Wednesday, December 30, 2009

FREE PROXY - INDONESIA

222.124.162.227:80
118.96.147.51:3128
203.142.64.106:80
61.247.46.48:3128
117.102.113.86:80
202.155.152.193:8080
222.124.217.60:3128
222.124.217.60:80
222.124.192.157:8080
202.46.3.81:8080
202.147.196.230:8080
118.96.135.10:3128
118.97.55.221:3128
118.97.56.18:8080
110.138.247.40:8080

Tuesday, December 29, 2009

UltraSurf | Privacy, Security and Freedom

UltraSurf Client SoftwareUltraSurf is a flagship anti-censorship product by UltraReach Internet Corp. (www.ultrareach.com).

UltraSurf
enables users inside countries with heavy Internet censorship to visit any public web sites in the world safely and freely
works together with the GIFT (a dynamic node-proxy anti-jamming system);
requires no installation or change in system setting;

UltraSurf is a green software, no installation process is needed and no change in system setting is required. It is simply an executable file on Windows platform.
Download UltraSurf Client Software athttp://www.wujie.net/downloads/ultrasurf/u.zip
Download UltraSurf 8 User Guide in Chinese at:http://www.wujie.net/downloads/ ultrasurf/ultrasurf8_userguide.zip
Download UltraSurf 6 User Guide in English at:http://www.wujie.net/downloa ds/ultrasurf/UltraSurf6_userGuide_en.zip

UltraSurf’s Chinese name, Wujie – meaning borderless – has become a household name among Chinese Internet users. UltraSurf is one of the “three swordsmen,” thanks partly to its user friendliness and user support in Chinese.

UltraSurf is a robust anti-censorship system evolved from the lasting battle between GFW and UltraReach. Since infancy, UltraSurf has been one of the Chinese Communists’ favorite targets. The freely available software has been analyzed, mutilated and spoofed, and the supporting network infrastructure has been constantly attacked. Without doubt, these factors have accelerated UltraSurf reaching its level of sophistication and fame. The current release, UltraSurf 8.8, has implemented a complex proxy system with complete transparency and a high level of encryption on the Microsoft Internet Explorer (IE) platform.

UltraSurf enables users to browse any website freely--just the same as using the regular IE browser--while it automatically searches the fastest proxy servers in the background. It has strong support for load balancing and fault tolerance, and it even employs a decoying mechanism to thwart any tracing effort of its communication with its infrastructure.

UltraReach Internet Corp. (www.ultrareach.com), an Internet technology company founded by a group of Silicon Valley technologists. Since 2002, UltraReach has focused its core business on developing anti-censorship technologies, and the current release of its anti-censorship software is UltraSurf 8.8. UltraReach has been expanding its offerings based on its unique GIFT (Global Internet Freedom Technology) platform, and today it is also providing a secure email service called UltraMail, and a protected web portal for users in China, UltraReach.net (or www.wujie.net).

FREE PROXY LIST [29 Dec 2009]

189.109.49.122:8080
200.96.49.4:8080
187.4.205.90:8080
200.195.137.166:8080
200.166.248.132:8080
187.5.156.13:8080
201.41.45.33:80
189.80.50.206:8080
200.161.240.5:8080
187.5.156.12:8080
207.35.172.214:80
222.76.210.8:8080
124.207.129.132:80
211.161.5.154:80
210.72.234.186:8080

Monday, December 28, 2009

LIST PROXY [28 DEC 2009]

189.109.49.122:8080
189.80.50.206:8080
200.241.244.5:8080
200.166.248.132:8080
59.39.71.233:80
58.246.76.76:8080
221.214.27.253:808
221.238.17.245:8080
212.1.54.19:80
80.74.110.149:80
58.181.37.238:80
148.245.191.3:80
203.126.214.50:8080
211.76.175.5:80
72.37.213.104:8089

Sunday, December 27, 2009

Fresh Proxy List [27 DEC 2009]

189.109.49.122:8080
200.161.240.5:8080
200.96.49.4:8080
202.120.38.182:80
58.246.76.76:8080
221.238.17.245:8080
221.214.27.253:808
88.191.109.54:81
88.191.17.209:443
85.214.48.18:80
212.1.54.19:80
217.110.79.243:80
85.25.152.194:80
148.245.191.3:80
83.98.144.90:80

Saturday, December 26, 2009

LIST PROXY - Czech-Republic

195.113.161.82:3124
195.113.161.82:3127
195.113.161.82:3128
95.46.120.20:3128
95.46.120.61:3128
95.46.120.247:3128
95.46.120.254:3128
95.46.120.12:3128
95.46.120.26:3128
95.46.120.27:3128
95.46.120.14:3128
95.46.120.246:3128
95.46.120.9:3128
95.46.120.16:3128
95.46.120.11:3128

PROXY - 26 DEC 2009

189.109.49.122:8080
187.28.71.200:8080
201.83.35.128:8080
200.166.248.132:8080
222.76.210.8:8080
122.205.95.27:80
58.246.76.76:8080
221.238.17.245:8080
221.214.27.253:808
211.162.208.50:80
122.169.116.107:80
80.74.110.149:80
148.245.191.3:80
210.5.71.130:8080
62.117.69.52:80

Friday, December 25, 2009

PROXY - Belgium

130.104.72.200:3124
130.104.72.201:3124
130.104.72.201:3127
130.104.72.200:3127
193.191.148.227:3124
193.191.148.227:3127
195.207.15.79:331
130.104.72.200:3128
130.104.72.201:3128
193.191.148.227:3128
212.68.208.97:3128

List Proxy [25-Dec-2009]

189.109.49.122:8080
124.207.129.132:80
88.191.17.209:443
95.31.1.90:8080
62.117.69.52:80
87.245.187.244:8088
194.160.76.5:80
80.249.51.198:80
95.131.249.5:80
207.99.23.198:0080
174.143.154.102:80
174.143.154.102:81
174.143.243.116:80
207.99.23.198:80
173.45.230.127:80

Thursday, December 24, 2009

List Proxy - Austria

131.130.32.154:3127
143.205.172.11:3127
131.130.32.154:3128
143.205.172.11:3128

List Proxy - Argentina

186.125.60.3:3128
201.234.107.99:3128
200.68.84.69:8080
190.139.101.154:8080
200.43.141.173:8080
186.124.118.5:3128
200.45.77.50:8080

Anonymous proxy[24-Dec-2009]

189.109.49.122:8080
207.35.172.214:80
122.205.95.27:80
121.204.0.2:80
59.41.103.43:8080
202.99.29.27:80
211.99.141.10:8080
60.172.179.14:9000
124.207.129.132:80
221.238.17.245:8080
222.76.210.8:8080
221.214.27.253:808
218.66.59.42:8080
58.246.76.76:8080
190.158.230.39:80

Monday, December 21, 2009

PROXY - UNITED STATES

174.143.236.43:80
207.99.23.198:80
24.176.255.51:443
208.53.168.169:8080
24.176.255.51:80
174.143.205.9:80
72.213.135.222:9000
35.9.27.26:3127
152.3.138.5:3128
35.9.27.26:3128
198.133.224.149:3127
143.215.131.197:3124
208.117.131.116:3124
128.187.223.211:3127
128.4.36.11:3127

PROXY LIST

Updated (December 21, 2009 at 11:00:08 AM). Total Proxies in List: 817

201.22.95.137:8080
211.162.208.50:80
119.161.129.239:80
121.204.0.2:80
211.99.141.10:8080
211.144.106.81:7070
60.172.179.14:9000
211.161.45.180:80
58.246.76.76:8080
122.205.95.27:80
59.41.103.43:8080
124.207.129.132:80
222.76.210.8:8080
61.153.149.205:8080
91.121.77.146:3128

HTTP & SOCK 5 PROXY SERVER

77.232.112.147:[8080] - HTTP
77.232.120.33:[8080] - HTTP
77.232.118.213:[80] - HTTP
77.232.112.54:[80] - HTTP
77.232.109.39:[80] - HTTP
41.201.125.120:[6588] - HTTP
123.237.105.164:[6588] - HTTP
190.41.136.209:[3128] - HTTP
119.118.226.3:[3769] - Socks 5
60.209.53.87:[9588] - Socks 5
76.19.74.252:[6535] - Socks 5
98.140.82.153:[43327] - Socks 5
68.6.160.59:[56742] - Socks 5
69.137.245.57:[2632] - Socks 5
71.56.194.245:[3300] - Socks 5
71.230.72.203:[62211] - Socks 5

Thursday, December 17, 2009

10 Rapidleech Public Server

http://www.muhamadaswan.co.cc/rap/index.php
http://www.dragonkill.com/index.php
http://www.chinesefreewebs.com/manuel2009/
http://www.fjordbits.com/tp1/index.php
http://rapid.dezonline.ir/
http://www.nguyenngochieudb.com/Leech/
http://leechbrasil.com/index.php
http://www.adiga.biz/rap/index.php
http://leech3.gspvn.org/
http://egylayer.info/index.php

Sunday, December 13, 2009

List FoxyProxy

99.245.168.108:80
98.207.214.104:80
98.193.137.20:80
98.199.32.148:8085
89.25.64.22:80
87.245.187.244:8088
87.234.60.165:8080
86.51.114.50:80
83.252.156.78:3128
82.8.169.174:8085
82.150.165.146:8080
80.74.110.149:80
80.73.4.9:808
78.186.190.215:8088
78.130.129.251:80
78.130.129.250:80
77.242.33.5:80
76.31.74.219:8085
74.37.182.234:80
72.36.112.71:3124
72.135.11.202:8085
70.94.84.97:8085
69.64.69.142:8080
69.136.44.124:8085
68.62.12.186:8085
68.57.103.108:80
68.47.83.187:8085
68.148.67.137:80
67.193.144.244:80
66.65.245.96:8085
65.111.184.220:80
65.111.184.210:80
65.111.184.207:80
62.219.225.156:8080
61.90.230.12:80
61.140.243.193:80
60.172.179.14:9000
58.246.76.76:8080
24.6.140.123:80
24.155.96.93:80
222.76.210.8:8080
222.124.213.114:3128
221.238.17.245:8080
221.231.137.85:8080
221.224.90.82:8080
221.215.1.224:8080
221.214.27.253:808
221.130.13.233:80
221.130.13.232:80
221.130.13.225:80
221.130.13.211:80
221.130.13.210:80
221.130.13.208:80
221.130.13.207:80
221.130.13.206:80
221.130.13.204:80
221.130.13.200:80
221.130.13.199:80
219.219.222.34:80
219.148.200.202:808
219.128.102.194:80
218.201.21.178:80
218.201.21.177:80
218.201.21.176:80
218.201.21.175:80
218.201.21.158:80
203.178.133.10:3128
203.81.81.37:80
203.82.86.109:80
203.82.86.113:80
203.82.86.121:80
203.82.86.123:80
203.82.86.15:80
203.82.86.24:80
203.82.86.3:80
203.82.86.36:80
203.82.86.4:80
203.82.86.41:80
203.82.86.5:80
203.82.86.55:80
203.82.86.59:80
203.82.86.65:80
203.82.86.70:80
203.82.86.75:80
203.82.86.82:80
204.56.0.137:3127
204.73.37.113:80
207.61.241.100:9090
208.117.131.115:3128
208.117.131.116:3128
208.53.168.169:8080
208.67.253.170:80
208.77.151.84:80
208.96.213.149:80
210.125.84.15:3124
210.125.84.17:3124
210.21.63.141:8080
211.138.124.196:80
211.138.124.197:80
211.138.124.198:80
211.138.124.199:80
211.138.124.200:80
211.138.124.210:80
211.138.124.211:80
211.138.124.232:80
211.138.124.233:80
211.138.249.178:808
211.144.106.81:7070
212.138.84.62:8080
212.201.44.82:3124
212.24.238.155:80
213.131.1.102:3124
213.73.40.105:3124
213.80.128.38:3128
216.48.80.14:3124
216.82.160.156:80
217.196.164.34:3128
201.243.36.164:8080
201.225.226.68:8080
200.31.42.3:80
200.238.83.49:3128
170.140.119.69:3124
174.129.33.76:80
174.142.104.57:3128
174.142.24.201:3128
192.107.168.129:80
192.197.121.3:3124
192.33.210.16:3124
192.33.90.195:3124
192.33.90.67:3127
192.41.135.218:3124
192.42.43.23:3128
193.136.227.163:3124
193.137.173.217:3124
193.147.162.166:3124
193.157.115.250:3124
193.167.187.187:3128
193.171.32.6:80
193.174.155.26:3124
193.174.155.27:3124
193.205.215.74:3124
193.6.20.4:3128
193.6.20.5:3128
193.63.58.71:3128
194.29.178.13:3124
194.29.178.14:3124
194.36.10.154:3124
194.42.17.124:3128
195.113.161.82:3124
195.113.161.83:3124
195.116.60.2:3124
195.2.216.186:8080
195.229.62.157:110
198.163.152.229:3124
198.163.152.230:3128
198.7.242.41:3128
198.7.242.42:3127
198.7.242.43:3128
199.26.254.66:3124
200.110.244.81:8080
200.144.185.223:80
200.177.228.4:80
200.19.159.34:3124
200.19.159.35:3124
200.215.15.34:8080
169.229.50.9:3128
169.229.50.8:3124
169.229.50.7:3128
169.229.50.4:3128
169.229.50.14:3128
169.229.50.16:3128
169.229.50.10:3128
164.78.252.25:80
164.78.252.110:80
164.77.170.68:8080
164.77.170.67:8080
163.221.11.73:3124
164.73.47.242:3124
163.221.11.72:3124
163.221.11.71:3124
156.56.250.227:3128
156.17.10.52:3124
155.246.12.163:3128
152.15.98.226:3128
150.65.32.68:3128
150.65.32.66:3128
148.245.191.3:80
147.83.30.167:3124
147.83.30.164:3128
147.83.30.166:3124
147.102.224.228:3127
147.102.224.227:3124
146.57.249.99:3124
146.57.249.98:3124
144.206.66.56:3127
143.225.229.238:3124
143.215.131.199:3124
142.150.238.13:3128
142.103.2.2:3124
141.24.33.192:3127
141.24.33.162:3124
141.24.249.129:3124
140.119.164.85:3128
140.119.164.84:3128
140.114.79.233:3128
138.251.214.77:3128
138.232.66.195:3124
137.226.138.154:3124
134.76.81.91:3124
134.151.255.180:3128
134.121.64.4:3124
133.11.240.56:3128
133.1.74.162:3128
132.252.152.194:3124
132.239.17.226:3128
132.187.230.2:3124
132.187.230.1:3128
131.247.2.242:3128
131.247.2.241:3124
131.246.191.42:3128
131.175.17.9:3124
130.92.70.252:3128
130.75.87.84:3124
130.75.87.83:3124
130.192.86.30:3128
130.192.157.132:3128
130.192.157.131:3124
130.136.254.22:3128
130.136.254.21:3124
130.104.72.201:3124
130.104.72.200:3124
129.242.19.196:3124
128.232.103.202:3128
128.220.231.4:3128
128.119.41.210:3128
125.46.73.45:808
123.138.18.114:808
121.52.148.16:8080
121.173.130.215:7777
120.28.64.94:8080
120.28.64.85:8080
118.175.22.69:8080
117.25.129.200:808
115.125.87.90:8080

Friday, December 11, 2009

Freegate

Freegate is an anti-censorship software for secure and fast Internet access. It was developed and maintained by Dynamic Internet Technology Inc. (DIT), a pioneer in censorship-circumvention operation.

  • users access web sites overseas as fast as their local ones;
  • requires no installation or change in system setting;
  • a single executable file on a Windows platform.

Freegate works by tapping into an anti-censorship backbone, DynaWeb, DIT's P2P-like proxy network system.

Freegate's anti-censorship capability is further enhanced by a new, unique encryption and compression algorithm in the versions of 6.33 and above.


visit : http://www.dit-inc.us/freegate

Thursday, December 3, 2009

Get Behind the Shield! Hotspot Shield by AnchorFree

Protecting the web for your security, privacy and anonymity! Get behind the SHIELD!

* Secure your web session with HTTPS encryption.
* Hide your IP address for your privacy online.
* Access all content privately without censorship; bypass firewalls.
* Protect yourself from snoopers at Wi-Fi hotspots, hotels, airports, corporate offices and ISP hubs.
* Works on wireless and wired connections alike.
* Secure your data & personal information online.

Hotspot Shield protects your entire web surfing session; securing your connection at both your home Internet network & Public Internet networks (both wired and wireless). Hotspot Shield protects your identity by ensuring that all web transactions (shopping, filling out forms, downloads) are secured through HTTPS. Hotspot Shield also makes you private online making your identity invisible to third party websites and ISP’s. Unless you choose to sign into a certain site, you will be anonymous for your entire web session with Hotspot Shield. We love the web because of the freedom that it creates to explore, organize, and communicate. Hotspot Shield enables access to all information online, providing freedom to access all web content freely and securely. Secure your entire web session and ensure your privacy online; your passwords, credit card numbers, and all of your data is secured with Hotspot Shield. Standard antivirus software protects your computer, but not your web activities.

That's why AnchorFree is pleased to offer Hotspot Shield. Our application keeps your Internet connection secure, private, and anonymous.
100% Security Through a VPN

Hotspot Shield creates a virtual private network (VPN) between your laptop or iPhone and our Internet gateway. This impenetrable tunnel prevents snoopers, hackers, ISP’s, from viewing your web browsing activities, instant messages, downloads, credit card information or anything else you send over the network. Hotspot Shield security application is free to download, employs the latest VPN technology, and is easy to install and use.

So go ahead - Get behind the Shield - Try Hotspot Shield today!

Hotspot Shield runs on:

* Windows Vista
* Windows XP
* Windows 2000
* Mac OS X (10.5 Leopard)
* Mac OS X (10.4 Tiger)

visit : http://www.hotspotshield.com/

Wednesday, December 2, 2009

Free VPN service@Alonweb

About VPN provider Alonweb

Alonweb is a relatively new company which was founded in 2008. A young but professional staff (developers, managers, support service team) launched the Free Access VPN Services program at the beginning of 2009.

Our Company Goals are:

1. Popularize the VPN services
2. Increase the number of VPN users (mainly due to free access to the server)
3. Increase the security level for internet users
4. Work on qualitative improvements of the internet services provided on the market in the VPN segment
5. Develop additional services for VPN services users.

Alonweb provides the Internet community with free and paid OpenVPN tunelling service, which is useful for bypassing corporate and other restrictions, as well as hiding your personal information such as IP address and geographical location. Your traffic is encrypted, which makes it impossible to intercept it.

Alonweb makes its users feel safe on the Net. Currently Free service offers its users connection via two servers: Netherlands and Panama. Although some limitations exist (1Gb of data traffic per month is availible, maximum HTTP request size is 2Mb, heavy traffic consuming protocols and games are blocked) it is enough for most of the users.

visit: http://alonweb.com

Monday, November 30, 2009

PROXY LIST - 01/12/2009

61.90.230.12:80 Elite Thailand
174.129.216.113:80 Elite United States
96.56.54.171:808 Elite United States
128.95.122.72:8080 Elite United States
67.207.129.26:3128 Elite Unknown
211.138.124.200:80 Elite Unknown
94.23.51.50:8118 Elite France
174.143.236.126:3128 Transparent United States
203.160.1.154:554 Transparent Vietnam
88.191.64.91:443 Transparent France
66.206.0.48:5555 Elite United States
192.33.90.69:3127 Elite Switzerland
114.127.246.36:8080 Elite Unknown
121.13.229.72:808 Elite Unknown
91.151.18.61:8080 Transparent Italy
89.189.85.99:80 Elite Unknown
65.111.184.226:80 Elite Unknown
67.62.67.182:8080 Transparent
89.18.70.42:8080 Transparent
78.28.202.140:8080 Transparent
195.229.62.157:80 Elite Unknown
89.189.85.122:80 Elite Unknown
69.64.69.142:8080 Elite Unknown
61.19.27.73:8080 Transparent
209.20.86.28:8000 Anonymous
201.232.27.204:3128 Elite Unknown
61.145.121.124:88 Elite China
174.143.236.43:80 Anonymous
201.93.243.202:3128 Transparent';''

Saturday, November 14, 2009

Free Rapidleech Public Server

FARSHADRL.HOSTSE.COM
RAPID8.COM
HOSSA.ORG
GANOOL.CO.CC
MYLEECHER.COM
IGOR888.NET63.NET
LEECH4FREE.US.TO
RSMAKER.COM
RSPLG.COM
NGISING.NET
SV1.CRACKLOVE.COM
DOWNLOADPREMIUM.NET
RSLINKGENERATOR.COM

Thursday, November 12, 2009

UltraVPN – Free VPN Service to Access Blocked Sites


UltraVPN is a client/server SSL VPN solution based on OpenVPN. It encrypts and anonymizes your network connection. UltraVPN is a simple user interface to connect or disconnect to a VPN server. UltraVPN is easy to install, easy to use.

It is a cross-platform client, which supports a large number of encryption scheme. THe best part is that it is open source and free to use.

Its servers are based in France and so you are given an IP based in France for your Internet connections. I found the browsing fast enough for similar services.

You just need to download the free VPN client software from their website and install on your machine. Don’t worry, the software is open source and free from Spyware and other malware.

Obtain a username and password, and start using it.

visit : http://www.ultravpn.fr/

Wednesday, November 11, 2009

Mibbit.com - Easy and fast Webchat

No Java, no flash. With Mibbit, chatting online is easy, just choose your nickname and press go! No sign-up is required and you can use it from wherever you are with just a web browser.

Connect to IRC networks, IM, twitter, and more coming soon.

Mibbit has many customizable features which can help you make the most of your chat. You can change skins and use real-time language translation, image thumbnails, or even embed Youtube clips and exchange files with other Mibbit users.


visit : http://www.mibbit.com

Tuesday, November 10, 2009

Web Proxy List

  1. http://webproxysite.com
  2. http://unblockfacebook.com
  3. http://www.freesslproxy.com
  4. http://vectroproxy.com
  5. http://supermanproxy.com
  6. http://ixkwik.net
  7. http://webproxybrowser.com
  8. http://www.seowatt.com
  9. http://baypassweb.com
  10. http://www.proxy-browse.com
  11. http://baypass.info
  12. http://www.freshide.com
  13. http://unblockmyurl.info
  14. http://worldhide.info
  15. http://s1p.info
  16. http://PROXIESGONEWILD.INFO
  17. http://SURFHELL.INFO
  18. http://isurfproxy.com
  19. http://unblockedurl.info
  20. http://clearlydrunk.com
  21. http://bulletproxy.com
  22. http://love2bunk.com
  23. http://sidemart.com
  24. http://www.jenu.info
  25. http://evep.info
  26. http://noisylab.com
  27. http://unblockmyurl.info
  28. http://proxrepublic.com
  29. http://seowatt.com

Monday, September 7, 2009

Free SSH Tunnel

root:root 83.1.10.65
root:root 83.1.12.167
root:root 83.1.10.2
root:root 83.1.10.11
root:root 83.1.10.65
root:root 83.1.12.167
root:root 83.1.10.11
root:root 83.1.10.2
root:root 83.1.10.65
root:root 83.1.10.2
root:root 83.1.10.11
root:root 83.1.12.167
root:root 83.1.164.55
root:root 83.2.33.93
root:root 83.2.36.65
root:root 83.2.23.97
root:root 83.1.164.55
root:root 83.2.33.93
root:root 83.2.36.65
root:root 83.2.23.97
root:root 83.1.164.55
root:root 83.2.33.93
root:root 83.2.36.65
root:root 83.2.164.35
root:root 83.2.165.140
root:root 83.2.165.216
root:root 83.2.167.66
root:root 83.2.167.65
root:root 83.2.167.76
root:root 83.2.167.77
root:root 83.2.167.96
root:root 83.2.167.97
root:root 83.2.167.93
root:root 83.2.167.99
root:root 83.2.167.70
root:root 83.2.167.78
root:root 83.2.167.100
root:root 83.2.168.125
root:root 83.2.165.37
root:root 83.2.23.97
root:root 83.2.165.140
root:root 83.2.165.216
root:root 83.2.167.77
root:root 83.2.167.66
root:root 83.2.167.96
root:root 83.2.167.70
root:root 83.2.167.100
root:root 83.2.167.78
root:root 83.2.165.37
root:root 83.2.165.140
root:root 83.2.165.216
root:root 83.2.167.77
root:root 83.2.167.66
root:root 83.2.167.96
admin:admin 83.2.212.39
root:root 83.2.167.78
root:root 83.2.229.153
admin:admin 83.2.212.39
root:root 83.3.54.202
root:root 83.3.66.2
root:root 83.3.184.178
root:root 83.3.184.178
root:root 83.3.184.178


root:root 83.3.239.82
root:root 83.3.239.82
root:root 83.3.239.82
root:admin 83.7.222.231
demo:demo 83.9.91.21
root:qazxsw 83.8.133.11
demo:demo 83.9.91.21
root:admin 83.10.48.59
root:admin 83.7.222.231
root:roots 83.12.103.150
root:root 83.12.103.150
root:12345 83.12.103.150
root:1234 83.12.103.150
root:123456 83.12.103.150
root:1234567 83.12.103.150
root:12345678 83.12.103.150
root:123456789 83.12.103.150
root:Oracle 83.12.103.150
root:oracle 83.12.103.150
root:webmaster 83.12.103.150
root:webadmin 83.12.103.150
root:webadm 83.12.103.150
root:qazzaq123 83.12.103.150
root:changeme 83.12.103.150
root:newuser 83.12.103.150
root:newpass 83.12.103.150
root:passwd 83.12.103.150
root:rooted 83.12.103.150
root:propercius 83.12.103.150
root:changeme 83.12.103.150
root:ChanGeMe 83.12.103.150
root:ChangeMe 83.12.103.150
root:dragon 83.12.103.150
root:aaaaaa 83.12.103.150
root:bbbbbb 83.12.103.150
root:777777 83.12.103.150
root:secret 83.12.103.150
root:secrets 83.12.103.150
root:private 83.12.103.150
root:qw1er2ty3 83.12.103.150
root:q1w2e3r4 83.12.103.150
root:fbsd 83.12.103.150
root:roots 83.12.235.58
root:root 83.12.235.58
root:12345 83.12.235.58
root:1234 83.12.235.58
root:123456 83.12.235.58
root:1234567 83.12.235.58
root:12345678 83.12.235.58
root:123456789 83.12.235.58
root:Oracle 83.12.235.58
root:oracle 83.12.235.58
root:webmaster 83.12.235.58
root:webadmin 83.12.235.58
root:webadm 83.12.235.58
root:qazzaq123 83.12.235.58
root:changeme 83.12.235.58
root:newuser 83.12.235.58
root:newpass 83.12.235.58
root:passwd 83.12.235.58
root:rooted 83.12.235.58
root:propercius 83.12.235.58
root:changeme 83.12.235.58


root:ChanGeMe 83.12.235.58
root:ChangeMe 83.12.235.58
root:dragon 83.12.235.58
root:aaaaaa 83.12.235.58
root:bbbbbb 83.12.235.58
root:777777 83.12.235.58
root:secret 83.12.235.58
root:secrets 83.12.235.58
root:private 83.12.235.58
root:root 83.13.36.250
root:root 83.13.44.221
root:root 83.13.36.250
root:root 83.13.44.221
root:root 83.13.36.250
root:root 83.13.44.221
root:admin 83.13.211.102
root:admin 83.13.211.102
root:admin 83.13.232.74
root:admin 83.13.232.74
admin:admin 83.14.147.82
admin:admin 83.14.147.82
root:admin 83.14.192.154
root:admin 83.14.192.154
root:root 83.15.58.67
root:root 83.16.18.10
root:root 83.16.18.10
root:root 83.16.18.10
roza:roza 83.16.61.158
mp3:mp3 83.16.98.182
root:root 83.16.120.190
root:root 83.16.120.190
root:root 83.16.120.190
root:root 83.17.63.130
root:root 83.17.63.133
root:root 83.17.161.146
root:admin 83.17.185.38
root:admin 83.17.185.38
admin:admin 83.18.139.100
admin:admin 83.18.139.100
root:root 83.26.77.204
demo:demo 83.26.78.149
admin:admin 83.26.185.120
demo:demo 83.26.78.149
root:admin 83.26.185.120
admin:admin 83.26.185.120
damian:damian 83.29.70.5
install:install 83.30.217.122
temp:temp 83.30.217.122
server:server 83.49.128.236
silvia:silvia 83.49.46.193
silvia:silvia 83.49.46.193
server:server 83.49.128.236
root:roots 83.61.22.190
root:root 83.61.22.190
root:12345 83.61.22.190
root:1234 83.61.22.190
root:123456 83.61.22.190
root:admin 83.61.165.10
root:admin 83.61.165.10
admin:12345 83.64.172.242
admin:admin 83.64.181.167
admin:admin 83.64.181.167


http://orek2an.blogspot.com/2009/08/free-ssh-tunnel.html

Monday, August 31, 2009

Free Shell list

http://mrejata.eu
Server: Linux Slackware
Services: Spam-filtered email, your-login@mrejata.eu, web email http://mail.mrejata.eu, simple web hosting http://mrejata.org/~your-login, full usenet access (read and post), console-based web browsing (lynx,links), IRC access to all networks, 2bg procesess, IRC - psybnc, eggdrop, full access to wide range of compilers


http://yunix.net
Server: CentOS release 5.3
Services: Irssi, screen, psybnc, figlet, local IRC, Mordor MUD, cc/g++ version 4.1.2, gdb 6.8-27, Python 2.4.3, Perl 5.8.8, Shells: sh, bash, zsh, tcsh, csh


http://ninthfloor.org
Server: Debian linux
Services: crontab and atd, nvi, Vim, Emacs, joe, nano, pico, ed , mutt, alpine, mailx, fetchmail, lynx, links, elinks, irssi, epic, an email account (username@ninthfloor.org) with advanced spam filtering features, web access to your HTML documents (http://users.ninthfloor.org/~username), 256MiB of disk quota ...


http://blackmage.co.uk
Server: Debian GNU/Linux Lenny, Intel(R) Xeon(R) CPU X3350 @ 2.66GHz, 400MB RAM
Services: Irssi, gcc, g++, gdb, php, perl, python, screen, nano, make, bzip2, mutt, wget, bash, lynx, subversion, FTP, SSH, HTTP e.g. http://blackmage.co.uk/~rez/, 250MB space for each user, however exceptions can be made.

Saturday, August 29, 2009

Cgi Proxies

hide-me-now.com
hidemyass.com
proxify.com
proxy.tc
sslunblock.com
secure-tunnel.com
blewpass.com
proxeasy.com

Friday, August 28, 2009

Proxies Site

http://placeforunblocked.co.cc
http://firewall-bypass.info
http://datushu.com
http://gamingunited.info
http://techfaqproxylist.co.cc
http://flyingleap.info
http://favoriteshows.info
http://1337games.net/proxy
http://mailsurf.co.cc
http://www.deadahead.info
http://fastwind.info
http://proxycenterserver.co.cc
http://www.behindboss.co.cc
http://remainanonymouse.co.cc
http://drypaint.info
http://ipmark.info
http://vipfreeproxy.co.cc
http://controlkey.info/
http://coatamundi.info
http://www.smartlookup.co.cc
http://dedhead.info
http://simplefinance.co.cc
http://funpages.info
http://turboproxyserver.co.cc
http://secureinternetaccess.co.cc

Friday, August 21, 2009

elite proxy list - 21 August [ Checked ]

59.36.98.154:80 - elite - China
69.13.197.165:80 - elite - United States
147.171.65.3:80 - elite - France
200.107.15.58:80 - elite - Ecuador
98.172.168.68:8080 - elite - United States
202.54.61.99:8080 - elite - India
122.155.0.244:3128 - elite - Thailand
202.3.217.125:80 - elite - Indonesia
143.225.238.238:80 - elite - Italy

Wednesday, August 19, 2009

Sock LIST

84.1.44.89:1080
208.109.110.163:28449
221.204.253.154:1080
211.189.18.165:5818
92.226.17.227:42315
221.12.147.80:1080

High anonymous (elite) HTTP proxies : 19 August [ Checked ]

76.107.223.83:8085
203.177.193.102:3128
193.136.191.26:3127
194.36.10.156:3128
77.88.66.251:8000
220.60.16.72:8080
24.4.223.134:9090
174.142.24.201:3128
74.54.156.73:80
174.142.104.57:3128
58.51.197.203:808

Monday, August 17, 2009

Huge List of Anonymous Proxies

216.55.95.213:8888
216.193.219.122:8118
98.124.135.217:8080
98.119.176.242:8080
97.65.164.214:8080
97.65.164.212:8080
97.65.164.211:8080
97.107.130.146:80
94.52.112.70:3128
93.185.38.36:3128
92.54.82.19:80
92.49.1.65:8080
92.48.80.107:80
211.183.3.9:80
211.144.200.14:80
211.136.86.204:8085
209.47.251.243:80
92.127.11.242:3128
91.193.130.126:1080
91.192.241.139:3129
91.146.50.38:1080
91.139.151.132:1080
91.121.91.61:3128
91.121.203.191:3128
91.121.135.73:80
91.112.157.214:8080
90.156.232.52:3128
201.75.67.191:6588
201.74.240.97:6588
201.74.235.65:6588
201.74.222.47:3128
201.73.208.18:1080
201.73.205.130:3128
201.72.111.10:1080
201.70.17.163:1080
201.70.144.49:1080
201.70.103.95:6588

SSH Tunnel SOCKS Proxy Forwarding = Secure Browsing

When you are at the coffee shop, or at a conference, and you are not sure that you want to send all your data over the wi-fi network in plaintext, you want a secure tunnel to browse. This happened to me recently and I stumbled across a neat feature of openssh (the ssh client on everyone’s computer). The wonders of ssh never cease to amaze me!

You can use the “-D” flag of openssh to create a SOCKS proxy.

The command first:
$ssh -D 9999 username@ip-address-of-ssh-server

This of course connects you to the server specified by “ip-address-of-ssh-server”. Needless to say, you (username) must have an ssh account on the server. In addition, this will create a SOCKS proxy on port “9999″ of your computer. This is a tunnel to the server. Now all you have to do is set the preference in Firefox to use a SOCKS proxy. The proxy is, of course, “localhost”, with the port 9999.

Now when you browse, all the connections you make to websites will seem to originate from the server to which you SSH-ed. In addition, all outgoing and incoming data for the browsing session will be encrypted since it passes through the SSH connection.

Other applications (like email clients) may also support SOCKS proxies. If any of them, you can look into using proxychains(there’s an Ubuntu package).

You can misuse this technology to circumvent paranoid browsing firewalls, even to pretend you are wherever your ssh server is located - so you can work around country-based blocks etc. I use it for the very unromantic reason that I don’t want some aspiring cracker to sneak up on me when I am in public.

Updates:


Reference: http://ubuntu.wordpress.com/2006/12/08/ssh-tunnel-socks-proxy-forwarding-secure-browsing/

Update Irc Proxy

203.160.1.75:80
203.160.1.66:80
212.93.193.72:443
212.93.193.78:443
212.93.193.74:443
212.93.193.82:443
218.14.227.197:3128
114.30.47.10:80
203.160.1.103:80
203.160.1.121:80
203.160.1.112:80
114.127.246.36:8080
203.160.1.85:80
203.160.1.94:80
148.233.239.23:80
60.12.190.58:8088
202.188.165.217:808
118.98.160.102:8080
59.139.31.217:80
212.102.0.104:80
212.102.0.104:8080

Monday, July 27, 2009

PROXY LIST

212.117.166.26:8138
84.22.47.34:8080
84.14.82.2:8081
35.9.27.27:3127
190.158.227.219:3128
78.61.36.119:8080
24.96.254.86:8080
98.129.147.1:80
60.248.227.175:3128
204.56.0.137:3124
201.229.192.18:8080
128.2.223.63:3124
209.59.207.147:39689
128.2.223.65:3127
190.92.4.214:3128
212.95.71.8:80
124.104.181.29:3128
193.136.227.163:3127
200.207.9.168:3128
80.36.255.171:8080
201.221.148.76:3128
129.69.210.96:3128
201.36.194.26:8080
140.134.104.195:2301
194.210.29.25:3128
222.88.219.66:3128
128.233.252.12:3128
189.26.242.50:3128
212.117.166.26:18225
221.8.15.170:8080
218.75.100.114:8080
192.33.90.66:3127
189.50.117.248:8000
64.79.199.35:48725
128.233.252.11:3128
80.148.23.52:80
190.81.15.107:3128
129.10.120.194:3124
141.24.33.192:3127
200.148.230.217:3128
189.76.218.220:8080
70.90.240.108:444
200.168.86.58:8080
59.165.84.152:8080
35.9.27.27:3124
66.98.212.79:8888
35.9.27.27:3128
89.239.110.248:3128
131.246.191.42:3128
194.108.93.13:8080
67.69.254.252:80
200.65.127.161:3128
64.29.148.36:80
218.92.8.165:8080
200.122.131.125:3128
194.29.178.13:3124
85.214.100.18:3128
204.56.0.137:3127
91.121.70.56:3128
78.46.255.93:53
220.194.55.192:3128
69.42.218.2:3128
187.0.3.1:3128
201.65.97.162:3128
190.207.252.233:3128
64.29.148.28:80
193.171.32.6:80
213.251.161.162:3128
96.229.223.2:80
95.48.196.178:3128
206.230.106.206:80
83.242.226.130:80
125.163.120.182:3128
85.115.20.76:8080
200.65.129.2:3128
130.192.157.132:3124
93.159.11.195:8080
115.68.28.14:8080
195.113.161.82:3128
189.53.218.191:3128
128.42.142.42:3124
199.193.13.202:3128
212.117.164.17:80
124.172.110.158:80
91.112.157.214:8080
82.194.76.198:3128
67.69.254.243:80
192.33.90.67:3128
128.42.142.41:3124
200.45.199.129:3128
210.245.63.218:80
219.234.81.106:80
196.31.11.18:3128
80.249.185.2:3128
203.157.169.10:80

PROXY LIST - 27 Jul 2009

58.30.227.5:3128
211.138.198.7:10917
221.214.27.252:808
221.215.72.218:8080
218.204.251.131:8090
60.208.64.177:8088
211.162.78.177:80
60.208.64.178:8088
211.136.86.204:8085
222.68.207.11:80
211.162.78.178:80
222.68.206.11:80
211.138.198.6:10917
202.99.29.27:80
210.51.184.62:80
202.116.160.89:80
210.51.184.41:80
200.220.140.226:3128
201.155.194.2:8080
98.208.76.247:9090
120.138.117.249:8080
80.148.22.116:8080
196.202.99.14:3128
75.101.43.34:8080
189.32.127.141:3128
222.173.130.198:80
169.235.24.232:3128
134.34.246.4:3124
202.3.217.125:80
200.164.74.78:3128
141.76.45.17:3128
131.246.191.42:3124
146.83.8.31:8080
75.101.188.125:80
201.159.20.152:8080
194.29.178.14:3124
85.214.145.36:3128
87.106.144.74:3128
150.146.205.43:80
189.77.31.82:80
189.77.8.254:3128
201.71.241.62:3128
209.59.209.121:32657
60.248.169.122:3128
217.145.98.213:8080
169.235.24.232:3124
189.47.200.12:3128
61.138.124.242:80
194.117.20.215:3128
169.235.24.232:3127

Saturday, July 25, 2009

Fresh Proxy List [25 Jul 2009]

75.145.241.73 8080 anonymous proxy server 
174.129.214.93 80 anonymous proxy server
80.93.119.6 80 anonymous proxy server
201.242.31.10 8080 anonymous proxy server
114.127.246.36 8080 high-anonymous proxy server
119.167.225.136 8080 anonymous proxy server
201.210.1.168 8080 anonymous proxy server
200.65.127.161 3128 anonymous proxy server
80.73.4.9 3128 high-anonymous proxy server
128.31.1.13 3128 high-anonymous proxy server

Fresh and New Proxy List

This is a list of from around the world. Does your work or school block sites like Myspace and Ebay? Use these proxies to view sites such as MySpace from school or work!

ID

ADDRESS

PORT

TYPE

COUNTRY

1

67.69.254.244

80

anonymous

Canada

2

218.14.227.197

3128

anonymous

China

3

148.233.159.58

8080

anonymous

Mexico

4

200.174.85.195

3128

transparent

Brazil

5

86.101.185.118

8080

anonymous

Hungary

6

201.161.48.194

3128

anonymous

Mexico

7

67.69.254.254

80

anonymous

Canada

8

80.148.21.75

8080

anonymous

Germany

9

208.74.174.142

3128

anonymous

United States

10

221.131.124.22

80

anonymous

China

11

119.146.73.114

8080

anonymous

China

12

67.69.254.247

80

anonymous

Canada

13

121.14.157.36

80

anonymous

China

14

202.54.61.99

8080

high anonymity

India

15

200.148.230.217

3128

anonymous

Brazil

16

200.65.129.2

80

anonymous

Mexico

17

189.84.217.124

3128

anonymous

Brazil

18

192.192.105.19

3128

anonymous

Taiwan

19

85.217.217.25

3128

anonymous

Bulgaria

20

201.91.0.9

3128

anonymous

Brazil

21

189.44.195.12

8080

anonymous

Brazil

22

67.69.254.248

80

anonymous

Canada

23

221.195.80.9

3128

anonymous

China

24

119.70.40.101

8080

anonymous

South Korea

25

67.69.254.253

80

anonymous

Canada

26

216.17.103.46

80

high anonymity

Spain

27

218.6.16.162

80

anonymous

China

28

222.68.206.11

80

anonymous

China

29

115.68.28.15

8080

anonymous

Australia

30

122.200.82.157

80

anonymous

China

31

213.180.131.135

80

anonymous

Poland

32

203.160.1.94

80

anonymous

Vietnam

33

60.190.139.10

80

anonymous

China

34

203.160.001.112

80

anonymous

Vietnam

35

200.103.183.93

3128

anonymous

Brazil

36

89.238.75.219

3128

anonymous

Germany

37

114.30.47.10

80

anonymous

Australia

38

203.160.001.103

80

anonymous

Vietnam

39

189.47.184.162

3128

anonymous

Brazil

40

66.9.60.134

3128

anonymous

United States

41

189.109.46.210

3128

anonymous

Brazil

42

203.160.1.121

80

anonymous

Vietnam

43

203.160.1.75

80

anonymous

Vietnam

44

200.1.19.13

80

anonymous

Chile

45

189.53.227.66

3128

anonymous

Brazil

46

8.9.209.2

3128

anonymous

United States

47

91.121.204.99

3128

anonymous

France

48

202.98.23.114

80

anonymous

China

49

190.95.149.198

3128

anonymous

Ecuador

50

67.69.254.242

80

anonymous

Canada

Thursday, July 23, 2009

US Sock List

Checked & filtered with Charon / ProxyFire (Timeout: 5)

173.19.205.220:7927
24.2.150.4:5131
24.30.42.15:28555
65.83.231.219:1988
65.83.231.225:1988
69.112.69.188:54731
75.65.20.213:55399
76.98.2.26:54249
98.192.108.228:39243
98.216.40.193:20971
98.217.253.202:28619
98.243.205.208:31663
98.251.13.161:9529
128.171.37.97:9275
173.18.195.192:17677
173.2.113.135:23330
173.29.152.16:26243
173.3.220.236:31863
173.30.18.85:4967
204.116.68.106:57051
208.109.110.163:39629
208.98.60.136:42632
208.98.60.141:18352
208.98.60.142:35464
208.98.60.147:48960
208.98.60.149:44038
208.98.60.152:51172
208.98.60.153:36045
208.98.60.155:22631
208.98.60.170:58282
208.98.60.171:25469
208.98.60.188:22080
208.98.60.197:53131
208.98.60.198:40726
208.98.60.199:42414
208.98.60.206:21664
208.98.60.216:40202
208.98.60.218:42653
208.98.60.224:47151
208.98.60.227:24056
24.1.110.31:45781
24.128.189.247:15283
24.128.21.23:21125
24.187.80.66:4431
24.21.154.242:59175
24.46.34.225:60717
64.126.71.132:27477
64.32.15.130:42237
64.32.15.131:40724
64.32.15.134:18098
64.32.15.135:34638
64.32.15.136:56263
64.32.15.138:39162
64.32.15.145:36543
65.29.110.184:58801
65.83.231.221:1988
65.83.231.223:1988
65.83.231.226:1988
65.83.231.228:1988
66.143.118.94:36225
66.148.71.21:31337
66.30.83.96:58323
66.55.8.51:13402
67.159.31.153:1080
67.159.31.155:1080
67.165.59.30:41531
67.166.85.255:33551
67.189.129.255:36405
67.81.145.209:62389
67.82.87.228:35297
67.86.28.10:59353
68.107.60.15:12153
68.12.211.10:56661
68.184.149.78:18011
68.193.1.120:29881
68.194.169.222:48981
68.199.246.116:6457
68.36.197.224:31301
68.45.64.34:27733
68.47.129.178:60423
68.48.218.233:45023
68.54.147.18:41625
69.112.99.24:34527
69.113.169.96:28977
69.117.144.151:11825
69.118.92.220:41695
69.137.209.135:49695
69.20.67.108:1988
69.244.106.178:3067
69.247.168.114:16927
69.254.7.68:24983
69.255.1.141:35903
69.91.72.248:26905
71.199.127.161:35741
71.225.154.53:3959
71.229.119.8:11465
71.233.59.178:11733
71.235.202.9:15293
71.237.165.195:30293
72.174.153.234:21679
72.87.158.236:8699
74.55.45.37:1080
74.55.45.45:1080
75.119.17.62:27793
75.191.194.144:24037
75.65.16.88:19831
75.74.173.127:27947
75.9.216.10:40087
76.100.96.147:40745
76.112.248.92:8115
76.122.244.45:4445
76.168.166.161:31749
76.169.63.25:50585
76.174.233.71:41715
76.208.41.156:48781
97.84.166.101:60859
98.199.24.100:29825
98.200.21.143:43603
98.202.102.230:38315
98.203.184.159:19345
98.210.64.250:21251
98.216.200.138:44999
98.226.195.88:49857
98.226.205.38:25552
98.232.83.177:22357
98.251.27.213:53637
98.26.14.66:4673
99.130.176.40:53213
99.179.68.74:50143
174.49.54.118:26325
174.50.12.181:8655
208.98.60.192:13556
208.98.60.194:28276
208.98.60.213:35386
216.194.70.3:1080
24.17.80.61:6075
24.33.232.44:58709
24.7.254.159:33997
64.130.116.35:8602
64.32.15.133:47435
64.32.15.137:22134
64.32.15.139:60729
64.32.15.144:20776
65.29.102.211:31797
65.83.231.224:1988
66.135.52.214:1080
66.215.174.20:10855
67.167.253.156:19535
67.188.100.155:31057
67.84.0.93:49459
68.117.11.98:12569
68.173.127.157:23231
68.34.188.146:39089
68.51.98.156:23427
68.61.235.254:54501
69.105.63.59:37435
69.123.143.94:8741
69.46.128.54:443
70.225.39.151:39853
70.238.222.19:22129
71.12.15.229:6509
71.200.150.62:58739
71.203.64.7:11825
71.227.194.6:19603
71.57.130.134:16615
72.151.241.58:1080
72.214.72.27:8761
75.21.227.116:1080
75.34.179.44:52669
75.49.225.33:4833
75.61.100.87:5531
75.67.196.251:3471
76.102.46.194:37459
76.103.110.209:30391
76.120.170.199:28791
76.20.81.219:24575
76.219.254.220:6557
76.24.66.153:43215
76.99.255.242:57661
96.3.75.155:11783
98.196.206.176:44193
98.219.3.43:38293
98.220.45.58:30093
98.243.15.60:53947
98.243.239.198:19203
98.251.50.25:14013
99.146.133.130:47305
208.98.183.61:42305
216.164.60.159:1988
216.240.54.182:1988
24.1.98.36:61541
24.190.78.101:58677
24.21.196.136:7254
24.42.121.105:22549
64.188.164.74:42127
64.32.15.142:61879
65.83.231.227:1988
68.190.46.213:6983
68.224.0.10:52753
68.59.182.2:27959
69.132.209.227:27859
69.227.177.30:54301
70.128.113.236:15247
71.79.172.34:8927
72.17.161.46:48943
75.139.202.21:17375
75.57.181.57:26189
75.67.222.215:13883
76.229.197.88:27819
76.29.206.174:34647
76.99.54.142:37577
97.100.117.116:21563
98.233.155.232:27813
65.83.231.220:1988
66.66.217.204:52572
69.151.255.165:41309
69.154.189.86:59929
70.95.96.119:44313
74.64.83.18:2597
75.87.71.104:1080
76.201.141.1:26739
76.21.129.90:46925
8.9.209.2:443
98.209.252.101:17741
216.15.82.203:47501
24.10.125.249:36629
24.188.216.25:9139
65.12.236.225:1988
67.170.170.67:8791
68.199.206.230:45339
68.57.254.10:24645
70.130.214.108:12491
74.206.69.113:34100
75.59.165.7:52509
96.246.74.17:28341
96.27.4.128:51983
173.80.24.177:4835
198.110.164.4:443
24.214.99.12:15357
65.83.231.222:1988
66.215.216.218:30459
72.23.85.95:19567
72.241.193.233:50117
24.233.43.10:56615
24.155.27.27:4379
74.55.45.40:1080
75.182.35.244:60475
206.255.109.57:45133
24.61.236.247:18184

Wednesday, July 22, 2009

Myspace Login Proxy

Free fresh web proxy , You can unblock myspace and unblock many other sites from you school or work.

http://www.canbypassit.info/

http://www.padproxy.info/

http://www.myproxier.info/

Friendster Proxy

Free web proxy unblock friendster and unblock many other sites from you school or work.

http://www.breakthroughit.info/


http://www.ezunblock.com/

http://www.proxyhide.info/

Gmail Proxy Unblock

Free web proxy unblock gmail , You can check gmail from you school or work .

http://www.proxyquick.info/

http://www.proxyrent.info/

http://www.proxyheart.info/

Monday, July 20, 2009

Proxy list Proxies Compatible with IRC, mIRC

203.160.1.66:80
212.93.193.74:443
203.160.1.121:80
203.160.1.85:80
203.160.1.112:80
203.160.1.94:80
114.127.246.36:8080
58.51.197.203:808
148.233.239.23:80
60.12.190.58:8088
200.12.44.69:8080

Tor

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy.

Individuals use Tor to keep websites from tracking them and their family members, or to connect to news sites, instant messaging services, or the like when these are blocked by their local Internet providers. Tor's hidden services let users publish web sites and other services without needing to reveal the location of the site. Individuals also use Tor for socially sensitive communication: chat rooms and web forums for rape and abuse survivors, or people with illnesses.

Journalists use Tor to communicate more safely with whistleblowers and dissidents. Non-governmental organizations (NGOs) use Tor to allow their workers to connect to their home website while they're in a foreign country, without notifying everybody nearby that they're working with that organization.

Groups such as Indymedia recommend Tor for safeguarding their members' online privacy and security. Activist groups like the Electronic Frontier Foundation (EFF) recommend Tor as a mechanism for maintaining civil liberties online. Corporations use Tor as a safe way to conduct competitive analysis, and to protect sensitive procurement patterns from eavesdroppers. They also use it to replace traditional VPNs, which reveal the exact amount and timing of communication. Which locations have employees working late? Which locations have employees consulting job-hunting websites? Which research divisions are communicating with the company's patent lawyers?

A branch of the U.S. Navy uses Tor for open source intelligence gathering, and one of its teams used Tor while deployed in the Middle East recently. Law enforcement uses Tor for visiting or surveilling web sites without leaving government IP addresses in their web logs, and for security during sting operations.

The variety of people who use Tor is actually part of what makes it so secure. Tor hides you among the other users on the network, so the more populous and diverse the user base for Tor is, the more your anonymity will be protected.

Why we need Tor

Using Tor protects you against a common form of Internet surveillance known as "traffic analysis." Traffic analysis can be used to infer who is talking to whom over a public network. Knowing the source and destination of your Internet traffic allows others to track your behavior and interests. This can impact your checkbook if, for example, an e-commerce site uses price discrimination based on your country or institution of origin. It can even threaten your job and physical safety by revealing who and where you are. For example, if you're travelling abroad and you connect to your employer's computers to check or send mail, you can inadvertently reveal your national origin and professional affiliation to anyone observing the network, even if the connection is encrypted.

How does traffic analysis work? Internet data packets have two parts: a data payload and a header used for routing. The data payload is whatever is being sent, whether that's an email message, a web page, or an audio file. Even if you encrypt the data payload of your communications, traffic analysis still reveals a great deal about what you're doing and, possibly, what you're saying. That's because it focuses on the header, which discloses source, destination, size, timing, and so on.

A basic problem for the privacy minded is that the recipient of your communications can see that you sent it by looking at headers. So can authorized intermediaries like Internet service providers, and sometimes unauthorized intermediaries as well. A very simple form of traffic analysis might involve sitting somewhere between sender and recipient on the network, looking at headers.

But there are also more powerful kinds of traffic analysis. Some attackers spy on multiple parts of the Internet and use sophisticated statistical techniques to track the communications patterns of many different organizations and individuals. Encryption does not help against these attackers, since it only hides the content of Internet traffic, not the headers.

The solution: a distributed, anonymous network

Tor helps to reduce the risks of both simple and sophisticated traffic analysis by distributing your transactions over several places on the Internet, so no single point can link you to your destination. The idea is similar to using a twisty, hard-to-follow route in order to throw off somebody who is tailing you — and then periodically erasing your footprints. Instead of taking a direct route from source to destination, data packets on the Tor network take a random pathway through several relays that cover your tracks so no observer at any single point can tell where the data came from or where it's going.

Tor circuit step one

To create a private network pathway with Tor, the user's software or client incrementally builds a circuit of encrypted connections through relays on the network. The circuit is extended one hop at a time, and each relay along the way knows only which relay gave it data and which relay it is giving data to. No individual relay ever knows the complete path that a data packet has taken. The client negotiates a separate set of encryption keys for each hop along the circuit to ensure that each hop can't trace these connections as they pass through.

Tor circuit step two

Once a circuit has been established, many kinds of data can be exchanged and several different sorts of software applications can be deployed over the Tor network. Because each relay sees no more than one hop in the circuit, neither an eavesdropper nor a compromised relay can use traffic analysis to link the connection's source and destination. Tor only works for TCP streams and can be used by any application with SOCKS support.

For efficiency, the Tor software uses the same circuit for connections that happen within the same ten minutes or so. Later requests are given a new circuit, to keep people from linking your earlier actions to the new ones.

Tor circuit step three

Hidden services

Tor also makes it possible for users to hide their locations while offering various kinds of services, such as web publishing or an instant messaging server. Using Tor "rendezvous points," other Tor users can connect to these hidden services, each without knowing the other's network identity. This hidden service functionality could allow Tor users to set up a website where people publish material without worrying about censorship. Nobody would be able to determine who was offering the site, and nobody who offered the site would know who was posting to it. Learn more about configuring hidden services and how the hidden service protocol works.

Staying anonymous

Tor can't solve all anonymity problems. It focuses only on protecting the transport of data. You need to use protocol-specific support software if you don't want the sites you visit to see your identifying information. For example, you can use web proxies such as Privoxy while web browsing to block cookies and withhold information about your browser type.

Also, to protect your anonymity, be smart. Don't provide your name or other revealing information in web forms. Be aware that, like all anonymizing networks that are fast enough for web browsing, Tor does not provide protection against end-to-end timing attacks: If your attacker can watch the traffic coming out of your computer, and also the traffic arriving at your chosen destination, he can use statistical analysis to discover that they are part of the same circuit.

The future of Tor

Providing a usable anonymizing network on the Internet today is an ongoing challenge. We want software that meets users' needs. We also want to keep the network up and running in a way that handles as many users as possible. Security and usability don't have to be at odds: As Tor's usability increases, it will attract more users, which will increase the possible sources and destinations of each communication, thus increasing security for everyone. We're making progress, but we need your help. Please consider running a relay or volunteering as a developer.

Ongoing trends in law, policy, and technology threaten anonymity as never before, undermining our ability to speak and read freely online. These trends also undermine national security and critical infrastructure by making communication among individuals, organizations, corporations, and governments more vulnerable to analysis. Each new user and relay provides additional diversity, enhancing Tor's ability to put control over your security and privacy back into your hands.



visit : http://www.torproject.org

Monday, July 13, 2009

Gpass - Online secure

GPass Client Software

  • Hide your IP address during online activities
  • Support streaming audio/video, email, instant messaging, download managers, etc
  • Encrypt all your network communication
  • Bypass network censorship
  • Easy-to-use graphical user interface supporting multiple languages and skins
  • Freeware for users in closed societies

Online Secure Anonymous Surfing (Web Direct Proxy)

  • Hide your IP address during web surfing
  • Encrypt your web communication
  • Bypass network censorship
  • Provide encryption for web surfing when using insecure wireless network
  • No software installation. Just come to our web site, and safely surf other websites
  • Free surfing might be limited by daily traffic volume.

Enterprise Solution

  • Provide custom systems for organizations that need to deliver contents to users in closed societies where the Internet is adversely censored. Our server and client software will bypass various organizational or national network censorship and provide secure anonymous Internet surfing.
visit : http://gpass1.com