Spyware Techie

|

Spyware Techie


Antivirus Suite Removal Guide

Posted: 31 Mar 2010 07:53 AM PDT

Do you know what Antivirus Suite is? Antivirus Suite is yet another malicious and powerful rogue antispyware application.You need to know that Antivirus Suite is actually a new version of Antivirus...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]

SafeDoctor Removal Guide

Posted: 31 Mar 2010 03:25 AM PDT

Do you know what is SafeDoctor? SafeDoctor is a nasty and very serious threat to the security of your computer. SafeDoctor may run a system scan, which will appear like an authentic scanner which is...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]

SafeDoctor Removal Guide

Posted: 31 Mar 2010 03:18 AM PDT

Do you know what is SafeDoctor? SafeDoctor is a nasty and very serious threat to the security of your computer. SafeDoctor may run a system scan, which will appear like an authentic scanner which is...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]

SafeDoctor Removal Guide

Posted: 31 Mar 2010 03:12 AM PDT

Do you know what is SafeDoctor? SafeDoctor is a nasty and very serious threat to the security of your computer. SafeDoctor may run a system scan, which will appear like an authentic scanner which is...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]

SafeDoctor Removal Guide

Posted: 31 Mar 2010 03:07 AM PDT

Do you know what is SafeDoctor? SafeDoctor is a nasty and very serious threat to the security of your computer. SafeDoctor may run a system scan, which will appear like an authentic scanner which is...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]

Web Development Community

|

Web Development Community


30 Best Free iPhone Applications

Posted: 31 Mar 2010 01:52 AM PDT

Today we presents the collection of best free iPhone applications.

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]


First Look Microsoft Office 2010

Posted: 31 Mar 2010 01:52 AM PDT

Greetings! For a limited time you can download this free e-book without stepping through any registration. First Look: Microsoft Office 2010, by Katherine Murray, offers 14 chapters of early content,...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]


Inversion of Control – An Introduction with Examples in .NET

Posted: 31 Mar 2010 01:52 AM PDT

By using Inversion of Control we are able to build more flexible and well designed applications. In this simple introduction I quickly describe, using examples in C#, what IoC is and how we can...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]


Web 2.0 | Silverlight Transformations

Posted: 31 Mar 2010 01:52 AM PDT

Recently I started exploring Silverlight and it has some cool features that i would like to share. In this article i will demonstrate how to specify transformations in Silverlight with...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]


How to hide ip: How to Setup Squid on Windows and Linux

|

How to hide ip: How to Setup Squid on Windows and Linux


How to Setup Squid on Windows and Linux

Posted: 31 Mar 2010 07:55 AM PDT

If you want to setup your own proxy on your home computer you are able to do it by using Squid. Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. It reduces bandwidth and improves response times by caching and reusing frequently-requested web pages.

Why would you want to use Squid?

  • If you travel abroad and you want to browse the Internet as you were home with no restrictions.
  • If you want to help people that are located in countries like Iran, UAE, Thailand, etc. by allowing them to access restricted sites via your computer.
  • If you want better performance when browsing your frequently-visited sites.
  • If are about to get shaped and want to reduce your quota consumption.

Install Squid on Windows

1) Download Squid for Windows
2) Extract that zip archive, and move the “squid” folder to the root of your drive (probably C:\).
3) After moving the squid folder, open “C:\squid\etc\squid.conf” in your favorite text editor (not Word).
4) Configure the DNS name servers on the line that says “dns_nameservers” to point at your ISPs DNS servers.
5) You should lock the access to only certain IP addresses.

Inside the text editor search for the line “http_access deny all” and change it to “http_access allow all“. This will make your proxy open and accessible to the world. If you would like to limit your proxy to certain IP blocks, change “http_access deny all” to “http_access allow TRUSTED“. Add a line (BEFORE the http_access line to setup an access control list [ACL]). This ACL line that defines TRUSTED IPs should be:

acl TRUSTED src xx.xx.xx.xx yy.yy.yy.yy zz.zz.zz.zz

where xx.xx.xx.xx, yy.yy.yy.yy and zz.zz.zz.zz are allowed IP addresses.

6) Setup “visible_hostname” (normally just the public IP address).
7) Turn off logging by adding these two lines:

access_log none
cache_store_log none

8) Setup the Squid cache by issuing the following command: “c:\squid\sbin\squid -D –z” (No quotes).
Setup Squid to run as a service by issuing the following command: “c:\squid\sbin\squid –i”.

Install Squid on Linux

If you're using CentOS/Redhat, it's pretty straight forward to setup a proxy.

Login as root and run the following

yum install squid
nano -w /etc/squid/squid.conf

Setup the trusted IP addresses in the same way as for Windows.

Turn off logging by adding these two lines:

access_log none
cache_store_log none

Save the config file and as root issue the following command to start the Squid proxy server:

service squid start

Important! You should not run Squid on a machine that you're worried about or is used for production. Make sure you take basic security precautions, liek moving ftp off the default port, using a firewall, etc.

Post from: How to hide ip

How to Setup Squid on Windows and Linux

Related Posts:

  1. How to setup a VPN connection in Windows 7
  2. How to Setup Your Own Proxy with Google App Engine for Free
  3. How to Protect Your Torrent Traffic in Linux


How to hide ip: How-to-hide-ip.info Privacy Policy

|

How to hide ip: How-to-hide-ip.info Privacy Policy


How-to-hide-ip.info Privacy Policy

Posted: 30 Mar 2010 01:28 AM PDT

Most readers of How-to-hide-ip.info are concerned about their online privacy and anonymity. And they should be as personal user information is collected and used in many ways by various organisations.

Sometime ago, one of the readers asked me about the privacy policy of this blog. It came as a surprise as I’ve never thought it was necessary. But it is! It has to be clear for everybody how this blog handles personal info and what are the third party organisations that are part of this process.

How-to-hide-ip.info places a high value on its readers’ personal privacy and respects the personal nature of the information provided on the blog. We adopt the Privacy Policy statement with the intent of presenting how your personal information such as your name, email address and IP address is stored and used.

When does How-to-hide-ip.info collect my personal information?

You may provide personal information to How-to-hide-ip.info in one of following ways:

(1) by sharing your e-mail address when subscribing to the newsletter,
(2) by sharing personal information (name, email address, IP address) when you submit news tips or questions via the Contact Form,
(3) by sharing personal information (name, email address, IP address) when you post comments on posts.

In addition to basic contact information, the analytics trackers may also collect information that is in no way personally identifiable. This may include the operating system you are working on, the Internet browser you are using, and the screen resolution of your computer.

How does How-to-hide-ip.info use my personal information?

Depending on what you have subscribed to, How-to-hide-ip.info may use your information in a number of ways.

  • The email address you provided through our newsletter subscription form enables us to send you news and offers.
  • The email address that you use when contacting us with an editorial tip or via our Contact Form will not be used for any reason but for the purposes of responding to your inquiry.
  • The email address associated with your account when you comment on stories may be used in conjunction with contests and promotions hosted on How-to-hide-ip.info's website to notify you if you have won.

We do not use your personal information in any other way!

Who else has access to my personal information?

The ads appearing on How-to-hide-ip.info's website are delivered to you by Google or directly by us. Information about your visit to this site, such as number of times you have viewed an ad (but not your name, address, or other personal information), is used to serve ads to you on this site.

Third parties and web sites that have links on our site may also collect or use information about you. For more information about how the information is collected and used, please see the following:

Read the complete Privacy Policy here.

Post from: How to hide ip

How-to-hide-ip.info Privacy Policy

Related Posts:

  1. Friday Privacy & Security News
  2. 10 SmartHide Accounts With The New Personal USA IP Subscription For How-to-hide-ip.info Readers
  3. Online Privacy – A Significant Concern for Web Users


How to hide ip: List of OpenVPN-based VPN Services

|

How to hide ip: List of OpenVPN-based VPN Services


List of OpenVPN-based VPN Services

Posted: 29 Mar 2010 12:13 PM PDT

OpenVPNOpenVPN is a free and open source virtual private network (VPN) application for creating point-to-point or server-to-multiclient encrypted tunnels between host computers. It is probably the most secure protocol used by VPN providers.  Below you can find a list of several popular VPN providers that offer OpenVPN as connecting application.

OpenVPN uses the OpenSSL library to provide encryption of both the data and control channels. It lets OpenSSL do all the encryption and authentication work, allowing OpenVPN to use all the ciphers available in the OpenSSL package. It’s a little more difficult to set up that PPTP but with the right tutorials an average computer user should not encounter any problems.

Here is a list of several OpenVPN based VPN services (alphabetically ordered):

VPN Provider Countries Price Bandwidth
Ace VPN USA (California, Illinois, Pennsylvania) and Europe (France, Germany, Italy, Netherlands, UK). $5/month Unlimited
Anonyproz USA, UK, Malaysia. $10/month Unlimited
AnonymityNetwork USA, Canada, Netherlands, Germany $25.8/month 120 GB
ConnectionVPN USA, Luxembourg $5/month Unlimited
CyberGhost VPN Germany 1GB free/ 40GB – 9.99 EUR 40 GB
Darknet VPN Germany 5 EUR/month Unlimited
HideIpVPN USA, UK, Germany $9.95/month Unlimited
Overplay USA, UK, Ireland, Germany, France, Canada, Sweeden, Switzerland, Norway, Poland $9.95/month Unlimited
Perfect-Privacy USA, Australia, Malaysia, China, Iran, Israel, Russia, Romania, Germany, Switzerland, Luxembourg, France, Canada, Panama, Argentina $25/month Unlimited
PQR Tunnel Sweden $10/month 512kbit
SwissVPN Sweden 5 EUR/month 512kbit
TorrentFreedom Netherlands $17/month Unlimited
UnblockVPN UK, Czech Republic, SK $4.99/month Unlimited
USAIP USA, EU, Asia $9/month Unlimited
VPNout USA $25/3-months Unlimited
WiTopia personalVPN USA, UK, Hongkong $59.99/year Unlimited

Post from: How to hide ip

List of OpenVPN-based VPN Services

Related Posts:

  1. What’s the difference between PPTP VPN and OpenVPN?
  2. Veracode’s Highest Possible Security Rating for OpenVPN
  3. 7 Free Online VPN Services


Spyware Techie

|

Spyware Techie


Anti-Virus Removal Guide

Posted: 29 Mar 2010 02:25 AM PDT

Do you know what is Anti-Virus? Anti-Virus is a rogue anti-spyware application. Anti-Virus tends to spread via malicious Trojan infections, malicious downloads or it can be downloaded directly from...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]

How to hide ip: SmallVPN – Pros, Cons and Alternatives

|

How to hide ip: SmallVPN – Pros, Cons and Alternatives


SmallVPN – Pros, Cons and Alternatives

Posted: 28 Mar 2010 04:00 AM PDT

SmallVPNSmallVPN is a VPN service for those who try to overcome censorship in countries like China, UAE, Kuwait, Qatar, Bahrain, etc. The service bypasses country filters by offering 2048 bit encryption and a large number of IP addresses.

SmallVPN allows Internet users from all over the world to:

  • Watch TV program online freely!
  • Surf anonymously at work or school
  • Protect their privacy so that ISP not able to spy on their activities
  • Unblock Skype and use VOIP freely!
  • Unblock Facebook, blogger, blogspot!
  • Bypass all blocked web sites, such as adult, poker, sensitive sites!

SmallVPN Pros

SmallVPN offers both OpenVPN and PPTP connections. The PPTP works smoothly on iPhone and also it does work on Hulu. It can be used on newsgroups, direct download and other servers.

SmallVPN Cons

It does not allow P2P or Torrent connections. Ports 443 and 1723 are blocked. Plus the price is a little bit high (about $20 per month). Quite unusual there is a setup fee of $25!

SmallVPN Alternatives

  • If you are looking for both OpenVPN and PPTP, you could also consider HideIpVPN that is about 50% cheaper.
  • If you need a lot of IP addresses from different locations, then StrongVPN is a better choice for the same price.

What do you think of SmallVPN? Do you use it? What are, in your opinion, its strong and weak points?

[Via VPNBlog.net]

Post from: How to hide ip

SmallVPN – Pros, Cons and Alternatives

Related Posts:

  1. Pros and Cons of PirateBay’s IPREDator
  2. Pros & Cons of Browsing Anonymously using Web Proxies
  3. Pros and Cons of using Tor


Latest Security News | SecurityExtra.com

|

Latest Security News | SecurityExtra.com


Have you Registered for Counter Terror Expo?

Posted: 27 Mar 2010 06:29 AM PDT

Less than 3 weeks to go… REGISTER NOW! Counter Terror Expo 2010 looks set to be the largest gathering of its kind when doors open on the 14 – 15 April at Olympia, London. Against a backdrop of continued tension globally, Counter Terror Expo 2010 brings together many of the world’s leading experts to debate the issues [...]

 

©2009 Programming & Security | Template Blue by TNB

Vida de bombeiro Recipes Informatica Humor Jokes Mensagens Curiosity Saude Video Games Diario das Mensagens Eletronica Rei Jesus News Noticias da TV Artesanato Esportes Noticias Atuais Games Pets Career Religion Recreation Business Education Autos Academics Style Television Programming Motosport Humor News The Games Home Downs World News Internet Design Entertaimment Celebrities 1001 Games Doctor Pets Net Downs World Enter Jesus Mensagensr Android Rub Letras Dialogue cosmetics Genexus Só Humor Curiosity Gifs Medical Female American Health Madeira Designer PPS Divertidas Estate Travel Estate Writing Computer Matilde Ocultos futebolcomnoticias girassol lettheworldturn topdigitalnet Bem amado enjohnny produceideas foodasticos cronicasdoimaginario downloadsdegraca compactandoletras newcuriosidades blogdoarmario arrozinhoii sonasol halfbakedtaters make-it-plain amatha lisboaohyeah lasofia thebushrajr wingshock tripedes gorduravegetal dainfamia dejavu-transpersonal jsbenfica republicadasbadanas ruiherbon iranianforaryans eaystcheyl fotosdanadir ojosmasabiertos ceilasantos