IP Address | Anonymity Type | Checked time | Country/State (City) |
---|---|---|---|
101.66.251.72:80 | transparent proxy | Nov-05-2013 | China (Hangzhou) |
103.245.197.124:80 | transparent proxy | Nov-05-2013 | India |
103.245.197.124:8080 | transparent proxy | Nov-05-2013 | India |
103.31.243.157:80 | transparent | Nov-05-2013 | Hong Kong |
103.4.144.246:8080 | transparent proxy | Nov-05-2013 | Bangladesh (Dhaka) |
103.4.175.82:3128 | transparent proxy | Nov-05-2013 | Indonesia |
103.6.85.214:3128 | transparent | Nov-05-2013 | Hong Kong (Hong Kong) |
106.3.209.211:3128 | transparent proxy | Nov-05-2013 | China (Jiubao) |
109.175.8.53:8080 | transparent proxy | Nov-05-2013 | Bosnia and Herzegovina (Sarajevo) |
109.195.34.64:8080 | transparent proxy | Nov-05-2013 | Russian Federation (Barnaul) |
109.195.66.224:3128 | transparent proxy | Nov-05-2013 | Russian Federation (Krasnoyarsk) |
109.196.127.35:8888 | transparent proxy | Nov-05-2013 | Poland (Debica) |
109.196.210.110:8080 | anonymous proxy | Nov-05-2013 | Russian Federation (Zheleznogorsk) |
109.197.92.60:8080 | transparent | Nov-05-2013 | Russian Federation (Urengoy) |
109.205.114.12:80 | transparent proxy | Nov-05-2013 | Iraq |
109.207.61.129:8090 | transparent | Nov-05-2013 | Poland (Strzelin) |
109.207.61.142:8090 | transparent proxy | Nov-05-2013 | Poland (Strzelin) |
109.207.61.143:8090 | transparent | Nov-05-2013 | Poland (Strzelin) |
109.207.61.158:8090 | transparent | Nov-05-2013 | Poland (Strzelin) |
109.207.61.161:8090 | transparent proxy | Nov-05-2013 | Poland (Strzelin) |
109.207.61.162:8090 | transparent proxy | Nov-05-2013 | Poland (Strzelin) |
109.207.61.166:8090 | transparent proxy | Nov-05-2013 | Poland (Strzelin) |
109.207.61.167:8090 | transparent proxy | Nov-05-2013 | Poland (Strzelin) |
109.207.61.169:8090 | transparent proxy | Nov-05-2013 | Poland (Strzelin) |
109.207.61.176:8090 | transparent | Nov-05-2013 | Poland (Strzelin) |
109.207.61.181:8090 | transparent | Nov-04-2013 | Poland (Strzelin) |
109.207.61.184:8090 | transparent | Nov-05-2013 | Poland (Strzelin) |
109.207.61.185:8090 | transparent | Nov-05-2013 | Poland (Strzelin) |
109.207.61.187:8090 | transparent proxy | Nov-05-2013 | Poland (Strzelin) |
109.207.61.194:8090 | transparent | Nov-05-2013 | Poland (Strzelin) |
109.207.61.196:8090 | transparent proxy | Nov-05-2013 | Poland (Strzelin) |
109.207.61.207:8090 | transparent proxy | Nov-05-2013 | Poland (Strzelin) |
109.207.61.209:8090 | transparent proxy | Nov-05-2013 | Poland (Strzelin) |
109.207.61.212:8090 | transparent proxy | Nov-05-2013 | Poland (Strzelin) |
109.207.61.215:8090 | transparent | Nov-05-2013 | Poland (Strzelin) |
Tuesday, 5 November 2013
Fresh Proxy IP Address for November 2013
Wednesday, 21 November 2012
Fresh Free Proxy Websites
Fresh free Proxy Websites
When you want to visit a website from a place like your work place for example and it's banned or you are not allowed to open it, the easiest way to reach out to that website is through a Web proxy Server.Here is a list of 10 popular free proxy websites:
- Hide my ass
http://hidemyass.com/ - Youhide
http://www.youhide.com - KingSurfProxy
http://kingsurfproxy.com/ - TryCatchMe
http://www.trycatchme.com/ - MegaProxy
https://www.megaproxy.com/freesurf/ - Proxy Website
http://www.proxywebsite.org/ - Proxify
http://proxify.com/ - BlewPass
http://blewpass.com/ - NewIPNow
http://newipnow.com/ - ProxEasy
http://www.proxeasy.com/webclient.aspx
Tuesday, 20 November 2012
How to get and install SSL Certificate
How to get and install SSL Certificate in your website
SSL (Secure Sockets Layer) is the standard security technology for establishing an encrypted link between a web server and a browser.
If you are looking for an SSL vendor then I recommend Godaddy for you, as Godaddy gives you the certificate in a lower cost, powerful 256-bit encryption and 99% browser recognition, all within minutes.
You can have the certificate for $69.99/yr, while you would have to pay $399 for a vendor like Verisign just to get the same quality and service.
P.S:When you order do not forget to use this code: gdx717a and save 33% off your order
SSL (Secure Sockets Layer) is the standard security technology for establishing an encrypted link between a web server and a browser.
If you are looking for an SSL vendor then I recommend Godaddy for you, as Godaddy gives you the certificate in a lower cost, powerful 256-bit encryption and 99% browser recognition, all within minutes.
You can have the certificate for $69.99/yr, while you would have to pay $399 for a vendor like Verisign just to get the same quality and service.
P.S:When you order do not forget to use this code: gdx717a and save 33% off your order
Labels:
comodo,
Godaddy,
secure internet,
security,
SSL,
SSL Certificate
Proxies-November-2012
Fresh proxy list from different countries and places.Free new proxies for November 2012 IP address Anonymity level Checked time Country 223.207.109.164:3128 anonymous Nov-19, 16:18 Thailand 94.23.52.82:3128 anonymous Nov-20, 06:35 France 200.106.149.26:80 anonymous Nov-20, 08:23 Panama 203.216.8.50:8080 anonymous Nov-20, 08:18 Japan 176.28.20.20:80 anonymous Nov-20, 08:15 Germany 119.73.68.89:8118 anonymous Nov-19, 21:36 Pakistan 91.220.220.3:3128 anonymous Nov-20, 07:53 118.172.107.153:8080 anonymous Nov-20, 06:42 Thailand 109.121.196.2:80 anonymous Nov-20, 06:37 Bulgaria 180.183.150.36:3128 anonymous Nov-19, 13:32 Thailand 178.131.51.169:8080 anonymous Nov-20, 08:15 Iran, Islamic Republic of 205.213.195.80:8080 anonymous Nov-19, 19:29 United States 31.43.56.9:8008 high-anonymous Nov-19, 21:31 Ukraine 183.28.214.19:6675 high-anonymous Nov-20, 00:11 China 61.135.209.203:81 high-anonymous Nov-20, 06:41 China 92.244.127.31:54321 high-anonymous Nov-19, 22:16 Ukraine 190.102.17.240:80 high-anonymous Nov-20, 07:00 Netherlands Antilles 218.2.51.72:8090 high-anonymous Nov-20, 07:22 China 125.211.50.183:6666 high-anonymous Nov-20, 07:00 China 63.221.152.123:80 high-anonymous Nov-20, 08:20 United States 184.73.8.192:8181 high-anonymous Nov-20, 09:11 United States 111.121.135.135:6673 high-anonymous Nov-19, 10:50 China 61.187.186.150:81 high-anonymous Nov-20, 08:18 China 115.236.38.46:8909 high-anonymous Nov-20, 08:30 China 208.78.160.118:80 high-anonymous Nov-20, 08:23 United States 176.74.190.104:80 high-anonymous Nov-20, 06:53 United Kingdom 85.214.241.222:8080 high-anonymous Nov-20, 06:34 Germany 61.183.9.20:8080 high-anonymous Nov-20, 06:44 China 163.30.162.1:80 high-anonymous Nov-20, 08:27 Taiwan 67.55.115.76:8080 high-anonymous Nov-20, 08:24 United States 122.102.44.38:3128 high-anonymous Nov-20, 08:24 Indonesia 61.136.68.76:808 high-anonymous Nov-20, 08:25 China 61.163.231.164:8080 high-anonymous Nov-20, 08:27 China 95.181.33.22:8080 high-anonymous Nov-20, 10:02 Russian Federation 216.224.174.116:8888 high-anonymous Nov-20, 08:55 United States 89.28.65.46:6588 high-anonymous Nov-20, 06:34 Moldova, Republic of 222.132.80.62:1337 high-anonymous Nov-20, 07:23 China 61.135.209.203:81 high-anonymous Nov-20, 06:41 China 72.51.38.117:8118 high-anonymous Nov-20, 08:28 United States 63.221.152.100:80 high-anonymous Nov-20, 07:55 United States 188.32.230.139:8080 high-anonymous Nov-20, 07:42 Russian Federation 109.235.60.74:80 high-anonymous Nov-20, 08:30 Germany 84.111.192.82:54321 high-anonymous Nov-20, 08:55 Israel 50.23.65.22:3128 high-anonymous Nov-20, 08:20 United States 63.221.152.125:80 high-anonymous Nov-20, 08:02 United States 202.119.199.147:8080 high-anonymous Nov-20, 08:30 China 24.184.220.156:8118 high-anonymous Nov-20, 06:22 United States 94.203.168.6:80 high-anonymous Nov-20, 08:21 United Arab Emirates 50.17.244.179:80 high-anonymous Nov-20, 08:25 United States 112.125.120.145:10080 high-anonymous Nov-20, 06:53 China 218.108.169.2:82 high-anonymous Nov-20, 07:17 China 188.125.161.243:5050 high-anonymous Nov-20, 08:22 Turkey 221.7.11.165:80 high-anonymous Nov-20, 08:21 China 124.237.78.137:8080 high-anonymous Nov-20, 08:45 China 78.188.58.196:8086 high-anonymous Nov-19, 10:35 Turkey 117.34.70.68:9000 high-anonymous Nov-20, 08:15 China 87.204.86.125:3128 high-anonymous Nov-20, 08:47 Poland 46.105.20.6:8080 high-anonymous Nov-20, 08:51 Spain 79.110.39.41:8080 transparent Nov-20, 06:36 Czech Republic 41.73.238.163:8080 transparent Nov-20, 06:27 Nigeria 219.137.229.214:3128 transparent Nov-20, 08:18 China 109.185.118.156:8080 transparent Nov-20, 06:36 Moldova, Republic of 186.113.26.35:3128 transparent Nov-20, 06:55 Colombia 187.84.240.85:8080 transparent Nov-20, 08:13 Brazil 59.57.15.71:80 transparent Nov-20, 06:41 China 182.160.102.114:8080 transparent Nov-20, 06:54 Bangladesh 201.56.208.226:8080 transparent Nov-20, 08:15 Brazil 186.201.228.130:3128 transparent Nov-20, 07:00 Brazil 118.96.215.190:8080 transparent Nov-20, 08:26 Indonesia 110.137.127.76:8080 transparent Nov-20, 08:09 Indonesia 124.207.162.117:80 transparent Nov-20, 08:15 China 202.118.253.111:3128 transparent Nov-20, 08:17 China 120.132.132.119:8080 transparent Nov-20, 08:11 China 202.127.28.67:3128 transparent Nov-20, 08:11 China 190.82.89.155:3128 transparent Nov-20, 07:00 Chile 189.15.46.90:8080 transparent Nov-20, 08:14 Brazil 201.62.48.155:8080 transparent Nov-20, 08:18 Brazil 210.14.143.118:80 transparent Nov-20, 07:15 China 94.154.88.11:8080 transparent Nov-20, 06:35 Ukraine 118.174.131.94:8080 transparent Nov-20, 06:42 Thailand 200.114.18.35:8080 transparent Nov-19, 20:36 Colombia 190.249.167.115:8080 transparent Nov-19, 15:03 Colombia 201.219.17.45:8080 transparent Nov-19, 22:14 Ecuador 186.215.214.202:80 transparent Nov-20, 07:05 Brazil 78.109.236.180:80 transparent Nov-20, 07:53 Iraq 190.102.157.30:3128 transparent Nov-20, 06:59 Peru 190.234.249.167:8080 transparent Nov-19, 15:01 Peru 121.14.186.216:80 transparent Nov-20, 07:26 China 82.200.165.46:3128 transparent Nov-20, 06:42 Kazakstan 196.5.62.48:80 transparent Nov-20, 07:01 South Africa 177.53.169.58:3128 transparent Nov-20, 07:00 Brazil 62.33.168.214:3128 transparent Nov-20, 06:34 Russian Federation 223.202.8.69:3128 transparent Nov-20, 09:50 China 212.7.192.91:8080 transparent Nov-20, 07:11 Poland 87.101.130.218:8080 transparent Nov-20, 08:10 Saudi Arabia 118.174.0.155:3128 transparent Nov-20, 06:54 Thailand 59.60.10.118:80 transparent Nov-20, 06:34 China 120.29.154.178:80 transparent Nov-19, 17:24 Indonesia 118.97.84.58:8080 transparent Nov-20, 08:24 Indonesia 200.87.173.146:3128 transparent Nov-20, 07:02 Bolivia
Monday, 7 December 2009
Wi-Fi security Advices
Wireless networking can open up whole new attack vectors .It doesn’t mean that you can’t make it securely, however, and I aim to give you some helpful ideas.
- Change Default Administrator Passwords (and Usernames), and use a strong password
At the core of most Wi-Fi home networks is an access point or router. To set up these pieces of equipment, manufacturers provide Web pages that allow owners to enter their network address and account information. These Web tools are protected with a login screen (username and password) so that only the rightful owner can do this. However, for any given piece of equipment, the logins provided are simple and very well-known to hackers on the Internet. Change these settings immediately. - Encrypt your Wireless
You can turn your WPA / WEP Encryption, it would give a basic encryption. WPA / WEP Encryption is not a good solution because with a free available tool like aircrack, you can sniff wireless traffic protected by WEP and crack security in a matter of minutes. You have to use a stronger Encryption tool Like Comodo WiFi Encrytpion or Kaspersky Internet Security when it's available to you. - Stop broadcasting your SSID
Dangerous crackers who know what they are doing will not be deterred by a hidden SSID — the “name” you give your wireless network. Configuring your wireless router so it doesn’t broadcast your SSID does not provide “real” security, but it does help play the “low hanging fruit” game pretty well. A lot of lower-tier security crackers and mobile malicious code like botnet worms will scan for easily discovered information about networks and computers, and attack those that have characteristics that make them appear easy to compromise. One of those is a broadcast SSID, and you can cut down on the amount of traffic your network gets from people trying to exploit vulnerabilities on random networks by hiding your SSID. Most commercial grade router/firewall devices provide a setting for this. - Enable MAC Address Filtering
Each piece of Wi-Fi gear possesses a unique identifier called the physical address or MAC address. Access points and routers keep track of the MAC addresses of all devices that connect to them. Many products offer the owner an option to key in the MAC addresses of their home equipment, that restricts the network to only allow connections from those devices. Do this, but also know that the feature is not so powerful as it may seem. Hackers and their software programs can fake MAC addresses easily. - Change the Default SSID
Access points and routers all use a network name called the SSID. Manufacturers normally ship their products with the same SSID set. For example, the SSID for Linksys devices is normally "linksys." True, knowing the SSID does not by itself allow your neighbors to break into your network, but it is a start. More importantly, when someone finds a default SSID, they see it is a poorly configured network and are much more likely to attack it. Change the default SSID immediately when configuring wireless security on your network. - Shut down the network when it’s not being used
This bit of advice is even more dependent on specific circumstances than most of them. If you have the sort of network that does not need to be running twenty-four hours a day, seven days a week, you can reduce the availability of it to security crackers by turning it off when it isn’t in use. While many of us run networks that never sleep, and cannot really put this suggestion into practice, it is worth mentioning if only because one of the greatest improvements to the security of a system you will ever encounter is to simply turn it off. Nobody can access what isn’t there. - Shut down your wireless network interface, too
If you have a mobile device such as a laptop that you carry around with you and use in public, you should have the wireless network interface turned off by default. Only turn it on when you actually need to connect to a wireless network. The rest of the time, an active wireless network interface is nothing more than another attack vector for malicious security crackers to use as a target. - Do Not Auto-Connect to Open Wi-Fi Networks
Connecting to an open Wi-Fi network such as a free wireless hotspot or your neighbor's router exposes your computer to security risks. Although not normally enabled, most computers have a setting available allowing these connections to happen automatically without notifying you (the user). This setting should not be enabled except in temporary situations. - Assign Static IP Addresses to Devices
Most home networkers gravitate toward using dynamic IP addresses. DHCP technology is indeed easy to set up. Unfortunately, this convenience also works to the advantage of network attackers, who can easily obtain valid IP addresses from your network's DHCP pool. Turn off DHCP on the router or access point, set a fixed IP address range instead, then configure each connected device to match. Use a private IP address range to prevent computers from being directly reached from the Internet. - Enable Firewalls On Each Computer and the Router
Modern network routers contain built-in firewall capability, but the option also exists to disable them. Ensure that your router's firewall is turned on. For extra protection, consider installing and running personal firewall software on each computer connected to the router. - Position the Router or Access Point Safely
Wi-Fi signals normally reach to the exterior of a home. A small amount of signal leakage outdoors is not a problem, but the further this signal reaches, the easier it is for others to detect and exploit. Wi-Fi signals often reach through neighboring homes and into streets, for example. When installing a wireless home network, the position of the access point or router determines its reach. Try to position these devices near the center of the home rather than near windows to minimize leakage.
Monday, 9 November 2009
The best free antivirus software
There are lots of free antivirus applications. These antivirus software are free and very effective too. Why do these companies give away the best antivirus free? They all have paid versions with more features that they would like you to buy.
All programs offer Windows versions.Only Avast has a version for Macs.
All programs offer Windows versions.Only Avast has a version for Macs.
Avast Home Edition Free Antivirus :
Avast antivirus provides a friendly user interface, while also being very customizable and feature complete. avast Home Edition includes ANTI-SPYWARE protection, , and ANTI-ROOTKIT detection based on the best-in class GMER technology
Avast also does scanning on boot up if you choose to do so.Avira Personal Free Antivirus
Avira is another one of the best free antivirus products. But the free version gives you a basic protection against spyware, it also gives you: AntiPhishing protection ,AntiRootkit , AntiDialer ,an attractive interface.AVG Antivirus Free Edition
AVG is very popular antivirus software product. AVG has a friendly interface to use. AVG free edition detects both viruses and spyware.If you need a higher level of security from AVG, you can go with their paid version which gives your Web Shield and Lets you download and exchange files without risking virus infections, Advanced Anti-Rootkit protection, Game Mode protection. Or you can go further and have AVG Internet Security- Bitdefender 10 Free Edition
This is only an on-demand scanner and doesn't offer "real time" protection, which all four of the other scanners offer. BitDefender Free Edition uses the same ICSA Labs certified scanning engines used in the payed version. I wouldn't recommend it for anyone who needs any level of regular virus protection, but it's still very fast and thorough. - Comodo Antivirus
Comodo Firewall is very popular. Comodo antivirus is kinda new one but still effective , and gives you a good level of protection for no cost at all. Comodo Antivirus protect you against viruses, trojans , and spaywares. When you use both Coomodo Firewall and antivirus ( you get them both in the same installation package), I believe you get a higher security level than using antivirus alone.If you need more protection behind the free edition gives you, Comodo offers a pro edition which includes : antivirus + firewall+ Wi-Fi encryption + Remote tech support 24/7 for only $39 Microsoft Security Essentials
Microsoft Security Essentials provides real-time protection for your home PC that protects you against viruses, spyware. It is a very good tool from Microsoft ans it is free :) .
Labels:
anti-virus,
antivirus,
AVG,
avira,
best free antivirus software,
comodo,
firewall,
norton
Sunday, 8 November 2009
Why reading email in plain text is better?
For many reasons HTML email message has become popular , colored fonts, embedded images ...etc. No doubt HTML makes email attractive and easier to read, but from a security standpoint , plain text is better and safer.
Why HTML-rendered email is dangerous?
Why HTML-rendered email is dangerous?
- HTML-rendered email can include invisible images, and a hacker can execute a malicious code while loading the image for example :
img src="http://www.hackerdomain.com/getemailcoockie.asp"
An image like this can be used to execute a server-side script to read your email cookie to get your password. HTML-rendered email to track the message and giving the sender the ability too know whether an email was read,when it was read, and if it is forwarded to others. Spammers use this technique to know whether an email address is valid or not, and if the recipient like to read their spam. Plain text does not support image, so this scenario cannot happen. - HTML-rendered email can open or download attachments to the system. Plain text email prevents email attachments from opening automatically.
- HTML-rendered email allows miscreant marketers and criminals to obfuscate the links, making them appear to point to somewhere else other than the user expected. These techniques are common in phishing scams, which often use scare tactics to entice a user to click a link allegedly leading to their bank or a well-known eCommerce site. Instead, the link takes the user to a website controlled by the scammer. It may look and feel like the website the user expected, but it's not. And behind the scenes, their login details and personal financial information are quietly being recorded for the criminal's later use.
In plain text email, there are no hidden commands - the link displayed is the actual link.

Subscribe to:
Posts (Atom)