Sei sulla pagina 1di 9

Hiding Your IP Address, Anonymous Internet Surfing HOWTO Pagina 1

Hiding Your IP Address

CGI/
LOGIN LISTS NEW .TXT CHK GEO ANON HTTPS EMAIL RELAY HEAD WHOIS DOCS HOWTO LINKS BBOARD
WEB

Hiding Your IP Address Using HTTP, CONNECT, CGI/PHP/WEB, SOCKS proxies


Anonymous Internet Surfing HOWTO

You could try reading about wingates, socks and proxies (oh before i forget, turn off java, javascript, cookies, what's related, and
smart update ... if you are using IE you're not very smart). Also try installing a firewall, or DHCP or you can learn from me!

There are situations in which you may want to visit a site without leaving a trace of the visit. For instance you want to check what's
going on at your competitor's site. Your visit will generate a record in the log file. Frequent visits will generate many records. Do you
want to know what kind of records? See in YOUR REQUEST, YOUR WHOIS RECORD and GEOGRAPHIC LOCATION, Privacy
Analysis of your Internet Connection, Another Privacy Investigation Report, BrowserSpy Info, ShowMyIP - will tell you some scary
info about what can be told about your computer via the internet.

Note that these tests are not very sophisticated. A dedicated "snooper" can often learn much more. Once I came across a server
that tried to connect to my computer's disk while I was browsing ... that was an exciting experince. You should also remember about
things like cookies, hostile applets and java scripts, browser security holes and so on. So why don't we send someone instead of
ourselves? Good idea.

Remember that simple owner of Web server may collect information about requests you had performed in search engines, keywords
you had typed, your browser and language, date, time, your operating system, physical and geographical position, pages from
which you had clicked links and so on. See below some records generated by our server users (real IPs are slightly changed).. Note
that large internet companies such as doubleclick, google, government institutions have tremendous possibilities to collect much
more information about you and your behaviour..

24.10.31.1 - - [17/Oct/2006:07:03:22 +0000] "GET /proxy/howto.htm HTTP/1.1" 200 33104


"http://www.google.com/search?complete=1&hl=en&q=change+ip+address+proxy&btnG=Google+Search"
"Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.0.7) Gecko/20060909 Firefox/1.5.0.7"
217.154.66.1 - - [17/Oct/2006:07:03:25 +0000] "GET /proxy/ HTTP/1.1" 200 37361
"http://www.google.co.uk/search?q=http+proxy+for+ftp&start=0&ie=utf-8&oe=utf-8"
"Mozilla/5.0 (Windows; U; Windows NT 5.1; en-GB; rv:1.8.0.6) Gecko/20060728 Firefox/1.5.0.6"

Step #1-Determine your IP Address:


Every computer connected to the Internet has a unique identifier called an IP Address. On many networks, the IP Address of a
computer is always the same. On other networks, a random IP Address is assigned each time a computer connects to the network.
This is what we are referring to when we ask if you have a static or a dynamic IP Address. If a system uses dynamic addressing,
the IP can change quite often. Look into REMOTE_ADDR row in THIS LINK to determing your current IP Address.

Step #2-Get Anonymous:


Method #1: Anonymizer
One can surf anonymously and easy with the help of a nice services called CGI/Web proxies. Simply type a URL you want to visit --
the Page does the job for you, selecting random CGI/Web proxy from a hundreds of available services, securing you from many
potential dangers. When you follow a link on a page viewed via CGI proxy you get there via the this proxy again, so you don't have
to type a new URL.

CGI/Web proxy has two more nice features. Firstly, there are WWW sites that are inaccessible from one place, but easily
accessible from another. Once I was trying to load a page located in Australia for 20 minutes, all in vain. Using CGI/Web proxies
immediately solved the problem. Secondly, there are certain sites that give you information depending on where you are "calling"
from. Let's take an example. I was at Encyclopedia Britannica site, trying to check the price for their products. Clicking on Order
Information button gave me the list of Britannica's dealers all over the world, no price info. Going to the same place via the
Anonymizer led me to a different page, where I found the price list. As it turned out the local dealer's price for Encyclopedia
Britannica CD was several times higher than the one at which it's sold in USA. Good savings!

Some CGI/Web proxies are able to encrypt URLs (uniform resource locator) in a way that these can be used as reference for a
server. If a request with an encrypted URL occurs, they are able to decrypt the URL and forward it to the server, without enabling
the user to get knowledge about the server address. All references in the servers response are again encrypted before the response
is forwarded to the client.

Some CGI/Web proxies are able to use secure HTTPS protocol for exchanging data between proxy and your computer, even if
original server is not secure. This option excluding possiblility to sniff a data flow between your computer and this proxy is very
useful in some cases, for example, when you are forced to work in possibly scanned/sniffed insecure public network.

http://tools.rosinstrument.com/proxy/howto.htm 04/12/2007 07.47.52


Hiding Your IP Address, Anonymous Internet Surfing HOWTO Pagina 2

Method #2: Proxy Servers


What is proxy?

Proxy - a server setup designed to offer either firewall security or faster access to cached content normally accessible only
through slower connections.
Proxy server - is the software installed on some network server. The main purpose of this software is to relay traffic between
two network hosts (client and server), sometimes this software does some data caching (usually this is performed by HTTP
proxies). If your browser is configured to work through the proxy server then all your network traffic will go through that proxy
server.

The main purposes of proxy servers:

Transfer speed improvement (in case of caching proxies). You may use your ISP's proxy to access the internet - usually you
have better connection to your ISP's proxy than to other hosts, if this proxy has the resource you requested from the internet
you will get a copy of it from proxy (from its cache).
Security and privacy (for HTTP). Anonymous proxies hide information about your computer in the request headers, so you can
safely surf the net and your information will never be used in any way.
LAN interconnection (or LAN to WAN connection). Sometimes you experience some problems while accessing the server
located in the other network (for example in the internet).

There are 3 types of HTTP proxies:

Fully anonymous (elite or high anonymous) proxies. Such proxies do not change request fields and look like real browser. You
real IP is also hidden of course. People that administrating internet servers will think that you are not using any proxies.
Anonymous proxies also do not show your real IP but change the request fields, so it is very easy to detect that proxy while log
analyzing. Nothing really matters, but some server administrators restrict the proxy requests.
Transparent proxies (not anonymous, simply HTTP) change the request fields, also they transfer real IP. Such proxies are not
applicable for security and privacy while surfing on net. You can use them only for network speed improvement.

When Web Proxy Servers are Useful?

Permitting and restricting client access to the Internet based on the client IP Address.
Caching documents for internal documents. - Selectively controlling access to the Internet and subnets based on the submitted
URL.
Providing Internet access for companies using private networks.
Converting data to HTML format so it is readable by a browser.

One can also anonymize one's web surfing by using a proxy server. Proxy servers are similar to the Anonymizer, i.e. web pages are
retrieved by the proxy server rather than by the person actually browsing the Web (you). But there are several important
distinctions: proxy servers don't help with cookies, hostile applets or code. In most of the cases they do just one thing: they conceal
your real geograhic location.

Most of proxy servers restrict access based on the IP Address from which a user connects to them. In other words if you have an
account with Bluh-Bluh-Com, you can't use La-Di-Da-Net's proxy server, access will be denied. Fortunately you can always find a
"kind-hearted" proxy server on the Net the owners of which openly state that the service is publicly available, or a proxy server that
doesn't restrict access that due to whatever reason, but the fact is not known to everyone.

How do you find a "kind-hearted" proxy server? Good news for lazy people: there are many lists of available proxy servers with
periodic updates: http://rosinstrument.com/proxy/

For those who are not so lazy: find your own proxy server, it's real easy. Go to your favorite search engine (Google.com for
example) and type something like open public +proxy server list +port 8080, and you'll get the list of Web pages where ISPs give
complete instructions to their users of how they should configure their browsers. Try every proxy address and after 5 or 7 failures
you will surely find a proxy server that works for you. So let's say you have found a proxy, e.g.: some.proxy.com, HTTP port 8080.
To make your browser use a proxy server fill out the corresponding fields in Manual Proxy Configuration tab (hope you can find it
yourself).

Search

Web rosinstrument.com

Testing proxy lists you have found.

As a rule a quality of proxies from proxy lists you have found by such ways is sufficiently low because of large number of requests to
these proxies by many users which have found that lists in search engine, number of professional abusers and robots using these
proxies very intensive for network adverising, spamming, flooding forums, bulletin boards, blogs and so on. Number of working
proxies from such lists varies from 0.00% to 10-20%. Therefore manual selection of operable proxies is not possible. Fortunately, a

http://tools.rosinstrument.com/proxy/howto.htm 04/12/2007 07.47.52


Hiding Your IP Address, Anonymous Internet Surfing HOWTO Pagina 3

few of proxy testing software exists such as our ProxyCheck Java application, Proxyrama for Windows with source code available,
Charon for Windows and others. See our Related Links for more examples.

Warnings!

Misconfigured Servers
Often, a PUBLIC proxy server is open because it has not been configured properly. Most of open proxy servers are not
supposed to be public. The person that configured the server was not aware of the potential problems and security risks. It
is very common to for a novice administrator to set up a proxy with access rights that allow anyone to connect. To close a
proxy server it is necessary to force users to connect from one IP Address or a range of IP Addresses. An alternative is to
require users to use a user name and password.
'Honey Pots' or 'Honey Proxies'
Everything that is done on or through the open proxy server can be logged and traced. A honey pot is an open proxy server
intentionally deployed by security professionals to lure hackers and track their every move. A honey pot can also be
installed by a hacker. A hacker can put a proxy server up on his, or a victim's computer and wait for a scanner to find it.
Sending spam e-mail trough a honey pot proxy exposes the sender's activity. When a spammer uses the proxy to send
bulk email, it is possible to collect the content of the spam and report the spammer to his ISP.
Educational, academic public proxy systems: Planetlab, CoDeeN
The CoDeeN (a suite of network services, including a CDN, that provides users with more robust access to network
content) proxies are big, fast, logged and cached proxy servers cluster based on PlanetLab (a global platform for testing
and deploying an emerging class of planetary-scale network services) global research network which was founded in 2002
in Princeton, Berkley and now consists of more than 700 nodes located in many educational and research institutions in the
world opened for public use. These proxies are often placed in many "anonymous proxy lists" such as "high anonymous"
and "elite", HOWEVER everything you do online is thoroughly tracked. As a rule these proxies are configured on
3124,3127,3128,8888 TCP ports. Some limitations for these proxies usage also exist, for example HTTP POST method is
disabled.
Security Risks
When you use an open proxy server, your computer is making a direct connection to another computer. You do not know
who is in control of the remote computer. If you are using proxy servers from open proxy lists, you could be trusting your
email messages, passwords or other sensitive information to a person running the server. Someone can be watching the
unencrypted information you are transferring over the network.

Configuring your browser to easy switch between multiple proxy configurations


There are many different software that could be used to set up a proxy for your system. For example small and free SwitchProxy
Tool Extension for Mozilla, Firefox, Thunderbird. SwitchProxy lets you manage and switch between multiple proxy configurations
quickly and easily. You can also use it as an anonymizer to protect your computer from prying eyes. Text proxy lists in host:port
format are very flexible and can be used with most proxy software for Internet Explorer, Mozilla, Firefox, Thunderbird, Opera and
other browsers.

Configuring your browser with "Proxy Auto-Config File" proxy.pac


Definition
The proxy auto-config (.pac) file defines how user agents can automatically choose the appropriate access method for fetching a
given URL. See Wikipedia article for more detailed description.
Firefox
Go to Tools -> Options -> General -> Connection Settings. Select the option to enter an automatic proxy configuration URL. Enter
http://rosinstrument.com/cgi-bin/proxy.pac and click OK twice.
Firefox 2
Go to Tools -> Options -> Advanced -> Network -> Settings. Select the option to enter an automatic proxy configuration URL. Enter
http://rosinstrument.com/cgi-bin/proxy.pac and click OK twice.
Internet Explorer
Go to Tools -> Internet Options -> Connections. If you use a dialup connection, select it and click Settings. Otherwise, click LAN
Settings. Select the option to use an automatic configuration script. Make sure no other options are selected. Enter http://
rosinstrument.com/cgi-bin/proxy.pac and click OK twice.
Configuring your browser manually
FireFox
Tools - Options - General - Connection Settings - Manual proxy configuration - View, and for HTTP and FTP type name of your
proxy server (example: proxy.net) and port number (example 3128).
Mozilla, Nestcape Navigator 6.x, Nestcape Navigator 4.x, Netscape Communicator
Edit - Preferences - Category - Advanced - Proxies - Manual proxy configuration - View - Set proxy for following protocols: HTTP,
FTP, etc.
Konqueror
Setting - Configure Konqueror... - Proxies - Enable "Use proxy" - Set proxies for HTTP, HTTPS, FTP or other protocols.
Internet Explorer 5.x, Internet Explorer 6.x

http://tools.rosinstrument.com/proxy/howto.htm 04/12/2007 07.47.52


Hiding Your IP Address, Anonymous Internet Surfing HOWTO Pagina 4

Service - Internet Options - Connections - Choose your connection and click "Settings" button for dial-up connection or click "LAN
Settings" button in the "Local Area Network (LAN) Settings" group box - Enable "use a proxy server - type proxy name and proxy
port - If nessesary, enable/disable "bypass proxy server for local addresses" - OK
Internet Explorer 4.x, Internet Explorer 3.x
View - Internet Options - Connection - mark "Access the Internet using a proxy server". At ADDRESS type name of the server
(example: proxy.net) and at PORT type port number (example: 3128), click on advanced button and mark "Use the same proxy
server for all protocols".
Once you have carried out this simple operation, you can start surfing the Web leaving traces as if you are from Bulgaria, USA,
North Korea (that would be fun!) or somewhere else, but ...there is one more very important privacy concern, "Is My Proxy
Anonymous?".

Is My Proxy Anonymous?
Not all proxy servers are truly anonymous. Some of them let the system administrator of the site that you visit via a proxy server find
out the IP Address from which the proxy server is accessed, i.e. your real IP Address. You can perform an anonymity check test:
DETECT PROXY

If you get the message: Proxy server is detected! - then there is a security hole in your proxy, and information about your real IP
Address will be listed. If the message is Proxy server is not detected - everything should be OK. In any case, carefully study the list
of IP Addresses that is returned by this online tool. None of them should belong to you. You can also use alternative tests to check if
your browser is anonymous. Such tests can give a complete list of the parametrs your browser passes to a remote server (this is
called Environmental Variables).

Where are these proxies from?


Sometimes is required to determine Country, City or even geographical latitude and longitude to select from proxies list or servers
list. Now it possible HERE, due to bulk interface to geoiplookup utility. Paste HERE your public proxies or simply hosts list in simple
text format and press "Lookup GeoIP info" button. As a result you'll get your bulk proxies list opposite to corresponding Country,
City, Longitude and Latitude and even link to Google Map of this server geographical location.

Test My Proxy Speed


Anonymity and Caching for speedup surfing are priority aims of Proxy servers. But not all proxy servers sufficiently fast for
comfortable surfing due to high server load, bad/slow client-server connection and so on. To determine does proxy you have
selected have sufficient speed for you CLICK HERE to measure your connection speed twice, first, without proxy configured,
second, with proxy configured. If you'll have received sufficiently similar results for measured speed in both cases, so the configured
proxy has speed capabilities sufficient for your connection speed. Otherwise try to select and to test another proxy.

Final Considerations
In spite of all of the the above said ... use proxies only when it's necessary. Working via proxy servers slows down data transfer rate
and is an additional load on the network and the servers. Another important thing that is often forgotten by many people: use proxies
for legal purposes. Hiding you identity is ok (at least in the free world) as long as you want to visit a site that offers, say,
pornography. But if you use a proxy server for purchasing CDs or software with a bogus credit card number there is a good chance
that you'll end up in prison, let alone the moral aspects. Remeber, all the connections are logged, and if you violate the law you can
be tracked down. The site administrator can check the logs and contact the proxy's administrator, he can in turn check his own logs
and find your real IP Address, then they both will contact your ISP, and your ISP keeps logs too ... Anyway, I hope you got it.

Specially for paranoiacs


Look, different tools described above can be chained! For example you set up your browser to use Proxy A, and you know the
addresses and port numbers of 2 more servers Proxy B and Proxy C. The URL that you type should look something like that: http://
proxyB:port/http://proxyC:port/http://www.whereyougo.com/ As the result you go to the site via 3 servers: A,B and C. One of them
can be the Anonymizer. WARNING: Not all the proxy servers allow chains like that. Such capabilities exist ONLY for CGI/Web
proxies (pay attention to chaining CGI proxy combobox), HTTP proxies with CONNECT capabilities (additional software is
required for chaining, usually such software supports both SOCKS and CONNECT proxies, see examples for SOCKS) and SOCKS
proxies (such software is required as Prtunnel, Proxyrama and others).

Anonymity and Myths


Anonymity is derived from the greek word ανωνυµία, meaning without a name or name-less. In colloquial use, the term
typically refers to a person, and often means that the Ppersonal identity, or personally identifiable information of that
person is not known.

The main question is of course, what are you trying to hide? Closely following that is how important is it? The precautions you take
have to weigh up to the value of the data you are trying to protect, in this case, you are trying to protect your anonymity. In the recent
years privacy and anonymity have become big issues with CCTV cameras everywhere, and projects like Echelon reading all your e-
mails and reporting back to the Orwellian ‘Big Brother’. So just for normal surfing, or if you are planning on hacking a foreign
governments personnel database (not that we recommend that of course), you need to protect yourself in different ways.

http://tools.rosinstrument.com/proxy/howto.htm 04/12/2007 07.47.52


Hiding Your IP Address, Anonymous Internet Surfing HOWTO Pagina 5

Remember Anonymity is not an absolute, there are varying degrees.

The Myths

Using a proxy I found on the web in my browser is enough.

People have been using proxies for years, normally open proxies found from scanning large IP ranges on the internet, what you
have to think though, is this proxy open for a purpose? Is this purpose to listen to what you are doing? To collect your passwords?
Also it’s not infallible, remember the traffic has to go from your computer to the proxy, and come back in, those records can be
corelated in your country alone and need to external aid. Plus the proxy may keep records of who access what and when, it make
be a honeypot and keep full packet logs of all completed TCP/IP sessions. The problem is you just don’t know.

If I chain proxies no one can find me.

Also not true, it doesn’t matter if you cross through Taiwan, Korea, Russia and Iraq, your ISP just needs to see the packets going
out and coming in at the right times to your machine from the last proxy hop in your chain.

The Reality

It can be said, pretty much whole heartedly, there is no such thing as real anonymity online, if you do something bad enough, the
people in power can find you. IP Spoofing is misunderstood in 9/10 cases and is no protection against anything (I’ll write an article
about this later). And web proxies, as above, offer little or no protection. They are good enough if you just want to stop your school/
parents/office from tracking your surfing habits, but they won’t protect you from doing time if you commit a federal crime. The next
best thing from this is Onion Routing, the common peer to peer implementation known as Tor.

Onion Routing prevents the transport medium from knowing who is communicating with whom — the network knows only
that communication is taking place. In addition, the content of the communication is hidden from eavesdroppers up to the
point where the traffic leaves the OR network.

Source: Onion Router

Tor is a toolset for a wide range of organizations and people that want to improve their safety and security on the Internet.
Using Tor can help you anonymize web browsing and publishing, instant messaging, IRC, SSH, and other applications
that use the TCP protocol. Tor also provides a platform on which software developers can build new applications with
built-in anonymity, safety, and privacy features.

You can read more at the Tor site, the Wikipedia articles Onion routing and Tor (anonymity network).

Getting Tored Up

For most people Tor is enough, I recommend getting the Tor Bundle, which includes Tor, TorCP and Privoxy. All you need to do is
set your applications to use a proxy, host is localhost and port is 8118. Instructions with screenshots are here. Then you’re done, it
works for most applications. Just remember though it’s encrypted from your machine to the end point, not from the end point to
wherever it’s going, so that Tor node can see whatever traffic you are sending through Tor.. So make sure you encrypt (POPS,
SMTP with TLS etc).

The h07 unix research team recognized that people paranoid enough to use tor are still dumb enough to use plaintext-
authentication protocols like pop3 and telnet. They might think it’s “secure because tor encrypts it”. This isn’t the case. It’s
encrypted, but …… communication from client to entry node and exit node to server will still remain as is. POP3, telnet
and others will still be plain-text and thus subject to sniffing.

True Anonymity?

It may not be totally legal, but it’s pretty much bulletproof (Unless of course you get caught in a car parking jacking off to porn
downloaded from an open Wireless Access Point). When you do this, you should make sure you are using an anonymous operating
system, so what better than a bootable distro especially for this purpose, called Anonym-OS, You can check it out here.

kaos.theory’s Anonym.OS LiveCD is a bootable live cd based on OpenBSD that provides a hardened operating
environment whereby all ingress traffic is denied and all egress traffic is automatically and transparently encrypted and/or
anonymized.

Using SocksCap and SOCKS proxy for anonymity in non HTTP applications (telnet, ftp, ICQ,
IRC and so on)
1. What is SocksCap?

http://tools.rosinstrument.com/proxy/howto.htm 04/12/2007 07.47.52


Hiding Your IP Address, Anonymous Internet Surfing HOWTO Pagina 6

2. What is the current version?


3. What is the difference between SocksCap, SocksCap16, and SocksCap32?
4. Do I need to run SocksCap16, SocksCap32, or both?
5. Where do I get SocksCap?
6. Is SocksCap free? Is the source code available?
7. Will it work with all stacks and applications?
8. How do I know if it works with my stack and application?
9. What happens if I start SocksCap16 AFTER a WinSock application is already running?
10. What if I close SocksCap16 before closing a WinSock application?
11. Will I need to run ftp in PASV mode?
12. When I close SocksCap16 in Windows 95 or Windows for Workgroups, it tells me "Exiting SocksCap may cause some network
connections to become unstable." I have already closed all the client applications.
13. Is SocksCap Y2K?
14. Can I use SocksCap32 with RealPlayer 5.0 and 6.0?
15. Can I use SocksCap32 with Internet Explorer 4.0 in desktop mode or on Windows98? What about Internet Explorer 5.0?
16. What do I enter for SOCKS server and port in SocksCap Setup?

What is SocksCap?
SocksCap automatically enables Windows-based TCP and UDP networking client applications to traverse a SOCKS
firewall. SocksCap intercepts the networking calls from WinSock applications and redirects them through the SOCKS
server without any modification to the orginal applications or to the operating system software or drivers.
What is the current version?
The current version of SocksCap16 (16-bit) is 1.02. The current release version of SocksCap32 (32-bit) is 1.03. A beta
version of SocksCap32 (Version 2, Beta 3) is also available.
What is the difference between SocksCap, SocksCap16, and SocksCap32?
SocksCap refers to the 16- and 32-bit versions. SocksCap16 is the 16-bit version. SocksCap32 is the 32-bit version.
Do I need to run SocksCap16, SocksCap32, or both?
For Windows 3.1 and Windows for Workgroups 3.11, run SocksCap16. For Windows 95 and Windows 98, you need
SocksCap32 for the 32-bit applications. If you are running 16-bit applications under Windows 95 or Windows 98, you need
SocksCap16 for those applications. You can run SocksCap16 and SocksCap32 simultaneously under Windows 95 and
Windows 98 to handle both 16- and 32-bit applications. Under Windows NT, use SocksCap32 for 32-bit applications.
SocksCap16 does not run under Windows NT.
Where do I get SocksCap?
SocksCap is available for download through the SOCKS Web site at: http://www.socks.permeo.com/. See also LINKS LIST
for new alternate SOCKS capable servers and clients.
Is SocksCap free? Is the source code available?
The software is available freely through the SOCKS web site. It is NOT in the public domain. Use and distribution is
restricted and subject to certain agreements. Please read the full copyright, license terms, and restrictions in the file named
"LICENSE.TXT" or "COPYRIGH.TXT" in the distribution. Source code is not available.
Will it work with all stacks and applications?
SocksCap functions independently from the applications and the stack. It needs to make some assumptions about the
application and the stack implementations. Therefore, it will not work with every application and every stack. NEC USA has
only tested SocksCap32 with Microsoft's 32-bit stack.
How do I know if it works with my stack and application?
The best way to find out is to try it. You may refer to the scorecard of applications and stacks with which SocksCap users
have reported success or failure. Download the list from the SocksCap section at http://www.socks.nec.com/. Volunteers
provide the information in the scorecard. The list is not complete and quickly becomes outdated. We greatly appreciate your
additions and updates to the scorecard.
What happens if I start SocksCap16 AFTER a WinSock application is already running?
Start SocksCap16 before other WinSock applications. If SocksCap16 sees a request come from an application run prior to
starting SocksCap16, it attempts to make all connections directly for that application. Beware that the application may
become unstable.
What if I close SocksCap16 before closing a WinSock application?
SocksCap16 must remain running until after you close all network applications. When you attempt to close SocksCap16 and
there are still active connections, SocksCap16 displays a warning and gives you a chance to cancel the exit. This does not
apply to SocksCap32.
Will I need to run ftp in PASV mode?
FTP may experience problems, depending on the application and stack. Try running without PASV. If that does not work, try
PASV.
When I close SocksCap16 in Windows 95 or Windows for Workgroups, it tells me "Exiting SocksCap may cause some
network connections to become unstable." I have already closed all the client applications.
SocksCap16 notices that the "WSASRV" process is still running. Add "WSASRV" to the Direct Applications list in the
SocksCap16 setup dialog.
Can I use SocksCap32 with RealPlayer?

http://tools.rosinstrument.com/proxy/howto.htm 04/12/2007 07.47.52


Hiding Your IP Address, Anonymous Internet Surfing HOWTO Pagina 7

Yes, but you need to configure RealPlayer so that it does not start up in the system tray. To do this in RealPlayer 5.0, select
Preferences in the View menu. Click on the Advanced tab. Clear the check box for "Allow RealPlayer to run in the system
tray." In RealPlayer 6.0, select Preferences in the Options menu. Under the General tab, clear the check box for "Allow
SmartStart to run in the system tray."
Can I use SocksCap32 with Internet Explorer 4.0 in desktop mode or on Windows 98? What about Internet Explorer 5.0, IE
6.0?
Although SocksCap32 will not socksify your entire desktop, it is possible to browse with Internet Explorer 4.0 in desktop
mode or on Windows 98 with SocksCap32. Select Internet Options in Internet Explorer's View menu. Under the Advanced
tab, check the "Browse in a new process" box. Then open an individual Internet Explorer process by starting it from
SocksCap32.
For Internet Explorer 5.0, 6.0, select Internet Options in Internet Explorer's Tools menu. Under the Advanced tab, check the
"Launch browser windows in a separate process" box. Under the Connections tab, click the LAN Settings button. Clear
check box for "Automatically detect settings."
What do I enter for SOCKS server and port in SocksCap Setup?
Enter the address and port of the SOCKS server you need to traverse. If you are not sure what those are, contact your ISP,
network administrator, or firewall administrator for your site or consult a lists: SOCKS LIST 1, SOCKS LIST 2.

Using HTTPort software and CONNECT/SSL/HTTPS proxy for anonymity for HTTP and non
HTTP applications and bypassing of your local HTTP proxy filtering
HTTPort allows you to bypass your HTTP proxy, which is blocking you from the Internet. With HTTPort you may use various Internet
software from behind the proxy, ex. e-mail, instant messengers, P2P file sharing, ICQ, News, FTP, IRC, etc. The basic idea is that
you set up your Internet software in such a manner, that it connects to your own local PC as if it was the remote server it needed.
HTTPort then intercepts that connection and runs it through a tunnel through the proxy.

HTTPort doesn't really care for the proxy as such, it works perfectly with firewalls, transparent accelerators, NATs and basically
anything that lets HTTP protocol through. HTTP is the basis for web surfing, so if you can freely surf the web from where you are,
HTTPort will bring you the rest of the Internet applications.

HTTPort performs tunneling using one of two modes. The following schemes will give you the idea.

In SSL/CONNECT mode HTTPort can make a tunnel through a proxy all by itself. It requires that the proxy supports a certain HTTP
feature, specifically CONNECT HTTP method. Most of the proxies have this method disabled by default, and administrators don't
readily enable it, so if you find that this tunneling mode works for you, you must be lucky. SSL/CONNECT mode much faster, but
encryption can't be used in this mode and as described here, your proxy tracks all your actions easily.

Remote host method is much more capable for tunneling through just about any proxy. In this mode HTTPort uses a special server
software called HTTHost installed somewhere outside of your proxy-blocked network. HTTHost is basically a web server with a
twist. When HTTPort is doing tunneling, it sends series of HTTP requests to the HTTHost. The proxy sees it af if you were surfing to
some web site, and consciously allows you to. HTTHost in turn performs it's half of tunneling and talks to the target servers. This
mode is much slower, but works in most cases, and it features strong data encryption which makes proxy logging useless.

Related links

Rosinstrument.com related links list


Assorted list of links related with Rosinstrument.com site with brief descriptions (proxy lists, howto's, forums and so on)
Squid Web Proxy Cache Unix, Linux, FreeBSD, OpenBSD, NetBSD etc. sources and binary
Full-featured Web proxy cache, the result of many contributions by unpaid (and paid) volunteers, proxying and caching of
HTTP, FTP, and other URLs; proxying for SSL; cache hierarchies; ICP, HTCP, CARP, Cache Digests; transparent
caching; WCCP (Squid v2.3 and above); extensive access controls; HTTP server acceleration; SNMP; caching of DNS
lookups
Aladdin Knowledge Systems Windows/Linux
eSafe gateway based content security providing protection against malicious software and spam/url filtering. Also offer USB
smart card for token authentication and hardware dongles for software copy protection purposes.
Chutney Technologies Windows, Unix
Offers caching solutions for arbitrary application objects such as HTML/XML fragments and session objects.
Cyberoam
Offers content filtering, load balancing and caching features. Firewall add-on available. Integrates with anti-virus and anti-
spam software. Includes evaluation software and documentation.
Dante Unix
Circuit level proxy with firewall, supports SOCKS, msproxy and http proxy. Port redirection and bandwidth usage control
available through add on modules.
DeleGate Windows, OS/2, Unix
Offers caching, filtering and proxy support for most common protocols. Free downloads and reference manuals.
EServ Windows

http://tools.rosinstrument.com/proxy/howto.htm 04/12/2007 07.47.52


Hiding Your IP Address, Anonymous Internet Surfing HOWTO Pagina 8

Offers mail and news server hosting, web caching and activity logging. Trial downloads, online ordering and PDF
documentation.
SOCKS5 Unix, source
This is NWSL (previously CSTC) version 5.0 of SOCKS, a package that allows Unix hosts behind a firewall to gain full
access to the internet without requiring direct IP reachability. It does require a SOCKS server program being run on a host
that can communicate directly to hosts behind the firewall as well as hosts on the Internet at large.
FreeCap Windows
transparent redirect connections through SOCKS/HTTPS server (SocksCap analog) and SOCKS/HTTPS servers chain
(SOCKS Chain analog). Supports SOCKS v4, SOCKS v5, HTTPS /CONNECT/ protocols, supports Internet Explorer,
Netscape, Mozilla, Trillian, Opera, MS Outlook Express, others as clients.
ezbounce
Configurable IRC proxy.
ftp.proxy Unix, Windows
Offers application layer FTP service proxying to facilitate use of service through firewalls. Supports various access control
options.
iMimic Networking, Inc. Solaris, Linux, FreeBSD
Offers web caching and multimedia streaming caching functionality. Also offer content filtering software.
JanaServer Windows
Offers connection sharing, monitoring and user level access control. Also offers http, email, ftp and news server
functionality.
602 LAN SUITE Windows
Offers mail server, spam filtering, antivirus, web caching, access control, firewall and activity logging.
micro_proxy Unix
HTTP/HTTPS proxy that runs from inetd, and uses less than 1kb of diskspace.
NetProxy Windows
Offers web caching, site filtering, firewall, activity logging and access control.
Netscape Proxy Server Unix, Windows
Offers web caching, content filtering, access control and activity reporting.
Novell.com: Volera
Website acceleration and content caching systems.
Philtron PHP, platform independent
Filtering HTTP proxy that rewrites the HTML of the web pages that pass through it; removing unwanted/hostile content from
the pages and providing enhanced user anonymity.
Proxy+ Windows
Offers web caching, firewall, mail server, access control and activity logging.
PServer Java, platform independent
Offers connection sharing, content filtering and activity logging.
Wingate Windows
Wingate offers connection sharing, caching, access control, usage monitoring and firewall services. Content filtering, anti-
virus and VPN options available as extras.
Spoon Proxy Windows
Offers connection sharing and logging.
Surfer Protection Program Windows
HTTP proxy that enhances user privacy by deleting (or faking) eight data elements, including the Cookie field and Referrer
fields, from web browser responses.
TcpIQ Windows
Offers connection sharing, bandwidth throttling and realtime graphical and data analysis of proxied traffic. Supports HTTP,
FTP and POP3 traffic.
Tinyproxy Unix
HTTP proxy with low system resource requirements. Offers http header blocking.
Tircproxy Linux
IRC proxy, access control available via standard Unix hosts file configuration.
Vicomsoft Ltd MacOS, Windows
InterGate software offers web caching, stateful inspection firewall, content filtering and network management services. Anti
spam module also available.
WWWOFFLE
Open source caching Web proxy for offline use and low-bandwidth connections. Supports ad blocking and security filtering.
AnalogX proxy Windows binary
supports HTTP (web), HTTPS (secure web), POP3 (recieve mail), SMTP (send mail), NNTP (newsgroups), FTP (file
transfer), and Socks4/4a and partial Socks5 (no UDP) protocols

http://tools.rosinstrument.com/proxy/howto.htm 04/12/2007 07.47.52


Hiding Your IP Address, Anonymous Internet Surfing HOWTO Pagina 9

WinProxy Windows binary


proxifying, caching, filtering, antivirus and antispam modules. Supports HTTP, HTTPS, NNTP, etc.
CCProxy Windows binary
Small proxy server with SOCKS protocol support, in china
Proxyrama Windows binary, source code
Tool for finding and testing proxy servers for anonymity, speed, gateway or not proxy, 'connect' method support
(chainability), socks 4/5 support and geographical location. Furthermore, Proxyrama can be used as a local proxy server
that redirects your traffic through chain of anonymous 'connect' method proxies. Source code also available.
Charon Windows binary
Proxy finding and testing tool. Crawls search engines for open proxies, test proxies anonymity.
SS5 Linux, Solaris, FreeBSD
SS5 is a socks server for Linux, Solaris and FreeBSD environment, that implements the SOCKS v4 and v5 protocols.
3Proxy Cross-platform (Win32 and Unix)
3[APA3A] tiny proxy 3Proxy is really tiny cross-platform (Win32&Unix) proxy servers set. It includes HTTP proxy with
HTTPS and FTP support, SOCKSv4/SOCKSv4.5/SOCKSv5 proxy, POP3 proxy, TCP and UDP portmappers. GNU/GPL
license.
Nylon BSD, Solaris, HP-UX and Linux
Nylon is a proxy server, developed on OpenBSD. It supports SOCKS version 4 and 5, as well as a mirror mode so that
services can be mirrored directly.
Prtunnel Unix
Prtunnel is a program that can tunnel TCP/IP connections in a variety of ways, including through HTTP and SOCKS5 proxy
servers.
HTTPort Windows, source
HTTPort allows you to bypass your HTTP proxy, which is blocking you from the Internet by using remote tunnel server and
local client for wide range of not only HTTP applications, such as e-Mail, instant messengers, P2P file sharing, ICQ, News,
FTP, IRC, etc. clients applications.

http://tools.rosinstrument.com/proxy/howto.htm 04/12/2007 07.47.52

Potrebbero piacerti anche