Friday, 7 June 2013

IP Masking



What is IP Masking? How to use Fake IP address?


What is Ip Masking?
IP masking is hiding your Original(Dynamic/Static) IP address so that you can not be traced. IP masking is using Fake IP address for your machine.


For Example, Let us assume your ip address is 173.23.22.212 and your location is xxxx.

Using IP masking, you can make your IP address is 202.102.12.123(fake IP Address) and your location becomes yyyy.

Using Proxy IP Address , you can hide your IP. Read this article : What is Proxy IP Address?

This can be achieved by the following methods:

Set Proxy IP Address in your Browser
Use IP hiding Tools
Web proxy(Eg: Flyproxy)


So won't i be traced now? The Answer is yes and No. It is depending on your anonymity level of your Proxy IP address.

Different Types of Anonymity Levels:
Transparent Proxy


This type of proxy server identifies itself as a proxy server and also makes the original IP address available through the http headers. These are generally used for their ability to cache websites and do not effectively provide any anonymity to those who use them. However, the use of a transparent proxy will get you around simple IP bans. They are transparent in the terms that your IP address is exposed, not transparent in the terms that you do not know that you are using it (your system is not specifically configured to use it.)

Anonymous Proxy
This type of proxy server indentifies itself as a proxy server, but does not make the original IP address available. This type of proxy server is detectable, but provides reasonable anonymity for most users.

Distorting Proxy
This type of proxy server identifies itself as a proxy server, but make an incorrect original IP address available through the http headers.

High Anonymity Proxy
This type of proxy server does not identify itself as a proxy server and does not make available the original IP address.

Related Posts:

  • XSS XSS[Behind the mask] What is XSS? Cross-site scripting (XSS) is a type of computer security vulnerability typically found in Web applications that enables attackers to inject client-side script into Web pages viewed by oth… Read More
  • Use Keyboard as Mouse Use Keyboard as Mouse  If your mouse is not working and you don't wish to wait till you get a new mouse, you would definitely like to know how you can use your keyboard as your mouse. It is easy to use your mouse as… Read More
  • ads free youtube Disable Ads on YouTube With This Simple Command There are a lot of ways to block ads, but with a simple command in the developer console, you can disable all ads on YouTube via an experiment. Google frequently … Read More
  • Top 6 Black Hat Hackers In The World Top 6 Black Hat Hackers In The World There are two types of hackers. First one are good hackers who are known as "white hat" hackers and another one which we will be talking about today are called "black hat" hack… Read More
  • SIMPLE way to see the password behind asterisks [NO SOFTWARE NEEDED] Tested with Firefox and ChromeAll you need to do is highlight and right click the password field of the target page, and click "Inspect Element".For something like Facebook, here's how it would look: Code: <input… Read More

0 comments:

Post a Comment