Results 1 to 2 of 2

Thread: Anonymizer

  1. #1
    mikesndbs Guest

    Default Anonymizer

    Hi OK
    This is starting to look interesting but I don't want to get bitten like I did with the ZA ISS B-)
    So can you tell me how it works and if there are any bad side effects to the system?

    Operating System:Windows XP Home Edition
    Product Name:Other ZoneAlarm Product
    Software Version:

  2. #2
    Join Date
    Dec 2005

    Default Re: Anonymizer

    Like this...

    It is basically a proxy server with a few extra added.

    See the section titled "Anonymous"
    from here

    What to expect:

    slower surfing, browsing, emails and such
    proxy servers still keep records of all your internet communications
    extra software on the PC and extra resources being used

    What is does:

    hides your IP which was assigned by your provider and uses a proxy IP from the proxy server, hence it is "Anonymous"

    What it does not do:

    If a trojan or malware is sent and received into the PC, it still will infect the PC. There is no special web protection from infections from a proxy server. If you install or let it in the PC, it will still infect the PC.

    The IP is normally seen by web sites and web servers. But it does really make any difference if it known or not- just by knowing an IP does not make it exploitable.

    Plus the router should be secured by the user without any extra software to do that or secure the LAN connections.
    Plus this is really readily available for free by freeware. The router is using the assigned IP and the PC is already hidden by the IP assigned by the router.

    When using web emails or banking or shopping, the connection always changes to https (secured connections) from the regular http (unsecured). So in that sense, shopping and bamking and such is safe and secure. Plus the site certificates verify if the site is secure or not.

    If there is a keylogger or trojan on the PC, the proxy server will not stop it from going outbound to the internet. They will hijack approved applications or send e-mail on the http connections or go out by the IRC ports or create their own TCP/IP stacks or inject themsleves in the Windows TCP/IP stack (and ignore firewalls and the proxy servers).

    There are other means to achieve "Anonymous". TOR is just one- this is available as an addon for FireFox andit does work well, although connections are also slower than usual.


    Message Edited by Oldsod on 04-19-2007 10:17 AM
    Best regards.

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)


Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts