MSN with Proxy servers

  1. Click on the Tools and then choose Options as shown below



  2. Click on Connection
    Click on the Advanced Settings button


  3. As shown in the image below:
    • Put a check in the box for SOCKS version 5
    • Type in the proxy ip address in the Socks 5 Server.
    • Type in the proxy Port.
    • Enter your proxy user name and password (if any) in the Socks 5 User ID and password section.



  4. Click on the Test SOCKS 5 Connection button.
    Click on OK
    until you are back to the main MSN screen.
    Restart your MSN and reconnect. It will now be using the socks 5 proxy
    .
Only for $39