Your browser (Internet Explorer 6) is out of date. It has known security flaws and may not display all features of this and other websites. Learn how to update your browser.
X

Posts tagged ‘change ip address’

Post

Introducing an Elite Proxy Switcher

For utmost security, simply connecting to a single proxy or VPN just isn’t enough. For a start it will be completely evident from your ISP logs that you’re using a proxy server and where it is located. Imagine instead of the logs containing lots of different locations and remote IP addresses, you’ll just have one in use all the time. Of course it’s better than using nothing at all particularly if the connection is encrypted, but it’s no where near as secure as using an elite proxy switcher program.

So what exactly is a proxy switcher and how does it work? Well the idea is to distribute your internet connection through a variety of servers all across the world. This minimizes the ‘proxy fingerprint’, meaning it’s not obvious from your logs that a proxy is being used. Also it’s much more difficult to track (in fact virtually impossible) if your connection is switching every few minutes. Here’s a quick introduction into using secure proxies, using my favorite security program Identity Cloaker.

As you can see, all proxies are not created equally in fact many you may stumble across online are inherently unsafe simply because they are so badly configured. However when the proxies are configured correctly, rotating your connection through multiple servers and hence switching your IP address every few minutes makes you connection extremely secure.

Here’s the settings for rotating in Identity Cloaker:

eliteproxyswitcher

You have the the following options of proxy switching:

  • Particular country – if you are searching or using a geo-restricted site, then you have the option of only switching between proxies in a specific country.
  • Nearest Place – this is the best option if you’re concerned primarily about speed,¬†servers will be selected based on their proximity to your current location.
  • Any country – the most secure option, means that your connection can be routed through any of the servers distributed across the world.

All the above options add an extra layer of privacy, however using ‘any country’ option is probably the best for ultra security. It’s also worth considering the countries that the various proxies are located in, for instance german proxies would offer the protection of the strong EU and German privacy regulations.

 

 

Post

Rotating Your IP Address

When you connect to the internet, using anything from a smart TV to a Laptop – you will be assigned an IP address. This is your unique identifier online, this address in the format – 192.168.1.1 is directly linked to your device.

For most of us at home, this address is assigned by the ISP we connect with and as such there is no way of changing it. This address is recorded by most web sites you visit for a variety of reasons and is in effect your digital ID. Much worst for those concerned with online privacy, at your ISP every single thing you do online is recorded in logs along with this address. Which means that for all of us there is a complete record of every website we visit, every movie we watch, video we download and email we send stored on servers hosted by whomever you pay your internet fee to.

However although it is impossible for most of us to actually change our IP address, at least the public facing one we use online. It is possible to hide our IP address and gain some elements of privacy online by the following methods:

  • Hide your real IP address from web sites you visit
  • Encrypt Your connection to ensure your online activity is kept private.

These two steps are essential and are detailed in the following video entitled IP Anonymizer which you can watch here or directly on YouTube.

Your real IP address is effectively hidden via the network of proxy servers distributed across the world, all the web sites record this address and not yours which is not visible to them.

The encryption is required to prevent interception of data, and also ensures that although logs will still exist at your ISP – they will not be readable. The encryption will ensure that the only information that will be visible in the logs is the connections made to the proxies – nothing else will be legible.