CANADA How The Communists Took Control

Saturday, February 28, 2015

Review: Wifi Protector – FREE VPN service

Holy Toledo! This VPN software and service come from a very professional looking web site, with a scrolling roster of praise from the VPN users.

This is the first time I had heard of Wifi Protector. The "initial" download was a bit over 6MB, however, during instal it began downloading more components.... and more components... and more components! Instal went on for at least half an hour, I couldn't believe it.

One component it was trying to add was an updated version of Silverlight. There was a conflict and I manually skipped it. Which may account for the red "Error!" message at the end of the long, long instal. I thought, okay, that's that.

How To Configure Your Web Browser To Use Proxies

FireFox users, go to (Tools > Options > Advanced > Network > [Connection] and click "Settings"). Select "Manual Proxy Configuration" and enter an IP and Port from one of my free proxy lists into the text boxes.

Internet Exporer users, go to (Tools > Internet Options > Connections > LAN), select "Use proxy server" and enter an IP and Port from one of my free proxy lists into the text boxes.

Opera users, go to (Tools > Preferences), select the Advanced tab and click on Network to the left (3rd box down). Then, top of same window, click the "Proxy servers" button. Select "HTTP", and enter the IP address and Port number of the proxy server you have chosen to use. Hit OK at the bottom. You're done.

Google Chrome users, go to Option (top-right side) > and click the Under The Hood tab. > Then click on Change Proxy Settings and input the IP address and Port number of the proxy server you wish to use.

A Proxy Is Good For Privacy

The word proxy means "go-between", someone who does something for another.

An IP address is called a proxy because it can put a remote computer (to which the IP address belongs) between your own computer's IP and the IP of a resource you are accessing over the Internet.

In other words, you can use the IP address of another computer in a different location as a shield or buffer. This can help to make your activities online more private by masking your own IP address as the origin whenever you interact with online resources.

Privacy is a fundamental right and necessity in a free society.

Using a proxy IP address makes it look like the request came from that remote computer, instead of from your own. For example, when you click a link in a search engine, or on a web page, or use any online service, a proxy IP can make it look like someone else's computer is doing those things, not yours. This can protect you from online spying by others, including snoops, the government, or even your Internet Service Provider (ISP).

This is not the whole story on proxy IPs, or online privacy. You should certainly look into the subject if your privacy is important to you.

What is CoDeeN?

CoDeeN is an academic testbed Content Distribution Network (CDN) built on top of PlanetLab by the Network Systems Group at Princeton University:

http://codeen.cs.princeton.edu

This testbed CDN consists of a network of high-performance proxy servers.

Currently, proxy servers are deployed on many PlanetLab nodes. These proxy servers behave both as request redirectors and server surrogates.


What is a Transparent Proxy?

This type of proxy server does not conceal you online, it identifies itself as a proxy server to the sites you access, and also makes your original IP address available through the http headers.

Transparent proxies are generally used for their ability to cache web sites. While transparent proxies do not effectively provide any anonymity to those who use them, the use of one will get you around simple IP bans.

Another way of explaining it is that a "transparent proxy" is a proxy that does not modify the request or response between your computer and the remote computer hosting the site you want to visit, beyond what is required for proxy authentication and identification.

What is an "Anonymous" Proxy Server?

An "anonymous" proxy server does not send the HTTP_X_FORWARDED_FOR variable to the site you are accessing. This improves your privacy, since your IP address cannot be logged.

An "anonymous" proxy does not transfer the information about the IP-address of its user, and thus effectively hides the information about you and your surfing interests.

In addition, some proxies (the so-called elite or "high anonymous" proxies) can also hide the fact that a user is surfing through a proxy server. So there are two types of anonymous proxies, "anonymous" and "high anonymous" also called "elite".

What Is An Elite Proxy?

An elite proxy is a completely anonymous proxy IP address. It's another name for "high anonymous" proxy server.

A "high anonymous proxy server" does not pass forward to the site being accessed, nor does it reveal in any way, that you (the visitor) are requesting access through a proxy. In other words, not only are you hidden behind it, but the fact that you are using such a utility is kept totally confidential.

To the site being accessed, an elite or "high anonymous" proxy IP address is your perfect disguise on the Internet. With this, you don't even look like a proxy at all, but just an average Joe online looking for information. An elite, "high anonymous" proxy is the ideal mask to secure your privacy.

What Can You Do Under An Elite Proxy?

In addition to surfing, you can usually also check your Web-based email using a "high anonymous" proxy. You may also go chatting or download files from FTP sites.

Without a "high anonymous" IP to shield you online, a lot of the information that you enter into the web sites you visit, such as your name, email address, city and country, can be collected by vendors. They will then spam your email address with an annoying stream of junk mail. Surfing without a shield of some kind also makes you more susceptible to hackers.

A "high anonymous" proxy server can be an essential tool to shield your privacy. With a proxy like this in place, you can surf the Web assured that no type of data concerning you or your activities online will be relayed to anyone.