How to hide ip: Make The Internet a Safer Place With AbuseIPDB.com |
Make The Internet a Safer Place With AbuseIPDB.com Posted: 03 Aug 2011 05:30 AM PDT The newly launched project AbuseIPDB.com is the place where you can report IP addresses that are involved in malicious activity or check whether an IP address has suspicious history. What is generally considered as malicious activity? Any illegal, abusive or inappropriate activity, e.g. DDoS, any type of Spam, Fraud orders, Hacking attempts, Phishing, Spoofing, SQL Injection, etc. Who is AbuseIPDB for?Firstly, if you are a regular Internet user you are likely the permanent victim of spam, hacking attemps, phishing, etc. Why not let others know about the source of these malicious attacks? Report the IP address to AbuseIPDB.com and make the Internet safer. Secondly, if you are service provider (hosting, VPN, etc.) you can reduce the percentage of fraudulent orders by checking the IP addresses of the subscribers when a new orders are placed. AbuseIPDB.com offers an API for checking and reporting IP addresses, that can be integrated with any website. How to use AbuseIPDB?In order to check an IP address, go to AbuseIPDB.com, enter the IP address and press Check it button. If the IP is already in the database the relevant information will be shown: Further, you can find details about previous complaints (Click here for details) or find more info about the IP owner (Whois …). If you want to report an abuse related to the IP address click the Report … button. You will be redirected to a page where you will be able to enter info related to the abuse: For those that want to use the abuse database through the API, registration is needed and detailed instructions are available in order to make the access easy and straightforward. To be honest I find the AbuseIPDB project very promising and I recommend everyone to report any IP address that is a source of spam or other malicious activities. Together will make the Internet a cleaner and safer place! What do you think about AbuseIPDB? Will you use it to report malicious activities?Post from: How to hide ip Related Posts: |
TOR: An Anonymizer For Online Activists, and More Posted: 03 Aug 2011 02:27 AM PDT So you are an online activist? Or you just don’t want to be tracked when doing your things on the internet. Let’s consider one publicly available solution that most activists are already using so as to override some internet censorship. Note: this post isn’t about inviting you to do censored things on the internet – this is about an open source, though publicly available, solution that is used by most citizen media activists around the world. The very nature of this post is to open how-to-hide-ip.info readers’eye to an existing technology geared toward people who desperately look for a way to anonymize their online activity, to work around some local internet censorship that they may have. By the way, at this time of writing, and according to TOR’s FAQ "Tor is not illegal anywhere in the world, so using Tor by itself is fine." So what is TOR: in fact it’s a kind of "peer-to-peer" concept but used for security purposes. It actually is a distributed network and anonymous network that is particularly helpful to people who don’t want their internet traffic to be tracked since the packets are distributed over the whole TOR network. To quote TOR’s website "The idea is similar to using a twisty, hard-to-follow route in order to throw off somebody who is tailing you — and then periodically erasing your footprints." So instead of rewriting a summary of what can be done with TOR service, I’d rather link you to the necessary materials, then you take whatever fits for your needs. So let’s say that you want to organize an anonymous online meeting so secure that even the participants can’t even be tracked. You may want to consider establishing a "rendez-vous" point within the TOR network via their hidden services. Be careful though, as it is the case with other security packages, there are some warnings you need to be aware of. Check them here. The good thing about joining the TOR network is that it is available for multiple platforms (linux, mac, windows, …), if you want to give it a try, you may want to check the installation guides. This blog is about "online anonymity guide" , and I thought TOR actually is inline with what we’re trying to show our users here. We’d love to hear from you how you’d use TOR services for anonymizing your internet activity. Share your views in the comment section. Post from: How to hide ip Related Posts: |
You are subscribed to email updates from How to hide your ip To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment
Note: Only a member of this blog may post a comment.