rss
twitter
    Find out what I'm doing, Follow Me :)

Configuring OSPF Routing Protocol Step by step configuration

Configuring OSPF Routing Protocol Step by step configuration

In this article I will demonstrate an example of OSPF Routing configuration. We will use four different series router so you can get familiar with all different platform covered in CCNA exam. Create a topology as shown in figure.
static route configurations
1841 Series Router0 (R1)
FastEthernet0/0Serial0/0/0
IP address10.0.0.120.0.0.1
Connected WithPc0R2 on Serial 0/0
2811 Series Router0 (R4)
FastEthernet0/0Serial0/0/0
IP address50.0.0.140.0.0.2
Connected WithPc1R3 on Serial 0/0
2621XM Series Router0 (R3)
FastEthernet0/0Serial0/0/0
IP address30.0.0.240.0.0.1
Connected WithFastEthernet0/0R4 on Serial 0/0/0
2620XM Series Router1 (R2)
FastEthernet0/0Serial0/0
IP address30.0.0.120.0.0.2
Connected WithR3 on FastEthernet0/0R1 on Serial 0/0/0
PC-PT PC0
FastEthernet0Default Gateway
IP address10.0.0.210.0.0.1
Connected WithR1 on FastEthernet0/0
PC-PT PC1
FastEthernet0Default Gateway
IP address50.0.0.250.0.0.1
Connected WithR4 on FastEthernet0/0
Configuring OSPF is slightly different from configuring RIP. When configuring OSPF, use the following syntax:
Router(config)# router ospf process_ID
Router(config-router)# network IP_address wildcard_mask area area_#
The process_ID is locally significant and is used to differentiate between OSPF processes running on the same router. Your router might be a boundary router between two OSPF autonomous systems, and to differentiate them on your router, you will give them unique process IDs. Note that these numbers do not need to match between different routers so they have nothing to do with autonomous system numbers.
To configure any router double click on it and select CLI.To configure this topology use this step by step guide.

(1841Router0) Hostname R1

To configure and enable ospf routing on R1 follow these commands exactly.
Router>enable
Router#configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Router(config)#hostname R1
R1(config)#interface fastethernet 0/0
R1(config-if)#ip address 10.0.0.1 255.0.0.0
R1(config-if)#no shutdown
%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to up
R1(config-if)#exit
R1(config)#interface serial 0/0/0
R1(config-if)#ip address 20.0.0.1 255.0.0.0
R1(config-if)#clock rate 64000
R1(config-if)#bandwidth 64
R1(config-if)#no shutdown
%LINK-5-CHANGED: Interface Serial0/0/0, changed state to down
R1(config-if)#exit
%LINK-5-CHANGED: Interface Serial0/0/0, changed state to up
R1(config)#router ospf 1
R1(config-router)#network 10.0.0.0 0.255.255.255 area 0
R1(config-router)#network 20.0.0.0 0.255.255.255 area 0
R1(config-router)#exit
R1(config)#

(2620XM-Router1) Hostname R2

To configure and enable ospf routing on R2 follow these commands exactly.
Router>enable
Router#configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Router(config)#hostname R2
R2(config)#interface serial 0/0
R2(config-if)#ip address 20.0.0.2 255.0.0.0
R2(config-if)#no shutdown
%LINK-5-CHANGED: Interface Serial0/0, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0, changed state to up
R2(config-if)#exit
R2(config)#interface fastethernet 0/0
R2(config-if)#ip address 30.0.0.1 255.0.0.0
R2(config-if)#no shutdown
%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up
R2(config-if)#exit
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to up
R2(config)#router ospf 2
R2(config-router)#network 20.0.0.0 0.255.255.255 area 0
R2(config-router)#network 3
00:03:10: %OSPF-5-ADJCHG: Process 2, Nbr 20.0.0.1 on Serial0/0 from
 LOADING to FULL, Loading Done0.0.0.0 0.255.255.255 area 0
R2(config-router)#network 30.0.0.0 0.255.255.255 area 0
R2(config-router)#exit
R2(config)#

(2620XM-Router2)Hostname R3

To configure and enable ospf routing on R3 follow these commands exactly.
Router>enable
Router#configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Router(config)#hostname R3
R3(config)#interface fastethernet 0/0
R3(config-if)#ip address 30.0.0.2 255.0.0.0
R3(config-if)#no shutdown
%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to up
R3(config-if)#interface serial 0/0
R3(config-if)#ip address 40.0.0.1 255.0.0.0
R3(config-if)#clock rate 64000
R3(config-if)#bandwidth 64
R3(config-if)#no shutdown
%LINK-5-CHANGED: Interface Serial0/0, changed state to down
R3(config-if)#exit
%LINK-5-CHANGED: Interface Serial0/0, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0, changed state to up
R3(config)#router ospf 3
R3(config-router)#network 40.0.0.0 0.255.255.255 area 0
R3(config-router)#network 30.0.0.0 0.255.255.255 area 0
00:04:53: %OSPF-5-ADJCHG: Process 3, Nbr 30.0.0.1 on FastEthernet0/0 from
 LOADING to FULL, Loading D
R3(config-router)#exit
R3(config)#
%SYS-5-CONFIG_I: Configured from console by console
R3#

(2811Router3) Hostname R4

To configure and enable ospf routing on R4 follow these commands exactly.
Router>enable
Router#configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Router(config)#interface serial 0/0/0
Router(config-if)#ip address 40.0.0.2 255.0.0.0
Router(config-if)#no shutdown
%LINK-5-CHANGED: Interface Serial0/0/0, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/0/0, changed state to up
Router(config-if)#exit
Router(config)#interface fastethernet 0/0
Router(config-if)#ip address 50.0.0.1 255.0.0.0
Router(config-if)#no shutdown
%LINK-5-CHANGED: Interface FastEthernet0/0, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to up
Router(config-if)#exit
R4(config)#router ospf 4
R4(config-router)#network 50.0.0.0 0.255.255.255 area 0
R4(config-router)#network 40.0.0.0 0.255.255.255 area 0
R4(config-router)#
00:06:32: %OSPF-5-ADJCHG: Process 4, Nbr 40.0.0.1 on Serial0/0/0 from
LOADING to FULL, Loading Done
R4(config-router)#exit
R4(config)#

PC-1

PC>ipconfig

IP Address......................: 10.0.0.2
Subnet Mask.....................: 255.0.0.0
Default Gateway.................: 10.0.0.1

PC>ping 50.0.0.2

Pinging 50.0.0.2 with 32 bytes of data:

Reply from 50.0.0.2: bytes=32 time=156ms TTL=124
Reply from 50.0.0.2: bytes=32 time=127ms TTL=124
Reply from 50.0.0.2: bytes=32 time=156ms TTL=124
Reply from 50.0.0.2: bytes=32 time=140ms TTL=124

Ping statistics for 50.0.0.2:
    Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
    Minimum = 127ms, Maximum = 156ms, Average = 144ms
PC>

PC-2

PC>ipconfig

IP Address......................: 50.0.0.2
Subnet Mask.....................: 255.0.0.0
Default Gateway.................: 50.0.0.1

PC>ping 10.0.0.2

Pinging 10.0.0.2 with 32 bytes of data:

Reply from 10.0.0.2: bytes=32 time=140ms TTL=124
Reply from 10.0.0.2: bytes=32 time=141ms TTL=124
Reply from 10.0.0.2: bytes=32 time=157ms TTL=124
Reply from 10.0.0.2: bytes=32 time=156ms TTL=124

Ping statistics for 10.0.0.2:
    Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
    Minimum = 140ms, Maximum = 157ms, Average = 148ms
You can verify that ospf is running successfully via show ip protocols command in privilege mode.
R4#show ip protocols

Routing Protocol is "ospf 4"
  Outgoing update filter list for all interfaces is not set
  Incoming update filter list for all interfaces is not set
  Router ID 50.0.0.1
  Number of areas in this router is 1. 1 normal 0 stub 0 nssa
  Maximum path: 4
  Routing for Networks:
    50.0.0.0 0.255.255.255 area 0
    40.0.0.0 0.255.255.255 area 0
  Routing Information Sources:
    Gateway         Distance      Last Update
    40.0.0.1             110      00:01:26
  Distance: (default is 110)

R4#
You can use show ip route command to troubleshoot ospf network. If you did not see information about any route checks the router attached with that network.
R4#show ip route
Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP
       D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
       N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
       E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP
       i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area
       * - candidate default, U - per-user static route, o - ODR
       P - periodic downloaded static route

Gateway of last resort is not set

O    10.0.0.0/8 [110/1564] via 40.0.0.1, 00:02:37, Serial0/0/0
O    20.0.0.0/8 [110/1563] via 40.0.0.1, 00:02:37, Serial0/0/0
O    30.0.0.0/8 [110/782] via 40.0.0.1, 00:02:37, Serial0/0/0
C    40.0.0.0/8 is directly connected, Serial0/0/0
C    50.0.0.0/8 is directly connected, FastEthernet0/0
R4#
To test ospf routing do ping from pc1 to pc2 and vice versa. If you get replay then you have successfully configured ospf routing but if you did not get replay double check this configuration and try to troubleshoot. I have uploaded a configured and tested topology in case you are unable to locate the problem spot then download this configuration file. And try to find out where have you committed mistake

Configuration command of OSPF


CommandsDescriptions
Router(config)#router ospf 1
Starts OSPF process 1. The process ID is any positive integer value between 1 and 65,535.
Router(config-router)#network 172.16.0.0 0.0.255.255 area 0
OSPF advertises interfaces, not networks. Uses the wildcard mask to determine which interfaces to advertise.
Router(config-if)#ip ospf hellointerval timer 20
Changes the Hello Interval timer to 20 seconds.
Router(config-if)#ip ospf deadinterval 80
Changes the Dead Interval timer to 80 seconds.
NOTE: Hello and Dead Interval timers must match for routers to become neighbors
Router#show ip protocol
Displays parameters for all protocols running on the router
Router#show ip route
Displays a complete IP routing table
Router#show ip ospf
Displays basic information about OSPF routing processes
Router#show ip ospf interface
Displays OSPF info as it relates to all interfaces
Router#show ip ospf interface fastethernet 0/0
Displays OSPF information for interface fastethernet 0/0
Router#show ip ospf border-routers
Displays border and boundary router information
Router#show ip ospf neighbor
Lists all OSPF neighbors and their states
Router#show ip ospf neighbor detail
Displays a detailed list of neighbors
Router#clear ip route *
Clears entire routing table, forcing it to rebuild
Router#clear ip route a.b.c.d
Clears specific route to network a.b.c.d
Router#clear ip opsf counters
Resets OSPF counters
Router#clear ip ospf process
Resets entire OSPF process, forcing OSPF to re-create neighbors, database, and routing table
Router#debug ip ospf events
Displays all OSPF events
Router#debug ip ospf adjacency
Displays various OSPF states and DR/ BDR election between adjacent routers
Router#debug ip ospf packets
Displays OPSF packets

How to get Better Signal Strength on USB Dongles

How to get Better Signal Strength on USB Dongles

radio frequency of a modem is increased when some metallic or Aluminium stuff is near the device,
It attracts the signal and keeps it constant. You will get more powerful network when some aluminium thing like a CD covered with a Aluminum foil is placed near your dongle, Lets see the steps. Take a CD/ DVD, and insert the dongle between its hole and connect the USB extender cable on other side, Now connect the other end of USB cable with your PC and keep or hang your dongle near a window or Open place.
That’s it, bu this way You will notice increased signal strength o which ever operators you are using.
This is quite funny trick but you will notice the difference in your network monitoring status on your data card dashboard. your dongle speed will 100% increase

HOW TO CRACK ANY TYPE OF CD PROTECTION

HOW TO CRACK ANY TYPE OF CD PROTECTION




Using W32Dasm, and HIEW. 

OK, let’s start:
First of all, you have to run the damn game you want to crack, without the CD.
The game, doesn’t work of course, (Please, don’t panic) BUT a window pops up, telling you an error message. 
This error message will help you to crack the game so, you’ve got to remember it.
For example: Please insert the - CD, or: You need the CD to play the - . 
( -, is the game you want to crack). Anyway, if you are so idiot and you can’t remember it, write it, in a little piece of paper.
Now, run Win32Dasm, and on the toolbar, press the first little button on the left, OR, go to Disassembler ->Open file to Disassemble. A menu will pop up. Select the exe which you want to crack. The disassemble, will take few minutes so, I suggest you, to go for shitting.

OK, it finished its process.
Now, in your screen, there is a strange text, and we can’t understand anything of course. Don’t worry, the only thing we have to do, ( If you want, you can change the font), is to click on the String Data References, the button next to the print button (Strn.REF).
You can see a window which is called String Data Items. Scroll down, and try to find the game’s error message. When you’ll find it, double click on it, and then, close the window, to go back to the Win32Dasm text.
As you can see you are somewhere in the CD check routine. This is the message’s place. Now comes the interesting and difficult part, so, be careful.
We don’t know what all these shits mean, BUT we must know the @ offset of every call and jump command.
Write down, every call and jump @ offset number. (You have to be sure, that the OPBAR change its used color to green). You need the number behind the @offset without the h. Let’s go to HIEW, now.

HIEW:
To move up and down, use the cursor keys. Start HIEW. exe.
In the HIEW directory, there is a list of exes and programs. Go to the directory, which you saved the game’s exe, we want to crack, and click on the exe. Click F4, and then, a menu will pop up, with 3 words. Text, Hex, and Decode. Click on Decode, and now, we can understand the list of numbers.
Click F5, and you can now enter the number, we wrote down, in Win32Dasm. Type it, and you will be placed at the number’s place. The cursor is placed on a command.

Before I’ll continue, I want to explain you something. For example, if the command where our cursor is placed on, is E92BF9BF74, means that it is 5 bytes.
Every 2 numbers, are one byte: E9-2B-F9-BF-74 = 90-90-90-90-90. 10 letters, mean, 5 bytes.
OK, if you understood it, you can continue.

Press F3, which means edit, and now you can edit these ten numbers.
Type five times, the number 90. For every byte, 90. Now click on F10 to exit.
We cracked the CD protection

tagged: How to Spy on Cell Phones

Want to learn to spy on cell phones ? Today,I’ll write about software that allows you to spy on cell phone . There are hundreds of cell phone spy software applications on the market, where many of them are nothing more than a crap. Some are good and only a few of them are the best. Also, each spy software has a different set of features and operating format which makes it hard for the novice users (perhaps like you) to make the right choice so as to fit your spying needs.
So, in order to help our readers find the best spy software, I have decided to give a thorough review of the Top 2 Best Selling spy phone software on the market.
SpyPhone GOLD and SpyBubble are the current leaders in the market which are used by thousands across the globe to spy on a cheating spousemonitor employees and keep an eye on their teens. Here is a complete review of these two products:

1. SpyBubble Review:

Although SpyBubble is not as feature rich as SpyPhone GOLD, it offers a good bunch of features that every spy software should have. It is a very good choice for those who are looking for a mid-range spy software at an affordable price.
How it Works?
After your purchase, you can directly download the installation module onto the target cell phone. Installation takes only a few minutes (2-3 min approx). After the installation, each activity on the target phone is recorded and uploaded onto the SpyBubble servers. You can login to your online account from your PC (or any computer) to view the logs at any time. The logs contain Text messages, Contacts List, Call History, GPS Locations and many such information.
Call Interception: When the target cell phone is on the conversation, you will receive a secret SMSnotification on your phone. At this time you can call the target phone to listen to the live conversation going on. All this process takes place in complete stealth mode and is 100% undetectable!
SpyBubble Features:
SpyBubble offers every common feature such as recording Call Logs, SMS, GPS Locations, IM Conversations, Web Activities, Emails etc. It is very similar to Spy Phone Gold but lacks the vital features like call recording and call interception. Thus with SpyBubble you cannot listen to live calls on the target cell phone.
Compatible Cell phones:
SpyBubble is compatible with Nokia (Symbian), Samsung (Android), Apple iPhones, Blackberry and Windows Mobile Phones.
You can download SpyBubble from the following link:

2. SpyPhone GOLD Review

Spy Phone GOLD is is the No.1 spy software on the market which turns any compatible cell phone into a spy phone within minutes. It offers every feature that a true cell phone spy software should have. Hence most people choose Spy Phone GOLD for their cell phone spying needs.
How SpyPhone GOLD Works?
The working of SpyPhone GOLD is exactly same as that of SpyBubble.
SpyPhone Gold Top Features:
  • Call Interception – Listen to the actual calls LIVE on the target cell phone
  • Environment Listening – Make a spy call to the target cell phone running SPY PHONE and listen in to the phone’s surroundings.
  • SMS Logging – Records both incoming & outgoing SMS
  • SIM Change Notification – Get instant notification via SMS when the target cell phonechanges it’s SIM
  • Remote Control – Send secret SMS to the target phone to control all functions
  • Spy from any location across the world
  • 100% Undetectable
Compatible Cell Phones:
1.Nokia, LG, Samsung and Sony Ericsson Phones (Symbian & Android)
2.BlackBerry Phones
3.Apple iPhones
4.Windows Mobile Phones

SpyPhone GOLD vs SpyBubble:

Which Cell Phone Spy Software to Choose?

If you ask me, SpyBubble is my choice! This is because, this feature rich software at a very low price of $49.95 is nothing more than a steal. If you’re looking for a mid-range spy software at an affordable price then this should be your choice.
However, if you want a high-end spy software with top features like call interception and call recording then you may go for SpyPhone GOLD. You may end-up paying a bit high, but it is worth the features it offers.
So, what are you waiting for? Go grab one of them from the following links now:

Become Secure on online

Become Secure on online


Privacy has become something very important to people using Internet these days. The more we do online, the more trails we leave behind. There are lots of private companies tracking every movement, keystrokes, websites you visit and the people you communicate with online. These companies often sell this information to law enforcement agencies or the government for legal affairs. Day by day more sophisticated tools and methods are being discovered to track your activities and the entire scenario has become very sophisticated. So it is very important for one to keep his privacy and stop third-parties from intruding into their activities. In this article, we will learn about various methods by which you can become secure online and mask your activities that you do not want the world to know.
The three types of methods we will use to make ourselves secure online are:
  • TOR
  • Proxies
  • VPN

TOR
Tor, short form of The Onion Router is a system that offers you anonymity online. TOR clients  redirects all your internet traffic through a network of computers concealing your actual location and preventing any tracking. The TOR bundle comes with a firefox that’s integrated to the TOR network and a GUI named Vidalia is used to use the TOR network. Here is how Vidalia looks like:
111
So before we start, let’s see how the TOR network works. Here are some pictures from the official website which will help you get started.
222
So whenever you try to contact to Dave, instead of directly contacting him, TOR first sends your transaction through a number of networks so no single point can track back to your location. So packets from your network take a random route through the network and reach the destination.

333
So once a route has been established, all kinds of data can be sent and received over the TOR network. And after a fixed amount of time, TOR changes the route through which you connect randomly which makes it very hard to trace back to you.

444
Tor is good, but it can’t completely secure you and your activity. While it protects the transported data, experts can use statistical analysis and get your circuit route and find out your location.             Official Websitehttp://www.torproject.org

PROXIES
A proxy or a proxy server is a computer system or application that acts as an intermediary between you and your client server or application. So you want to access a target, you connect to the proxy, the proxy connects to the target, then it gets back the relevant information to you.
555
So a proxy can be used to keep you anonymous, or to bypass IP restrictions, security/parental controls, or to get around regional restrictions. A proxy server appears as an IP address which you have to configure on your web browser to use it. When you do that, your original IP will be masked by the proxy and you will be anonymous.
190.96.64.234 – This is how a proxy looks like. All proxies are from a particular location or country so using a proxy near to your target server might help faster browsing too! If you’re on Firefox, you can set a proxy by going to Firefox Options > Advanced > Network > Connection Settings >Manual Proxy Settings.
666
VPN (Virtual Private Network)
VPN or Virtual Private Network is a remote server in an offsite location that tunnels all your data and information through their secured servers by encrypting them thereby making your connection secure. Most of the VPN’s use 128 bit SSL encryption or 256 bit SSL encryption. More the bit count, better the encryption. VPN helps you hide your real IP and spoofs your location to any programs or clients trying to track you. So suppose you’re from USA and needs to access a website that’s for Russia only, I could use a VPN located in Russia that masks my IP as a Russian one and thereby access the website.
777
Another matter of concern while using a VPN is logs. Almost all of the VPN providers keep logs as a security measure. This is done so that if they ever want to check up a user’s activity, they could refer to the logs. So federal agents or the government could contact the VPN providers and get your activity. Hence if you are really concerned about your security, you should purchase a VPNthat do not keep logs. When you purchase a VPN, make sure you choose one which is closer to you since it will make your Internet experience smooth and won’t cause any lag or slowness.
There are lots of free VPN’s available but they’re not recommended since most of them come with lots of ads, adwares and slow connection. Most of them keep logs which mean you’re not really secure and the connection won’t be having a good encryption rate. So it is always recommended you get a paid VPN. But I’ll include some good free and paid VPN’s to help you out.

Free VPN

Paid VPN

CONCLUSION
So that’s it. I’ve discussed some main methods by which you can be secure online. But always remember, you’re never 100% safe. If the federals or others want to track you, they can still do it no matter what measures you’re using to prevent it. These methods will work, but only up to a limit. The rest is up to you to use your intuition to keep yourself safe

How To Surf Anonymously – For Free

How To Surf Anonymously – For Free

Whenever you surf the Web, you leave yourself open to being snooped upon by web sites. They can track your online travels, know what operating system and browser you’re running, find out your machine name, uncover the last sites you’ve visited, examine your history list, delve into your cache, examine your IP address and use that to learn basic information about you such as your geographic location, and more. To a great extent, your Internet life is an open book when you visit.


Sites use a variety of techniques to gather and collate this information, but the two most basic are examining your IP address and placing cookies on your PC. Matching your IP address with your cookies makes it easier for them to create personal profiles.

If you’d like to see what kind of information sites can gather about you, head to two sites that peer into your browser and report what they find. The Privacy.net Analyzer gathers and displays basic information, such as your operating system, screen resolution, what site brought you to Privacy.net’s Analyzer, general system setup, and so on.

BrowserSpy delves even deeper into your system, and even reports on whether you have certain software on your system, such as RealPlayer and Adobe Acrobat, including version information.

Protect Yourself: Surf Anonymously

The best way to make sure web sites can’t gather personal information about you and your computer is to surf anonymously using an anonymous proxy server that sits between you and the web sites you visit. When you use an anonymous proxy server, your browser doesn’t contact a web site directly. Instead, it tells a proxy server which web site you want to visit. The proxy server then contacts the web site, and when you get the web site’s page, you don’t get it directly from the site. Instead, it’s delivered to you by the proxy server. In that way, your browser never directly contacts the web server whose site you want to view. The web site sees the IP address of the proxy server, not your PC’s IP address. It can’t read your cookies, see the referring page, or examine your clipboard because your PC is never in direct contact with it. You’re able to surf anonymously, without a trace.

There are three primary ways to use anonymous proxy servers. You can configure your browser to use an anonymous proxy server (or else get software to configure it for you); you can visit a web site, which does the work of contacting the server; or you can download software which ensures your anonymity when you use the Internet. We’ll look at how to do each.

Keep Yourself Anonymous with Tor

Tor is the best free software you can find for being anonymous when you use the Web. When you use Tor, all your communications, (not just Web surfing, but also instant messaging and other applications) is in essence bounced around a giant network of Tor servers called “onion routers,” until it’s impossible for sites or people to be able to track your activities.

Setting up Tor is straightforward. Download a package that includes not just Tor, but other software you need to work in concert with it, such as Privoxy, a proxy program. All the software is self-configuring, so you won’t need to muck around with port settings or the like. Tor runs as a small icon in your system tray. To start Tor, right-click it, and choose Start from the menu that appears; to stop it, right-click, it and choose Stop.

Once it starts, simply use the Internet as you normally would. If you’re super-paranoid, you can regularly change your Tor “identity,” to make it even harder for anyone to track your travels. Right-click the Tor icon, and select “New Identity”; that’s all it takes.

Firefox users will want to download the Torbutton, which lets them turn Tor on and off from directly within Firefox.

I’ve found only one drawback to Tor; at times, I’ve noticed a slowdown in surfing when using it. But that comes and goes, and slowdowns aren’t that extreme. So if you’re worried about your privacy when you surf, it’s a great bet.

Web Sites That Let You Surf Anonymously for Free

A number of free web sites offer free anonymous surfing via proxy servers. The benefits of these sites are obvious: when you surf, you’re anonymous. But there are some drawbacks as well. Surfing tends to be slower, and in some cases very slow. And when you use these web sites, some sites you visit from them don’t display properly.

The sites all work pretty much the same. Head to them, and in a box, type the web site you want to visit. From that point on, you’ll be surfing anonymously; the site does the work of using an anonymous proxy server for you.

The Cloak is one such service. It lets you customize exactly how anonymous you want to be and what surfing technologies you want to leave on or off. It goes beyond providing anonymity and can also protect you in other ways, for example, by turning off Java and Javascript, or even blocking banner ads. You can configure all that yourself, before you even start to surf.

Once you do that, you type in the address you want to visit, and you’re off. As you browse in your browser’s address bar, you’ll notice an odd URL that contains The Cloak’s URL as well as the site you’re visiting. For example, if you visit CNN, you’ll see something like this:

“http://www.the-cloak.com/Cloaked/+cfg=31/http%3A//www.cnn.com/”

Note that if you want to remain anonymous during your surfing session after you visit the first web site from The Cloak, you’ll have to only click links. If you type a URL directly into the address bar, The Cloak will no longer work.

The Cloak is free but has some limitations. You’ll surf more slowly than normally, and the slowdown may become noticeable. One reason is that the site also offers a for-pay service, and so it throttles down free users, while letting those who pay surf without a throttle. And the site may also limit the amount of time you surf anonymously as well, depending on whether many users are logged in simultaneously.

Use Your Browser with an Anonymous Proxy

If you don’t like the limitations imposed on you by sites like The Cloak, or would simply prefer to configure anonymous surfing yourself, you can easily set up your browser to use an anonymous proxy server that sits between you and the sites you visit.

To use an anonymous proxy server in concert with your browser, first find an anonymous proxy server. Hundreds of free, public proxy servers are available, but many frequently go offline or are very slow. Many sites compile lists of these proxy servers, including Public Proxy Servers andAtom InterSoft proxy server list. To find others, do a Google search.

I prefer the Atom InterSoft proxy server list because it provides more information about each server. It lists server uptime percentage and the last time the server was checked to see if it was online.

Find the server with the highest percentage of uptime. Write down the server’s IP address and the port it uses. For example, if you see 24.236.148.15:80, the IP address is 24.236.148.15, and the port number is 80.

In Internet Explorer, select Tools > ¨Internet Options, click the Connections tab, and click the LAN Settings button (see the picture below). Check the box next to “Use a proxy server for your LAN”. In the Address field, type in the IP address of the proxy server. In the Port field, type in its port number. Check the box next to “Bypass proxy server for local addresses”; you don’t need to remain anonymous on your local network (and if your local network is a private network, the proxy server won’t be able to connect to any of your internal web servers anyhow). Click OK and then OK again to close the dialog boxes. Now when you surf the Web, the proxy server will protect your privacy. Keep in mind that proxy servers can make surfing the Web slower, depending on the proxy you’re using.



In Firefox, select Tools > ¨Options¨ > Advanced, click the Network tab, and click the Settings button. Choose “Manual proxy configuration”, enter the proxy information (IP address and port number), and click OK and then OK again.

Problems with Anonymous Proxy Servers

If you set up your browser to use anonymous proxies, as I just outlined, you need to keep in mind that there’s one potential danger: theoretically, a hacker could set up a proxy server and then use it to capture information about the Web sites you visit. And if you type in usernames and passwords, he could steal those as well.

I haven’t heard of this actually happening in the real world, but you should be aware that it’s a possibility. Using software such as Tor or a free proxy server such as The Cloak won’t expose you to this danger; only the use of public proxy servers does.

How can you protect yourself against this? Before using a proxy server, do a Google search on its name and address, to see if there are any reports about hackers using it. And it’s also a good idea to only use a server that has been on the lists a long time because hackers are not likely to keep a server running a long time without being caught or shutting it down. The other option is to use the proxy only for casual surfing and not use a proxy when you connect to a service that requires a username and password.

Do you have questions, comments, or suggestions? Feel free to post a comment

Watch 18+ Videos On Youtube Without Signing In

Watch 18+ Videos On Youtube Without Signing In


Watch 18+ Videos On Youtube Without Signing In
Sometime its annoying when youtube ask you to sign in for your age verification to watch 18+ videos. So i will make it easy for you by showing you a simple youtube trick to watch adult or 18+ youtube videos without signing In. This trick is 100% working as of 2013. So lets get started.

How To Watch 18+ Youtube Videos Without Logging In ?

1. First get the Url of video you want to watch. As shown below.
http://www.youtube.com/watch?v=4Xkh6j7RMqk 
2. Then copy the Video Id. For above link video Id is 4Xkh6j7RMqk
3. Now paste the Video Id in the link given below.
http://www.youtube.com/v/VideoId?fs=1
  • Replace VideoId with the Id you copied in Step 2
4. Now the url will become as shown below.
http://www.youtube.com/v/4Xkh6j7RMqk?fs=1
5. Done.