Feel free to contribute.
Template:
- Informations
- Download link (if applicable)
- Source(s)
- Author.
Anonymity Shield v3.8 - gives you a totally anonymous on the network, the engine of the program is built on "SmartProxy" technology, which provides excellent protection, no matter what you do on the Internet: just browsing around the web browser, sit chatting or sending e-mail.? SmartProxy? modern technology that transmits all your threads through a chain of proxies, thereby sweeps and confused traces of what makes it an ideal tool for anonymity.
Download & crack
Tor
Official O / S: Windows / MacOSX / Linux / BSD / Unix Tor - anonymizing this network. Tor provides covert location on the Internet, s aschischaet of analysis and listening to traffic, hides IP address . The above properties are achieved through "multi" encrypt the traffic for a few arbitrarily selected nodes Tor network and serial transmission through these sites to the recipient (in the end, the last Tor-node and the receiver does not know who gave them traffic, and the first node in the Tor- chain has no idea about the place of destination). Attention: Tor will not somehow magically protect all your traffic just by the fact that you install it. You will need some way to reconfigure the software used, and perhaps reconsider their behavior on the web. Some recommendations are listed below. It should be noted that anonymity is achieved is not "free." In particular, the capacity of the Tor network is lower than with direct connections, the transmission through the network introduces some delays, but, nevertheless, the rate is usually higher than with a dialup modem connection. In addition, Tor imposes some restrictions on the content of transmitted data: for example, without resorting to special tricks, and through it you can not send a simple letter from a mail client that has been done to prevent the use of the network to send spam. Important is that Tor provides anonymity only at the transport layer, ie hides your IP-address of the recipient and can not distinguish in the flow of traffic transmitted over a network specifically yours. At the same time, Tor does not care about the protocol level and content of your communications. Here's what you need to keep in mind before installing Tor, if you expect to get a sufficient level of anonymity:
- Plug-ins and add-ins for various browser can trivially discover your IP (eg, plug-in Adobe Reader, which allows to read PDF documents in the
- browser, can bypass the proxy server and open a document directly, bypassing the Tor, which will destroy your anonymity). These same steps can
- execute Java-applets, ActiveX controls and Flash etc.
- To work with Tor is recommended to use the latest version of Firefox extensions NoScript (blocking it all plug-ins and javascript without exceptions),
- Torbutton , and disable the browser support for Java.
- Proxy settings should be specified for all the supported browsers protocols (including FTP, Gopher, etc.).
- Unsafe use of cookies can destroy anonymity, despite the use of Tor. In the best case, cookies must be turned off completely.
- DNS-queries programs that bypass the Tor network to the DNS-server provider, just as dangerous. Instructions in the direction of DNS-queries
- through Tor depends on the program, for the Firefox browser, they are: in the address bar, type about: Config, locate the
- network.proxy.socks_remote_dns and set it to true.
- And, finally, be careful to ensure that publishing on the web. If you use Tor, but telling in any forum your real name or nickname that at non-
- anonymous connections using, then Tor will not blame for anything.
ps: Do not forget that the output nodes of your unencrypted traffic can saved.
Authors: Opensource.
OpenVPN
OpenVPN is a free and open source software application that implements virtual private network (VPN) techniques for creating secure point-to-point or site-to-site connections in routed or bridged configurations and remote access facilities. It uses a custom security protocol that utilizes SSL/TLS for key exchange. It is capable of traversing network address translators (NATs) and firewalls. It was written by James Yonan and is published under the GNU General Public License.
Download
Source(s) openvpn.