http://dataproxy.blogspot.com/ :ssh,Tunnels,putty, Free Http anon , SSL , socks ,Fresh IRC PRoxy list ,proxy for mirc Connections PROXYS everyday Update! FREE ANONYMOUS PROXY LIST - ONLINE PRIVACY, ANONYMOUS SURFING, PROTECT PRIVACY: PROXIES & SOCKS FOR HTTP IRC MAIL POP3 Port : 8080 ,3128, 6588 ,more ~IF you use my list in your site put my link in your page ~http://dataproxy.blogspot.com/
Monday, July 27, 2009
PROXY LIST
84.22.47.34:8080
84.14.82.2:8081
35.9.27.27:3127
190.158.227.219:3128
78.61.36.119:8080
24.96.254.86:8080
98.129.147.1:80
60.248.227.175:3128
204.56.0.137:3124
201.229.192.18:8080
128.2.223.63:3124
209.59.207.147:39689
128.2.223.65:3127
190.92.4.214:3128
212.95.71.8:80
124.104.181.29:3128
193.136.227.163:3127
200.207.9.168:3128
80.36.255.171:8080
201.221.148.76:3128
129.69.210.96:3128
201.36.194.26:8080
140.134.104.195:2301
194.210.29.25:3128
222.88.219.66:3128
128.233.252.12:3128
189.26.242.50:3128
212.117.166.26:18225
221.8.15.170:8080
218.75.100.114:8080
192.33.90.66:3127
189.50.117.248:8000
64.79.199.35:48725
128.233.252.11:3128
80.148.23.52:80
190.81.15.107:3128
129.10.120.194:3124
141.24.33.192:3127
200.148.230.217:3128
189.76.218.220:8080
70.90.240.108:444
200.168.86.58:8080
59.165.84.152:8080
35.9.27.27:3124
66.98.212.79:8888
35.9.27.27:3128
89.239.110.248:3128
131.246.191.42:3128
194.108.93.13:8080
67.69.254.252:80
200.65.127.161:3128
64.29.148.36:80
218.92.8.165:8080
200.122.131.125:3128
194.29.178.13:3124
85.214.100.18:3128
204.56.0.137:3127
91.121.70.56:3128
78.46.255.93:53
220.194.55.192:3128
69.42.218.2:3128
187.0.3.1:3128
201.65.97.162:3128
190.207.252.233:3128
64.29.148.28:80
193.171.32.6:80
213.251.161.162:3128
96.229.223.2:80
95.48.196.178:3128
206.230.106.206:80
83.242.226.130:80
125.163.120.182:3128
85.115.20.76:8080
200.65.129.2:3128
130.192.157.132:3124
93.159.11.195:8080
115.68.28.14:8080
195.113.161.82:3128
189.53.218.191:3128
128.42.142.42:3124
199.193.13.202:3128
212.117.164.17:80
124.172.110.158:80
91.112.157.214:8080
82.194.76.198:3128
67.69.254.243:80
192.33.90.67:3128
128.42.142.41:3124
200.45.199.129:3128
210.245.63.218:80
219.234.81.106:80
196.31.11.18:3128
80.249.185.2:3128
203.157.169.10:80
PROXY LIST - 27 Jul 2009
211.138.198.7:10917
221.214.27.252:808
221.215.72.218:8080
218.204.251.131:8090
60.208.64.177:8088
211.162.78.177:80
60.208.64.178:8088
211.136.86.204:8085
222.68.207.11:80
211.162.78.178:80
222.68.206.11:80
211.138.198.6:10917
202.99.29.27:80
210.51.184.62:80
202.116.160.89:80
210.51.184.41:80
200.220.140.226:3128
201.155.194.2:8080
98.208.76.247:9090
120.138.117.249:8080
80.148.22.116:8080
196.202.99.14:3128
75.101.43.34:8080
189.32.127.141:3128
222.173.130.198:80
169.235.24.232:3128
134.34.246.4:3124
202.3.217.125:80
200.164.74.78:3128
141.76.45.17:3128
131.246.191.42:3124
146.83.8.31:8080
75.101.188.125:80
201.159.20.152:8080
194.29.178.14:3124
85.214.145.36:3128
87.106.144.74:3128
150.146.205.43:80
189.77.31.82:80
189.77.8.254:3128
201.71.241.62:3128
209.59.209.121:32657
60.248.169.122:3128
217.145.98.213:8080
169.235.24.232:3124
189.47.200.12:3128
61.138.124.242:80
194.117.20.215:3128
169.235.24.232:3127
Saturday, July 25, 2009
Fresh Proxy List [25 Jul 2009]
75.145.241.73 8080 anonymous proxy server
174.129.214.93 80 anonymous proxy server
80.93.119.6 80 anonymous proxy server
201.242.31.10 8080 anonymous proxy server
114.127.246.36 8080 high-anonymous proxy server
119.167.225.136 8080 anonymous proxy server
201.210.1.168 8080 anonymous proxy server
200.65.127.161 3128 anonymous proxy server
80.73.4.9 3128 high-anonymous proxy server
128.31.1.13 3128 high-anonymous proxy server
Fresh and New Proxy List
|
| | | | | ||
ID | ADDRESS | PORT | TYPE | COUNTRY | | |
1 | 67.69.254.244 | 80 | anonymous | | | |
2 | 218.14.227.197 | 3128 | anonymous | | | |
3 | 148.233.159.58 | 8080 | anonymous | | | |
4 | 200.174.85.195 | 3128 | transparent | | | |
5 | 86.101.185.118 | 8080 | anonymous | | | |
6 | 201.161.48.194 | 3128 | anonymous | | | |
7 | 67.69.254.254 | 80 | anonymous | | | |
8 | 80.148.21.75 | 8080 | anonymous | | | |
9 | 208.74.174.142 | 3128 | anonymous | | | |
10 | 221.131.124.22 | 80 | anonymous | | | |
11 | 119.146.73.114 | 8080 | anonymous | | | |
12 | 67.69.254.247 | 80 | anonymous | | | |
13 | 121.14.157.36 | 80 | anonymous | | | |
14 | 202.54.61.99 | 8080 | high anonymity | | | |
15 | 200.148.230.217 | 3128 | anonymous | | | |
16 | 200.65.129.2 | 80 | anonymous | | | |
17 | 189.84.217.124 | 3128 | anonymous | | | |
18 | 192.192.105.19 | 3128 | anonymous | | | |
19 | 85.217.217.25 | 3128 | anonymous | | | |
20 | 201.91.0.9 | 3128 | anonymous | | | |
21 | 189.44.195.12 | 8080 | anonymous | | | |
22 | 67.69.254.248 | 80 | anonymous | | | |
23 | 221.195.80.9 | 3128 | anonymous | | | |
24 | 119.70.40.101 | 8080 | anonymous | | | |
25 | 67.69.254.253 | 80 | anonymous | | | |
26 | 216.17.103.46 | 80 | high anonymity | | | |
27 | 218.6.16.162 | 80 | anonymous | | | |
28 | 222.68.206.11 | 80 | anonymous | | | |
29 | 115.68.28.15 | 8080 | anonymous | | | |
30 | 122.200.82.157 | 80 | anonymous | | | |
31 | 213.180.131.135 | 80 | anonymous | | | |
32 | 203.160.1.94 | 80 | anonymous | | | |
33 | 60.190.139.10 | 80 | anonymous | | | |
34 | 203.160.001.112 | 80 | anonymous | | | |
35 | 200.103.183.93 | 3128 | anonymous | | | |
36 | 89.238.75.219 | 3128 | anonymous | | | |
37 | 114.30.47.10 | 80 | anonymous | | | |
38 | 203.160.001.103 | 80 | anonymous | | | |
39 | 189.47.184.162 | 3128 | anonymous | | | |
40 | 66.9.60.134 | 3128 | anonymous | | | |
41 | 189.109.46.210 | 3128 | anonymous | | | |
42 | 203.160.1.121 | 80 | anonymous | | | |
43 | 203.160.1.75 | 80 | anonymous | | | |
44 | 200.1.19.13 | 80 | anonymous | | | |
45 | 189.53.227.66 | 3128 | anonymous | | | |
46 | 8.9.209.2 | 3128 | anonymous | | | |
47 | 91.121.204.99 | 3128 | anonymous | | | |
48 | 202.98.23.114 | 80 | anonymous | | | |
49 | 190.95.149.198 | 3128 | anonymous | | | |
50 | 67.69.254.242 | 80 | anonymous | | | |
Thursday, July 23, 2009
US Sock List
173.19.205.220:7927
24.2.150.4:5131
24.30.42.15:28555
65.83.231.219:1988
65.83.231.225:1988
69.112.69.188:54731
75.65.20.213:55399
76.98.2.26:54249
98.192.108.228:39243
98.216.40.193:20971
98.217.253.202:28619
98.243.205.208:31663
98.251.13.161:9529
128.171.37.97:9275
173.18.195.192:17677
173.2.113.135:23330
173.29.152.16:26243
173.3.220.236:31863
173.30.18.85:4967
204.116.68.106:57051
208.109.110.163:39629
208.98.60.136:42632
208.98.60.141:18352
208.98.60.142:35464
208.98.60.147:48960
208.98.60.149:44038
208.98.60.152:51172
208.98.60.153:36045
208.98.60.155:22631
208.98.60.170:58282
208.98.60.171:25469
208.98.60.188:22080
208.98.60.197:53131
208.98.60.198:40726
208.98.60.199:42414
208.98.60.206:21664
208.98.60.216:40202
208.98.60.218:42653
208.98.60.224:47151
208.98.60.227:24056
24.1.110.31:45781
24.128.189.247:15283
24.128.21.23:21125
24.187.80.66:4431
24.21.154.242:59175
24.46.34.225:60717
64.126.71.132:27477
64.32.15.130:42237
64.32.15.131:40724
64.32.15.134:18098
64.32.15.135:34638
64.32.15.136:56263
64.32.15.138:39162
64.32.15.145:36543
65.29.110.184:58801
65.83.231.221:1988
65.83.231.223:1988
65.83.231.226:1988
65.83.231.228:1988
66.143.118.94:36225
66.148.71.21:31337
66.30.83.96:58323
66.55.8.51:13402
67.159.31.153:1080
67.159.31.155:1080
67.165.59.30:41531
67.166.85.255:33551
67.189.129.255:36405
67.81.145.209:62389
67.82.87.228:35297
67.86.28.10:59353
68.107.60.15:12153
68.12.211.10:56661
68.184.149.78:18011
68.193.1.120:29881
68.194.169.222:48981
68.199.246.116:6457
68.36.197.224:31301
68.45.64.34:27733
68.47.129.178:60423
68.48.218.233:45023
68.54.147.18:41625
69.112.99.24:34527
69.113.169.96:28977
69.117.144.151:11825
69.118.92.220:41695
69.137.209.135:49695
69.20.67.108:1988
69.244.106.178:3067
69.247.168.114:16927
69.254.7.68:24983
69.255.1.141:35903
69.91.72.248:26905
71.199.127.161:35741
71.225.154.53:3959
71.229.119.8:11465
71.233.59.178:11733
71.235.202.9:15293
71.237.165.195:30293
72.174.153.234:21679
72.87.158.236:8699
74.55.45.37:1080
74.55.45.45:1080
75.119.17.62:27793
75.191.194.144:24037
75.65.16.88:19831
75.74.173.127:27947
75.9.216.10:40087
76.100.96.147:40745
76.112.248.92:8115
76.122.244.45:4445
76.168.166.161:31749
76.169.63.25:50585
76.174.233.71:41715
76.208.41.156:48781
97.84.166.101:60859
98.199.24.100:29825
98.200.21.143:43603
98.202.102.230:38315
98.203.184.159:19345
98.210.64.250:21251
98.216.200.138:44999
98.226.195.88:49857
98.226.205.38:25552
98.232.83.177:22357
98.251.27.213:53637
98.26.14.66:4673
99.130.176.40:53213
99.179.68.74:50143
174.49.54.118:26325
174.50.12.181:8655
208.98.60.192:13556
208.98.60.194:28276
208.98.60.213:35386
216.194.70.3:1080
24.17.80.61:6075
24.33.232.44:58709
24.7.254.159:33997
64.130.116.35:8602
64.32.15.133:47435
64.32.15.137:22134
64.32.15.139:60729
64.32.15.144:20776
65.29.102.211:31797
65.83.231.224:1988
66.135.52.214:1080
66.215.174.20:10855
67.167.253.156:19535
67.188.100.155:31057
67.84.0.93:49459
68.117.11.98:12569
68.173.127.157:23231
68.34.188.146:39089
68.51.98.156:23427
68.61.235.254:54501
69.105.63.59:37435
69.123.143.94:8741
69.46.128.54:443
70.225.39.151:39853
70.238.222.19:22129
71.12.15.229:6509
71.200.150.62:58739
71.203.64.7:11825
71.227.194.6:19603
71.57.130.134:16615
72.151.241.58:1080
72.214.72.27:8761
75.21.227.116:1080
75.34.179.44:52669
75.49.225.33:4833
75.61.100.87:5531
75.67.196.251:3471
76.102.46.194:37459
76.103.110.209:30391
76.120.170.199:28791
76.20.81.219:24575
76.219.254.220:6557
76.24.66.153:43215
76.99.255.242:57661
96.3.75.155:11783
98.196.206.176:44193
98.219.3.43:38293
98.220.45.58:30093
98.243.15.60:53947
98.243.239.198:19203
98.251.50.25:14013
99.146.133.130:47305
208.98.183.61:42305
216.164.60.159:1988
216.240.54.182:1988
24.1.98.36:61541
24.190.78.101:58677
24.21.196.136:7254
24.42.121.105:22549
64.188.164.74:42127
64.32.15.142:61879
65.83.231.227:1988
68.190.46.213:6983
68.224.0.10:52753
68.59.182.2:27959
69.132.209.227:27859
69.227.177.30:54301
70.128.113.236:15247
71.79.172.34:8927
72.17.161.46:48943
75.139.202.21:17375
75.57.181.57:26189
75.67.222.215:13883
76.229.197.88:27819
76.29.206.174:34647
76.99.54.142:37577
97.100.117.116:21563
98.233.155.232:27813
65.83.231.220:1988
66.66.217.204:52572
69.151.255.165:41309
69.154.189.86:59929
70.95.96.119:44313
74.64.83.18:2597
75.87.71.104:1080
76.201.141.1:26739
76.21.129.90:46925
8.9.209.2:443
98.209.252.101:17741
216.15.82.203:47501
24.10.125.249:36629
24.188.216.25:9139
65.12.236.225:1988
67.170.170.67:8791
68.199.206.230:45339
68.57.254.10:24645
70.130.214.108:12491
74.206.69.113:34100
75.59.165.7:52509
96.246.74.17:28341
96.27.4.128:51983
173.80.24.177:4835
198.110.164.4:443
24.214.99.12:15357
65.83.231.222:1988
66.215.216.218:30459
72.23.85.95:19567
72.241.193.233:50117
24.233.43.10:56615
24.155.27.27:4379
74.55.45.40:1080
75.182.35.244:60475
206.255.109.57:45133
24.61.236.247:18184
Wednesday, July 22, 2009
Myspace Login Proxy
http://www.canbypassit.info/
http://www.padproxy.info/
http://www.myproxier.info/
Friendster Proxy
http://www.breakthroughit.info/
http://www.ezunblock.com/
http://www.proxyhide.info/
Gmail Proxy Unblock
http://www.proxyquick.info/
http://www.proxyrent.info/
http://www.proxyheart.info/
Monday, July 20, 2009
Proxy list Proxies Compatible with IRC, mIRC
212.93.193.74:443
203.160.1.121:80
203.160.1.85:80
203.160.1.112:80
203.160.1.94:80
114.127.246.36:8080
58.51.197.203:808
148.233.239.23:80
60.12.190.58:8088
200.12.44.69:8080
Tor
Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy.
Individuals use Tor to keep websites from tracking them and their family members, or to connect to news sites, instant messaging services, or the like when these are blocked by their local Internet providers. Tor's hidden services let users publish web sites and other services without needing to reveal the location of the site. Individuals also use Tor for socially sensitive communication: chat rooms and web forums for rape and abuse survivors, or people with illnesses.
Journalists use Tor to communicate more safely with whistleblowers and dissidents. Non-governmental organizations (NGOs) use Tor to allow their workers to connect to their home website while they're in a foreign country, without notifying everybody nearby that they're working with that organization.
Groups such as Indymedia recommend Tor for safeguarding their members' online privacy and security. Activist groups like the Electronic Frontier Foundation (EFF) recommend Tor as a mechanism for maintaining civil liberties online. Corporations use Tor as a safe way to conduct competitive analysis, and to protect sensitive procurement patterns from eavesdroppers. They also use it to replace traditional VPNs, which reveal the exact amount and timing of communication. Which locations have employees working late? Which locations have employees consulting job-hunting websites? Which research divisions are communicating with the company's patent lawyers?
A branch of the U.S. Navy uses Tor for open source intelligence gathering, and one of its teams used Tor while deployed in the Middle East recently. Law enforcement uses Tor for visiting or surveilling web sites without leaving government IP addresses in their web logs, and for security during sting operations.
The variety of people who use Tor is actually part of what makes it so secure. Tor hides you among the other users on the network, so the more populous and diverse the user base for Tor is, the more your anonymity will be protected.
Why we need Tor
Using Tor protects you against a common form of Internet surveillance known as "traffic analysis." Traffic analysis can be used to infer who is talking to whom over a public network. Knowing the source and destination of your Internet traffic allows others to track your behavior and interests. This can impact your checkbook if, for example, an e-commerce site uses price discrimination based on your country or institution of origin. It can even threaten your job and physical safety by revealing who and where you are. For example, if you're travelling abroad and you connect to your employer's computers to check or send mail, you can inadvertently reveal your national origin and professional affiliation to anyone observing the network, even if the connection is encrypted.
How does traffic analysis work? Internet data packets have two parts: a data payload and a header used for routing. The data payload is whatever is being sent, whether that's an email message, a web page, or an audio file. Even if you encrypt the data payload of your communications, traffic analysis still reveals a great deal about what you're doing and, possibly, what you're saying. That's because it focuses on the header, which discloses source, destination, size, timing, and so on.
A basic problem for the privacy minded is that the recipient of your communications can see that you sent it by looking at headers. So can authorized intermediaries like Internet service providers, and sometimes unauthorized intermediaries as well. A very simple form of traffic analysis might involve sitting somewhere between sender and recipient on the network, looking at headers.
But there are also more powerful kinds of traffic analysis. Some attackers spy on multiple parts of the Internet and use sophisticated statistical techniques to track the communications patterns of many different organizations and individuals. Encryption does not help against these attackers, since it only hides the content of Internet traffic, not the headers.
The solution: a distributed, anonymous network
Tor helps to reduce the risks of both simple and sophisticated traffic analysis by distributing your transactions over several places on the Internet, so no single point can link you to your destination. The idea is similar to using a twisty, hard-to-follow route in order to throw off somebody who is tailing you — and then periodically erasing your footprints. Instead of taking a direct route from source to destination, data packets on the Tor network take a random pathway through several relays that cover your tracks so no observer at any single point can tell where the data came from or where it's going.
To create a private network pathway with Tor, the user's software or client incrementally builds a circuit of encrypted connections through relays on the network. The circuit is extended one hop at a time, and each relay along the way knows only which relay gave it data and which relay it is giving data to. No individual relay ever knows the complete path that a data packet has taken. The client negotiates a separate set of encryption keys for each hop along the circuit to ensure that each hop can't trace these connections as they pass through.
Once a circuit has been established, many kinds of data can be exchanged and several different sorts of software applications can be deployed over the Tor network. Because each relay sees no more than one hop in the circuit, neither an eavesdropper nor a compromised relay can use traffic analysis to link the connection's source and destination. Tor only works for TCP streams and can be used by any application with SOCKS support.
For efficiency, the Tor software uses the same circuit for connections that happen within the same ten minutes or so. Later requests are given a new circuit, to keep people from linking your earlier actions to the new ones.
Hidden services
Tor also makes it possible for users to hide their locations while offering various kinds of services, such as web publishing or an instant messaging server. Using Tor "rendezvous points," other Tor users can connect to these hidden services, each without knowing the other's network identity. This hidden service functionality could allow Tor users to set up a website where people publish material without worrying about censorship. Nobody would be able to determine who was offering the site, and nobody who offered the site would know who was posting to it. Learn more about configuring hidden services and how the hidden service protocol works.
Staying anonymous
Tor can't solve all anonymity problems. It focuses only on protecting the transport of data. You need to use protocol-specific support software if you don't want the sites you visit to see your identifying information. For example, you can use web proxies such as Privoxy while web browsing to block cookies and withhold information about your browser type.
Also, to protect your anonymity, be smart. Don't provide your name or other revealing information in web forms. Be aware that, like all anonymizing networks that are fast enough for web browsing, Tor does not provide protection against end-to-end timing attacks: If your attacker can watch the traffic coming out of your computer, and also the traffic arriving at your chosen destination, he can use statistical analysis to discover that they are part of the same circuit.
The future of Tor
Providing a usable anonymizing network on the Internet today is an ongoing challenge. We want software that meets users' needs. We also want to keep the network up and running in a way that handles as many users as possible. Security and usability don't have to be at odds: As Tor's usability increases, it will attract more users, which will increase the possible sources and destinations of each communication, thus increasing security for everyone. We're making progress, but we need your help. Please consider running a relay or volunteering as a developer.
Ongoing trends in law, policy, and technology threaten anonymity as never before, undermining our ability to speak and read freely online. These trends also undermine national security and critical infrastructure by making communication among individuals, organizations, corporations, and governments more vulnerable to analysis. Each new user and relay provides additional diversity, enhancing Tor's ability to put control over your security and privacy back into your hands.
visit : http://www.torproject.org
Monday, July 13, 2009
Gpass - Online secure
GPass Client Software
- Hide your IP address during online activities
- Support streaming audio/video, email, instant messaging, download managers, etc
- Encrypt all your network communication
- Bypass network censorship
- Easy-to-use graphical user interface supporting multiple languages and skins
- Freeware for users in closed societies
Online Secure Anonymous Surfing (Web Direct Proxy)
- Hide your IP address during web surfing
- Encrypt your web communication
- Bypass network censorship
- Provide encryption for web surfing when using insecure wireless network
- No software installation. Just come to our web site, and safely surf other websites
- Free surfing might be limited by daily traffic volume.
Enterprise Solution
- Provide custom systems for organizations that need to deliver contents to users in closed societies where the Internet is adversely censored. Our server and client software will bypass various organizational or national network censorship and provide secure anonymous Internet surfing.
Sunday, July 12, 2009
high anonymity proxy list
210.158.6.201:8080
66.167.100.59:6649
216.114.194.18:7212
IRC PROXY LIST FREE
212.93.193.72:443
203.160.1.66:80
203.160.1.121:80
203.160.1.85:80
203.160.1.112:80
148.233.239.23:80
61.135.179.52:80
60.208.64.177:8088
Bypass Firewalls - Preserve your online Anonymity, Privacy & Security - HTTP Tunnel Corp
HTTP-Tunnel Technology
HTTP-Tunnel technology allows users to perform various Internet tasks despite the restrictions imposed by firewalls. This is made possible by sending data through HTTP (port 80). Additionally, HTTP-Tunnel technology is very secure, making it indispensable for both average and business communications.
The HTTP-Tunnel Client is an application that runs in your system tray acting as a SOCKS server, managing all data transmissions between the computer and the network.
The HTTP-Tunnel Server is a customizable server software solution for both personal and corporate networks.
The HTTP-Tunnel ActiveX Control allows developers to incorporate HTTP-Tunnel technology into their software applications.
The Corporate Messenger (VCM) is a secure and serverless instant messaging application, perfect for corporate intranets.
visit: http://www.http-tunnel.com/html/default.asp
Friday, July 10, 2009
Youtube Multiply Facebook Proxy Unblock
http://www.neatfill.com/
http://www.clearload.com/
http://www.meatballpizza.info/
Myyearbook Login Proxy
Yon can unblock myyearbook from your school or work.
http://www.qsurf.info/
http://www.getaroundit.info/
http://goodproxyunblock.co.cc/
http://goldproxyunblock.co.cc/
Wednesday, July 8, 2009
list proxy anonymous elite HTTP
116.112.236.177 8088
116.224.146.131 8090
116.224.19.147 8090
117.11.74.138 8090
117.13.71.146 8088
117.28.5.30 8090
121.206.53.52 8090
121.243.207.118 6588
121.34.33.15 8088
122.140.65.126 8090
122.4.25.196 8088
123.113.150.56 8090
123.117.130.115 8090
123.117.214.220 8090
123.159.89.242 8088
123.201.115.34 6588
123.6.191.0 8088
124.116.173.32 8088
124.163.141.47 8088
125.2.64.189 8080
125.215.115.248 8080
125.85.72.74 8088
125.93.23.140 8090
125.95.113.170 8088
Monday, July 6, 2009
Anonymous Proxy List
148.233.229.235:3128
148.233.159.58:3128
148.233.159.58:8080
114.127.246.36:8080
41.210.252.11:8080
200.65.129.2:80
218.75.100.114:8080
217.10.246.4:8080
222.83.228.34:8080
217.10.246.2:8080
65.65.219.98:29122
83.222.31.119:80
142.150.238.13:3128
91.121.203.191:3128
218.26.14.122:80
88.191.66.131:3128
203.178.133.3:3128
93.123.104.66:8080
203.178.133.3:3127
35.9.27.26:3127
128.112.139.28:3124
64.12.223.232:80
208.99.69.136:80
218.26.165.34:80
222.68.207.11:80
203.160.1.121:80
148.221.13.187:80
61.135.179.52:80
129.82.12.187:3124
151.11.83.170:80
133.1.74.162:3127
82.242.46.232:8080
169.235.24.232:3128
141.24.33.192:3124
219.137.229.218:3128
143.225.229.236:3128
67.15.104.28:80
60.191.241.38:8088
70.87.135.179:80
141.24.33.192:3127
200.188.208.122:80
203.172.180.15:3129
220.7.210.59:8080
169.229.50.8:3128
82.145.197.249:8080
201.6.246.70:3128
58.15.106.117:9000
212.93.193.74:443
212.93.193.78:443
212.93.193.72:443
66.63.165.10:3128
128.2.223.64:3124
193.28.46.52:80
203.178.133.2:3127
192.33.90.67:3128
202.151.175.243:80
203.160.1.75:80
193.136.227.164:3128
159.213.87.22:80
212.93.193.83:443
212.93.193.82:443
193.136.227.163:3124
212.44.145.21:80
121.11.87.171:80
202.148.23.58:8080
134.151.255.180:3124
86.101.185.99:8080
202.184.103.96:80
60.250.3.3:80
203.130.192.162:3128
80.148.30.1:8080
Socks proxy list
189.35.62.241:1080
support protocol 5,4
189.91.26.34:1080
support protocol 5,4
190.24.204.158:1080
support protocol 5,4
190.254.43.186:1080
support protocol 5,4
190.40.148.57:1080
support protocol 5,4
200.159.206.229:1080
support protocol 5,4
201.37.237.83:1080
support protocol 5
92.255.134.173:1080
support protocol 5
198.36.131.134:1080
support protocol 4
218.241.190.41:1080
support protocol 4
209.254.24.30:80
support protocol 4
202.104.35.116:1080
support protocol 4
121.8.124.42:1080
support protocol 4
222.161.2.180:1080
support protocol 4
Sunday, July 5, 2009
Addons FireFox :: FoxyProxy
what is foxyproxy?
FoxyProxy is a free, open-source advanced proxy management tool that completely replaces Firefox's limited proxying capabilities. It automatically switches an internet connection across one or more proxy servers based on URL and IP patterns.
Put simply, FoxyProxy automates the manual process of editing Firefox's Connection Settings dialog. Proxy server switching occurs based on the loading URL and the switching rules you define. Animated icons show you when a proxy is in use. Advanced logging shows you which proxies were used and when. QuickAdd makes it a snap to create new URL patterns on-the-fly. FoxyProxy is fully compatible with Portable Firefox, has better support for PAC files than Firefox itself, and is translated into more than 25 languages.
- Want fine-grained control over which websites load through proxies?
- Live in Belarus, Burma, China, Cuba, Egypt, Iran, North Korea, Saudi Arabia, Syria, Thailand, Tunisia, Turkmenistan Uzbekistan, Vietnam, or one of the other nations who censor the internet?
- Can't get to MySpace from school?
- Can't get to GMail at work?
foxyproxy does not inherently make you anonymous
Please read this important note if you require thorough privacy and anonymity.some foxyproxy features
- Animated statusbar/toolbar icons show you when a proxy is in use
- Define multiple proxies
- Define which proxy to use (or none!) for arbitrary URLs using wildcards, regular expressions, whitelists, blacklists, and other conveniences
- No more wondering whether a URL loaded through a proxy or not: FoxyProxy optionally logs all URLs, including which proxy was used (if any), which pattern was matched, timestamps, etc.
- Out-of-the-box support for Tor with the unique Tor Wizard - zero configuration!
- Temporarily or permanently dedicate all URLs to go through a particular proxy
- Temporarily or permanently disable use of a proxy
- Automatically add blocked sites to a proxy and have them reload through the proxy
- Optional status bar information about which proxy is currently in use
- Complete Proxy Auto-Config (PAC) support
- Download a link using one of your defined proxies with a simple right-click (coming soon)
- Unobtrusive presence, stable execution, premier support
- Optionally force Firefox to perform DNS lookups through a SOCKS4a/5 server. Note that Firefox without FoxyProxy always performs DNS lookups through a SOCKS5 server if you've defined one. Only with FoxyProxy can you instruct Firefox to not use defined SOCKS5 servers for DNS lookups.
- More!
Friday, July 3, 2009
Proxy Finder Pro 2.5
Automatically search & leech proxy addresses from webs, which offers fresh updated proxylist. In 30 seconds, it will give you 6000+ http proxy servers. Most are elite anonymous proxy addresses.
- Intelligent & Automatic - It first connects to hundreds of websites / forums that publish public free proxy list, Second extracts fresh proxyserver automatically.
- Proxy Server Search Fast - Just in 30 seconds, It will find about 6000+ http proxies addresses. Most are elite anonymous proxy addresses.
- Fresh - All are new proxy list web sites/forums, most be updated every day even every minute.
- Easy - Very easy to use only need one click to find proxy server automatically.
- Filter - Automatically remove all the gov & military & planet lab proxies IP.
- Random Order - Show all the proxy in random order.
fresh proxy lists
http://www.proxy-list.net/fresh-proxy-lists.shtml
Modify Headers
Add, modify and filter http request headers. You can modify the user agent string, add headers to spoof a mobile request (e.g. x-up-calling-line-id) and much more. Take a look at the help tab of the Modify Headers window...
Long Description
Add, modify and filter http request headers. You can modify the user-agent string, add headers to spoof a mobile request (e.g. x-up-calling-line-id) and much more. Take a look at the help tab of the Modify Headers window.
Some people think that 'user-agent' is a custom way of specifying the user agent string. This is not true, for a guide on this and other HTTP request headers, look at this W3C page: http://www.w3.org/Protocols/HTTP/HTRQ_Headers.html
Please DO NOT post support requests or issues here. To make suggestions or report issues, please go to http://modifyheaders.mozdev.org/bugs.html
https://addons.mozilla.org/en-US/firefox/addon/967
Wednesday, July 1, 2009
UPDATE PUBLIC RAPIDLEECH SERVERS
http://sv2.ohay.info/
http://infraredtools.com/foxgen/
http://mccallbrewery.com/
http://milkyway.dnsprotect.com/~fewettne/rapid/
http://siamcafe2r.com/rapid/
http://rapidleech.gspvn.org/
hopster: bypass firewall - bypass proxy - http tunnel software
Chat with your friends using your favourite applications: MSN, AOL, Yahoo Messenger, ICQ, Miranda, Trillian, mIRC... Wherever your friends are, hopster will bypass a censoring firewall and take you right to your buddies.
Browse, Surf, Download & Chat Anonymously
Hide your real IP address and protect yourself from nosy people and wannabe-hackers. With hopster, there's no way anyone will know where or who you are.
Try hopster for free!
Freedom is just five minutes away. With just little more than 1 MB, downloading hopster is just a matter of minutes. And it even configures itself - automatically. So, go get it! Demo version transfers files with 2 Kilobytes per second.
Visit http://www.hopster.com