Applications for anonymous networking.

Ben Hartley

Active Member
Reputation
0
Feel free to contribute.

Template:

- Informations

- Download link (if applicable)

- Source(s)

- Author.

Anonymity Shield v3.8 - gives you a totally anonymous on the network, the engine of the program is built on "SmartProxy" technology, which provides excellent protection, no matter what you do on the Internet: just browsing around the web browser, sit chatting or sending e-mail.? SmartProxy? modern technology that transmits all your threads through a chain of proxies, thereby sweeps and confused traces of what makes it an ideal tool for anonymity.

Download & crack


Tor

Official O / S: Windows / MacOSX / Linux / BSD / Unix Tor - anonymizing this network. Tor provides covert location on the Internet, s aschischaet of analysis and listening to traffic, hides IP address . The above properties are achieved through "multi" encrypt the traffic for a few arbitrarily selected nodes Tor network and serial transmission through these sites to the recipient (in the end, the last Tor-node and the receiver does not know who gave them traffic, and the first node in the Tor- chain has no idea about the place of destination). Attention: Tor will not somehow magically protect all your traffic just by the fact that you install it. You will need some way to reconfigure the software used, and perhaps reconsider their behavior on the web. Some recommendations are listed below. It should be noted that anonymity is achieved is not "free." In particular, the capacity of the Tor network is lower than with direct connections, the transmission through the network introduces some delays, but, nevertheless, the rate is usually higher than with a dialup modem connection. In addition, Tor imposes some restrictions on the content of transmitted data: for example, without resorting to special tricks, and through it you can not send a simple letter from a mail client that has been done to prevent the use of the network to send spam. Important is that Tor provides anonymity only at the transport layer, ie hides your IP-address of the recipient and can not distinguish in the flow of traffic transmitted over a network specifically yours. At the same time, Tor does not care about the protocol level and content of your communications. Here's what you need to keep in mind before installing Tor, if you expect to get a sufficient level of anonymity:


  • Plug-ins and add-ins for various browser can trivially discover your IP (eg, plug-in Adobe Reader, which allows to read PDF documents in the
  • browser, can bypass the proxy server and open a document directly, bypassing the Tor, which will destroy your anonymity). These same steps can
  • execute Java-applets, ActiveX controls and Flash etc.
  • To work with Tor is recommended to use the latest version of Firefox extensions NoScript (blocking it all plug-ins and javascript without exceptions),
  • Torbutton , and disable the browser support for Java.
  • Proxy settings should be specified for all the supported browsers protocols (including FTP, Gopher, etc.).
  • Unsafe use of cookies can destroy anonymity, despite the use of Tor. In the best case, cookies must be turned off completely.
  • DNS-queries programs that bypass the Tor network to the DNS-server provider, just as dangerous. Instructions in the direction of DNS-queries
  • through Tor depends on the program, for the Firefox browser, they are: in the address bar, type about: Config, locate the
  • network.proxy.socks_remote_dns and set it to true.
  • And, finally, be careful to ensure that publishing on the web. If you use Tor, but telling in any forum your real name or nickname that at non-
  • anonymous connections using, then Tor will not blame for anything.

ps: Do not forget that the output nodes of your unencrypted traffic can saved.

Authors: Opensource.

OpenVPN

OpenVPN is a free and open source software application that implements virtual private network (VPN) techniques for creating secure point-to-point or site-to-site connections in routed or bridged configurations and remote access facilities. It uses a custom security protocol that utilizes SSL/TLS for key exchange. It is capable of traversing network address translators (NATs) and firewalls. It was written by James Yonan and is published under the GNU General Public License.

Download

Source(s) openvpn.
 

tu y tu mama

Onyx user!
Reputation
0
Contribution here.

Hotspot Shield:
Works on wireless and wired connections alike. Provides Unlimited Bandwidth.

Works on the PC and the Mac, including new operating systems (Windows 7 and Snow Leopard)

Hotspot Shield protects your entire web surfing session; securing your connection at both your home Internet network & Public Internet networks (both wired and wireless). Hotspot Shield protects your identity by ensuring that all web transactions (shopping, filling out forms, downloads) are secured through HTTPS. Hotspot Shield also makes you private online making your identity invisible to third party websites and ISP’s. Unless you choose to sign into a certain site, you will be anonymous for your entire web session with Hotspot Shield. We love the web because of the freedom that it creates to explore, organize, and communicate. Hotspot Shield enables access to all information online, providing freedom to access all web content freely and securely. Secure your entire web session and ensure your privacy online; your passwords, credit card numbers, and all of your data is secured with Hotspot Shield. Standard antivirus software protects your computer, but not your web activities.

That's why AnchorFree is pleased to offer Hotspot Shield. Our application keeps your Internet connection secure, private, and anonymous.

Official website here.

Source:
HotSpot Shield

Author:
HotSpot Shield team (?)

And thanks for that Anonymity Shield.
 

Ben Hartley

Active Member
Reputation
0
SecureFX v6.0.1

SecureFX - secure transfer of client files with the support of SFTP, FTP / SSL and FTP protocols. SecureFX combines ease of use, the interface is similar to the Explorer interface with advanced features, including long file transfers, remote edit, synchronize sites, X.509 certificates and Kerberos v5 (GSSAPI) authentication. Additional "FIPS Mode" uses a FIPS 140-2 cryptographic library and only allows FIPS-validated algorithms. Subscribe to the site that supports SSH2, SecureFX and and get everything you need to create a fully encrypted SFTP session. SecureFX makes it easy to secure file transfers. Set the secure connection click or type the server name in the dialog box, Quick Connect. Drag and paste files to and from the server and your computer, Windows Explorer and other applications or to produce a fully automated, uninterrupted transfer files from the command-line utility SFXCL. Continuous file transfers automatically resume when the connection and Quick Sync allows for synchronization between your local files and server with one click. with the session manager as a tree structure you can organize hundreds of sites. You can conveniently access any open sessions from the system tray utility menu Activator tray utility. Named sessions allow you to save your personal settings for individual sites. Named firewalls can be used on an ad hoc basis for the session so that you can work from multiple locations with different firewalls. Options include a firewall generic, basic (core) and unconfirmed HTTP proxy - servers. SecureFX also provides the ability to run multiple applications and supports IPv6. SecureFX supports AES, Twofish, Blowfish, 3DES and RC4 ciphers. RSA and DSA keys are supported for host and public keys. If you need terminal emulation and file transfer, SecureCRT and SecureFX can share the global options and options session and host key database so configuring the connection will require only one time. Or create a complete equipment for transferring files with SecureFX and VShell server

Download / crack / mirror

Source(s) https://xakepy.ru/
 

Ben Hartley

Active Member
Reputation
0
Sock5 proxys

(Not application but heh is usefull)

SOCKS is an Internet protocol that routes network packets between a client and server through a proxy server. SOCKS5 additionally provides authentication so only authorized users may access a server. Practically, a SOCKS server will proxy TCP connections to an arbitrary IP address as well as providing a means for UDP packets to be forwarded.
SOCKS performs at Layer 5 of the OSI model the session layer (an intermediate layer between the presentation layer and the transport layer).

Author: David Koblas

Sock servers
Code:
94.76.232.157	3128	Anonymous	Great Britain (UK)	11/1 06:45:01	short
93.187.17.201	80	Anonymous	Great Britain (UK)	12/16 21:51:32	short
93.187.17.202	80	Anonymous	Great Britain (UK)	12/17 10:30:49	short
80.90.199.83	3128	Transparent	Great Britain (UK)	12/17 11:43:05	short
80.90.199.84	3128	Transparent	Great Britain (UK)	12/17 11:43:09	short
82.198.228.92	80	Anonymous	Great Britain (UK)	12/17 11:43:36	short
212.219.0.20	8080	Distorting	Great Britain (UK)	12/17 12:33:41	short
83.229.6.179	8080	Transparent	Great Britain (UK)	12/17 13:10:31	short
85.31.70.157	80	Transparent	Great Britain (UK)	12/17 14:37:35	short
217.15.117.58	3128	Transparent	Great Britain (UK)	12/17 15:39:05	short
82.198.225.82	80	Anonymous	Great Britain (UK)	12/17 15:52:29	short
93.126.9.133	8080	Transparent	Great Britain (UK)	12/17 16:00:47	short
94.30.94.10	8080	Transparent	Great Britain (UK)	12/17 16:05:20	short
31.3.230.29	3128	Transparent	Great Britain (UK)	12/17 16:52:47	short
91.205.248.207	80	Distorting	Great Britain (UK)	12/17 17:06:07	short
212.118.224.154	80	Transparent	Great Britain (UK)	12/17 17:44:34	short
80.194.50.123	8080	Distorting	Great Britain (UK)	12/17 18:07:27	short
93.126.22.22	8080	Transparent	Great Britain (UK)	12/17 18:11:03	short
109.123.110.151	8080	Transparent	Great Britain (UK)	12/17 18:17:25	short
109.204.121.123	80	Transparent	Great Britain (UK)	12/17 18:17:28	short
212.118.224.151	80	Transparent	Great Britain (UK)	12/17 18:47:28	short
212.118.224.156	80	Transparent	Great Britain (UK)	12/17 18:47:28	short
213.27.233.181	80	Anonymous	Great Britain (UK)	12/17 18:53:17	short
217.198.37.50	8080	Distorting	Great Britain (UK)	12/17 18:54:22	short
31.3.249.13	8080	Transparent	Great Britain (UK)	12/17 19:03:21	short