BTemplates.com

Search This Blog

Monday, 6 July 2015

Unblock Blocked Sites Cum Become Anonymous On Internet


This question revolves around a single term called "IP ADDRESS". Hackers know that they are doing a crime and will be traced if they perform an attack directly with their original IP address. So they hide their original IP address. It becomes difficult for the investigators to trace them if an attacker hides his original IP address.

Hiding The Identity
This is possible with some wonderful tools called Proxies and VPNs. There are a number of services available to hide our identity online. It can be a free service or paid service. In paid services, since we pay some money, it will be more reliable.

1. Basic concepts about Proxies

Proxy Servers: A Proxy acts as an intermediary between our computer and the target server. It means we are not directly interacting with the servers. Instead, we will interact with the proxy server which in turn interacts with the target server. All the requests sent from our computer will go to the server via proxy server. Similarly, all the responses from the server will come back to our computer via proxy server.

2. Types of Proxy Server

Web Based Proxy: When we use websites which give a facility to user to change the online identity through their web proxy servers then we say its known as WBPS. For Example: www.ninjaproxy.com www.kproxy.com www.anonymzier.ru

Application Based Proxy Servers: These are the proxy servers in which we try to use application software of the proxy servers which directly connect us to the pool table of proxy servers and gives us a fake IP address to surf internet hence the banning policy will not work much as we are not traveling the content directly through the HTTP and port number 80. For Example, UltraSurf, HotSpot Security Shield.

VPNs: Virtual Private Network: A VPN is a private network that connects remote networks through a public network such as the internet. VPNs are also very similar to proxies. VPN provides security by using some tunneling protocols and encryption mechanisms. For Example, OpenVPN, Proxpn, Cyberghost, Hotspotshield, Logmein Hamachi

Plug-In Based Proxy Server: AnonymoX.


3. What makes the difference?
If you will browse the target website without any proxy, then your original IP will be visible to that website. If you browse the internet with proxy then your original IP will be hidden and proxy's IP will be visible to target website.

4. TOR- The Onion Routing
TOR is one more beautiful tool to hide your identity. As the name represents, it contains too many router layers (nodes) like an onion. Using TOR is one of the best way to hide your identity online since it uses a chain of nodes where each node doesn't know any information about the traffic path except the details of next receiver node and previous sender node from which it is receiving the data.

How to use TOR
First download the TOR bundle here. It contains a client application you need to run. It gets the information about the node available when executed(run). Then it selects a random path through which the traffic will be passed towards the destination. 

Note: The TOR browser is specially intercepted by Indian Govt. in India.




1 comment:

  1. I appreciate your efforts writing such wonderful blog post. However, I'd prefer to go with the paid option rather than Tor. I recently came across to a service called Hide My IP https://www.hide-my-ip.com/ its a good value for money.

    ReplyDelete