Monday, July 27, 2009

PROXY LIST

212.117.166.26:8138
84.22.47.34:8080
84.14.82.2:8081
35.9.27.27:3127
190.158.227.219:3128
78.61.36.119:8080
24.96.254.86:8080
98.129.147.1:80
60.248.227.175:3128
204.56.0.137:3124
201.229.192.18:8080
128.2.223.63:3124
209.59.207.147:39689
128.2.223.65:3127
190.92.4.214:3128
212.95.71.8:80
124.104.181.29:3128
193.136.227.163:3127
200.207.9.168:3128
80.36.255.171:8080
201.221.148.76:3128
129.69.210.96:3128
201.36.194.26:8080
140.134.104.195:2301
194.210.29.25:3128
222.88.219.66:3128
128.233.252.12:3128
189.26.242.50:3128
212.117.166.26:18225
221.8.15.170:8080
218.75.100.114:8080
192.33.90.66:3127
189.50.117.248:8000
64.79.199.35:48725
128.233.252.11:3128
80.148.23.52:80
190.81.15.107:3128
129.10.120.194:3124
141.24.33.192:3127
200.148.230.217:3128
189.76.218.220:8080
70.90.240.108:444
200.168.86.58:8080
59.165.84.152:8080
35.9.27.27:3124
66.98.212.79:8888
35.9.27.27:3128
89.239.110.248:3128
131.246.191.42:3128
194.108.93.13:8080
67.69.254.252:80
200.65.127.161:3128
64.29.148.36:80
218.92.8.165:8080
200.122.131.125:3128
194.29.178.13:3124
85.214.100.18:3128
204.56.0.137:3127
91.121.70.56:3128
78.46.255.93:53
220.194.55.192:3128
69.42.218.2:3128
187.0.3.1:3128
201.65.97.162:3128
190.207.252.233:3128
64.29.148.28:80
193.171.32.6:80
213.251.161.162:3128
96.229.223.2:80
95.48.196.178:3128
206.230.106.206:80
83.242.226.130:80
125.163.120.182:3128
85.115.20.76:8080
200.65.129.2:3128
130.192.157.132:3124
93.159.11.195:8080
115.68.28.14:8080
195.113.161.82:3128
189.53.218.191:3128
128.42.142.42:3124
199.193.13.202:3128
212.117.164.17:80
124.172.110.158:80
91.112.157.214:8080
82.194.76.198:3128
67.69.254.243:80
192.33.90.67:3128
128.42.142.41:3124
200.45.199.129:3128
210.245.63.218:80
219.234.81.106:80
196.31.11.18:3128
80.249.185.2:3128
203.157.169.10:80

PROXY LIST - 27 Jul 2009

58.30.227.5:3128
211.138.198.7:10917
221.214.27.252:808
221.215.72.218:8080
218.204.251.131:8090
60.208.64.177:8088
211.162.78.177:80
60.208.64.178:8088
211.136.86.204:8085
222.68.207.11:80
211.162.78.178:80
222.68.206.11:80
211.138.198.6:10917
202.99.29.27:80
210.51.184.62:80
202.116.160.89:80
210.51.184.41:80
200.220.140.226:3128
201.155.194.2:8080
98.208.76.247:9090
120.138.117.249:8080
80.148.22.116:8080
196.202.99.14:3128
75.101.43.34:8080
189.32.127.141:3128
222.173.130.198:80
169.235.24.232:3128
134.34.246.4:3124
202.3.217.125:80
200.164.74.78:3128
141.76.45.17:3128
131.246.191.42:3124
146.83.8.31:8080
75.101.188.125:80
201.159.20.152:8080
194.29.178.14:3124
85.214.145.36:3128
87.106.144.74:3128
150.146.205.43:80
189.77.31.82:80
189.77.8.254:3128
201.71.241.62:3128
209.59.209.121:32657
60.248.169.122:3128
217.145.98.213:8080
169.235.24.232:3124
189.47.200.12:3128
61.138.124.242:80
194.117.20.215:3128
169.235.24.232:3127

Saturday, July 25, 2009

Fresh Proxy List [25 Jul 2009]

75.145.241.73 8080 anonymous proxy server 
174.129.214.93 80 anonymous proxy server
80.93.119.6 80 anonymous proxy server
201.242.31.10 8080 anonymous proxy server
114.127.246.36 8080 high-anonymous proxy server
119.167.225.136 8080 anonymous proxy server
201.210.1.168 8080 anonymous proxy server
200.65.127.161 3128 anonymous proxy server
80.73.4.9 3128 high-anonymous proxy server
128.31.1.13 3128 high-anonymous proxy server

Fresh and New Proxy List

This is a list of from around the world. Does your work or school block sites like Myspace and Ebay? Use these proxies to view sites such as MySpace from school or work!

ID

ADDRESS

PORT

TYPE

COUNTRY

1

67.69.254.244

80

anonymous

Canada

2

218.14.227.197

3128

anonymous

China

3

148.233.159.58

8080

anonymous

Mexico

4

200.174.85.195

3128

transparent

Brazil

5

86.101.185.118

8080

anonymous

Hungary

6

201.161.48.194

3128

anonymous

Mexico

7

67.69.254.254

80

anonymous

Canada

8

80.148.21.75

8080

anonymous

Germany

9

208.74.174.142

3128

anonymous

United States

10

221.131.124.22

80

anonymous

China

11

119.146.73.114

8080

anonymous

China

12

67.69.254.247

80

anonymous

Canada

13

121.14.157.36

80

anonymous

China

14

202.54.61.99

8080

high anonymity

India

15

200.148.230.217

3128

anonymous

Brazil

16

200.65.129.2

80

anonymous

Mexico

17

189.84.217.124

3128

anonymous

Brazil

18

192.192.105.19

3128

anonymous

Taiwan

19

85.217.217.25

3128

anonymous

Bulgaria

20

201.91.0.9

3128

anonymous

Brazil

21

189.44.195.12

8080

anonymous

Brazil

22

67.69.254.248

80

anonymous

Canada

23

221.195.80.9

3128

anonymous

China

24

119.70.40.101

8080

anonymous

South Korea

25

67.69.254.253

80

anonymous

Canada

26

216.17.103.46

80

high anonymity

Spain

27

218.6.16.162

80

anonymous

China

28

222.68.206.11

80

anonymous

China

29

115.68.28.15

8080

anonymous

Australia

30

122.200.82.157

80

anonymous

China

31

213.180.131.135

80

anonymous

Poland

32

203.160.1.94

80

anonymous

Vietnam

33

60.190.139.10

80

anonymous

China

34

203.160.001.112

80

anonymous

Vietnam

35

200.103.183.93

3128

anonymous

Brazil

36

89.238.75.219

3128

anonymous

Germany

37

114.30.47.10

80

anonymous

Australia

38

203.160.001.103

80

anonymous

Vietnam

39

189.47.184.162

3128

anonymous

Brazil

40

66.9.60.134

3128

anonymous

United States

41

189.109.46.210

3128

anonymous

Brazil

42

203.160.1.121

80

anonymous

Vietnam

43

203.160.1.75

80

anonymous

Vietnam

44

200.1.19.13

80

anonymous

Chile

45

189.53.227.66

3128

anonymous

Brazil

46

8.9.209.2

3128

anonymous

United States

47

91.121.204.99

3128

anonymous

France

48

202.98.23.114

80

anonymous

China

49

190.95.149.198

3128

anonymous

Ecuador

50

67.69.254.242

80

anonymous

Canada

Thursday, July 23, 2009

US Sock List

Checked & filtered with Charon / ProxyFire (Timeout: 5)

173.19.205.220:7927
24.2.150.4:5131
24.30.42.15:28555
65.83.231.219:1988
65.83.231.225:1988
69.112.69.188:54731
75.65.20.213:55399
76.98.2.26:54249
98.192.108.228:39243
98.216.40.193:20971
98.217.253.202:28619
98.243.205.208:31663
98.251.13.161:9529
128.171.37.97:9275
173.18.195.192:17677
173.2.113.135:23330
173.29.152.16:26243
173.3.220.236:31863
173.30.18.85:4967
204.116.68.106:57051
208.109.110.163:39629
208.98.60.136:42632
208.98.60.141:18352
208.98.60.142:35464
208.98.60.147:48960
208.98.60.149:44038
208.98.60.152:51172
208.98.60.153:36045
208.98.60.155:22631
208.98.60.170:58282
208.98.60.171:25469
208.98.60.188:22080
208.98.60.197:53131
208.98.60.198:40726
208.98.60.199:42414
208.98.60.206:21664
208.98.60.216:40202
208.98.60.218:42653
208.98.60.224:47151
208.98.60.227:24056
24.1.110.31:45781
24.128.189.247:15283
24.128.21.23:21125
24.187.80.66:4431
24.21.154.242:59175
24.46.34.225:60717
64.126.71.132:27477
64.32.15.130:42237
64.32.15.131:40724
64.32.15.134:18098
64.32.15.135:34638
64.32.15.136:56263
64.32.15.138:39162
64.32.15.145:36543
65.29.110.184:58801
65.83.231.221:1988
65.83.231.223:1988
65.83.231.226:1988
65.83.231.228:1988
66.143.118.94:36225
66.148.71.21:31337
66.30.83.96:58323
66.55.8.51:13402
67.159.31.153:1080
67.159.31.155:1080
67.165.59.30:41531
67.166.85.255:33551
67.189.129.255:36405
67.81.145.209:62389
67.82.87.228:35297
67.86.28.10:59353
68.107.60.15:12153
68.12.211.10:56661
68.184.149.78:18011
68.193.1.120:29881
68.194.169.222:48981
68.199.246.116:6457
68.36.197.224:31301
68.45.64.34:27733
68.47.129.178:60423
68.48.218.233:45023
68.54.147.18:41625
69.112.99.24:34527
69.113.169.96:28977
69.117.144.151:11825
69.118.92.220:41695
69.137.209.135:49695
69.20.67.108:1988
69.244.106.178:3067
69.247.168.114:16927
69.254.7.68:24983
69.255.1.141:35903
69.91.72.248:26905
71.199.127.161:35741
71.225.154.53:3959
71.229.119.8:11465
71.233.59.178:11733
71.235.202.9:15293
71.237.165.195:30293
72.174.153.234:21679
72.87.158.236:8699
74.55.45.37:1080
74.55.45.45:1080
75.119.17.62:27793
75.191.194.144:24037
75.65.16.88:19831
75.74.173.127:27947
75.9.216.10:40087
76.100.96.147:40745
76.112.248.92:8115
76.122.244.45:4445
76.168.166.161:31749
76.169.63.25:50585
76.174.233.71:41715
76.208.41.156:48781
97.84.166.101:60859
98.199.24.100:29825
98.200.21.143:43603
98.202.102.230:38315
98.203.184.159:19345
98.210.64.250:21251
98.216.200.138:44999
98.226.195.88:49857
98.226.205.38:25552
98.232.83.177:22357
98.251.27.213:53637
98.26.14.66:4673
99.130.176.40:53213
99.179.68.74:50143
174.49.54.118:26325
174.50.12.181:8655
208.98.60.192:13556
208.98.60.194:28276
208.98.60.213:35386
216.194.70.3:1080
24.17.80.61:6075
24.33.232.44:58709
24.7.254.159:33997
64.130.116.35:8602
64.32.15.133:47435
64.32.15.137:22134
64.32.15.139:60729
64.32.15.144:20776
65.29.102.211:31797
65.83.231.224:1988
66.135.52.214:1080
66.215.174.20:10855
67.167.253.156:19535
67.188.100.155:31057
67.84.0.93:49459
68.117.11.98:12569
68.173.127.157:23231
68.34.188.146:39089
68.51.98.156:23427
68.61.235.254:54501
69.105.63.59:37435
69.123.143.94:8741
69.46.128.54:443
70.225.39.151:39853
70.238.222.19:22129
71.12.15.229:6509
71.200.150.62:58739
71.203.64.7:11825
71.227.194.6:19603
71.57.130.134:16615
72.151.241.58:1080
72.214.72.27:8761
75.21.227.116:1080
75.34.179.44:52669
75.49.225.33:4833
75.61.100.87:5531
75.67.196.251:3471
76.102.46.194:37459
76.103.110.209:30391
76.120.170.199:28791
76.20.81.219:24575
76.219.254.220:6557
76.24.66.153:43215
76.99.255.242:57661
96.3.75.155:11783
98.196.206.176:44193
98.219.3.43:38293
98.220.45.58:30093
98.243.15.60:53947
98.243.239.198:19203
98.251.50.25:14013
99.146.133.130:47305
208.98.183.61:42305
216.164.60.159:1988
216.240.54.182:1988
24.1.98.36:61541
24.190.78.101:58677
24.21.196.136:7254
24.42.121.105:22549
64.188.164.74:42127
64.32.15.142:61879
65.83.231.227:1988
68.190.46.213:6983
68.224.0.10:52753
68.59.182.2:27959
69.132.209.227:27859
69.227.177.30:54301
70.128.113.236:15247
71.79.172.34:8927
72.17.161.46:48943
75.139.202.21:17375
75.57.181.57:26189
75.67.222.215:13883
76.229.197.88:27819
76.29.206.174:34647
76.99.54.142:37577
97.100.117.116:21563
98.233.155.232:27813
65.83.231.220:1988
66.66.217.204:52572
69.151.255.165:41309
69.154.189.86:59929
70.95.96.119:44313
74.64.83.18:2597
75.87.71.104:1080
76.201.141.1:26739
76.21.129.90:46925
8.9.209.2:443
98.209.252.101:17741
216.15.82.203:47501
24.10.125.249:36629
24.188.216.25:9139
65.12.236.225:1988
67.170.170.67:8791
68.199.206.230:45339
68.57.254.10:24645
70.130.214.108:12491
74.206.69.113:34100
75.59.165.7:52509
96.246.74.17:28341
96.27.4.128:51983
173.80.24.177:4835
198.110.164.4:443
24.214.99.12:15357
65.83.231.222:1988
66.215.216.218:30459
72.23.85.95:19567
72.241.193.233:50117
24.233.43.10:56615
24.155.27.27:4379
74.55.45.40:1080
75.182.35.244:60475
206.255.109.57:45133
24.61.236.247:18184

Wednesday, July 22, 2009

Myspace Login Proxy

Free fresh web proxy , You can unblock myspace and unblock many other sites from you school or work.

http://www.canbypassit.info/

http://www.padproxy.info/

http://www.myproxier.info/

Friendster Proxy

Free web proxy unblock friendster and unblock many other sites from you school or work.

http://www.breakthroughit.info/


http://www.ezunblock.com/

http://www.proxyhide.info/

Gmail Proxy Unblock

Free web proxy unblock gmail , You can check gmail from you school or work .

http://www.proxyquick.info/

http://www.proxyrent.info/

http://www.proxyheart.info/

Monday, July 20, 2009

Proxy list Proxies Compatible with IRC, mIRC

203.160.1.66:80
212.93.193.74:443
203.160.1.121:80
203.160.1.85:80
203.160.1.112:80
203.160.1.94:80
114.127.246.36:8080
58.51.197.203:808
148.233.239.23:80
60.12.190.58:8088
200.12.44.69:8080

Tor

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy.

Individuals use Tor to keep websites from tracking them and their family members, or to connect to news sites, instant messaging services, or the like when these are blocked by their local Internet providers. Tor's hidden services let users publish web sites and other services without needing to reveal the location of the site. Individuals also use Tor for socially sensitive communication: chat rooms and web forums for rape and abuse survivors, or people with illnesses.

Journalists use Tor to communicate more safely with whistleblowers and dissidents. Non-governmental organizations (NGOs) use Tor to allow their workers to connect to their home website while they're in a foreign country, without notifying everybody nearby that they're working with that organization.

Groups such as Indymedia recommend Tor for safeguarding their members' online privacy and security. Activist groups like the Electronic Frontier Foundation (EFF) recommend Tor as a mechanism for maintaining civil liberties online. Corporations use Tor as a safe way to conduct competitive analysis, and to protect sensitive procurement patterns from eavesdroppers. They also use it to replace traditional VPNs, which reveal the exact amount and timing of communication. Which locations have employees working late? Which locations have employees consulting job-hunting websites? Which research divisions are communicating with the company's patent lawyers?

A branch of the U.S. Navy uses Tor for open source intelligence gathering, and one of its teams used Tor while deployed in the Middle East recently. Law enforcement uses Tor for visiting or surveilling web sites without leaving government IP addresses in their web logs, and for security during sting operations.

The variety of people who use Tor is actually part of what makes it so secure. Tor hides you among the other users on the network, so the more populous and diverse the user base for Tor is, the more your anonymity will be protected.

Why we need Tor

Using Tor protects you against a common form of Internet surveillance known as "traffic analysis." Traffic analysis can be used to infer who is talking to whom over a public network. Knowing the source and destination of your Internet traffic allows others to track your behavior and interests. This can impact your checkbook if, for example, an e-commerce site uses price discrimination based on your country or institution of origin. It can even threaten your job and physical safety by revealing who and where you are. For example, if you're travelling abroad and you connect to your employer's computers to check or send mail, you can inadvertently reveal your national origin and professional affiliation to anyone observing the network, even if the connection is encrypted.

How does traffic analysis work? Internet data packets have two parts: a data payload and a header used for routing. The data payload is whatever is being sent, whether that's an email message, a web page, or an audio file. Even if you encrypt the data payload of your communications, traffic analysis still reveals a great deal about what you're doing and, possibly, what you're saying. That's because it focuses on the header, which discloses source, destination, size, timing, and so on.

A basic problem for the privacy minded is that the recipient of your communications can see that you sent it by looking at headers. So can authorized intermediaries like Internet service providers, and sometimes unauthorized intermediaries as well. A very simple form of traffic analysis might involve sitting somewhere between sender and recipient on the network, looking at headers.

But there are also more powerful kinds of traffic analysis. Some attackers spy on multiple parts of the Internet and use sophisticated statistical techniques to track the communications patterns of many different organizations and individuals. Encryption does not help against these attackers, since it only hides the content of Internet traffic, not the headers.

The solution: a distributed, anonymous network

Tor helps to reduce the risks of both simple and sophisticated traffic analysis by distributing your transactions over several places on the Internet, so no single point can link you to your destination. The idea is similar to using a twisty, hard-to-follow route in order to throw off somebody who is tailing you — and then periodically erasing your footprints. Instead of taking a direct route from source to destination, data packets on the Tor network take a random pathway through several relays that cover your tracks so no observer at any single point can tell where the data came from or where it's going.

Tor circuit step one

To create a private network pathway with Tor, the user's software or client incrementally builds a circuit of encrypted connections through relays on the network. The circuit is extended one hop at a time, and each relay along the way knows only which relay gave it data and which relay it is giving data to. No individual relay ever knows the complete path that a data packet has taken. The client negotiates a separate set of encryption keys for each hop along the circuit to ensure that each hop can't trace these connections as they pass through.

Tor circuit step two

Once a circuit has been established, many kinds of data can be exchanged and several different sorts of software applications can be deployed over the Tor network. Because each relay sees no more than one hop in the circuit, neither an eavesdropper nor a compromised relay can use traffic analysis to link the connection's source and destination. Tor only works for TCP streams and can be used by any application with SOCKS support.

For efficiency, the Tor software uses the same circuit for connections that happen within the same ten minutes or so. Later requests are given a new circuit, to keep people from linking your earlier actions to the new ones.

Tor circuit step three

Hidden services

Tor also makes it possible for users to hide their locations while offering various kinds of services, such as web publishing or an instant messaging server. Using Tor "rendezvous points," other Tor users can connect to these hidden services, each without knowing the other's network identity. This hidden service functionality could allow Tor users to set up a website where people publish material without worrying about censorship. Nobody would be able to determine who was offering the site, and nobody who offered the site would know who was posting to it. Learn more about configuring hidden services and how the hidden service protocol works.

Staying anonymous

Tor can't solve all anonymity problems. It focuses only on protecting the transport of data. You need to use protocol-specific support software if you don't want the sites you visit to see your identifying information. For example, you can use web proxies such as Privoxy while web browsing to block cookies and withhold information about your browser type.

Also, to protect your anonymity, be smart. Don't provide your name or other revealing information in web forms. Be aware that, like all anonymizing networks that are fast enough for web browsing, Tor does not provide protection against end-to-end timing attacks: If your attacker can watch the traffic coming out of your computer, and also the traffic arriving at your chosen destination, he can use statistical analysis to discover that they are part of the same circuit.

The future of Tor

Providing a usable anonymizing network on the Internet today is an ongoing challenge. We want software that meets users' needs. We also want to keep the network up and running in a way that handles as many users as possible. Security and usability don't have to be at odds: As Tor's usability increases, it will attract more users, which will increase the possible sources and destinations of each communication, thus increasing security for everyone. We're making progress, but we need your help. Please consider running a relay or volunteering as a developer.

Ongoing trends in law, policy, and technology threaten anonymity as never before, undermining our ability to speak and read freely online. These trends also undermine national security and critical infrastructure by making communication among individuals, organizations, corporations, and governments more vulnerable to analysis. Each new user and relay provides additional diversity, enhancing Tor's ability to put control over your security and privacy back into your hands.



visit : http://www.torproject.org

Monday, July 13, 2009

Gpass - Online secure

GPass Client Software

  • Hide your IP address during online activities
  • Support streaming audio/video, email, instant messaging, download managers, etc
  • Encrypt all your network communication
  • Bypass network censorship
  • Easy-to-use graphical user interface supporting multiple languages and skins
  • Freeware for users in closed societies

Online Secure Anonymous Surfing (Web Direct Proxy)

  • Hide your IP address during web surfing
  • Encrypt your web communication
  • Bypass network censorship
  • Provide encryption for web surfing when using insecure wireless network
  • No software installation. Just come to our web site, and safely surf other websites
  • Free surfing might be limited by daily traffic volume.

Enterprise Solution

  • Provide custom systems for organizations that need to deliver contents to users in closed societies where the Internet is adversely censored. Our server and client software will bypass various organizational or national network censorship and provide secure anonymous Internet surfing.
visit : http://gpass1.com

Sunday, July 12, 2009

high anonymity proxy list

high anonymity proxy list

210.158.6.201:8080

66.167.100.59:6649

216.114.194.18:7212

IRC PROXY LIST FREE

203.160.1.75:80
212.93.193.72:443
203.160.1.66:80
203.160.1.121:80
203.160.1.85:80
203.160.1.112:80
148.233.239.23:80
61.135.179.52:80
60.208.64.177:8088

Bypass Firewalls - Preserve your online Anonymity, Privacy & Security - HTTP Tunnel Corp

HTTP-Tunnel Technology

HTTP-Tunnel technology allows users to perform various Internet tasks despite the restrictions imposed by firewalls. This is made possible by sending data through HTTP (port 80). Additionally, HTTP-Tunnel technology is very secure, making it indispensable for both average and business communications.

The HTTP-Tunnel Client is an application that runs in your system tray acting as a SOCKS server, managing all data transmissions between the computer and the network.

The HTTP-Tunnel Server is a customizable server software solution for both personal and corporate networks.

The HTTP-Tunnel ActiveX Control allows developers to incorporate HTTP-Tunnel technology into their software applications.

The Corporate Messenger (VCM) is a secure and serverless instant messaging application, perfect for corporate intranets.



visit: http://www.http-tunnel.com/html/default.asp

Friday, July 10, 2009

Youtube Multiply Facebook Proxy Unblock

You can unblock facebook unblock youtube videos unblock multiply and unblock many other sites at school or work.

http://www.neatfill.com/

http://www.clearload.com/

http://www.meatballpizza.info/

Myyearbook Login Proxy

Free web proxy unblock myyearbook.
Yon can unblock myyearbook from your school or work.

http://www.qsurf.info/
http://www.getaroundit.info/
http://goodproxyunblock.co.cc/
http://goldproxyunblock.co.cc/

Wednesday, July 8, 2009

list proxy anonymous elite HTTP

116.112.118.254 8090
116.112.236.177 8088
116.224.146.131 8090
116.224.19.147 8090
117.11.74.138 8090
117.13.71.146 8088
117.28.5.30 8090
121.206.53.52 8090
121.243.207.118 6588
121.34.33.15 8088
122.140.65.126 8090
122.4.25.196 8088
123.113.150.56 8090
123.117.130.115 8090
123.117.214.220 8090
123.159.89.242 8088
123.201.115.34 6588
123.6.191.0 8088
124.116.173.32 8088
124.163.141.47 8088
125.2.64.189 8080
125.215.115.248 8080
125.85.72.74 8088
125.93.23.140 8090
125.95.113.170 8088

Monday, July 6, 2009

Anonymous Proxy List

148.233.239.23:80
148.233.229.235:3128
148.233.159.58:3128
148.233.159.58:8080
114.127.246.36:8080
41.210.252.11:8080
200.65.129.2:80
218.75.100.114:8080
217.10.246.4:8080
222.83.228.34:8080
217.10.246.2:8080
65.65.219.98:29122
83.222.31.119:80
142.150.238.13:3128
91.121.203.191:3128
218.26.14.122:80
88.191.66.131:3128
203.178.133.3:3128
93.123.104.66:8080
203.178.133.3:3127
35.9.27.26:3127
128.112.139.28:3124
64.12.223.232:80
208.99.69.136:80
218.26.165.34:80
222.68.207.11:80
203.160.1.121:80
148.221.13.187:80
61.135.179.52:80
129.82.12.187:3124
151.11.83.170:80
133.1.74.162:3127
82.242.46.232:8080
169.235.24.232:3128
141.24.33.192:3124
219.137.229.218:3128
143.225.229.236:3128
67.15.104.28:80
60.191.241.38:8088
70.87.135.179:80
141.24.33.192:3127
200.188.208.122:80
203.172.180.15:3129
220.7.210.59:8080
169.229.50.8:3128
82.145.197.249:8080
201.6.246.70:3128
58.15.106.117:9000
212.93.193.74:443
212.93.193.78:443
212.93.193.72:443
66.63.165.10:3128
128.2.223.64:3124
193.28.46.52:80
203.178.133.2:3127
192.33.90.67:3128
202.151.175.243:80
203.160.1.75:80
193.136.227.164:3128
159.213.87.22:80
212.93.193.83:443
212.93.193.82:443
193.136.227.163:3124
212.44.145.21:80
121.11.87.171:80
202.148.23.58:8080
134.151.255.180:3124
86.101.185.99:8080
202.184.103.96:80
60.250.3.3:80
203.130.192.162:3128
80.148.30.1:8080

Socks proxy list

Socks proxy list
189.35.62.241:1080
support protocol 5,4

189.91.26.34:1080
support protocol 5,4

190.24.204.158:1080
support protocol 5,4

190.254.43.186:1080
support protocol 5,4

190.40.148.57:1080
support protocol 5,4

200.159.206.229:1080
support protocol 5,4

201.37.237.83:1080
support protocol 5

92.255.134.173:1080
support protocol 5

198.36.131.134:1080
support protocol 4

218.241.190.41:1080
support protocol 4

209.254.24.30:80
support protocol 4

202.104.35.116:1080
support protocol 4

121.8.124.42:1080
support protocol 4

222.161.2.180:1080
support protocol 4

Sunday, July 5, 2009

Addons FireFox :: FoxyProxy

what is foxyproxy?

FoxyProxy is a free, open-source advanced proxy management tool that completely replaces Firefox's limited proxying capabilities. It automatically switches an internet connection across one or more proxy servers based on URL and IP patterns.

Put simply, FoxyProxy automates the manual process of editing Firefox's Connection Settings dialog. Proxy server switching occurs based on the loading URL and the switching rules you define. Animated icons show you when a proxy is in use. Advanced logging shows you which proxies were used and when. QuickAdd makes it a snap to create new URL patterns on-the-fly. FoxyProxy is fully compatible with Portable Firefox, has better support for PAC files than Firefox itself, and is translated into more than 25 languages.

  • Want fine-grained control over which websites load through proxies?
  • Live in Belarus, Burma, China, Cuba, Egypt, Iran, North Korea, Saudi Arabia, Syria, Thailand, Tunisia, Turkmenistan Uzbekistan, Vietnam, or one of the other nations who censor the internet?
  • Can't get to MySpace from school?
  • Can't get to GMail at work?
then foxyproxy is for you!

foxyproxy does not inherently make you anonymous

Please read this important note if you require thorough privacy and anonymity.

some foxyproxy features

  • Animated statusbar/toolbar icons show you when a proxy is in use
  • Define multiple proxies
  • Define which proxy to use (or none!) for arbitrary URLs using wildcards, regular expressions, whitelists, blacklists, and other conveniences
  • No more wondering whether a URL loaded through a proxy or not: FoxyProxy optionally logs all URLs, including which proxy was used (if any), which pattern was matched, timestamps, etc.
  • Out-of-the-box support for Tor with the unique Tor Wizard - zero configuration!
  • Temporarily or permanently dedicate all URLs to go through a particular proxy
  • Temporarily or permanently disable use of a proxy
  • Automatically add blocked sites to a proxy and have them reload through the proxy
  • Optional status bar information about which proxy is currently in use
  • Complete Proxy Auto-Config (PAC) support
  • Download a link using one of your defined proxies with a simple right-click (coming soon)
  • Unobtrusive presence, stable execution, premier support
  • Optionally force Firefox to perform DNS lookups through a SOCKS4a/5 server. Note that Firefox without FoxyProxy always performs DNS lookups through a SOCKS5 server if you've defined one. Only with FoxyProxy can you instruct Firefox to not use defined SOCKS5 servers for DNS lookups.
  • More!
visit : http://foxyproxy.mozdev.org/

Friday, July 3, 2009

Proxy Finder Pro 2.5


Automatically search & leech proxy addresses from webs, which offers fresh updated proxylist. In 30 seconds, it will give you 6000+ http proxy servers. Most are elite anonymous proxy addresses.

  • Intelligent & Automatic - It first connects to hundreds of websites / forums that publish public free proxy list, Second extracts fresh proxyserver automatically.

  • Proxy Server Search Fast - Just in 30 seconds, It will find about 6000+ http proxies addresses. Most are elite anonymous proxy addresses.

  • Fresh - All are new proxy list web sites/forums, most be updated every day even every minute.

  • Easy - Very easy to use only need one click to find proxy server automatically.

  • Filter - Automatically remove all the gov & military & planet lab proxies IP.

  • Random Order - Show all the proxy in random order.
http://www.proxy-tool.com/proxy-finder-pro.html

fresh proxy lists

CreatedSubmitted ByCountCheckedQuality
2009-07-03 07:06:46Jaga170333%
2009-07-03 06:08:52trasparent43243262%
2009-07-03 06:02:14======94947845%
2009-07-02 14:06:40proxyworld.org20620653%
2009-06-30 13:29:36bash109520014%
2009-06-29 22:28:27LeandroJF303090%
2009-06-29 17:48:00proxyworld.org39839874%
2009-06-28 23:04:03LeandroJF4652006%
2009-06-28 08:28:21trasparent52452456%
2009-06-27 05:11:48[[[]]]22222233%
2009-06-26 16:41:15proxyworld.org545440%
2009-06-26 09:42:16List517317353%
2009-06-26 09:42:05List417417448%
2009-06-26 09:41:44List321821841%
2009-06-26 09:41:20List221321344%
2009-06-26 09:41:02List121121154%
2009-06-25 15:29:20proxyworld.org15215256%
2009-06-25 03:51:35======75575566%
2009-06-25 03:39:38List1057457470%
2009-06-25 03:21:07List934234229%
2009-06-25 03:20:50List832832827%
2009-06-25 03:20:23List734534530%
2009-06-25 03:19:56List632020019%
2009-06-25 03:19:34List531231230%
2009-06-25 03:19:13List432832831%
2009-06-25 03:18:52List332132132%
2009-06-25 03:10:28List224124130%
2009-06-25 03:09:03List124124132%
2009-06-24 07:39:53trasparent42242260%
2009-06-23 18:25:44=========66566566%
2009-06-23 04:21:01List828228280%
2009-06-23 02:17:45List731631647%
2009-06-23 02:17:29List617217252%
2009-06-23 02:17:05List515915946%
2009-06-23 02:16:45List415915949%
2009-06-23 02:16:24List316116147%
2009-06-23 02:16:04List216316358%
2009-06-23 02:15:32List110710745%
2009-06-22 11:09:12ghatz11100%
2009-06-22 10:14:54jackie chan110%
2009-06-21 01:40:14Velus19219257%
2009-06-18 09:31:26trasparent10410464%
2009-06-17 07:39:07talre202080%
2009-06-17 07:38:32tamere393964%
2009-06-16 11:03:42duc959578%
2009-06-16 04:47:11trasparent14514565%
2009-06-13 15:49:45Velus22922968%
2009-06-13 06:18:09jjj1971972%
2009-06-13 01:31:25nox6666%
2009-06-12 01:25:54Freshy272785%



http://www.proxy-list.net/fresh-proxy-lists.shtml

Modify Headers

Add, modify and filter http request headers. You can modify the user agent string, add headers to spoof a mobile request (e.g. x-up-calling-line-id) and much more. Take a look at the help tab of the Modify Headers window...


Long Description

Add, modify and filter http request headers. You can modify the user-agent string, add headers to spoof a mobile request (e.g. x-up-calling-line-id) and much more. Take a look at the help tab of the Modify Headers window.

Some people think that 'user-agent' is a custom way of specifying the user agent string. This is not true, for a guide on this and other HTTP request headers, look at this W3C page: http://www.w3.org/Protocols/HTTP/HTRQ_Headers.html

Please DO NOT post support requests or issues here. To make suggestions or report issues, please go to http://modifyheaders.mozdev.org/bugs.html

https://addons.mozilla.org/en-US/firefox/addon/967

Wednesday, July 1, 2009

UPDATE PUBLIC RAPIDLEECH SERVERS

http://lx8.cc/rp/
http://sv2.ohay.info/
http://infraredtools.com/foxgen/
http://mccallbrewery.com/
http://milkyway.dnsprotect.com/~fewettne/rapid/
http://siamcafe2r.com/rapid/
http://rapidleech.gspvn.org/

hopster: bypass firewall - bypass proxy - http tunnel software

Bypass Firewall - Bypass Proxy - HTTP tunnel
Chat with your friends using your favourite applications: MSN, AOL, Yahoo Messenger, ICQ, Miranda, Trillian, mIRC... Wherever your friends are, hopster will bypass a censoring firewall and take you right to your buddies.

Browse, Surf, Download & Chat Anonymously
Hide your real IP address and protect yourself from nosy people and wannabe-hackers. With hopster, there's no way anyone will know where or who you are.

Try hopster for free!
Freedom is just five minutes away. With just little more than 1 MB, downloading hopster is just a matter of minutes. And it even configures itself - automatically. So, go get it! Demo version transfers files with 2 Kilobytes per second.

" It's the only one which has managed to bypass my network. "

Visit http://www.hopster.com