WELCOME Learn Hacking web site

With our help approve your genuine adsense account within 4 hours only. We will Help you to get maximum revenue from your website blog,wordpress .ect show contact me www.fb.com/mayur.khokhar1

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Sunday 30 September 2012

symbol Legal Notice On Startup Of Windows

symbolLegal Notice On Startup Of Windows




display legal information on window startup
Display Legal Notice on Startup of your Windows
If your PC has multiple users then you can now display legal notice to every user before they login to your PC. This legal notice will be displayed at every startup just before the Desktop is loaded. Using this you can tell your friends about the do’s and dont’s in your computer when they login in your absence. Well you can do this pretty easily. For this there is one small registry hack. Here is the step-by-step instruction to do this.

Go to Start->Run, type regedit and hit ENTER
Navigate to the following key in the registry
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion
\policies\system
On the right side pane look for “legalnoticecaption“, double click on it and enter the desired Legal Notice Caption.
Next below this look for “legalnoticetext” and enter the desired Legal Notice Text. The legal notice text can be up to a page in it’s size so that it can include a set of do’s and dont’s for your computer.
After you do this just restart your computer and upon the next startup you can see the legal notice information for your computer. This trick works on both XP and Vista. You can also try it on Windows 7 and should work with no problems.

Lock Folders Using


Lock Folders Using Notepad
37  36  35 

lock folder
How To Lock A Folder Using Notepad***
Hello,

Have you ever wondered if it is possible to Lock Folder using Notepad?

Well yes it is possible to Lock Folder Without Any Software. This method works fine in Xp/Vista and hopefully upper versions of windows.
Please don't use this method if you are unsure what you are doing, I am not responsible for any damage caused by use of this, though it won't occur if you follow my steps correctly.
Here we start:
Open Notepad from your Start -> All Programs -> Accessories -> Notepad


Step 1. Copy and Paste the below code in Notepad and Save it as FolderLock.bat
cls
@ECHO OFF
title Folder Locker
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
:CONFIRM
echo Are you sure u want to Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock folder
set/p "pass=>"
if NOT %pass%==type your password here goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker

echo Locker created successfully
goto End
:End

Now save this notepad file as FolderLock.bat


Step 2 :- Now Double Click that new Batch file named FolderLock and it will make a new folder named Locker in the same location:
folder lock

Now put the Data Inside the folder Locker and again Double Click the Batch file to Lock it, this will give you a prompt, just Type y and press Enter: , File get locked
Now keep the Batch File named FolderLock.bat in a different place like your USB Pen Drive so that only you can access the Folder you have locked.

To Unlock the Folder just double click the Batch file again and type y and press Enter.

NOTE:- This Folder Lock Will Sometime not work on saving FolderLock.bat file on dekstop, so use it in any drive.

Delete or Remove Recycle bin Icon from Desktop

Delete or Remove Recycle bin Icon from Desktop
              If you are the kind of person who always likes neatness specially desktop, then here is a small trick for you that will simply remove the Recycle bin icon from desktop.
 
Follow the steps below:
[Start] [Run] [Regedit]
Registry Key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\
CurrentVersion\Explorer\BitBucket

Modify/Create the Value Data Type(s) and Value Name(s) as detailed below.

Data Type: DWORD // Value Name: NukeOnDelete

Setting for Value Data: [0 = Use Recycle Bin / 1 = Permanently Delete]
Exit Registry and Reboot

  Another Method
start->run->gpedit.msc-> user configuration ->desktop->remove recycle bin from desktop->double click->change it not configured to enable->apply and ok.

now come to start->run->gpupdate.exe and press enter.

your recycle bin icon is gone from desktop nad you will need to revert your settings for get that back.

after reverting setting make sure to run gpupdate.exe command.

What is hacking?


 What is hacking?

mayur khokhar trick hacking information

View previous topic View next topic Go down 
AuthorMessage
Hacker iam
Admin
Admin


Posts: 269
Points: 2631
Reputation: 3
Join date: 2010-11-26
Age: 22
Location: Lucknow

PostSubject: What is hacking?   by

1.originally, someone who makes furniture with an axe1. A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary.

2. One whoprograms enthusiastically (even obsessively) or who enjoys programming
rather than just theorizing about programming.

3. Aperson capable of appreciating hack value.

4. A person who is good at programming quickly.

5. An expert at a particular program, or one who frequently does work using it or on it; as in ‘a
Unix hacker.’ (Definitions 1 through 5 are correlated, and people who fit them congregate.)

6. An expert or enthusiast of any kind. One might be an astronomy hacker, for example.
7. One who enjoys the intellectual challenge of creatively overcoming or circumventing
limitations.

8. [deprecated] A malicious meddler who tries to discover sensitive information by poking around. Hence
‘password hacker,’ ‘network hacker.’ The correct term for this sense is cracker.

Cracker


One who breaks security on a system. Coined ca. 1985 by hackers
in defense against journalistic misuse of hacker (q.v., sense Cool. An
earlier attempt to establish ‘worm’ in this sense around 1981–82
on Usenet was largely a failure.

Use of both these neologisms reflects a strong revulsion against
the theft and vandalism perpetrated by cracking rings. While it is
expected that any real hacker will have done some playful cracking
and knows many of the basic techniques, anyone past larval stage
is expected to have outgrown the desire to do so except for immediate,
benign, practical reasons (for example, if it’s necessary to get
around some security in order to get some work done).
Thus, there is far less overlap between hackerdom and crackerdom
than the mundane reader misled by sensationalistic journalism
might expect. Crackers tend to gather in small, tight-knit,
very secretive groups that have little overlap with the huge, open
poly-culture this lexicon describes; though crackers often like to
describe themselves as hackers, most true hackers consider them a
separate and lower form of life.

It’s clear that the term cracker is absolutely meant to be derogatory. One
shouldn’t take the tone too seriously though, as The Jargon File is done with a
sense of humor, and the above is said with a smile. As we can see from the
above, illegal or perhaps immoral activity is viewed with disdain by the “true
hackers,” whomever they may be. It also makes reference to cracker being a
possible intermediate step to hacker, perhaps something to be overcome.

Script Kiddie


The term script kiddie has come into vogue in recent years. The term refers to
crackers who use scripts and programs written by others to perform their intrusions.
If one is labeled a “script kiddie,” then he or she is assumed to be incapable
of producing his or her own tools and exploits, and lacks proper
understanding of exactly how the tools he or she uses work. As will be apparent
by the end of this chapter, skill and knowledge (and secondarily, ethics) are the
essential ingredients to achieving status in the minds of hackers. By definition,
a script kiddie has no skills, no knowledge, and no ethics.

Phreak


A phreak is a hacker variant, or rather, a specific species of hacker. Phreak is
short for phone phreak (freak spelled with a ph, like phone is). Phreaks are
hackers with an interest in telephones and telephone systems. Naturally, there
has been at times a tremendous amount of overlap between traditional hacker
roles and phreaks.

White Hat/Black Hat/Gray Hat

White Hat Hacker:

White Hat hackers are good guys who does the hacking for defensing. They probably work an organization for providing security.

Black Hat Hacker

Black hat hackers are bad guys(the malicious
hackers or crackers). They usually steal the other bank information and
steal the money.
They use their skills for illegal purposes.
They are creators of viruses,malware,spyware.
They will destroy your pc.

Gray Hat Hackers


Grey hats are hackers who may work offensively or defensively, depending on the situation.
This is the dividing line between hacker and cracker. Both are powerful forces on the Internet,
and both will remain permanently. And some individuals qualify for both categories. The
existence of such individuals further clouds the division between these two groups of people.
In addition to these groups, there are self-proclaimed ethical hackers, who are interested in
hacker tools mostly from a curiosity standpoint. They may want to highlight security problems
in a system or educate victims so they secure their systems properly. These hackers are
doing their “victims” a favor. For instance, if a weakness is discovered in a service offered by
an investment bank, the hacker is doing the bank a favor by giving the bank a chance to rectify
the vulnerability.

Hello guyz here is some website got defaced by easy trick.

Hacker mayur
Admin
Admin



PostSubject: SITE HACKED BY ADY BLAZE   

Hello guyz here is some website got defaced by easy trick.

Some site fixed by admin but you can check other link


http://coewww.rutgers.edu/soedrupal/files/imce/Hacked.htm
http://www.argyll-bute.gov.uk/sites/default/files/Hacked_0.htm
http://www.steulaliegites.com/tinymce/jscripts/tiny_mce/plugins/filemanager/files/ady.htm
http://aceds.org/sites/default/files/css/ady.htm
http://www.obassg.com/sites/obassg.com/files/gallery/ady.htm
http://www.ec.edu/sites/default/files/imagefield_thumbs/2011/May/events/ady.htm
http://www.steulaliegites.com/tinymce/jscripts/tiny_mce/plugins/filemanager/files/blaze
http://erg.sabanciuniv.edu/sites/erg.sabanciuniv.edu/files/enews/ady.htm
http://www.sofsci.com/sites/default/files/imce/ady.htm
http://www.argyll-bute.gov.uk/sites/default/files/budgetconsultation/ady.htm
http://www.subversivegames.com/sites/default/files/games/ady.htm
http://www.arcireal.com/sites/real.sitetest.it/files/indexi.htm
http://www.proexport.com.co/sites/default/files/indexi.htm
http://www.la-gerbille.net/sites/default/files/artykul/indexi.htm
http://www.alamomusic.com/sites/default/files/images/ady.htm
http://www.gttadance.com/sites/default/files/indexi.htm
http://www.aida-americas.org/sites/default/files/indexi.htm
http://www.bcruralnetwork.ca/files/indexi.htm
http://www.energyinbalance.org/sites/default/files/indexi.htm
http://www.thegerbils.co.uk/files/artykul/indexi.htm
http://www.imft.org/sites/default/files/indexi.htm
http://www.proexport.com.co/sites/default/files/indxi.htm
http://www.silvanstaehli.ch/sites/default/files/ady.htm

Windows uses 20% of your bandwidth Here's how to Get it back

Windows uses 20% of your bandwidth Here's how to Get it back

mayur khokhar softwere enginier 

A nice little tweak for XP. Microsoft reserve 20% of your available bandwidth for their own purposes (suspect for updates and interrogating your machine etc..)



Here's how to get it back:

Click Start-->Run-->type "gpedit.msc" without the "

This opens the group policy editor. Then go to:



Local Computer Policy-->Computer Configuration-->Administrative Templates-->Network-->QOS Packet Scheduler-->Limit Reservable Bandwidth



Double click on Limit Reservable bandwidth. It will say it is not configured, but the truth is under the 'Explain' tab :

"By default, the Packet Scheduler limits the system to 20 percent of the bandwidth of a connection, but you can use this setting to override the default."

So the trick is to ENABLE reservable bandwidth, then set it to ZERO.

This will allow the system to reserve nothing, rather than the default 20%.

I have tested on XP Pro, and 2000 other o/s not tested.

Please give me feedback about your results

MAKE YOUR MENUS LOAD FASTER

MAKE YOUR MENUS LOAD FASTER
              This is one of my favorite tweaks as it makes a huge difference to how fast your machine will 'feel'. What this tweak does is remove the slight delay between clicking on a menu and XP displaying the menu.
 
Go to Start then Run
Type 'Regedit' then click 'Ok'
Find "HKEY_CURRENT_USER\Control Panel\Desktop\"
Select "MenuShowDelay"
Right click and select "Modify'
Reduce the number to around "100"
This is the delay time before a menu is opened. You can set it to "0" but it can make windows really hard to use as menus will open if you just look at them - well move your mouse over them anyway. I tend to go for anywhere between 50-150 depending on my mood.

Windows uses 20% of your bandwidth Here's how to Get it back

Windows uses 20% of your bandwidth Here's how to Get it back

mayur khokhar softwere enginier 

A nice little tweak for XP. Microsoft reserve 20% of your available bandwidth for their own purposes (suspect for updates and interrogating your machine etc..)



Here's how to get it back:

Click Start-->Run-->type "gpedit.msc" without the "

This opens the group policy editor. Then go to:



Local Computer Policy-->Computer Configuration-->Administrative Templates-->Network-->QOS Packet Scheduler-->Limit Reservable Bandwidth



Double click on Limit Reservable bandwidth. It will say it is not configured, but the truth is under the 'Explain' tab :

"By default, the Packet Scheduler limits the system to 20 percent of the bandwidth of a connection, but you can use this setting to override the default."

So the trick is to ENABLE reservable bandwidth, then set it to ZERO.

This will allow the system to reserve nothing, rather than the default 20%.

I have tested on XP Pro, and 2000 other o/s not tested.

Please give me feedback about your results

start menu bautton rename






Start-Button

How to
Change Start Button Text to Your Text

SomeTime we want's that start button name in our window xp should be changed to our name or any other name.
There are simple Steps to do it, But first take backup of explorer.exe
Open --> My computer and Then as under..
C:\Windows\explorer.exe , Copy explorer.exe and Save it at some other place.

Follow Steps As Under to change start button name:-
 
  1. Download Software name ResHack.
  2. Click To Download ResHack
  3. (FREEWARE utility to view, modify, add, rename
    and delete resources in Win32 executables and
    resource files. Incorporates an internal
    resource compiler and decompiler. Works on
    Win9x, WinNT, Win2000 and WinXP.)
  4. Open resource hack then open explorer.exe in it As by going to :-
  5. Click File, Then Click Open --> My computer and Then as under C:\Windows\explorer.exe
  6. Open string table Then 37 and 38, Then change on right hand side "start" to your name "sahil's" and then complile complile script above.
    and then save it and then save as ur explorer.exe as explorersahil.exe
  7. Then do the registry setting
  8. Open Run and Type regedit in it ,Enter,Registry is opened.
  9. Now go to winlogon as under...
  10. Hkey_local_machine\software\microsoft\windows NT\currentbversion\winlogon
  11. Click Winlogon and No right hand side,Select shell
  12. There modify explorer.exe as explorersahil.exe
  13. NOw Reboot or Restart your computer,You will be able to change the name of Start Button.
  14. Now reboot or restart your computer, You will be able to change the name of start Button.

WiFi hacking trick



PostSubject: WiFi hacking trick   


  1. Install Commview, then paste the included “cv.exe” to the directory you installed it to (c:program filescommviewwifi)
  2. Open commview and install the commview drivers to a card. It should prompt you about your card and than automatically install the driver. It is important that you have 1 card that works with commview or else the rest of the tutorial will not work
  3. Go to the “rules” tab and check “enable advanced rules”
  4. Type in the box labled formula “tods=1 and dmac=FF:FF:FF:FF:FF:FF” then type a name for your formula in the box labled name and than click add/edit.
  5. This should now appear in the upper box. if it is not checked, check it.
  6. Click settings>options>memory usage and turn maximum packets in buffer to 20000 (max). If it prompts you to restart it, do so. There are three funnel looking things on the main menu bar of commview. uncheck all but the first one (one labled “capture data packets”)
  7. Click the play button and scan for the network you want to crack.
  8. Once you have found it, drag the channel menu down to the desired channel and click capture.
  9. Now using your other adapter thats not capturing, connect to the password protected network. when it asks you for key, type in something random, i used 1234567890.
  10. It should now say connected with limited connectivity.
  11. Go back to your commview menu and click on the packets tab. you should see a couple of packets.
  12. Looking at the protocol column, you should see a couple labled IP/UDP, ARP REQ, and a couple of others. Right click on any packet labled “ARP REQ” and than click send packet, and selected. A mini menu should now appear.
  13. On the mini menu, change packets per second to 2000, and rather than 1 time(s), click continuously, and Then click send.
  14. Go back to the main commview window and go to the rules tab, and uncheck the rule you made.
  15. You are now injecting and you should see the number of packets rising really fast.
  16. Save the packets, you have to save every 20000 packets, click file, save and than in the save dialogue, remember where you saved it, and instead of saving it as an ncf file, save it as a “dump” .cap file.
  17. Extract the Aircrack-NG folder.
  18. open aircrack-ng-GUI that can be found in the map “bin” and select the files you saved, and than click launch.
  19. Look at the list of IV’s you have, and select the network you want to crack , there should be a list of a lot of them, chose the one with the most IVs.
  20. You are connected to your neighbor’s Wi-Fi. Buy him some nice gift as he just let you use his 4Mbps connection :p

notice window






display legal information on window startup
Display Legal Notice on Startup of your Windows
If your PC has multiple users then you can now display legal notice to every user before they login to your PC. This legal notice will be displayed at every startup just before the Desktop is loaded. Using this you can tell your friends about the do’s and dont’s in your computer when they login in your absence. Well you can do this pretty easily. For this there is one small registry hack. Here is the step-by-step instruction to do this.

Go to Start->Run, type regedit and hit ENTER
Navigate to the following key in the registry
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion
\policies\system
On the right side pane look for “legalnoticecaption“, double click on it and enter the desired Legal Notice Caption.
Next below this look for “legalnoticetext” and enter the desired Legal Notice Text. The legal notice text can be up to a page in it’s size so that it can include a set of do’s and dont’s for your computer.
After you do this just restart your computer and upon the next startup you can see the legal notice information for your computer. This trick works on both XP and Vista. You can also try it on Windows 7 and should work with no problems.

How to hack facebook, twitter, Gmail password using Winspy Keylogger

How to hack facebook, twitter, Gmail password using Winspy Keylogger



How to hack facebook, twitter, Gmail password using Winspy Keylogger


Keylogger is also onr of the best ways to hack password of facebook, gmail or any other website account. In this post i am going to show how to hack passwords using winspy keylogger.
Read the steps givn below:


1. First of all get your Winspy keylogger. Download it from the link given below


download Here


2. After downloading, run the program and create the user id and pasword. Remember this password as it is required each time you start Winspy and even while uninstalling.
3. Then a new dialog box will open to show you the hotkey (Ctrl + Shift + F12 ) to start keylogger.
4. Now press the hot key written in last step to go to the login form and enter login details to login.
5. Now you are on main screen of the software. CLink on remote at top and then remote install.

  • user – type in the victim’s name
  • file name – Name the file to be sent. Use the name such that victim will love to accept it.
  • file icon – keep it the same
  • picture – select the picture you want to apply to the keylogger.



In the textfield of “Email keylog to” , enter your email address. 
6.click on “Create Remote file”.


You just need to send ths file to the person whom you want to hack. If victim runs this on his system, you will get all his keylogs in your email. Check for passwords in keylogs.

How to Hack a Yahoo Password

How to Hack a Yahoo Password


Hack Yahoo Password
Every day,  a lot of people contact me about suspecting their boyfriend or girlfriend of cheating, and ask me how to hack their Yahoo password so as to find out the truth. If you are in a similar situation and wondering to know how to hack a Yahoo password, then this is the post for you. In this post, I will uncover some of the real and working ways to do that.

Is it possible to hack Yahoo?

Yes! As a matter of fact, it is possible to hack almost any email password. But before you learn the real ways of hacking, the following are the things you should be aware of:
1. Never trust any hacking service that claims to hack Yahoo password for just $100 or $200. In most cases they will rip off your pockets with false promises. Sometimes they may even start to threaten you by blackmailing that they are going to inform the victim or the cyber crime officials about your hack attempt. So, to be on the safer side, it is better to stay away from such scam websites.
2. Beware! On many websites and web portals you will often come across a fake tutorial on email hacking. The tutorial will tell you something like “You need to send the target email address along with your username and passwordto yahoo_pass_reset@yahoo.com (or similar)” to hack the password of the target account. This method seems too good to be true but, if you follow this method, you will lose your own password in attempt to hack someone else’s password.
With my experience of over 7 years in the field of hacking and cyber security, I can tell you that there are only TWO ways to hack Yahoo password. They are keylogging and phishing.
All the other email hacking methods are simply scam or don’t work! The following are the only 2 foolproof methods that work.

1. Keylogging: Easiest Way to Hack Yahoo Password

Using a keylogger is the easiest way to hack Yahoo password. A keylogger is a small program that records each and every keystroke (including passwords) that a user types on a specific computer’s keyboard. A keylogger is also called as spy program or spy software. To use it, you don’t need to have any special knowledge. Anyone with a basic knowledge of computer should be able to install and use this software. With my experience, I recommend the following two keyloggers as the best for hacking Yahoo password.
1. SniperSpy (Tested)
2. WinSpy (Tested)
I don’t have physical access to the target computer, can I still use SniperSpy?
Yes, you can! Since both SniperSpy and WinSpy offers Remote Installation Feature, it is possible to remotely install the keylogger on the target computer. However, it will also work on a local computer.
How to use SniperSpy?
1. After you download it, you will be able to create the installation module. You need to email this module to the remote user as an attachment.
2. When the remote user runs the module, it will get installed silently and the monitoring process will begin. The keystrokes are captured and uploaded to the SniperSpy servers continuously.
3. You can login to your online SniperSpy account (you get this after purchase) to see the logs which contains the password.
NOTE: If you have physical access to the target computer, you can simply install the module by yourself without the need to email it as an attachment.
The working of Winspy is somewhat similar to that of SniperSpy.
Once I install SniperSpy, can the victim come to know about it’s presence?
No. The victim will not come to know about it’s presence on his/her computer. This is because, after the installation, SniperSpy will run in a total stealth mode. Unlike other spy programs, it will never show up in start-menu, start-up, program files, add/remove programs or task manager.
Can I be traced back if I install it on some other computer?
No, it’s almost impossible to trace back to you for installing the keylogger on other’s computer.
How safe is to use SniperSpy?
Sniperspy is completely safe to use since all the customer databases remain confidential and private. SniperSpy will neither collect any information from your system nor will contact you in any way unless you request assistance.
What are the other features of SniperSpy software?
1. With SniperSpy, you can gain access to any password protected account including Yahoo, Gmail, Hotmail, MySpace, Facebook etc.
2. This software will not only capture passwords, but will also take screenshots and record chat conversations.
3. This product is extremely easy to use so that, even novice users can install and use it with ease.
SniperSpy vs WinSpy
For more details on keylogger, you can read my post on How to use Keyloggers.

2. Other Ways To Hack Yahoo Password

The other most commonly used trick to hack Yahoo password is by using a fake login Page (also called as Phishing). Today, phishing is the most widely used technique to hack Yahoo password. A fake login page is a page that appears exactly similar to the login pages of sites like Yahoo, Gmail, Facebook etc. The victim is tricked to believe this fake login page to be the real one. But once he/she enters the password there, they end up losing it.
Phishing can be very effective when implemented successfully. But creating a fake login page and taking it online to make the hack attempt successful is not an easy job. It demands an in depth technical knowledge of HTML and scripting languages like PHP or JSP.
So, if you are new to the concept of hacking passwords, then I recommend the use of keyloggers as the best to hack Yahoo password

ip hide

How to Hide Your IP Address

by mayur khokhar softwere enginier


Hide IP AddressEvery time your computer is connected to the Internet, it is assigned a public IP address which is used to uniquely identify your computer. Wherever you visit websites or use Internet services, your public IP is also transmetted and recorded in the logs kept on those servers. Thus, your IP address makes it possible to trace all your web activities back to you.
 

So, How do I Hide my IP Address?

 
The best and the easiest way to hide your IP address is by using a proxy server (anonymous proxy server) in one form or the other. A proxy server is a special type of server which acts as an intermediary between your home computer (or network) and rest of the Internet. This proxy server makes requests for Internet services/information on behalf of your computer using it’s own IP address instead of yours. The obtained information is then passed on to your computer. Thus, your computer is indirectly connected to the Internet via a proxy server where the IP address of the proxy server is exposed and your actual IP address remains concealed. Web proxies are identified by a combination of URL and TCP port number which is similar to something as below:
http://207.133.133.205:35
In the above example, http://207.133.133.205 is the URL of the proxy server and 35 is the port number. There are a variety of these proxy servers available:
 
Transparent Proxy Server
This type of proxy server identifies itself as a proxy server and also makes the original IP address available through the http headers. These are generally used to speed-up the web browsing since thay have a very good ability to cache websites. But they do not conceal the IP of it’s users. It is widely known as transparent proxy because it will expose your real IP address to the outside world. This type of proxy server will not hide your IP address.
 
Anonymous Proxy Server
This type of proxy server identifies itself as a proxy server, but does not make the original IP address available. Anonymous proxy server is detectable, but provides reasonable anonymity for most users. This type of proxy server will hide your IP address.
 
Distorting Proxy Server
A Distorting proxy server identifies itself as a proxy server, but make an incorrect original IP address available through the http headers. This type of proxy server will hide your IP address.
 
High Anonymity Proxy Server (Elite Proxy)
An Elite proxy server does not identify itself as a proxy server and will not make the original IP address available to the outside world. This type of proxy server will hide your IP address.
 

Which Proxy is the Best?

 
Clearly High Anonymity Proxy (Elite Proxy) is the best to hide your IP address. Because of it’s nature, the elite proxy neither identifies itself as a proxy server nor will expose your real IP address to the Internet. Hence, it provides maximum privacy for your Internet activities.
You can obtain a long list of proxy server URLs on Google and configure your browser settings so as to make them working for you. However, most of the free proxy servers you get on the Internet will not be effective in concealing your IP address. Even if some of them work they will be too slow and may take several minutes for a single webpage to load.
So, in order to connect to a blazing fast elite proxy server, I recommend you to use the following IP Hiding software:
Hide the IP (Tested)
 
Hide the IP will put you behind a blazing fast Elite Proxy Server(High Anonymous Proxy) with just a click of a button. With this program, you need not worry about configuring your browser settings.
All you have to do is just install the program and select the proxy server you want to be behind. It offers a list of countries from which you can decide which country to be indicated as your origin.
 

How to ensure that the IP is hidden?

 
Before you hide your IP address, you can check your real IP by visiting the following website:
Once you get your real IP, switch on your IP hiding software. Now once again visit the above site and check your IP address. If you see a new IP then this means that your software is doing the right job.
Also, the above site (Whatismyipaddress.com) is capable of detecting many proxies. If you see the words such as “suspected proxy server or network sharing device” or similar words then, it means that the proxy you are using is not an Elite Proxy.
Download Hide the IP now and see the difference for yourself. For more information on this product, visit Hide the IP homepage from the following link:
Hide the IP (Download Link)

***For free Breaking News Alerts just sms JOIN NAXATRANEWS to 567678********For free Adult Jokes just sms JOIN 18JOKES to 567678*****