➕ FROM OUR CIRCLE➕
Hello, in this tutorial, I will demonstrate various ways on how to remain anonymous on the Internet. Privacy is a must, in today's world. Currently, there are a lot of crimes going on, such as Swatting, Doxing etc. When our identity gets leaked, it is a big loss for us and it is somewhat one of the big mistakes of our lives. Which is why, staying secure, and anonymous online is essential.
This tutorial is about two types of protection
Offline protection ( already given above )
( continues )
*online protection*
Types of Online Protection
VPN(s)
Proxies
Tor
SSH Tunneling
VPN (Virtual Private Network)
A virtual private network (VPN) is a network that uses primarily public telecommunication infrastructure, such as the Internet, to provide remote offices or traveling users access to a central organizational network.
VPN provides us a secure way of connecting to websites by hiding our IP and encrypting our information.
Source and more : http://en.wikipedia.org/wiki/Virtual_private_network
Free VPNs
Cyberghost
HotSpot Shield
Pro XPN
Open VPN
Opera vpn
Etc etc
Paid VPNs
nVPN
SwissVPN
Nord vpn
Express vpn
HTTP Proxies and SOCKS5
Get Proxy lists from this sites.
Alive Proxy
Hide My Ass
Proxy list
Pro-Tip : Don't use HideMyAss for hacking.
You can also get Proxies from IHF
For Premium and Private SOCKS5, you can search Google. Because the sites I use get down constantly.
Some Proxy sites
http://www.ninjacloak.com
http://www.hidemyass.com
http://go-between.me
http://ir2.me
http://rapidsurf.info
http://go-between.me
http://ir2.me
http://rapidsurf.info
http://yourownproxy.info
http://proxy.co.cc
http://iknownothing.org
http://accessyouth.info
http://buwk.com
http://UnblockFree.net
http://hillofbeans.biz
http://aptunnel.com
http://goaheadmakemyday.org
http://lameproxy.info
http://centerfoldproxy.info
http://proxylist.co
http://sneaky9.com
http://freesurfproxy.com
http://goflyakite.org
http://fastieproxy.com
http://ihaveacunningplan.info
http://schoolfreezone.com
http://proxify.net
http://passmethru.com
http://proxy2use.com
http://0001.cz.cc
Use Tor for secure browsing
Tor
Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis
Source and more : https://www.torproject.org/about/overview.html.en
SSH Tunneling
Things you will need for SSH Tunneling
PuTTy
Firefox (Preferred)
Steps of Tunneling
Open PuTTY
Enter your IP on the Hostname or IP Address text box
To find your IP, you can use Command Prompt. Just type ipconfig and click Enter.
Now to the left of PuTTy, you will see a list.
Click the '+' symbol of SSH.
From the drop down, click Tunnels
You need to input a port and the click "Dynamic".
Now click Add and open the connection. You will be connected.
Now in your browser proxy settings, type 127.0.0.1 for IP and the selected port for port.
That's it. It is done!!
Conclusion
It is a proven fact that nobody can be fully anonymous on the Internet. However, that does not mean nobody is secure. We should take steps to protect ourselves in the World Wide Web. Daily, a large amount of Cyber Crimes occurs and Identity theft is one of them. Black Hats ruin peoples' lives for personal gain. It is our duty to remain secure. I sincerely hope this guide helped you.
Regards,
➕FROM OUR CIRCLE➕
Comments
Post a Comment