http://dataproxy.blogspot.com/ :ssh,Tunnels,putty, Free Http anon , SSL , socks ,Fresh IRC PRoxy list ,proxy for mirc Connections PROXYS everyday Update! FREE ANONYMOUS PROXY LIST - ONLINE PRIVACY, ANONYMOUS SURFING, PROTECT PRIVACY: PROXIES & SOCKS FOR HTTP IRC MAIL POP3 Port : 8080 ,3128, 6588 ,more ~IF you use my list in your site put my link in your page ~http://dataproxy.blogspot.com/
Wednesday, December 30, 2009
FREE PROXY - INDONESIA
118.96.147.51:3128
203.142.64.106:80
61.247.46.48:3128
117.102.113.86:80
202.155.152.193:8080
222.124.217.60:3128
222.124.217.60:80
222.124.192.157:8080
202.46.3.81:8080
202.147.196.230:8080
118.96.135.10:3128
118.97.55.221:3128
118.97.56.18:8080
110.138.247.40:8080
Tuesday, December 29, 2009
UltraSurf | Privacy, Security and Freedom
UltraSurf is a flagship anti-censorship product by UltraReach Internet Corp. (www.ultrareach.com).
UltraSurf
enables users inside countries with heavy Internet censorship to visit any public web sites in the world safely and freely
works together with the GIFT (a dynamic node-proxy anti-jamming system);
requires no installation or change in system setting;
UltraSurf is a green software, no installation process is needed and no change in system setting is required. It is simply an executable file on Windows platform.
Download UltraSurf Client Software athttp://www.wujie.net/downloads/ultrasurf/u.zip
Download UltraSurf 8 User Guide in Chinese at:http://www.wujie.net/downloads/ ultrasurf/ultrasurf8_userguide.zip
Download UltraSurf 6 User Guide in English at:http://www.wujie.net/downloa ds/ultrasurf/UltraSurf6_userGuide_en.zip
UltraSurf’s Chinese name, Wujie – meaning borderless – has become a household name among Chinese Internet users. UltraSurf is one of the “three swordsmen,” thanks partly to its user friendliness and user support in Chinese.
UltraSurf is a robust anti-censorship system evolved from the lasting battle between GFW and UltraReach. Since infancy, UltraSurf has been one of the Chinese Communists’ favorite targets. The freely available software has been analyzed, mutilated and spoofed, and the supporting network infrastructure has been constantly attacked. Without doubt, these factors have accelerated UltraSurf reaching its level of sophistication and fame. The current release, UltraSurf 8.8, has implemented a complex proxy system with complete transparency and a high level of encryption on the Microsoft Internet Explorer (IE) platform.
UltraSurf enables users to browse any website freely--just the same as using the regular IE browser--while it automatically searches the fastest proxy servers in the background. It has strong support for load balancing and fault tolerance, and it even employs a decoying mechanism to thwart any tracing effort of its communication with its infrastructure.
UltraReach Internet Corp. (www.ultrareach.com), an Internet technology company founded by a group of Silicon Valley technologists. Since 2002, UltraReach has focused its core business on developing anti-censorship technologies, and the current release of its anti-censorship software is UltraSurf 8.8. UltraReach has been expanding its offerings based on its unique GIFT (Global Internet Freedom Technology) platform, and today it is also providing a secure email service called UltraMail, and a protected web portal for users in China, UltraReach.net (or www.wujie.net).
FREE PROXY LIST [29 Dec 2009]
200.96.49.4:8080
187.4.205.90:8080
200.195.137.166:8080
200.166.248.132:8080
187.5.156.13:8080
201.41.45.33:80
189.80.50.206:8080
200.161.240.5:8080
187.5.156.12:8080
207.35.172.214:80
222.76.210.8:8080
124.207.129.132:80
211.161.5.154:80
210.72.234.186:8080
Monday, December 28, 2009
LIST PROXY [28 DEC 2009]
189.80.50.206:8080
200.241.244.5:8080
200.166.248.132:8080
59.39.71.233:80
58.246.76.76:8080
221.214.27.253:808
221.238.17.245:8080
212.1.54.19:80
80.74.110.149:80
58.181.37.238:80
148.245.191.3:80
203.126.214.50:8080
211.76.175.5:80
72.37.213.104:8089
Sunday, December 27, 2009
Fresh Proxy List [27 DEC 2009]
200.161.240.5:8080
200.96.49.4:8080
202.120.38.182:80
58.246.76.76:8080
221.238.17.245:8080
221.214.27.253:808
88.191.109.54:81
88.191.17.209:443
85.214.48.18:80
212.1.54.19:80
217.110.79.243:80
85.25.152.194:80
148.245.191.3:80
83.98.144.90:80
Saturday, December 26, 2009
LIST PROXY - Czech-Republic
195.113.161.82:3127
195.113.161.82:3128
95.46.120.20:3128
95.46.120.61:3128
95.46.120.247:3128
95.46.120.254:3128
95.46.120.12:3128
95.46.120.26:3128
95.46.120.27:3128
95.46.120.14:3128
95.46.120.246:3128
95.46.120.9:3128
95.46.120.16:3128
95.46.120.11:3128
PROXY - 26 DEC 2009
187.28.71.200:8080
201.83.35.128:8080
200.166.248.132:8080
222.76.210.8:8080
122.205.95.27:80
58.246.76.76:8080
221.238.17.245:8080
221.214.27.253:808
211.162.208.50:80
122.169.116.107:80
80.74.110.149:80
148.245.191.3:80
210.5.71.130:8080
62.117.69.52:80
Friday, December 25, 2009
PROXY - Belgium
130.104.72.201:3124
130.104.72.201:3127
130.104.72.200:3127
193.191.148.227:3124
193.191.148.227:3127
195.207.15.79:331
130.104.72.200:3128
130.104.72.201:3128
193.191.148.227:3128
212.68.208.97:3128
List Proxy [25-Dec-2009]
124.207.129.132:80
88.191.17.209:443
95.31.1.90:8080
62.117.69.52:80
87.245.187.244:8088
194.160.76.5:80
80.249.51.198:80
95.131.249.5:80
207.99.23.198:0080
174.143.154.102:80
174.143.154.102:81
174.143.243.116:80
207.99.23.198:80
173.45.230.127:80
Thursday, December 24, 2009
List Proxy - Argentina
201.234.107.99:3128
200.68.84.69:8080
190.139.101.154:8080
200.43.141.173:8080
186.124.118.5:3128
200.45.77.50:8080
Anonymous proxy[24-Dec-2009]
207.35.172.214:80
122.205.95.27:80
121.204.0.2:80
59.41.103.43:8080
202.99.29.27:80
211.99.141.10:8080
60.172.179.14:9000
124.207.129.132:80
221.238.17.245:8080
222.76.210.8:8080
221.214.27.253:808
218.66.59.42:8080
58.246.76.76:8080
190.158.230.39:80
Monday, December 21, 2009
PROXY - UNITED STATES
207.99.23.198:80
24.176.255.51:443
208.53.168.169:8080
24.176.255.51:80
174.143.205.9:80
72.213.135.222:9000
35.9.27.26:3127
152.3.138.5:3128
35.9.27.26:3128
198.133.224.149:3127
143.215.131.197:3124
208.117.131.116:3124
128.187.223.211:3127
128.4.36.11:3127
PROXY LIST
201.22.95.137:8080
211.162.208.50:80
119.161.129.239:80
121.204.0.2:80
211.99.141.10:8080
211.144.106.81:7070
60.172.179.14:9000
211.161.45.180:80
58.246.76.76:8080
122.205.95.27:80
59.41.103.43:8080
124.207.129.132:80
222.76.210.8:8080
61.153.149.205:8080
91.121.77.146:3128
HTTP & SOCK 5 PROXY SERVER
77.232.120.33:[8080] - HTTP
77.232.118.213:[80] - HTTP
77.232.112.54:[80] - HTTP
77.232.109.39:[80] - HTTP
41.201.125.120:[6588] - HTTP
123.237.105.164:[6588] - HTTP
190.41.136.209:[3128] - HTTP
119.118.226.3:[3769] - Socks 5
60.209.53.87:[9588] - Socks 5
76.19.74.252:[6535] - Socks 5
98.140.82.153:[43327] - Socks 5
68.6.160.59:[56742] - Socks 5
69.137.245.57:[2632] - Socks 5
71.56.194.245:[3300] - Socks 5
71.230.72.203:[62211] - Socks 5
Thursday, December 17, 2009
10 Rapidleech Public Server
http://www.dragonkill.com/index.php
http://www.chinesefreewebs.com/manuel2009/
http://www.fjordbits.com/tp1/index.php
http://rapid.dezonline.ir/
http://www.nguyenngochieudb.com/Leech/
http://leechbrasil.com/index.php
http://www.adiga.biz/rap/index.php
http://leech3.gspvn.org/
http://egylayer.info/index.php
Sunday, December 13, 2009
List FoxyProxy
99.245.168.108:80
98.207.214.104:80
98.193.137.20:80
98.199.32.148:8085
89.25.64.22:80
87.245.187.244:8088
87.234.60.165:8080
86.51.114.50:80
83.252.156.78:3128
82.8.169.174:8085
82.150.165.146:8080
80.74.110.149:80
80.73.4.9:808
78.186.190.215:8088
78.130.129.251:80
78.130.129.250:80
77.242.33.5:80
76.31.74.219:8085
74.37.182.234:80
72.36.112.71:3124
72.135.11.202:8085
70.94.84.97:8085
69.64.69.142:8080
69.136.44.124:8085
68.62.12.186:8085
68.57.103.108:80
68.47.83.187:8085
68.148.67.137:80
67.193.144.244:80
66.65.245.96:8085
65.111.184.220:80
65.111.184.210:80
65.111.184.207:80
62.219.225.156:8080
61.90.230.12:80
61.140.243.193:80
60.172.179.14:9000
58.246.76.76:8080
24.6.140.123:80
24.155.96.93:80
222.76.210.8:8080
222.124.213.114:3128
221.238.17.245:8080
221.231.137.85:8080
221.224.90.82:8080
221.215.1.224:8080
221.214.27.253:808
221.130.13.233:80
221.130.13.232:80
221.130.13.225:80
221.130.13.211:80
221.130.13.210:80
221.130.13.208:80
221.130.13.207:80
221.130.13.206:80
221.130.13.204:80
221.130.13.200:80
221.130.13.199:80
219.219.222.34:80
219.148.200.202:808
219.128.102.194:80
218.201.21.178:80
218.201.21.177:80
218.201.21.176:80
218.201.21.175:80
218.201.21.158:80
203.178.133.10:3128
203.81.81.37:80
203.82.86.109:80
203.82.86.113:80
203.82.86.121:80
203.82.86.123:80
203.82.86.15:80
203.82.86.24:80
203.82.86.3:80
203.82.86.36:80
203.82.86.4:80
203.82.86.41:80
203.82.86.5:80
203.82.86.55:80
203.82.86.59:80
203.82.86.65:80
203.82.86.70:80
203.82.86.75:80
203.82.86.82:80
204.56.0.137:3127
204.73.37.113:80
207.61.241.100:9090
208.117.131.115:3128
208.117.131.116:3128
208.53.168.169:8080
208.67.253.170:80
208.77.151.84:80
208.96.213.149:80
210.125.84.15:3124
210.125.84.17:3124
210.21.63.141:8080
211.138.124.196:80
211.138.124.197:80
211.138.124.198:80
211.138.124.199:80
211.138.124.200:80
211.138.124.210:80
211.138.124.211:80
211.138.124.232:80
211.138.124.233:80
211.138.249.178:808
211.144.106.81:7070
212.138.84.62:8080
212.201.44.82:3124
212.24.238.155:80
213.131.1.102:3124
213.73.40.105:3124
213.80.128.38:3128
216.48.80.14:3124
216.82.160.156:80
217.196.164.34:3128
201.243.36.164:8080
201.225.226.68:8080
200.31.42.3:80
200.238.83.49:3128
170.140.119.69:3124
174.129.33.76:80
174.142.104.57:3128
174.142.24.201:3128
192.107.168.129:80
192.197.121.3:3124
192.33.210.16:3124
192.33.90.195:3124
192.33.90.67:3127
192.41.135.218:3124
192.42.43.23:3128
193.136.227.163:3124
193.137.173.217:3124
193.147.162.166:3124
193.157.115.250:3124
193.167.187.187:3128
193.171.32.6:80
193.174.155.26:3124
193.174.155.27:3124
193.205.215.74:3124
193.6.20.4:3128
193.6.20.5:3128
193.63.58.71:3128
194.29.178.13:3124
194.29.178.14:3124
194.36.10.154:3124
194.42.17.124:3128
195.113.161.82:3124
195.113.161.83:3124
195.116.60.2:3124
195.2.216.186:8080
195.229.62.157:110
198.163.152.229:3124
198.163.152.230:3128
198.7.242.41:3128
198.7.242.42:3127
198.7.242.43:3128
199.26.254.66:3124
200.110.244.81:8080
200.144.185.223:80
200.177.228.4:80
200.19.159.34:3124
200.19.159.35:3124
200.215.15.34:8080
169.229.50.9:3128
169.229.50.8:3124
169.229.50.7:3128
169.229.50.4:3128
169.229.50.14:3128
169.229.50.16:3128
169.229.50.10:3128
164.78.252.25:80
164.78.252.110:80
164.77.170.68:8080
164.77.170.67:8080
163.221.11.73:3124
164.73.47.242:3124
163.221.11.72:3124
163.221.11.71:3124
156.56.250.227:3128
156.17.10.52:3124
155.246.12.163:3128
152.15.98.226:3128
150.65.32.68:3128
150.65.32.66:3128
148.245.191.3:80
147.83.30.167:3124
147.83.30.164:3128
147.83.30.166:3124
147.102.224.228:3127
147.102.224.227:3124
146.57.249.99:3124
146.57.249.98:3124
144.206.66.56:3127
143.225.229.238:3124
143.215.131.199:3124
142.150.238.13:3128
142.103.2.2:3124
141.24.33.192:3127
141.24.33.162:3124
141.24.249.129:3124
140.119.164.85:3128
140.119.164.84:3128
140.114.79.233:3128
138.251.214.77:3128
138.232.66.195:3124
137.226.138.154:3124
134.76.81.91:3124
134.151.255.180:3128
134.121.64.4:3124
133.11.240.56:3128
133.1.74.162:3128
132.252.152.194:3124
132.239.17.226:3128
132.187.230.2:3124
132.187.230.1:3128
131.247.2.242:3128
131.247.2.241:3124
131.246.191.42:3128
131.175.17.9:3124
130.92.70.252:3128
130.75.87.84:3124
130.75.87.83:3124
130.192.86.30:3128
130.192.157.132:3128
130.192.157.131:3124
130.136.254.22:3128
130.136.254.21:3124
130.104.72.201:3124
130.104.72.200:3124
129.242.19.196:3124
128.232.103.202:3128
128.220.231.4:3128
128.119.41.210:3128
125.46.73.45:808
123.138.18.114:808
121.52.148.16:8080
121.173.130.215:7777
120.28.64.94:8080
120.28.64.85:8080
118.175.22.69:8080
117.25.129.200:808
115.125.87.90:8080
Friday, December 11, 2009
Freegate
Freegate is an anti-censorship software for secure and fast Internet access. It was developed and maintained by Dynamic Internet Technology Inc. (DIT), a pioneer in censorship-circumvention operation.
- users access web sites overseas as fast as their local ones;
- requires no installation or change in system setting;
- a single executable file on a Windows platform.
Freegate works by tapping into an anti-censorship backbone, DynaWeb, DIT's P2P-like proxy network system.
Freegate's anti-censorship capability is further enhanced by a new, unique encryption and compression algorithm in the versions of 6.33 and above.
visit : http://www.dit-inc.us/freegate
Thursday, December 3, 2009
Get Behind the Shield! Hotspot Shield by AnchorFree
* Secure your web session with HTTPS encryption.
* Hide your IP address for your privacy online.
* Access all content privately without censorship; bypass firewalls.
* Protect yourself from snoopers at Wi-Fi hotspots, hotels, airports, corporate offices and ISP hubs.
* Works on wireless and wired connections alike.
* Secure your data & personal information online.
Hotspot Shield protects your entire web surfing session; securing your connection at both your home Internet network & Public Internet networks (both wired and wireless). Hotspot Shield protects your identity by ensuring that all web transactions (shopping, filling out forms, downloads) are secured through HTTPS. Hotspot Shield also makes you private online making your identity invisible to third party websites and ISP’s. Unless you choose to sign into a certain site, you will be anonymous for your entire web session with Hotspot Shield. We love the web because of the freedom that it creates to explore, organize, and communicate. Hotspot Shield enables access to all information online, providing freedom to access all web content freely and securely. Secure your entire web session and ensure your privacy online; your passwords, credit card numbers, and all of your data is secured with Hotspot Shield. Standard antivirus software protects your computer, but not your web activities.
That's why AnchorFree is pleased to offer Hotspot Shield. Our application keeps your Internet connection secure, private, and anonymous.
100% Security Through a VPN
Hotspot Shield creates a virtual private network (VPN) between your laptop or iPhone and our Internet gateway. This impenetrable tunnel prevents snoopers, hackers, ISP’s, from viewing your web browsing activities, instant messages, downloads, credit card information or anything else you send over the network. Hotspot Shield security application is free to download, employs the latest VPN technology, and is easy to install and use.
So go ahead - Get behind the Shield - Try Hotspot Shield today!
Hotspot Shield runs on:
* Windows Vista
* Windows XP
* Windows 2000
* Mac OS X (10.5 Leopard)
* Mac OS X (10.4 Tiger)
visit : http://www.hotspotshield.com/
Wednesday, December 2, 2009
Free VPN service@Alonweb
About VPN provider Alonweb
Alonweb is a relatively new company which was founded in 2008. A young but professional staff (developers, managers, support service team) launched the Free Access VPN Services program at the beginning of 2009.
Our Company Goals are:
1. Popularize the VPN services
2. Increase the number of VPN users (mainly due to free access to the server)
3. Increase the security level for internet users
4. Work on qualitative improvements of the internet services provided on the market in the VPN segment
5. Develop additional services for VPN services users.
Alonweb provides the Internet community with free and paid OpenVPN tunelling service, which is useful for bypassing corporate and other restrictions, as well as hiding your personal information such as IP address and geographical location. Your traffic is encrypted, which makes it impossible to intercept it.
Alonweb makes its users feel safe on the Net. Currently Free service offers its users connection via two servers: Netherlands and Panama. Although some limitations exist (1Gb of data traffic per month is availible, maximum HTTP request size is 2Mb, heavy traffic consuming protocols and games are blocked) it is enough for most of the users.
visit: http://alonweb.com
Monday, November 30, 2009
PROXY LIST - 01/12/2009
174.129.216.113:80 Elite United States
96.56.54.171:808 Elite United States
128.95.122.72:8080 Elite United States
67.207.129.26:3128 Elite Unknown
211.138.124.200:80 Elite Unknown
94.23.51.50:8118 Elite France
174.143.236.126:3128 Transparent United States
203.160.1.154:554 Transparent Vietnam
88.191.64.91:443 Transparent France
66.206.0.48:5555 Elite United States
192.33.90.69:3127 Elite Switzerland
114.127.246.36:8080 Elite Unknown
121.13.229.72:808 Elite Unknown
91.151.18.61:8080 Transparent Italy
89.189.85.99:80 Elite Unknown
65.111.184.226:80 Elite Unknown
67.62.67.182:8080 Transparent
89.18.70.42:8080 Transparent
78.28.202.140:8080 Transparent
195.229.62.157:80 Elite Unknown
89.189.85.122:80 Elite Unknown
69.64.69.142:8080 Elite Unknown
61.19.27.73:8080 Transparent
209.20.86.28:8000 Anonymous
201.232.27.204:3128 Elite Unknown
61.145.121.124:88 Elite China
174.143.236.43:80 Anonymous
201.93.243.202:3128 Transparent';''
Saturday, November 14, 2009
Free Rapidleech Public Server
RAPID8.COM
HOSSA.ORG
GANOOL.CO.CC
MYLEECHER.COM
IGOR888.NET63.NET
LEECH4FREE.US.TO
RSMAKER.COM
RSPLG.COM
NGISING.NET
SV1.CRACKLOVE.COM
DOWNLOADPREMIUM.NET
RSLINKGENERATOR.COM
Thursday, November 12, 2009
UltraVPN – Free VPN Service to Access Blocked Sites
UltraVPN is a client/server SSL VPN solution based on OpenVPN. It encrypts and anonymizes your network connection. UltraVPN is a simple user interface to connect or disconnect to a VPN server. UltraVPN is easy to install, easy to use.
It is a cross-platform client, which supports a large number of encryption scheme. THe best part is that it is open source and free to use.
Its servers are based in France and so you are given an IP based in France for your Internet connections. I found the browsing fast enough for similar services.
You just need to download the free VPN client software from their website and install on your machine. Don’t worry, the software is open source and free from Spyware and other malware.
Obtain a username and password, and start using it.
visit : http://www.ultravpn.fr/
Wednesday, November 11, 2009
Mibbit.com - Easy and fast Webchat
No Java, no flash. With Mibbit, chatting online is easy, just choose your nickname and press go! No sign-up is required and you can use it from wherever you are with just a web browser.
Connect to IRC networks, IM, twitter, and more coming soon.
Mibbit has many customizable features which can help you make the most of your chat. You can change skins and use real-time language translation, image thumbnails, or even embed Youtube clips and exchange files with other Mibbit users.
visit : http://www.mibbit.com
Tuesday, November 10, 2009
Web Proxy List
- http://webproxysite.com
- http://unblockfacebook.com
- http://www.freesslproxy.com
- http://vectroproxy.com
- http://supermanproxy.com
- http://ixkwik.net
- http://webproxybrowser.com
- http://www.seowatt.com
- http://baypassweb.com
- http://www.proxy-browse.com
- http://baypass.info
- http://www.freshide.com
- http://unblockmyurl.info
- http://worldhide.info
- http://s1p.info
- http://PROXIESGONEWILD.INFO
- http://SURFHELL.INFO
- http://isurfproxy.com
- http://unblockedurl.info
- http://clearlydrunk.com
- http://bulletproxy.com
- http://love2bunk.com
- http://sidemart.com
- http://www.jenu.info
- http://evep.info
- http://noisylab.com
- http://unblockmyurl.info
- http://proxrepublic.com
- http://seowatt.com
Monday, September 7, 2009
Free SSH Tunnel
root:root 83.1.12.167
root:root 83.1.10.2
root:root 83.1.10.11
root:root 83.1.10.65
root:root 83.1.12.167
root:root 83.1.10.11
root:root 83.1.10.2
root:root 83.1.10.65
root:root 83.1.10.2
root:root 83.1.10.11
root:root 83.1.12.167
root:root 83.1.164.55
root:root 83.2.33.93
root:root 83.2.36.65
root:root 83.2.23.97
root:root 83.1.164.55
root:root 83.2.33.93
root:root 83.2.36.65
root:root 83.2.23.97
root:root 83.1.164.55
root:root 83.2.33.93
root:root 83.2.36.65
root:root 83.2.164.35
root:root 83.2.165.140
root:root 83.2.165.216
root:root 83.2.167.66
root:root 83.2.167.65
root:root 83.2.167.76
root:root 83.2.167.77
root:root 83.2.167.96
root:root 83.2.167.97
root:root 83.2.167.93
root:root 83.2.167.99
root:root 83.2.167.70
root:root 83.2.167.78
root:root 83.2.167.100
root:root 83.2.168.125
root:root 83.2.165.37
root:root 83.2.23.97
root:root 83.2.165.140
root:root 83.2.165.216
root:root 83.2.167.77
root:root 83.2.167.66
root:root 83.2.167.96
root:root 83.2.167.70
root:root 83.2.167.100
root:root 83.2.167.78
root:root 83.2.165.37
root:root 83.2.165.140
root:root 83.2.165.216
root:root 83.2.167.77
root:root 83.2.167.66
root:root 83.2.167.96
admin:admin 83.2.212.39
root:root 83.2.167.78
root:root 83.2.229.153
admin:admin 83.2.212.39
root:root 83.3.54.202
root:root 83.3.66.2
root:root 83.3.184.178
root:root 83.3.184.178
root:root 83.3.184.178
root:root 83.3.239.82
root:root 83.3.239.82
root:root 83.3.239.82
root:admin 83.7.222.231
demo:demo 83.9.91.21
root:qazxsw 83.8.133.11
demo:demo 83.9.91.21
root:admin 83.10.48.59
root:admin 83.7.222.231
root:roots 83.12.103.150
root:root 83.12.103.150
root:12345 83.12.103.150
root:1234 83.12.103.150
root:123456 83.12.103.150
root:1234567 83.12.103.150
root:12345678 83.12.103.150
root:123456789 83.12.103.150
root:Oracle 83.12.103.150
root:oracle 83.12.103.150
root:webmaster 83.12.103.150
root:webadmin 83.12.103.150
root:webadm 83.12.103.150
root:qazzaq123 83.12.103.150
root:changeme 83.12.103.150
root:newuser 83.12.103.150
root:newpass 83.12.103.150
root:passwd 83.12.103.150
root:rooted 83.12.103.150
root:propercius 83.12.103.150
root:changeme 83.12.103.150
root:ChanGeMe 83.12.103.150
root:ChangeMe 83.12.103.150
root:dragon 83.12.103.150
root:aaaaaa 83.12.103.150
root:bbbbbb 83.12.103.150
root:777777 83.12.103.150
root:secret 83.12.103.150
root:secrets 83.12.103.150
root:private 83.12.103.150
root:qw1er2ty3 83.12.103.150
root:q1w2e3r4 83.12.103.150
root:fbsd 83.12.103.150
root:roots 83.12.235.58
root:root 83.12.235.58
root:12345 83.12.235.58
root:1234 83.12.235.58
root:123456 83.12.235.58
root:1234567 83.12.235.58
root:12345678 83.12.235.58
root:123456789 83.12.235.58
root:Oracle 83.12.235.58
root:oracle 83.12.235.58
root:webmaster 83.12.235.58
root:webadmin 83.12.235.58
root:webadm 83.12.235.58
root:qazzaq123 83.12.235.58
root:changeme 83.12.235.58
root:newuser 83.12.235.58
root:newpass 83.12.235.58
root:passwd 83.12.235.58
root:rooted 83.12.235.58
root:propercius 83.12.235.58
root:changeme 83.12.235.58
root:ChanGeMe 83.12.235.58
root:ChangeMe 83.12.235.58
root:dragon 83.12.235.58
root:aaaaaa 83.12.235.58
root:bbbbbb 83.12.235.58
root:777777 83.12.235.58
root:secret 83.12.235.58
root:secrets 83.12.235.58
root:private 83.12.235.58
root:root 83.13.36.250
root:root 83.13.44.221
root:root 83.13.36.250
root:root 83.13.44.221
root:root 83.13.36.250
root:root 83.13.44.221
root:admin 83.13.211.102
root:admin 83.13.211.102
root:admin 83.13.232.74
root:admin 83.13.232.74
admin:admin 83.14.147.82
admin:admin 83.14.147.82
root:admin 83.14.192.154
root:admin 83.14.192.154
root:root 83.15.58.67
root:root 83.16.18.10
root:root 83.16.18.10
root:root 83.16.18.10
roza:roza 83.16.61.158
mp3:mp3 83.16.98.182
root:root 83.16.120.190
root:root 83.16.120.190
root:root 83.16.120.190
root:root 83.17.63.130
root:root 83.17.63.133
root:root 83.17.161.146
root:admin 83.17.185.38
root:admin 83.17.185.38
admin:admin 83.18.139.100
admin:admin 83.18.139.100
root:root 83.26.77.204
demo:demo 83.26.78.149
admin:admin 83.26.185.120
demo:demo 83.26.78.149
root:admin 83.26.185.120
admin:admin 83.26.185.120
damian:damian 83.29.70.5
install:install 83.30.217.122
temp:temp 83.30.217.122
server:server 83.49.128.236
silvia:silvia 83.49.46.193
silvia:silvia 83.49.46.193
server:server 83.49.128.236
root:roots 83.61.22.190
root:root 83.61.22.190
root:12345 83.61.22.190
root:1234 83.61.22.190
root:123456 83.61.22.190
root:admin 83.61.165.10
root:admin 83.61.165.10
admin:12345 83.64.172.242
admin:admin 83.64.181.167
admin:admin 83.64.181.167
http://orek2an.blogspot.com/2009/08/free-ssh-tunnel.html
Monday, August 31, 2009
Free Shell list
Server: Linux Slackware
Services: Spam-filtered email, your-login@mrejata.eu, web email http://mail.mrejata.eu, simple web hosting http://mrejata.org/~your-login, full usenet access (read and post), console-based web browsing (lynx,links), IRC access to all networks, 2bg procesess, IRC - psybnc, eggdrop, full access to wide range of compilers
http://yunix.net
Server: CentOS release 5.3
Services: Irssi, screen, psybnc, figlet, local IRC, Mordor MUD, cc/g++ version 4.1.2, gdb 6.8-27, Python 2.4.3, Perl 5.8.8, Shells: sh, bash, zsh, tcsh, csh
http://ninthfloor.org
Server: Debian linux
Services: crontab and atd, nvi, Vim, Emacs, joe, nano, pico, ed , mutt, alpine, mailx, fetchmail, lynx, links, elinks, irssi, epic, an email account (username@ninthfloor.org) with advanced spam filtering features, web access to your HTML documents (http://users.ninthfloor.org/~username), 256MiB of disk quota ...
http://blackmage.co.uk
Server: Debian GNU/Linux Lenny, Intel(R) Xeon(R) CPU X3350 @ 2.66GHz, 400MB RAM
Services: Irssi, gcc, g++, gdb, php, perl, python, screen, nano, make, bzip2, mutt, wget, bash, lynx, subversion, FTP, SSH, HTTP e.g. http://blackmage.co.uk/~rez/, 250MB space for each user, however exceptions can be made.
Saturday, August 29, 2009
Cgi Proxies
hidemyass.com
proxify.com
proxy.tc
sslunblock.com
secure-tunnel.com
blewpass.com
proxeasy.com
Friday, August 28, 2009
Proxies Site
http://firewall-bypass.info
http://datushu.com
http://gamingunited.info
http://techfaqproxylist.co.cc
http://flyingleap.info
http://favoriteshows.info
http://1337games.net/proxy
http://mailsurf.co.cc
http://www.deadahead.info
http://fastwind.info
http://proxycenterserver.co.cc
http://www.behindboss.co.cc
http://remainanonymouse.co.cc
http://drypaint.info
http://ipmark.info
http://vipfreeproxy.co.cc
http://controlkey.info/
http://coatamundi.info
http://www.smartlookup.co.cc
http://dedhead.info
http://simplefinance.co.cc
http://funpages.info
http://turboproxyserver.co.cc
http://secureinternetaccess.co.cc
Friday, August 21, 2009
elite proxy list - 21 August [ Checked ]
69.13.197.165:80 - elite - United States
147.171.65.3:80 - elite - France
200.107.15.58:80 - elite - Ecuador
98.172.168.68:8080 - elite - United States
202.54.61.99:8080 - elite - India
122.155.0.244:3128 - elite - Thailand
202.3.217.125:80 - elite - Indonesia
143.225.238.238:80 - elite - Italy
Wednesday, August 19, 2009
Sock LIST
208.109.110.163:28449
221.204.253.154:1080
211.189.18.165:5818
92.226.17.227:42315
221.12.147.80:1080
High anonymous (elite) HTTP proxies : 19 August [ Checked ]
203.177.193.102:3128
193.136.191.26:3127
194.36.10.156:3128
77.88.66.251:8000
220.60.16.72:8080
24.4.223.134:9090
174.142.24.201:3128
74.54.156.73:80
174.142.104.57:3128
58.51.197.203:808
Monday, August 17, 2009
Huge List of Anonymous Proxies
216.193.219.122:8118
98.124.135.217:8080
98.119.176.242:8080
97.65.164.214:8080
97.65.164.212:8080
97.65.164.211:8080
97.107.130.146:80
94.52.112.70:3128
93.185.38.36:3128
92.54.82.19:80
92.49.1.65:8080
92.48.80.107:80
211.183.3.9:80
211.144.200.14:80
211.136.86.204:8085
209.47.251.243:80
92.127.11.242:3128
91.193.130.126:1080
91.192.241.139:3129
91.146.50.38:1080
91.139.151.132:1080
91.121.91.61:3128
91.121.203.191:3128
91.121.135.73:80
91.112.157.214:8080
90.156.232.52:3128
201.75.67.191:6588
201.74.240.97:6588
201.74.235.65:6588
201.74.222.47:3128
201.73.208.18:1080
201.73.205.130:3128
201.72.111.10:1080
201.70.17.163:1080
201.70.144.49:1080
201.70.103.95:6588
SSH Tunnel SOCKS Proxy Forwarding = Secure Browsing
When you are at the coffee shop, or at a conference, and you are not sure that you want to send all your data over the wi-fi network in plaintext, you want a secure tunnel to browse. This happened to me recently and I stumbled across a neat feature of openssh (the ssh client on everyone’s computer). The wonders of ssh never cease to amaze me!
You can use the “-D” flag of openssh to create a SOCKS proxy.
The command first:
$ssh -D 9999 username@ip-address-of-ssh-server
This of course connects you to the server specified by “ip-address-of-ssh-server”. Needless to say, you (username) must have an ssh account on the server. In addition, this will create a SOCKS proxy on port “9999″ of your computer. This is a tunnel to the server. Now all you have to do is set the preference in Firefox to use a SOCKS proxy. The proxy is, of course, “localhost”, with the port 9999.
Now when you browse, all the connections you make to websites will seem to originate from the server to which you SSH-ed. In addition, all outgoing and incoming data for the browsing session will be encrypted since it passes through the SSH connection.
Other applications (like email clients) may also support SOCKS proxies. If any of them, you can look into using proxychains(there’s an Ubuntu package).
You can misuse this technology to circumvent paranoid browsing firewalls, even to pretend you are wherever your ssh server is located - so you can work around country-based blocks etc. I use it for the very unromantic reason that I don’t want some aspiring cracker to sneak up on me when I am in public.
Updates:
- Kees Cook tells us how to tunnel DNS lookups, so snoopy folks can’t even figure out what your are browsing, and the evil ones can’t DNS-phish you
- Don McArthur points out his excellent article that addresses the same issue
- verevi says the FoxyProxy extension will make things easier for you on the Firefox side of things
Reference: http://ubuntu.wordpress.com/2006/12/08/ssh-tunnel-socks-proxy-forwarding-secure-browsing/
Update Irc Proxy
203.160.1.66:80
212.93.193.72:443
212.93.193.78:443
212.93.193.74:443
212.93.193.82:443
218.14.227.197:3128
114.30.47.10:80
203.160.1.103:80
203.160.1.121:80
203.160.1.112:80
114.127.246.36:8080
203.160.1.85:80
203.160.1.94:80
148.233.239.23:80
60.12.190.58:8088
202.188.165.217:808
118.98.160.102:8080
59.139.31.217:80
212.102.0.104:80
212.102.0.104:8080
Monday, July 27, 2009
PROXY LIST
84.22.47.34:8080
84.14.82.2:8081
35.9.27.27:3127
190.158.227.219:3128
78.61.36.119:8080
24.96.254.86:8080
98.129.147.1:80
60.248.227.175:3128
204.56.0.137:3124
201.229.192.18:8080
128.2.223.63:3124
209.59.207.147:39689
128.2.223.65:3127
190.92.4.214:3128
212.95.71.8:80
124.104.181.29:3128
193.136.227.163:3127
200.207.9.168:3128
80.36.255.171:8080
201.221.148.76:3128
129.69.210.96:3128
201.36.194.26:8080
140.134.104.195:2301
194.210.29.25:3128
222.88.219.66:3128
128.233.252.12:3128
189.26.242.50:3128
212.117.166.26:18225
221.8.15.170:8080
218.75.100.114:8080
192.33.90.66:3127
189.50.117.248:8000
64.79.199.35:48725
128.233.252.11:3128
80.148.23.52:80
190.81.15.107:3128
129.10.120.194:3124
141.24.33.192:3127
200.148.230.217:3128
189.76.218.220:8080
70.90.240.108:444
200.168.86.58:8080
59.165.84.152:8080
35.9.27.27:3124
66.98.212.79:8888
35.9.27.27:3128
89.239.110.248:3128
131.246.191.42:3128
194.108.93.13:8080
67.69.254.252:80
200.65.127.161:3128
64.29.148.36:80
218.92.8.165:8080
200.122.131.125:3128
194.29.178.13:3124
85.214.100.18:3128
204.56.0.137:3127
91.121.70.56:3128
78.46.255.93:53
220.194.55.192:3128
69.42.218.2:3128
187.0.3.1:3128
201.65.97.162:3128
190.207.252.233:3128
64.29.148.28:80
193.171.32.6:80
213.251.161.162:3128
96.229.223.2:80
95.48.196.178:3128
206.230.106.206:80
83.242.226.130:80
125.163.120.182:3128
85.115.20.76:8080
200.65.129.2:3128
130.192.157.132:3124
93.159.11.195:8080
115.68.28.14:8080
195.113.161.82:3128
189.53.218.191:3128
128.42.142.42:3124
199.193.13.202:3128
212.117.164.17:80
124.172.110.158:80
91.112.157.214:8080
82.194.76.198:3128
67.69.254.243:80
192.33.90.67:3128
128.42.142.41:3124
200.45.199.129:3128
210.245.63.218:80
219.234.81.106:80
196.31.11.18:3128
80.249.185.2:3128
203.157.169.10:80
PROXY LIST - 27 Jul 2009
211.138.198.7:10917
221.214.27.252:808
221.215.72.218:8080
218.204.251.131:8090
60.208.64.177:8088
211.162.78.177:80
60.208.64.178:8088
211.136.86.204:8085
222.68.207.11:80
211.162.78.178:80
222.68.206.11:80
211.138.198.6:10917
202.99.29.27:80
210.51.184.62:80
202.116.160.89:80
210.51.184.41:80
200.220.140.226:3128
201.155.194.2:8080
98.208.76.247:9090
120.138.117.249:8080
80.148.22.116:8080
196.202.99.14:3128
75.101.43.34:8080
189.32.127.141:3128
222.173.130.198:80
169.235.24.232:3128
134.34.246.4:3124
202.3.217.125:80
200.164.74.78:3128
141.76.45.17:3128
131.246.191.42:3124
146.83.8.31:8080
75.101.188.125:80
201.159.20.152:8080
194.29.178.14:3124
85.214.145.36:3128
87.106.144.74:3128
150.146.205.43:80
189.77.31.82:80
189.77.8.254:3128
201.71.241.62:3128
209.59.209.121:32657
60.248.169.122:3128
217.145.98.213:8080
169.235.24.232:3124
189.47.200.12:3128
61.138.124.242:80
194.117.20.215:3128
169.235.24.232:3127
Saturday, July 25, 2009
Fresh Proxy List [25 Jul 2009]
75.145.241.73 8080 anonymous proxy server
174.129.214.93 80 anonymous proxy server
80.93.119.6 80 anonymous proxy server
201.242.31.10 8080 anonymous proxy server
114.127.246.36 8080 high-anonymous proxy server
119.167.225.136 8080 anonymous proxy server
201.210.1.168 8080 anonymous proxy server
200.65.127.161 3128 anonymous proxy server
80.73.4.9 3128 high-anonymous proxy server
128.31.1.13 3128 high-anonymous proxy server
Fresh and New Proxy List
|
| | | | | ||
ID | ADDRESS | PORT | TYPE | COUNTRY | | |
1 | 67.69.254.244 | 80 | anonymous | | | |
2 | 218.14.227.197 | 3128 | anonymous | | | |
3 | 148.233.159.58 | 8080 | anonymous | | | |
4 | 200.174.85.195 | 3128 | transparent | | | |
5 | 86.101.185.118 | 8080 | anonymous | | | |
6 | 201.161.48.194 | 3128 | anonymous | | | |
7 | 67.69.254.254 | 80 | anonymous | | | |
8 | 80.148.21.75 | 8080 | anonymous | | | |
9 | 208.74.174.142 | 3128 | anonymous | | | |
10 | 221.131.124.22 | 80 | anonymous | | | |
11 | 119.146.73.114 | 8080 | anonymous | | | |
12 | 67.69.254.247 | 80 | anonymous | | | |
13 | 121.14.157.36 | 80 | anonymous | | | |
14 | 202.54.61.99 | 8080 | high anonymity | | | |
15 | 200.148.230.217 | 3128 | anonymous | | | |
16 | 200.65.129.2 | 80 | anonymous | | | |
17 | 189.84.217.124 | 3128 | anonymous | | | |
18 | 192.192.105.19 | 3128 | anonymous | | | |
19 | 85.217.217.25 | 3128 | anonymous | | | |
20 | 201.91.0.9 | 3128 | anonymous | | | |
21 | 189.44.195.12 | 8080 | anonymous | | | |
22 | 67.69.254.248 | 80 | anonymous | | | |
23 | 221.195.80.9 | 3128 | anonymous | | | |
24 | 119.70.40.101 | 8080 | anonymous | | | |
25 | 67.69.254.253 | 80 | anonymous | | | |
26 | 216.17.103.46 | 80 | high anonymity | | | |
27 | 218.6.16.162 | 80 | anonymous | | | |
28 | 222.68.206.11 | 80 | anonymous | | | |
29 | 115.68.28.15 | 8080 | anonymous | | | |
30 | 122.200.82.157 | 80 | anonymous | | | |
31 | 213.180.131.135 | 80 | anonymous | | | |
32 | 203.160.1.94 | 80 | anonymous | | | |
33 | 60.190.139.10 | 80 | anonymous | | | |
34 | 203.160.001.112 | 80 | anonymous | | | |
35 | 200.103.183.93 | 3128 | anonymous | | | |
36 | 89.238.75.219 | 3128 | anonymous | | | |
37 | 114.30.47.10 | 80 | anonymous | | | |
38 | 203.160.001.103 | 80 | anonymous | | | |
39 | 189.47.184.162 | 3128 | anonymous | | | |
40 | 66.9.60.134 | 3128 | anonymous | | | |
41 | 189.109.46.210 | 3128 | anonymous | | | |
42 | 203.160.1.121 | 80 | anonymous | | | |
43 | 203.160.1.75 | 80 | anonymous | | | |
44 | 200.1.19.13 | 80 | anonymous | | | |
45 | 189.53.227.66 | 3128 | anonymous | | | |
46 | 8.9.209.2 | 3128 | anonymous | | | |
47 | 91.121.204.99 | 3128 | anonymous | | | |
48 | 202.98.23.114 | 80 | anonymous | | | |
49 | 190.95.149.198 | 3128 | anonymous | | | |
50 | 67.69.254.242 | 80 | anonymous | | | |
Thursday, July 23, 2009
US Sock List
173.19.205.220:7927
24.2.150.4:5131
24.30.42.15:28555
65.83.231.219:1988
65.83.231.225:1988
69.112.69.188:54731
75.65.20.213:55399
76.98.2.26:54249
98.192.108.228:39243
98.216.40.193:20971
98.217.253.202:28619
98.243.205.208:31663
98.251.13.161:9529
128.171.37.97:9275
173.18.195.192:17677
173.2.113.135:23330
173.29.152.16:26243
173.3.220.236:31863
173.30.18.85:4967
204.116.68.106:57051
208.109.110.163:39629
208.98.60.136:42632
208.98.60.141:18352
208.98.60.142:35464
208.98.60.147:48960
208.98.60.149:44038
208.98.60.152:51172
208.98.60.153:36045
208.98.60.155:22631
208.98.60.170:58282
208.98.60.171:25469
208.98.60.188:22080
208.98.60.197:53131
208.98.60.198:40726
208.98.60.199:42414
208.98.60.206:21664
208.98.60.216:40202
208.98.60.218:42653
208.98.60.224:47151
208.98.60.227:24056
24.1.110.31:45781
24.128.189.247:15283
24.128.21.23:21125
24.187.80.66:4431
24.21.154.242:59175
24.46.34.225:60717
64.126.71.132:27477
64.32.15.130:42237
64.32.15.131:40724
64.32.15.134:18098
64.32.15.135:34638
64.32.15.136:56263
64.32.15.138:39162
64.32.15.145:36543
65.29.110.184:58801
65.83.231.221:1988
65.83.231.223:1988
65.83.231.226:1988
65.83.231.228:1988
66.143.118.94:36225
66.148.71.21:31337
66.30.83.96:58323
66.55.8.51:13402
67.159.31.153:1080
67.159.31.155:1080
67.165.59.30:41531
67.166.85.255:33551
67.189.129.255:36405
67.81.145.209:62389
67.82.87.228:35297
67.86.28.10:59353
68.107.60.15:12153
68.12.211.10:56661
68.184.149.78:18011
68.193.1.120:29881
68.194.169.222:48981
68.199.246.116:6457
68.36.197.224:31301
68.45.64.34:27733
68.47.129.178:60423
68.48.218.233:45023
68.54.147.18:41625
69.112.99.24:34527
69.113.169.96:28977
69.117.144.151:11825
69.118.92.220:41695
69.137.209.135:49695
69.20.67.108:1988
69.244.106.178:3067
69.247.168.114:16927
69.254.7.68:24983
69.255.1.141:35903
69.91.72.248:26905
71.199.127.161:35741
71.225.154.53:3959
71.229.119.8:11465
71.233.59.178:11733
71.235.202.9:15293
71.237.165.195:30293
72.174.153.234:21679
72.87.158.236:8699
74.55.45.37:1080
74.55.45.45:1080
75.119.17.62:27793
75.191.194.144:24037
75.65.16.88:19831
75.74.173.127:27947
75.9.216.10:40087
76.100.96.147:40745
76.112.248.92:8115
76.122.244.45:4445
76.168.166.161:31749
76.169.63.25:50585
76.174.233.71:41715
76.208.41.156:48781
97.84.166.101:60859
98.199.24.100:29825
98.200.21.143:43603
98.202.102.230:38315
98.203.184.159:19345
98.210.64.250:21251
98.216.200.138:44999
98.226.195.88:49857
98.226.205.38:25552
98.232.83.177:22357
98.251.27.213:53637
98.26.14.66:4673
99.130.176.40:53213
99.179.68.74:50143
174.49.54.118:26325
174.50.12.181:8655
208.98.60.192:13556
208.98.60.194:28276
208.98.60.213:35386
216.194.70.3:1080
24.17.80.61:6075
24.33.232.44:58709
24.7.254.159:33997
64.130.116.35:8602
64.32.15.133:47435
64.32.15.137:22134
64.32.15.139:60729
64.32.15.144:20776
65.29.102.211:31797
65.83.231.224:1988
66.135.52.214:1080
66.215.174.20:10855
67.167.253.156:19535
67.188.100.155:31057
67.84.0.93:49459
68.117.11.98:12569
68.173.127.157:23231
68.34.188.146:39089
68.51.98.156:23427
68.61.235.254:54501
69.105.63.59:37435
69.123.143.94:8741
69.46.128.54:443
70.225.39.151:39853
70.238.222.19:22129
71.12.15.229:6509
71.200.150.62:58739
71.203.64.7:11825
71.227.194.6:19603
71.57.130.134:16615
72.151.241.58:1080
72.214.72.27:8761
75.21.227.116:1080
75.34.179.44:52669
75.49.225.33:4833
75.61.100.87:5531
75.67.196.251:3471
76.102.46.194:37459
76.103.110.209:30391
76.120.170.199:28791
76.20.81.219:24575
76.219.254.220:6557
76.24.66.153:43215
76.99.255.242:57661
96.3.75.155:11783
98.196.206.176:44193
98.219.3.43:38293
98.220.45.58:30093
98.243.15.60:53947
98.243.239.198:19203
98.251.50.25:14013
99.146.133.130:47305
208.98.183.61:42305
216.164.60.159:1988
216.240.54.182:1988
24.1.98.36:61541
24.190.78.101:58677
24.21.196.136:7254
24.42.121.105:22549
64.188.164.74:42127
64.32.15.142:61879
65.83.231.227:1988
68.190.46.213:6983
68.224.0.10:52753
68.59.182.2:27959
69.132.209.227:27859
69.227.177.30:54301
70.128.113.236:15247
71.79.172.34:8927
72.17.161.46:48943
75.139.202.21:17375
75.57.181.57:26189
75.67.222.215:13883
76.229.197.88:27819
76.29.206.174:34647
76.99.54.142:37577
97.100.117.116:21563
98.233.155.232:27813
65.83.231.220:1988
66.66.217.204:52572
69.151.255.165:41309
69.154.189.86:59929
70.95.96.119:44313
74.64.83.18:2597
75.87.71.104:1080
76.201.141.1:26739
76.21.129.90:46925
8.9.209.2:443
98.209.252.101:17741
216.15.82.203:47501
24.10.125.249:36629
24.188.216.25:9139
65.12.236.225:1988
67.170.170.67:8791
68.199.206.230:45339
68.57.254.10:24645
70.130.214.108:12491
74.206.69.113:34100
75.59.165.7:52509
96.246.74.17:28341
96.27.4.128:51983
173.80.24.177:4835
198.110.164.4:443
24.214.99.12:15357
65.83.231.222:1988
66.215.216.218:30459
72.23.85.95:19567
72.241.193.233:50117
24.233.43.10:56615
24.155.27.27:4379
74.55.45.40:1080
75.182.35.244:60475
206.255.109.57:45133
24.61.236.247:18184
Wednesday, July 22, 2009
Myspace Login Proxy
http://www.canbypassit.info/
http://www.padproxy.info/
http://www.myproxier.info/
Friendster Proxy
http://www.breakthroughit.info/
http://www.ezunblock.com/
http://www.proxyhide.info/
Gmail Proxy Unblock
http://www.proxyquick.info/
http://www.proxyrent.info/
http://www.proxyheart.info/
Monday, July 20, 2009
Proxy list Proxies Compatible with IRC, mIRC
212.93.193.74:443
203.160.1.121:80
203.160.1.85:80
203.160.1.112:80
203.160.1.94:80
114.127.246.36:8080
58.51.197.203:808
148.233.239.23:80
60.12.190.58:8088
200.12.44.69:8080
Tor
Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy.
Individuals use Tor to keep websites from tracking them and their family members, or to connect to news sites, instant messaging services, or the like when these are blocked by their local Internet providers. Tor's hidden services let users publish web sites and other services without needing to reveal the location of the site. Individuals also use Tor for socially sensitive communication: chat rooms and web forums for rape and abuse survivors, or people with illnesses.
Journalists use Tor to communicate more safely with whistleblowers and dissidents. Non-governmental organizations (NGOs) use Tor to allow their workers to connect to their home website while they're in a foreign country, without notifying everybody nearby that they're working with that organization.
Groups such as Indymedia recommend Tor for safeguarding their members' online privacy and security. Activist groups like the Electronic Frontier Foundation (EFF) recommend Tor as a mechanism for maintaining civil liberties online. Corporations use Tor as a safe way to conduct competitive analysis, and to protect sensitive procurement patterns from eavesdroppers. They also use it to replace traditional VPNs, which reveal the exact amount and timing of communication. Which locations have employees working late? Which locations have employees consulting job-hunting websites? Which research divisions are communicating with the company's patent lawyers?
A branch of the U.S. Navy uses Tor for open source intelligence gathering, and one of its teams used Tor while deployed in the Middle East recently. Law enforcement uses Tor for visiting or surveilling web sites without leaving government IP addresses in their web logs, and for security during sting operations.
The variety of people who use Tor is actually part of what makes it so secure. Tor hides you among the other users on the network, so the more populous and diverse the user base for Tor is, the more your anonymity will be protected.
Why we need Tor
Using Tor protects you against a common form of Internet surveillance known as "traffic analysis." Traffic analysis can be used to infer who is talking to whom over a public network. Knowing the source and destination of your Internet traffic allows others to track your behavior and interests. This can impact your checkbook if, for example, an e-commerce site uses price discrimination based on your country or institution of origin. It can even threaten your job and physical safety by revealing who and where you are. For example, if you're travelling abroad and you connect to your employer's computers to check or send mail, you can inadvertently reveal your national origin and professional affiliation to anyone observing the network, even if the connection is encrypted.
How does traffic analysis work? Internet data packets have two parts: a data payload and a header used for routing. The data payload is whatever is being sent, whether that's an email message, a web page, or an audio file. Even if you encrypt the data payload of your communications, traffic analysis still reveals a great deal about what you're doing and, possibly, what you're saying. That's because it focuses on the header, which discloses source, destination, size, timing, and so on.
A basic problem for the privacy minded is that the recipient of your communications can see that you sent it by looking at headers. So can authorized intermediaries like Internet service providers, and sometimes unauthorized intermediaries as well. A very simple form of traffic analysis might involve sitting somewhere between sender and recipient on the network, looking at headers.
But there are also more powerful kinds of traffic analysis. Some attackers spy on multiple parts of the Internet and use sophisticated statistical techniques to track the communications patterns of many different organizations and individuals. Encryption does not help against these attackers, since it only hides the content of Internet traffic, not the headers.
The solution: a distributed, anonymous network
Tor helps to reduce the risks of both simple and sophisticated traffic analysis by distributing your transactions over several places on the Internet, so no single point can link you to your destination. The idea is similar to using a twisty, hard-to-follow route in order to throw off somebody who is tailing you — and then periodically erasing your footprints. Instead of taking a direct route from source to destination, data packets on the Tor network take a random pathway through several relays that cover your tracks so no observer at any single point can tell where the data came from or where it's going.
To create a private network pathway with Tor, the user's software or client incrementally builds a circuit of encrypted connections through relays on the network. The circuit is extended one hop at a time, and each relay along the way knows only which relay gave it data and which relay it is giving data to. No individual relay ever knows the complete path that a data packet has taken. The client negotiates a separate set of encryption keys for each hop along the circuit to ensure that each hop can't trace these connections as they pass through.
Once a circuit has been established, many kinds of data can be exchanged and several different sorts of software applications can be deployed over the Tor network. Because each relay sees no more than one hop in the circuit, neither an eavesdropper nor a compromised relay can use traffic analysis to link the connection's source and destination. Tor only works for TCP streams and can be used by any application with SOCKS support.
For efficiency, the Tor software uses the same circuit for connections that happen within the same ten minutes or so. Later requests are given a new circuit, to keep people from linking your earlier actions to the new ones.
Hidden services
Tor also makes it possible for users to hide their locations while offering various kinds of services, such as web publishing or an instant messaging server. Using Tor "rendezvous points," other Tor users can connect to these hidden services, each without knowing the other's network identity. This hidden service functionality could allow Tor users to set up a website where people publish material without worrying about censorship. Nobody would be able to determine who was offering the site, and nobody who offered the site would know who was posting to it. Learn more about configuring hidden services and how the hidden service protocol works.
Staying anonymous
Tor can't solve all anonymity problems. It focuses only on protecting the transport of data. You need to use protocol-specific support software if you don't want the sites you visit to see your identifying information. For example, you can use web proxies such as Privoxy while web browsing to block cookies and withhold information about your browser type.
Also, to protect your anonymity, be smart. Don't provide your name or other revealing information in web forms. Be aware that, like all anonymizing networks that are fast enough for web browsing, Tor does not provide protection against end-to-end timing attacks: If your attacker can watch the traffic coming out of your computer, and also the traffic arriving at your chosen destination, he can use statistical analysis to discover that they are part of the same circuit.
The future of Tor
Providing a usable anonymizing network on the Internet today is an ongoing challenge. We want software that meets users' needs. We also want to keep the network up and running in a way that handles as many users as possible. Security and usability don't have to be at odds: As Tor's usability increases, it will attract more users, which will increase the possible sources and destinations of each communication, thus increasing security for everyone. We're making progress, but we need your help. Please consider running a relay or volunteering as a developer.
Ongoing trends in law, policy, and technology threaten anonymity as never before, undermining our ability to speak and read freely online. These trends also undermine national security and critical infrastructure by making communication among individuals, organizations, corporations, and governments more vulnerable to analysis. Each new user and relay provides additional diversity, enhancing Tor's ability to put control over your security and privacy back into your hands.
visit : http://www.torproject.org
Monday, July 13, 2009
Gpass - Online secure
GPass Client Software
- Hide your IP address during online activities
- Support streaming audio/video, email, instant messaging, download managers, etc
- Encrypt all your network communication
- Bypass network censorship
- Easy-to-use graphical user interface supporting multiple languages and skins
- Freeware for users in closed societies
Online Secure Anonymous Surfing (Web Direct Proxy)
- Hide your IP address during web surfing
- Encrypt your web communication
- Bypass network censorship
- Provide encryption for web surfing when using insecure wireless network
- No software installation. Just come to our web site, and safely surf other websites
- Free surfing might be limited by daily traffic volume.
Enterprise Solution
- Provide custom systems for organizations that need to deliver contents to users in closed societies where the Internet is adversely censored. Our server and client software will bypass various organizational or national network censorship and provide secure anonymous Internet surfing.