Sie sind auf Seite 1von 28

Table of Contents I. Introduction a. What is the Internet .... b. Why do you need to be anonymous in the internet? II.

. The ways for determining you on the internet . a. IP Address . b. Cookies c. Browser d. JavaScript, ActiveX, and Flash Support . III. IV. V. Who and why is it necessary to be anonymous in the internet Top 10 Frequently Asked Questions about Internet Security ... VPN a. What is VPN ... b. How VPN does helps in internet security? ....... c. 3 3 7 7 7 8 8 9 11 16 16 16

The other uses and advantages of using VPN ......... 16

d. How VPN does operate? ............... 17 e. VPN Protocols ................. 17

i. OpenVPN ................ 17 ii. PPTP ....................... 18 iii. L2TP ................. 18 iv. Single ................. 19 v. Double ................. 19 vi. Triple ................. 19 f. Table: Comparison of VPN Protocols .......... 19 g. The Best VPN Protocol .............. 20 VI. SOCKS .................. 21 a. What is SOCKs? .............. 21

b. What are uses of SOCKs? ............ 21 c. How SOCKs does operate? .............. 22 d. SOCKS Specifications ............... 23 e. Advantages and Disadvantages of using SOCKs 24
1

VII.

VPN

SOCKS Chain ............. 25 SOCKs Chain .......... 25

a. What is VPN

b. VPN vs. SOCKS .......... 25 c. How VPN SOCKs Chain operates? ......... 25 SOCKs Chain ....... 26 SOCKs Chain? ....... 27 27

d. Advantages of using VPN e. How you can use VPN

i. OpenVPN Chain ...........

ii. PPTP+FreeCap Chain ............ 28

Introduction

What is the Internet? The Internet, the World Wide Web, or simply referred to, as the net is the interconnection of many computers within a vast network. A lot of data and information have been globally available to billions of people that need it, in an ease by the help of the internet.

Why do you need to be anonymous in the internet? However, despite the internets usefulness to human, it can also provide negative effect that relates to security and privacy risks. When you connect to the internet, your device, or computer automatically send information to the web servers. This information includes your viewing habits, the terms you had searched, your geographical location, your address, phone number, employment details, your credit card numbers, and more. Websites that you visits keeps logs of this data, and even though you trust the integrity of that website, the fact that they are storing your information clearly means that you are still not safe and potentially at risk for data security invasions. You cannot prevent this to happen, but you can change what is happening or do something about it. Being anonymous on the internet does not just covers security and data protection. Another good use of being anonymous from the internet is it can give you the freedom you need to get access to p2p1, torrents2, and porn contents from the internet and stay undetected or hidden. Internet anonymity for this purpose has been reportedly to be successful, thus enriching the experience of the internet user for its purpose and objectives.

1.

p2p P2P stands for Peer-To-Peer. It is a type of network communication, which allows file and data sharing between hardware and software without passing through the services of a server.

2.

torrents or torrent, a peer-to-peer file sharing (P2P) communications protocol/software/company.

There is also a massive suing of thousands of p2p/torrent users or downloaders for their illegal downloads that have been reported from the past few years. Quoting from online news articles and news publications or sources:

NEW YORK (CNNMoney) -- The turn of the 21st century was rife with bitter antipiracy lawsuits pitting studios against their potential customers, with music labels banding together to blast Napster -- and its massive user base -- to smithereens. Get ready for round two. This time, it is BitTorrent users facing off against the movie studios. Nearly 50,000 users of BitTorrent's peer-to-peer downloading software have been targeted in a sting over the past few months, accused of illegally downloading one of two movies. Source: 50,000 BitTorrent users sued for alleged illegal downloads

In the last 12 months, copyright infringement lawsuits in the United States, mainly against torrent users (and a few hundred ed2k users), have targeted 99,924 defendants. The profitable pay-up-or-else scheme has been embraced by many. Of the 80 cases that were filed originally, 68 are still active, with 70,914 defendants still being targeted. Mass P2P lawsuits are a new revenue stream for the adult entertainment and movie studio industries. Copyright holders try to obtain the personal details of users who are allegedly sharing their material online, and once they do, they offer the defendant the opportunity to settle the case for somewhere between a few hundred to a couple of thousand dollars. The victims are told this will allow them to avoid a full trial and potentially even bigger financial penalties. Source: Almost 100,000 US torrent users sued in the last 12 months

CONCORD, N.H. (AP) Renee Elderd never thought to ask her husband about the music he downloaded and listened to on their computer. Turns out she should have.Last September, a few months after Elderd's husband moved out, a police officer showed up at her Nashua home with a lawsuit from the recording industry. She was accused of copyright infringement. "The bottom line is, he wanted to do the right thing and get out of the lawsuit and not pay all the fees," Persson said. "With the amounts they're settling for, it doesn't make any sense for people to fight these." Source: Woman struggling with music downloading lawsuit

It says at least 33 people have been detained for internet subversion and two prisoners had subsequently died after apparent torture or ill-treatment. Amnesty said a former police officer, Li Dawei, was the subject of one of the longest sentences. He was jailed for 11 years after being convicted of downloading articles from democracy sites abroad. Source: China accused of jailing net users

Downloading from torrent sites or peer to peer sites have been reported to be an illegal action as per it gives internet users the easy access to copyrighted materials and media stuffs that they should be getting with a price, hence they get it for free easily from torrents or p2p sites. Since the beginning of the flourishing of the internet era; the law, or anti-piracy acts and campaigns have been enforced by the governments of every country in the world. The government, from then have become strict, and without further amnesty, depending on the state you belong, you are possibly going to jail if proven that you are breaching over this kind of illegal activities. Even though this only pertains to

downloads from the internet.

Obviously, you can get yourself sued only if you have been traced for doing those illegal actions. However, with the right knowledge of internet anonymity, you can put your mind at ease as per your identity is hidden, whenever you are accessing p2p or torrent sites. This adds another kind of security for you as an internet user. Getting anonymous from the internet can start from you and will only be from the end-user, whether he decided to make his information private, or unreal that are sent on the web servers for the norm compliance. There are a lot of method that you can use in order to get anonymous from the web, thus giving yourself the maximum freedom you need for your every internet actions, without the fear of getting sued or sent to jail just by this stuffs that seems to be illegal on the first hand.

The Ways for Determining You on the Internet Once you are connected on the internet, through any website, your machine automatically sends data and information to their webservers. This information includes your IP Address, Cookies, Browser, and JavaScript, Active X, and Flash support capability of your machine that you are using to connect on the internet.

IP Address IP Address, or internet proxy address, refers to the proxy you are using on that moment you are connecting on the internet. This can come into numbers or names, often referred to as hostnames. With your IP address, your current location and ISP1 can be tracked easily. In the case of seeking for internet censorship and anonymity, you never want to expose your real IP address. There are many ways that you can do to change the IP address you have.

Cookies Cookies refer to unique data that are encrypted in a way it contains vital information that deals with your log-ins on different sites. In the internet, speaking of cookies does not pertain to those baked breads that are edible. When you visit a website, or any webserver, your computer sends a specific cookie to the site, to make yourself remembered by the site. Some invasion can be done through cookie sniffing, in which nasty people can jack up into your privacy, when they successfully stole your cookie. This is a big risk to your security and privacy. However, you always have the option to get your browser rejects on accepting and sending cookies, thus making your web browsing safer, secure, and anonymous.

1.

ISP Internet Service Providers

Browser Your browser is the application software, or program that you are using on browsing the internet. The most popular among computer browsers are Internet Explorer from Microsoft, Google Chrome from Google, Mozilla Firefox from Mozilla, and Safari Browser from Apple. When you browse any webpage through your browser, the webserver that you are connected to instantly knows your Browser name. However, for internet anonymity purposes, there are many ways to faking your browser data, this refers to user-agent2 masking or faking.

JavaScript, Active X, and Flash Support Webservers can easily know whether your browser or machine can support the following: JavaScript, Active X, and Flash. These are used for coding webpages, in which it makes some webpages load specific content based on its purpose. You can always opt-out to disabling your browsers JavaScript support. It may help in preventing nasty attacks via some exploits in side with this kind of scripting procedure, which you may unknowingly encounter. However, disabling support for these coding protocols might decrease the quality of your webpage/internet browsing experience.

Since these set of information are easily detectable by web servers, and the webpages you are connected to, it is important for internet anonymity purpose that you know whether you are sending the proper information you desired. A good online web service can be found at www.5who.net, it can give you detailed information and accurate analysis of the data you are sending on the internet including but not limited to: IP Address, location, Browser or user-agent, cookie name, and JavaScript, Active X, or Flash support.

2.

user-agent a user-agent, or ua, is an application which connects to The Internet. Each user-agent has its own unique identification string.

Who and why is it necessary to get anonymous on the Internet Many people are currently employing internet anonymity for serving their own needs. On some countries, their local ISPs are instructed by their governments to block access to certain sites that are similar but not limited to social networking sites or video streaming sites. Some are just even blocking specific websites, just for fulfilling their cultural or ethical preferences. Some sites also are restricting access to certain countries, in which they forbid users from that specific country to get access to their websites and services. Thus, the need to being anonymous on the internet can be achieved from faking the information you are sending to webservers. It will allow you to pass through the firewalls set by your ISP or web servers, thus giving you full access or internet freedom. If you are anonymous, your location gets unknown for webservers, and you are free from restrictions. Not just normal people or internet surfers take the good use and benefits of internet anonymity. Even hackers or criminals, know that this is one sure way for them to get safe along with the internet crimes they are purposely doing. When hackers or criminals get anonymous via different methods, even if their interception or hacking attempts are detected, they still cannot be detected. Thus, it makes them free for doing the internet crimes they desire. To date, there are already countless stories from local to online news about internet hacking and breaching, through the internet. The same with the numbers of people, that were referred to as hackers are also increasing as the internet era progresses.

Computerworld - Chinese hackers once broke into computers at the U.S. Chamber of Commerce and had access to everything on the organization's systems, including information on about 3 million of its members.

A Chamber of Commerce spokesperson this afternoon confirmed reports that the intrusion was discovered and shut down in May 2010, about a year after the hackers gained access to the business organization's networks. According to a report in today's Wall Street Journal, investigators have been unable to determine specifically what information may have been compromised. However, it appears that the hackers targeted four Chamber employees who worked on Asia policy, the Journal said. About six weeks' worth of email belonging to those four employees is believed to have been stolen. In total, emails belonging to about 50 members of the Chamber appear to have been stolen, the Journal reported. Source: Chinese hackers breached U.S. Chamber of Commerce

An Iranian hacker is prompting major tech companies to revisit their online security policies, after his breaches in companies like DigiNotar threatened basic Internet security worldwide. Comodohacker, a self-proclaimed 21-year-old Iranian engineering student, told the New York Times he hacked the security certificate firms to help Ayatollah Ali Khamenei track dissidents in his country. "My country should have control over Google, Skype, Yahoo, etc.," he emailed. "I'm breaking all encryption algorithms and giving power to my country to control all of them." Source: Iranian Hacker Shakes Internet Security

10

Computerworld - The U.S. can expect more aggressive cyberespionage efforts from China, Russia and other countries looking to collect information in areas such as pharmaceuticals, defense, and manufacturing, according to a new government report. The report, from the Office of the National Counterintelligence Executive, also provided recommendations for how organizations can strengthen their defenses."Chinese actors are the world's most active and persistent perpetrators of economic espionage," the report said. "Russia's intelligence services are conducting a range of activities to collect information and technology from U.S. targets." Sensitive information on smartphones and laptops is an attractive target for cyberspies. The report says encryption, multifactor authentication, and realtime network monitoring may help keep data safe. The report cited the case of Dongfan Chung, an engineer with Rockwell and Boeing who worked on the B-1 bomber and was found to have 250,000 documents in his house." Cyberspace makes possible the near-instantaneous transfer of enormous quantities of information," the report said. Source: Report warns of cyber spying by China, Russia

11

Top 10 Frequently Asked Questions about Internet Security

Am I always safe in the web? Many web users still do not know this, that malware attacks cannot be easily identified. You might not even now this, but you might be already under constant malware attack. Such attacks are designed to steal personal information and passwords from your machine. It can even use you to distribute spam1, malware, or inappropriate content to others without your knowledge.

What websites can be considered dangerous? Porn sites shall be considered first on the list. These sites have been popular to be containing malwares2 and distributing it to its visitors unknowingly, just the same as pokers, casino, or gambling sites as well. However, nowadays, not only these kinds of sites may possess potential dangers. Even those trusted sites can be possibly a source of malware attacks if the site is hijacked in any ways.

Can I be infected even if I did not download anything? Yes, you can be infected even if you do not download anything from a certain website. Hijackers are able to inject malicious codes. These are usually executed in just a way via accessing the hijacked site, and without you doing anything else; it can infect your machine.

1.

spam -- Spam is the use of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately.

2.

malwares -- Malware, short for malicious software, consists of programming (code, scripts, active content, and other software) that is designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, or gain unauthorized access to system resources, or that otherwise exhibits abusive behavior.

12

Is there a safest and most secure web browser? There is no foolproof evidence that a certain browser is safer than any other else. Every browser has equal potential of being infected from internet security risks. It is always a matter of the end users safety precautions, and should be regardless of what kind of web browser was being used. Using VPN is compatible to any browsers as well. It is able to add security to your browsing. The packets of information you are sending and receiving via the public network can be tunneled into the VPNs private network, encrypting it and making everything secured and safe from traffic sniffers and stealers.

What does the lock icon next to the web addresses in the browser means? If you see a lock icon on your browser while visiting certain sites, it means that you are visiting a site with SSL3 encryption. Having SSL encryption, means that the data you are sending and receiving is safely encrypted, in which it cannot be seen by any other else, by any means. Using VPN also provides a connection secured by OpenSSL security encryption with 4096-bit key. This means, your internet access is protected and the data you send or receive cannot be stolen easily.

Is it safe to use torrents? Yes, you are safe to use torrents as long as you go private and anonymous. Unless you expose yourself that you are using torrents, you are in danger of being sued for such illegal activities. Being anonymous in the internet, adds security and privacy, which can be achieve by methods such as using VPN.

13

What do hackers steal? Even if your computer does not have anything valuable, it does not necessarily means that you are out of the hackers eye of interest. Information such as login and banks or credit credentials, are among the top on this list. However, such issues about identity theft should be something to be taken into precaution as well.

I am just an ordinary internet user; will I still be targeted by hackers? Yes. Regardless of your status and identity, you can be a potential target to hackers. Being someone that is unpopular does not make you out of the hackers prey list. Depending on the hacker, targets might be some random people, in such cases like web phishing4 and spam. Hackers are able to sniff and read the traffic you send and receive if you are under a public gateway. This can be prevented by using VPN connection, for which the data you send and receive undergoes an encryption process, in that case; even though hackers can sniff your traffic, they will not be able to read it.

Does firewall can provide enough security? No. even though a firewall5 has been configured properly, it isnt enough to give internet security as per it doesnt sometimes blocks web and e-mail services by allowing these services getting unfiltered, that still leaves a hole for a risk in internet security. However, VPN can be used on a routers firewall, thus creating a much secured firewall for your router, once implemented.

3. 4.

SSL -- Secure Sockets Layer (SSL), are cryptographic protocols that provide communication security over the Internet. phishing Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication.

5.

firewall A firewall is a device or set of devices designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass.

14

What does my ISP do with my firewall? Your ISP6 absolutely does nothing to your firewall. ISPs are just there to give connectivity, not security at all at the same time. Your ISP might be setting up a little firewall just to limit and set a base level of connectivity, but it is always left as it was. The firewalls software does not get an update. They never do that, ISP just do maintenance, in which a failing device is replaced.

6.

ISP -- An Internet service provider (ISP) is a company that provides access to the Internet.

15

VPN What is VPN? VPN is an acronym for the term: Virtual Private Network. VPN is a network that uses the internet as its primary public telecommunication infrastructure. The main use of VPN is to provide remote offices or traveling users, an access to a central organizational network.

How VPN does helps in internet security? A required authentication is passed among the remote users of the network in a VPN service. Data is always secured with encryption technologies, in a way it prevents the disclosure of private information to unauthorized parties.

The other uses and advantages of using VPNs Using VPN can give you the ability to be anonymous from the internet by hiding your real IP address. In this way, you can bypass network restrictions that were set by your internet providers or network administrators.

16

How VPN does operate? A VPN works much like the previous hard-wired network systems; a virtual private network gives the owner the ability to share information with others on their network by means of a private, exclusive link that is created by a method other than hard-wires or leased lines; usually via the public internet.

VPN Protocols In terms of secure VPN technologies, these are what come among the list: OpenVPN is an open source software application that implements virtual private network (VPN) techniques for creating secure point-to-point or site-to-site connections in routed or bridged configurations and remote access facilities. OpenVPN, from James Yonan, has become a VPN protocol, in which it uses a custom security protocol that utilizes SSL/TLS1 for key exchange. This kind of VPN protocol is capable of traversing network address translators and firewalls.

1.

SSL/TLS -- Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols that provide communication security over the Internet.

17

Point-to-Point Tunneling Protocol (PPTP) is another method for implementing virtual private networks. PPTP uses a control channel over TCP2 and a GRE3 tunnel operating to encapsulate PPP4 packets. Layer 2 Tunneling Protocol (L2TP) is also a tunneling protocol used to support virtual private networks (VPNs). It does not provide any encryption or confidentiality by itself; it relies on an encryption protocol that it passes within the tunnel to provide privacy.

2. 3.

TCP The Transmission Control Protocol (TCP) is one of the core protocols of the Internet Protocol Suite. GRE Generic Routing Encapsulation (GRE) is a tunneling protocol developed by Cisco Systems that can encapsulate a wide variety of network layer protocols inside virtual point-to-point links over an Internet Protocol internetwork.

4.

PPP PPP is another legend for Point-to-Point Protocol.

18

Single VPN simply refers to the simplest form of a VPN connection technique, in which the internet connection via the VPN is made only on one single VPN server. The security level is decent.

Double VPN is a chain of two VPN servers connection. It makes a more efficient security because the internet traffic is encrypted twice on two different servers or country location of the VPN server. It gives a greater security level than the Single VPN.

Triple VPN is also called a Cascade VPN. Internet connection is cascaded and encrypted in three different servers located on three different countries. It will give the maximum level of internet security and anonymity among the Single and Double VPN types. Table: Comparison of VPN Protocols
Protocol OpenVPN Encryption OpenSSL/HMAC Authentication Pre-shared keys, certificatebased, username/password based PPTP N/A N/A TCP EAPTLS L2P N/A N/A UDP IPsec Windows Cross-platform Networking UDP/TCP Security SSL/TLS Platforms Cross-platform

VPN Connection Type Single Double Triple

Number of Servers Used 1 2 3

Level of Security Decent security Greater security Ultimate security

19

The Best VPN Protocol In comparison, looking at the major aspects of every VPN protocols, we can clearly conclude that the OpenVPN protocol is the best among the rest. OpenVPN provides encryption that is not present from the other protocols. Having a data encryption functionality means that you are more secure from privacy and security risks. With the combination of pre-shared keys, certificate-based, and

username/password based authentication, access to the network from OpenVPN can be more secured for respective parties or clients that should be using the VPN server. This functionality is not present on other secure VPN technologies. On the networking side, OpenVPN can work on either UDP or TCP protocols. This becomes an advantage, as some ISP does not allow internet connection from a certain protocol; it also provides flexibility as well. OpenVPN is the only VPN protocol that is extensible enough, as it being an open-source project, it is capable of supporting additional plugins, and features support. OpenVPN is the only crossed-platform VPN that is available for a wide range of devices and machines. When used alongside with the Triple or Cascade VPN connection method, a supreme level of internet security and anonymity can be achieved.

20

SOCKS What is SOCKS? SOCKS, not to be misinterpreted with the piece of clothing we are wearing on our foot, is an Internet protocol that routes network packets between a client and server through a proxy server. There is two major variation of SOCKS proxy, they are SOCKS4 (SOCKSv4) and SOCKS5 (SOCKSv5). SOCKSv5 provides an additional authentication so only authorized users may access a server. A SOCKS server practically proxies TCP connections to an arbitrary IP address as well as providing a means for UDP1 packets to be forwarded.

What are uses of SOCKS? Originally, the SOCKS5 protocol was designed to be a security protocol that aids in firewalls and other security products management, thus helping into an easier administration. SOCKS are also used as a circumvention tool, allowing bypassing Internet filtering to access content otherwise blocked by governments, workplaces, and schools.

1.

UDP -- The User Datagram Protocol (UDP) is one of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet.

21

How SOCKS does operate?

SOCKS is a networking proxy protocol that enables hosts on one side of SOCKS server to gain full access to hosts on the other side of the SOCKS server without requiring direct IP reachability. SOCKS redirect connection requests from hosts on opposite sides of a SOCKS server. The SOCKS server authenticates and authorizes the requests, establishes a proxy connection, and relays data.

SOCKS is commonly used as a network firewall that enables hosts behind a SOCKS server to gain full access to the Internet, while preventing unauthorized access from the Internet to the internal hosts.

22

SOCKS Specifications SOCKSv4 is SOCKS on its simplest form, in which it does not supports authentication and UDP connections, only TCP. SOCKSv4a SOCKS4a is a simple extension to SOCKS4 protocol that allows a client that cannot resolve the destination host's domain name to specify it. SOCKSv5 - The SOCKS5 protocol is an extension of the SOCKS4 protocol. It offers more choices of authentication, adds support for IPv6 and UDP that can be used for DNS2 lookups.

2.

DNS The Domain Name System (DNS) is a hierarchical distributed naming system for computers, services, or any resource connected to the Internet or a private network.

23

Advantages and Disadvantages of using SOCKS Advantages: SOCKS can hide your internal network from outside systems. SOCKS protect the host from direct access by outside systems. SOCKS can filter data that comes in from outside if they are properly designed and configured. SOCKS, when used as Security Protocol; aids in easy administration of security products. It is more flexible than using a HTTP Proxy.3 It uses only a secure connection between client and the proxy server.

Disadvantages: SOCKS servers are not widely used, it guarantees you a faster data transfer service but at the same time, you will have to pay double or thrice the same amount of the SOCKS server. SOCKS proxy cannot make you private always. Websites can see your IP wit Java, Flash, Active-X, or other scripts even if you are under a SOCKS proxy. The best way to stay fully private and secured is to use VPN after using SOCKS proxy for your internet connection.

3.

HTTP Proxy A HTTP Server is bound to an IP address and port number and listens for incoming TCP connections from clients on this address.

24

VPN

SOCKS Chain

What is VPN VPN

SOCKS Chain? SOCKS 4/5 Chain is a term called to a process of using VPN and

SOCKS at the same time in one single connection to access the internet. Having a chain like the VPN and anonymity. SOCKS chain is a great way to maximize your internet security

VPN vs. SOCKS SOCKS proxies are far too different with VPN proxies. SOCKS proxies can be easily used on browsers, and other applications that you need to proxy with a certain SOCKSv4/5 proxy. Premium proxy subscription, like from http://5socks.net, can be cheap, in exchange of access to almost unlimited private SOCKs proxies. While on VPN proxies, it is actually not a proxy, what you are getting and using is the proxy of the VPN host server. However, they both can provide anonymity and enhance security; still VPN is the one who can provide more security as per it can encrypt your data through its server tunnel. The only downside with VPN is, it can be costly to set-up your own VPN client. There is already available VPN service that you can purchase for low price, such as http://5vpn.net.

How VPN

SOCKs Chain operates?

25

The chain simply works by using both VPN and SOCKs at the same time to achieve maximum security and anonymity. Your machine should be using SOCKs proxy to make send and receive of data from the internet, in which the internet gateway you are using is coming from the VPN, which was encrypted.

Advantage of using VPN

SOCKs Chain

Using VPN and SOCKs chain can be easy. You just need a VPN and SOCKs proxy subscriptions, use them both and there you have it, a chain. Despite its ease of setting up, another major advantage of using this chain is; it is a guaranteed way of obtaining the highest level of internet anonymity, to assure you maximum protection, and privacy on the internet. Connection VPN SOCKs VPN SOCKS Security Level High High Highest level of anonymity

Using SOCKs changes your IP, Country, and Location instantly when you automatically connect from the public internet. It gives you an assurance that you are now anonymous on the web. This can be enhanced into a higher level of security, by the usage of VPNs, together with the SOCKS. When you use VPN, your data is encrypted and possible data sniffing, and stealing will be evaded; adding the use of SOCKS, you can totally hide your identity from certain scripts, and you get completely anonymous and secured to the highest level!

26

How you can use the VPN

SOCKS chain?

You can perform chains depending on what kind of VPN protocol you want to use. Here are two-types of most common practice: OpenVPN Chain PPTP+FreeCap Chain

OpenVPN Chain In order to use the SOCKs chain on OpenVPN, you must use the --socks-proxy parameter in your OpenVPN (it should be a newer release, as per older release does not support authentication yet). Just add this line in your OpenVPN config file: socks-proxy your_socks5_server your_socks5_port auth_file In which: socks-proxy an OpenVPN parameter your_socks5_server the SOCKs server you want to use; this should be changed and comes in the form of a host name or numbers (IP format). your_socks5_port the respective port for the SOCKs server; this should be changed also. auth_file should be changed into a file name, say: pass.txt, that is also in the same directory as the config file. This pass.txt (auth file) should contain the authentication information for the SOCKs proxy, in case you are using a SOCKSv5 proxy. What should be inside the auth_file should be in this format: USERNAME PASSWORD Only two lines of text will do. It might be good to check these step-by-step guides for using OpenVPN on Windows XP, and Open VPN for Windows Vista/7.
27

It does not actually matter whatever your machine is running into, it might be Windows XP, Vista, or Win7, and it will be the same with those Windows OS variations. OpenVPN is a cross-platform release so it works fine with any platform; the same way as the SOCKS proxy tunneling apps. However, some older apps that is used for SOCKs proxy tunneling did not have the chance to have a version that can be supported on a Win7 pc, as per the program development has been stopped. In the case of using OpenVPN on Windows Vista/7, you must always run the OpenVPN application or GUI with an administrator privileges.

PPTP+FreeCap Chain The PPTP+FreeCap Chain can be easily achieved, just by using a Windows application called FreeCap. The logic is simple, you need to connect first on your PPTP VPN, and then use the FreeCap application to start tunneling your connection with a SOCKs proxy. A good tutorial on how to use SOCKs on FreeCap can be found here: SOCKs + FreeCap Tutorial

There are many other ways of SOCKs implementations, in which you can find through these links: Manual SOCKs Proxy Input on Google Chrome, Mozilla Firefox, Internet Explorer and Opera Browsers Tutorial on Using SOCKs via WideCap Tutorial on Using SOCKs via SOCKsCap Tutorial on Using SOCKs via Permeo Tutorial on Using SOCKs via Proxifier Tutorial on Using SOCKs via ProxySwitcher

28

Das könnte Ihnen auch gefallen