Archive for category Flash FXP

>To Speed up Windows XP

>

Best of all, most of them will cost you nothing.

1.) To decrease a system’s boot time and increase system performance, use the money you save by not buying defragmentation software — the built-in Windows defragmenter works just fine — and instead equip the computer with an Ultra-133 or Serial ATA hard drive with 8-MB cache buffer.

2.) If a PC has less than 512 MB of RAM, add more memory. This is a relatively inexpensive and easy upgrade that can dramatically improve system performance.

3.) Ensure that Windows XP is utilizing the NTFS file system. If you’re not sure, here’s how to check: First, double-click the My Computer icon, right-click on the C: Drive, then select Properties. Next, examine the File System type; if it says FAT32, then back-up any important data. Next, click Start, click Run, type CMD, and then click OK. At the prompt, type CONVERT C: /FS:NTFS and press the Enter key. This process may take a while; it’s important that the computer be uninterrupted and virus-free. The file system used by the bootable drive will be either FAT32 or NTFS. I highly recommend NTFS for its superior security, reliability, and efficiency with larger disk drives.

4.) Disable file indexing. The indexing service extracts information from documents and other files on the hard drive and creates a “searchable keyword index.” As you can imagine, this process can be quite taxing on any system.

The idea is that the user can search for a word, phrase, or property inside a document, should they have hundreds or thousands of documents and not know the file name of the document they want. Windows XP’s built-in search functionality can still perform these kinds of searches without the Indexing service. It just takes longer. The OS has to open each file at the time of the request to help find what the user is looking for.

Most people never need this feature of search. Those who do are typically in a large corporate environment where thousands of documents are located on at least one server. But if you’re a typical system builder, most of your clients are small and medium businesses. And if your clients have no need for this search feature, I recommend disabling it.

Here’s how: First, double-click the My Computer icon. Next, right-click on the C: Drive, then select Properties. Uncheck “Allow Indexing Service to index this disk for fast file searching.” Next, apply changes to “C: subfolders and files,” and click OK. If a warning or error message appears (such as “Access is denied”), click the Ignore All button.

5.) Update the PC’s video and motherboard chipset drivers. Also, update and configure the BIOS. For more information on how to configure your BIOS properly, see this article on my site.

6.) Empty the Windows Prefetch folder every three months or so. Windows XP can “prefetch” portions of data and applications that are used frequently. This makes processes appear to load faster when called upon by the user. That’s fine. But over time, the prefetch folder may become overloaded with references to files and applications no longer in use. When that happens, Windows XP is wasting time, and slowing system performance, by pre-loading them. Nothing critical is in this folder, and the entire contents are safe to delete.

7.) Once a month, run a disk cleanup. Here’s how: Double-click the My Computer icon. Then right-click on the C: drive and select Properties. Click the Disk Cleanup button — it’s just to the right of the Capacity pie graph — and delete all temporary files.

8.) In your Device Manager, double-click on the IDE ATA/ATAPI Controllers device, and ensure that DMA is enabled for each drive you have connected to the Primary and Secondary controller. Do this by double-clicking on Primary IDE Channel. Then click the Advanced Settings tab. Ensure the Transfer Mode is set to “DMA if available” for both Device 0 and Device 1. Then repeat this process with the Secondary IDE Channel.

speed Xp

9.) Upgrade the cabling. As hard-drive technology improves, the cabling requirements to achieve these performance boosts have become more stringent. Be sure to use 80-wire Ultra-133 cables on all of your IDE devices with the connectors properly assigned to the matching Master/Slave/Motherboard sockets. A single device must be at the end of the cable; connecting a single drive to the middle connector on a ribbon cable will cause signaling problems. With Ultra DMA hard drives, these signaling problems will prevent the drive from performing at its maximum potential. Also, because these cables inherently support “cable select,” the location of each drive on the cable is important. For these reasons, the cable is designed so drive positioning is explicitly clear.

10.) Remove all spyware from the computer. Use free programs such as AdAware by Lavasoft or SpyBot Search & Destroy. Once these programs are installed, be sure to check for and download any updates before starting your search. Anything either program finds can be safely removed. Any free software that requires spyware to run will no longer function once the spyware portion has been removed; if your customer really wants the program even though it contains spyware, simply reinstall it. For more information on removing Spyware visit this Web Pro News page.

11.) Remove any unnecessary programs and/or items from Windows Startup routine using the MSCONFIG utility. Here’s how: First, click Start, click Run, type MSCONFIG, and click OK. Click the StartUp tab, then uncheck any items you don’t want to start when Windows starts. Unsure what some items are? Visit the WinTasks Process Library. It contains known system processes, applications, as well as spyware references and explanations. Or quickly identify them by searching for the filenames using Google or another Web search engine.

12.) Remove any unnecessary or unused programs from the Add/Remove Programs section of the Control Panel.

13.) Turn off any and all unnecessary animations, and disable active desktop. In fact, for optimal performance, turn off all animations. Windows XP offers many different settings in this area. Here’s how to do it: First click on the System icon in the Control Panel. Next, click on the Advanced tab. Select the Settings button located under Performance. Feel free to play around with the options offered here, as nothing you can change will alter the reliability of the computer — only its responsiveness.

14.) If your customer is an advanced user who is comfortable editing their registry, try some of the performance registry tweaks offered at Tweak XP.

15.) Visit Microsoft’s Windows update site regularly, and download all updates labeled Critical. Download any optional updates at your discretion.

16.) Update the customer’s anti-virus software on a weekly, even daily, basis. Make sure they have only one anti-virus software package installed. Mixing anti-virus software is a sure way to spell disaster for performance and reliability.

17.) Make sure the customer has fewer than 500 type fonts installed on their computer. The more fonts they have, the slower the system will become. While Windows XP handles fonts much more efficiently than did the previous versions of Windows, too many fonts — that is, anything over 500 — will noticeably tax the system.

18.) Do not partition the hard drive. Windows XP’s NTFS file system runs more efficiently on one large partition. The data is no safer on a separate partition, and a reformat is never necessary to reinstall an operating system. The same excuses people offer for using partitions apply to using a folder instead. For example, instead of putting all your data on the D: drive, put it in a folder called “D drive.” You’ll achieve the same organizational benefits that a separate partition offers, but without the degradation in system performance. Also, your free space won’t be limited by the size of the partition; instead, it will be limited by the size of the entire hard drive. This means you won’t need to resize any partitions, ever. That task can be time-consuming and also can result in lost data.

19.) Check the system’s RAM to ensure it is operating properly. I recommend using a free program called MemTest86. The download will make a bootable CD or diskette (your choice), which will run 10 extensive tests on the PC’s memory automatically after you boot to the disk you created. Allow all tests to run until at least three passes of the 10 tests are completed. If the program encounters any errors, turn off and unplug the computer, remove a stick of memory (assuming you have more than one), and run the test again. Remember, bad memory cannot be repaired, but only replaced.

20.) If the PC has a CD or DVD recorder, check the drive manufacturer’s Web site for updated firmware. In some cases you’ll be able to upgrade the recorder to a faster speed. Best of all, it’s free.

21.) Disable unnecessary services. Windows XP loads a lot of services that your customer most likely does not need. To determine which services you can disable for your client, visit the Black Viper site for Windows XP configurations.

22.) If you’re sick of a single Windows Explorer window crashing and then taking the rest of your OS down with it, then follow this tip: open My Computer, click on Tools, then Folder Options. Now click on the View tab. Scroll down to “Launch folder windows in a separate process,” and enable this option. You’ll have to reboot your machine for this option to take effect.

23.) At least once a year, open the computer’s cases and blow out all the dust and debris. While you’re in there, check that all the fans are turning properly. Also inspect the motherboard capacitors for bulging or leaks. For more information on this leaking-capacitor phenomena, you can read numerous articles on my site.

Leave a comment

>To Speed up Windows XP

>

Best of all, most of them will cost you nothing.

1.) To decrease a system’s boot time and increase system performance, use the money you save by not buying defragmentation software — the built-in Windows defragmenter works just fine — and instead equip the computer with an Ultra-133 or Serial ATA hard drive with 8-MB cache buffer.

2.) If a PC has less than 512 MB of RAM, add more memory. This is a relatively inexpensive and easy upgrade that can dramatically improve system performance.

3.) Ensure that Windows XP is utilizing the NTFS file system. If you’re not sure, here’s how to check: First, double-click the My Computer icon, right-click on the C: Drive, then select Properties. Next, examine the File System type; if it says FAT32, then back-up any important data. Next, click Start, click Run, type CMD, and then click OK. At the prompt, type CONVERT C: /FS:NTFS and press the Enter key. This process may take a while; it’s important that the computer be uninterrupted and virus-free. The file system used by the bootable drive will be either FAT32 or NTFS. I highly recommend NTFS for its superior security, reliability, and efficiency with larger disk drives.

4.) Disable file indexing. The indexing service extracts information from documents and other files on the hard drive and creates a “searchable keyword index.” As you can imagine, this process can be quite taxing on any system.

The idea is that the user can search for a word, phrase, or property inside a document, should they have hundreds or thousands of documents and not know the file name of the document they want. Windows XP’s built-in search functionality can still perform these kinds of searches without the Indexing service. It just takes longer. The OS has to open each file at the time of the request to help find what the user is looking for.

Most people never need this feature of search. Those who do are typically in a large corporate environment where thousands of documents are located on at least one server. But if you’re a typical system builder, most of your clients are small and medium businesses. And if your clients have no need for this search feature, I recommend disabling it.

Here’s how: First, double-click the My Computer icon. Next, right-click on the C: Drive, then select Properties. Uncheck “Allow Indexing Service to index this disk for fast file searching.” Next, apply changes to “C: subfolders and files,” and click OK. If a warning or error message appears (such as “Access is denied”), click the Ignore All button.

5.) Update the PC’s video and motherboard chipset drivers. Also, update and configure the BIOS. For more information on how to configure your BIOS properly, see this article on my site.

6.) Empty the Windows Prefetch folder every three months or so. Windows XP can “prefetch” portions of data and applications that are used frequently. This makes processes appear to load faster when called upon by the user. That’s fine. But over time, the prefetch folder may become overloaded with references to files and applications no longer in use. When that happens, Windows XP is wasting time, and slowing system performance, by pre-loading them. Nothing critical is in this folder, and the entire contents are safe to delete.

7.) Once a month, run a disk cleanup. Here’s how: Double-click the My Computer icon. Then right-click on the C: drive and select Properties. Click the Disk Cleanup button — it’s just to the right of the Capacity pie graph — and delete all temporary files.

8.) In your Device Manager, double-click on the IDE ATA/ATAPI Controllers device, and ensure that DMA is enabled for each drive you have connected to the Primary and Secondary controller. Do this by double-clicking on Primary IDE Channel. Then click the Advanced Settings tab. Ensure the Transfer Mode is set to “DMA if available” for both Device 0 and Device 1. Then repeat this process with the Secondary IDE Channel.

speed Xp

9.) Upgrade the cabling. As hard-drive technology improves, the cabling requirements to achieve these performance boosts have become more stringent. Be sure to use 80-wire Ultra-133 cables on all of your IDE devices with the connectors properly assigned to the matching Master/Slave/Motherboard sockets. A single device must be at the end of the cable; connecting a single drive to the middle connector on a ribbon cable will cause signaling problems. With Ultra DMA hard drives, these signaling problems will prevent the drive from performing at its maximum potential. Also, because these cables inherently support “cable select,” the location of each drive on the cable is important. For these reasons, the cable is designed so drive positioning is explicitly clear.

10.) Remove all spyware from the computer. Use free programs such as AdAware by Lavasoft or SpyBot Search & Destroy. Once these programs are installed, be sure to check for and download any updates before starting your search. Anything either program finds can be safely removed. Any free software that requires spyware to run will no longer function once the spyware portion has been removed; if your customer really wants the program even though it contains spyware, simply reinstall it. For more information on removing Spyware visit this Web Pro News page.

11.) Remove any unnecessary programs and/or items from Windows Startup routine using the MSCONFIG utility. Here’s how: First, click Start, click Run, type MSCONFIG, and click OK. Click the StartUp tab, then uncheck any items you don’t want to start when Windows starts. Unsure what some items are? Visit the WinTasks Process Library. It contains known system processes, applications, as well as spyware references and explanations. Or quickly identify them by searching for the filenames using Google or another Web search engine.

12.) Remove any unnecessary or unused programs from the Add/Remove Programs section of the Control Panel.

13.) Turn off any and all unnecessary animations, and disable active desktop. In fact, for optimal performance, turn off all animations. Windows XP offers many different settings in this area. Here’s how to do it: First click on the System icon in the Control Panel. Next, click on the Advanced tab. Select the Settings button located under Performance. Feel free to play around with the options offered here, as nothing you can change will alter the reliability of the computer — only its responsiveness.

14.) If your customer is an advanced user who is comfortable editing their registry, try some of the performance registry tweaks offered at Tweak XP.

15.) Visit Microsoft’s Windows update site regularly, and download all updates labeled Critical. Download any optional updates at your discretion.

16.) Update the customer’s anti-virus software on a weekly, even daily, basis. Make sure they have only one anti-virus software package installed. Mixing anti-virus software is a sure way to spell disaster for performance and reliability.

17.) Make sure the customer has fewer than 500 type fonts installed on their computer. The more fonts they have, the slower the system will become. While Windows XP handles fonts much more efficiently than did the previous versions of Windows, too many fonts — that is, anything over 500 — will noticeably tax the system.

18.) Do not partition the hard drive. Windows XP’s NTFS file system runs more efficiently on one large partition. The data is no safer on a separate partition, and a reformat is never necessary to reinstall an operating system. The same excuses people offer for using partitions apply to using a folder instead. For example, instead of putting all your data on the D: drive, put it in a folder called “D drive.” You’ll achieve the same organizational benefits that a separate partition offers, but without the degradation in system performance. Also, your free space won’t be limited by the size of the partition; instead, it will be limited by the size of the entire hard drive. This means you won’t need to resize any partitions, ever. That task can be time-consuming and also can result in lost data.

19.) Check the system’s RAM to ensure it is operating properly. I recommend using a free program called MemTest86. The download will make a bootable CD or diskette (your choice), which will run 10 extensive tests on the PC’s memory automatically after you boot to the disk you created. Allow all tests to run until at least three passes of the 10 tests are completed. If the program encounters any errors, turn off and unplug the computer, remove a stick of memory (assuming you have more than one), and run the test again. Remember, bad memory cannot be repaired, but only replaced.

20.) If the PC has a CD or DVD recorder, check the drive manufacturer’s Web site for updated firmware. In some cases you’ll be able to upgrade the recorder to a faster speed. Best of all, it’s free.

21.) Disable unnecessary services. Windows XP loads a lot of services that your customer most likely does not need. To determine which services you can disable for your client, visit the Black Viper site for Windows XP configurations.

22.) If you’re sick of a single Windows Explorer window crashing and then taking the rest of your OS down with it, then follow this tip: open My Computer, click on Tools, then Folder Options. Now click on the View tab. Scroll down to “Launch folder windows in a separate process,” and enable this option. You’ll have to reboot your machine for this option to take effect.

23.) At least once a year, open the computer’s cases and blow out all the dust and debris. While you’re in there, check that all the fans are turning properly. Also inspect the motherboard capacitors for bulging or leaks. For more information on this leaking-capacitor phenomena, you can read numerous articles on my site.

Leave a comment

>Windows Xp Tips

>

 
Here’s how to check if your copy of XP is Activated

Go to the run box and type in  oobe/msoobe /a
and hit ok …theirs your answer
Windows Explorer Tip

When launched in Windows Millennium/Win2k/WinXP,Explorer by default will open the “My Documents” folder. Many people prefer the behavior from previous versions of Windows, where Windows Explorer would open and display “My Computer” instead of the new way. To revert to the old way [My Computer by default rather than My Documents as the default], simply edit the shortcut to Windows Explorer, by right clicking on it, and left clicking “Properties” and changing the “Target” box to: “C:\WINDOWS\EXPLORER.EXE /n,/e,” [adjust the path/drive letter if needed]. The key is to add the “/n,/e,” to the end of the shortcut (don’t type the quotes).
Backup your Fresh install
After you complete your clean install and get all your software installed I would recommend that you use something like Drive Image 3 or 4 to do an image of your install partition, then burn the image to CD and keep it. XP is a different creature for some people. If you mess it up when playing around with it, just bring the image back. You can be up and running again in 20 minutes vs. the two to three hours it will take to get the whole thing and all your stuff installed again.
Note the default install of XP is about 1.5gigs and the DI image may be larger that 700 meg. So don’t install too much on the OS partition. To help downsize the Image I run the System file checker and reset the cache size to 40 or 50 meg (It’s well over 300 by default).
To run it open the command prop and type:
SFC /?
SFC /purgecache
SFC /cachesize=50
and finally rebuild the cache with SFC /scannow (have the CD ready)
I also Delete the Pagefile.sys and hibernate.sys files before running Drive Image..

  • 1.When setting up the system with tweaks or making changes to the core OS or hardware always be logged in as administrator. Seems that while XP does create an account upon install that has administrator privileges, its not the same as the administrator account is. Think about it this way – if the account created was the same then why have an administrator account period?

  • 2.It is always better to install winXP clean than to do an upgrade.

  • 3. The files and settings wizard is your friend. However it doesn’t save the account passwords for your e-mail and news groups accounts in OE. Export these accounts manually from within OE first before hand and save them in a safe place. This way you will not need to remember what the account info was, just import the account again.

  • Xp Ttweak Tips

  • 4. If using a SB Live sound card and trying to run Unreal (the game) you may have some problems. This is not the fault of winXP or Unreal. the problem is a bad driver design from creative and the Devloader portion. There is currently no work around for this problem.

  • 5. Many – many games do run in winXP with comparability mode. The easiest way to do this is to simply create a shortcut on the desktop to the game executable and choose the compatibility tab of the shortcut and set up for win98.

  • 6. Do not disable all the services that you find outlined in the win2K tweak guides floating around. Instead set them to manual instead of disabled. This will allow something to start up when it is needed and you’ll avoid the BSOD thing that can occur if something gets disabled that wasn’t supposed to.

  • 7. The winXP firewall is actually very good. However it is not very configurable. I would recommend tiny personal firewall from http://www.tinysoftware.com. <http://www.tinysoftware.com.> It free and all you need. It so far is the most compatible with winXP – why you may ask? – because (little known trivia fun fact here) this is where the winXP firewall came from. Both the XP built in firewall and tiny will give complete stealth. However what you can do – which is kind of cool is divide the work between the two and use both. use tiny to just filter the ports you want to filter instead of everything and let the built in XP firewall take care of the rest. The result is a smoother running firewall system that reacts much more quickly. I’ve used Nortons , zone alarm (which contrary to popular belief is not a real firewall and a joke in the IT community as a whole) and several of the rest, Tiny has been the best so far.

  • 8. After you complete your clean install and get all your software installed I would recommend that you use something like drive image 4 to do an image of your install partition, then burn the image to CD and keep it. XP is a different creature for some people. If you mess it up when playing around with it, just bring the image back. You can be up and running again in 20 minutes vs. the two to three hours it will take to get the whole thing and all your stuff installed again.

    Sony Alpha NEX NEX5K/B Digital Camera with Interchangeable Lens (Black)Sony DSLR NEX5ASK1 NEX-5A 14.2MP Digital Camera; 16mm 2.8 & 18-55 Lenses Silver 

  • 9. choose winXP pro over the personal version because it has more bells and whistles. However if the bells and whistles do not appeal to you then the home (personal) version is the way to go.

  • 10. Avoid problems with WinXP. Insure that your hardware is on the HCL. Don’t be mad because the latest and greatest doesn’t work with your hardware. It is not the fault of MS , winXP or anything or one else. Not defending them here, just being practical. Look at it this way – if your dream car costs $100,000 dollars and you don’t have $100,000 is it the car manufactures fault? nope because thats the free enterprise system and the way it works. Try to upgrade your hardware if you can. If you can’t, wait for drivers from the manufacturer that support winxp. I would highly recommend before installing winXP that you go out and get the win2000 drivers for all your hardware. 99% of the win2000 drivers will work in winXP. This way if winxp doesn’t have drivers, you do.

    NEW US Laptop Keyboard for Dell Inspiron 700M J5538Sony Alpha A230Y 10.2 MP Digital SLR Camera with Super SteadyShot INSIDE Image Stabilization and 18-55mm and 55-200mm Lenses 

Leave a comment

>Windows Xp Tips

>

 
Here’s how to check if your copy of XP is Activated

Go to the run box and type in  oobe/msoobe /a
and hit ok …theirs your answer
Windows Explorer Tip

When launched in Windows Millennium/Win2k/WinXP,Explorer by default will open the “My Documents” folder. Many people prefer the behavior from previous versions of Windows, where Windows Explorer would open and display “My Computer” instead of the new way. To revert to the old way [My Computer by default rather than My Documents as the default], simply edit the shortcut to Windows Explorer, by right clicking on it, and left clicking “Properties” and changing the “Target” box to: “C:\WINDOWS\EXPLORER.EXE /n,/e,” [adjust the path/drive letter if needed]. The key is to add the “/n,/e,” to the end of the shortcut (don’t type the quotes).
Backup your Fresh install
After you complete your clean install and get all your software installed I would recommend that you use something like Drive Image 3 or 4 to do an image of your install partition, then burn the image to CD and keep it. XP is a different creature for some people. If you mess it up when playing around with it, just bring the image back. You can be up and running again in 20 minutes vs. the two to three hours it will take to get the whole thing and all your stuff installed again.
Note the default install of XP is about 1.5gigs and the DI image may be larger that 700 meg. So don’t install too much on the OS partition. To help downsize the Image I run the System file checker and reset the cache size to 40 or 50 meg (It’s well over 300 by default).
To run it open the command prop and type:
SFC /?
SFC /purgecache
SFC /cachesize=50
and finally rebuild the cache with SFC /scannow (have the CD ready)
I also Delete the Pagefile.sys and hibernate.sys files before running Drive Image..

  • 1.When setting up the system with tweaks or making changes to the core OS or hardware always be logged in as administrator. Seems that while XP does create an account upon install that has administrator privileges, its not the same as the administrator account is. Think about it this way – if the account created was the same then why have an administrator account period?

  • 2.It is always better to install winXP clean than to do an upgrade.

  • 3. The files and settings wizard is your friend. However it doesn’t save the account passwords for your e-mail and news groups accounts in OE. Export these accounts manually from within OE first before hand and save them in a safe place. This way you will not need to remember what the account info was, just import the account again.

  • Xp Ttweak Tips

  • 4. If using a SB Live sound card and trying to run Unreal (the game) you may have some problems. This is not the fault of winXP or Unreal. the problem is a bad driver design from creative and the Devloader portion. There is currently no work around for this problem.

  • 5. Many – many games do run in winXP with comparability mode. The easiest way to do this is to simply create a shortcut on the desktop to the game executable and choose the compatibility tab of the shortcut and set up for win98.

  • 6. Do not disable all the services that you find outlined in the win2K tweak guides floating around. Instead set them to manual instead of disabled. This will allow something to start up when it is needed and you’ll avoid the BSOD thing that can occur if something gets disabled that wasn’t supposed to.

  • 7. The winXP firewall is actually very good. However it is not very configurable. I would recommend tiny personal firewall from http://www.tinysoftware.com. <http://www.tinysoftware.com.> It free and all you need. It so far is the most compatible with winXP – why you may ask? – because (little known trivia fun fact here) this is where the winXP firewall came from. Both the XP built in firewall and tiny will give complete stealth. However what you can do – which is kind of cool is divide the work between the two and use both. use tiny to just filter the ports you want to filter instead of everything and let the built in XP firewall take care of the rest. The result is a smoother running firewall system that reacts much more quickly. I’ve used Nortons , zone alarm (which contrary to popular belief is not a real firewall and a joke in the IT community as a whole) and several of the rest, Tiny has been the best so far.

  • 8. After you complete your clean install and get all your software installed I would recommend that you use something like drive image 4 to do an image of your install partition, then burn the image to CD and keep it. XP is a different creature for some people. If you mess it up when playing around with it, just bring the image back. You can be up and running again in 20 minutes vs. the two to three hours it will take to get the whole thing and all your stuff installed again.

    Sony Alpha NEX NEX5K/B Digital Camera with Interchangeable Lens (Black)Sony DSLR NEX5ASK1 NEX-5A 14.2MP Digital Camera; 16mm 2.8 & 18-55 Lenses Silver 

  • 9. choose winXP pro over the personal version because it has more bells and whistles. However if the bells and whistles do not appeal to you then the home (personal) version is the way to go.

  • 10. Avoid problems with WinXP. Insure that your hardware is on the HCL. Don’t be mad because the latest and greatest doesn’t work with your hardware. It is not the fault of MS , winXP or anything or one else. Not defending them here, just being practical. Look at it this way – if your dream car costs $100,000 dollars and you don’t have $100,000 is it the car manufactures fault? nope because thats the free enterprise system and the way it works. Try to upgrade your hardware if you can. If you can’t, wait for drivers from the manufacturer that support winxp. I would highly recommend before installing winXP that you go out and get the win2000 drivers for all your hardware. 99% of the win2000 drivers will work in winXP. This way if winxp doesn’t have drivers, you do.

    NEW US Laptop Keyboard for Dell Inspiron 700M J5538Sony Alpha A230Y 10.2 MP Digital SLR Camera with Super SteadyShot INSIDE Image Stabilization and 18-55mm and 55-200mm Lenses 

Leave a comment

Anonymity Proxy Servers

Anonymity
I can see you hiding in the shadows over there and so can the logs of all the web sites, FTP servers and other nooks and crannies you visit on the web. The sort of information gathered by these logs and which is available to the webmasters of the sites you visit include the address of the previous site you visited, your IP address, your computer’s ID name, your physical location and the name of your ISP along with less personal details such as the operating system you’re using and your screen resolution. If someone was snooping through your dustbin to gather information on consumer trends or tracking your every move to see where it is you go everyday you wouldn’t be too chuffed would you. Well the web is no different, it’s still an invasion of privacy and a threat to security and you don’t have to put up with it.
Proxy servers:
Every time you visit a web site, detailed information about your system is automatically provided to the webmaster. This information can be used by hackers to exploit your computer or can be forwarded to the market research departments of consumer corporations who by tracking your activities on the internet are better equipped to direct more relevant spam at you. Your best defence against this is to use what is known as a proxy server, which will hide revealing information from the web sites you visit, allowing you to surf the web anonymously. These work by altering the way in which your browser retrieves web pages or connects to remote servers. With a proxy server set up, whenever you ‘ask’ IE or Netscape to look at a web page, the request is first sent through an external server which is completely independent of your ISP’s servers. This third party server then does the requesting on your behalf so that it appears that the request came from them rather than you and your real IP address is never disclosed to the sites you visit. There is nothing to download and the whole process takes less than a minute.
There are two different ways to use proxy servers and both have their advantages and disadvantages. The first method is to use a web based service. What this involves is visiting the proxy’s home page each time you want to browse a web site anonymously. The core component of such a system is the dialog box where you enter the address of the web site you want to visit. Each time you enter the URL of the site you want to browse via the proxy into this box, your personal information, IP address and so on is first encrypted before being sent to the site allowing you to maintain your anonymity. Two of the best examples of this type of web based proxy service are Code:
hxxp://www.rewebber.com/
and hxxp://www.anonymizer.com/.
Obviously one disadvantage of using a web based service like Rewebber or Anonymizer, however, is that you have to visit the proxies home page each time you want to surf anonymously. You could choose to select this page as your default home page, but it’s still quite awkward if you’re forever site hopping at the speed of light. The second main ‘con’ is that you often have to put up with extra adverts on the pages you visit. These are automatically inserted into the pages by the proxy – they have to pay for service somehow. More sophisticated and convenient solutions are also on offer yet they come with a price tag.
The second method you can use to protect your privacy via a proxy server involves adjusting the settings of your web browser so that you can surf anonymously without having to visit the home page of your proxy each time. To do this you will first need to know the name of your proxy server and the port number it uses. This information can be gleaned from either a public proxy server list or the FAQ referring to a private subscription based service. Once you have the name of the proxy server you wish to use, select ‘Internet Options’ from the ‘Tools’ menu of your browser. Now select ‘Connections’ followed by ‘Settings’ and tick the ‘use a proxy server’ check box. To finish the job all you have to do now is enter the name of the server in the ‘address’ box, the port which it uses in the ‘port’ box and go forth and surf anonymously.
Free, manual proxy servers as advertised on anonymity sites, if you can find one at all, are likely to be highly oversubscribed, and as a result the speed at which they retrieve web pages can deteriorate. In which case you can go in pursuit of a public proxy server list and select an alternative from it, which can then be set up manually. To locate such a list you can investigate sites such as Code:
hxxp://www.proxys4all.com/
however, this method isn’t problem free either, so before you get too carried away and go jumping on the anonymity bandwagon there are a few things you should be aware of. It’s very easy to use proxies to protect your privacy, but often the disadvantages of using them far out weigh the benefits. You see, the problem is that, like the proxy servers provided Rewebber et al, free, public proxies are nearly all over subscribed and so they can slow down web browsing considerably. Digging out fast reliable proxy servers is an art form in itself and is a skill which takes considerable practice. You could find a list of public proxy servers and then experiment with each one until you find one that runs at a reasonable speed, but this can be very time consuming and frustrating. Instead, your search would be much more efficient if you got a dedicated program to carry out this task for you. There are literally dozens of proxy seeking programs around which can do just that, and many of them are available as freeware. What these do is scan the Internet for public proxy servers. These servers are then tested for speed and anonymity (not all of them are truly anonymous, even if they claim to be!) and once you find one which suits your requirements you can select it as your default proxy with the click of a button.
One of the most significant advantages of using an automated tool to locate proxy servers is that you do not have to keep editing your proxy settings manually each time you wish to try out a new one. Instead, what you do is enter ‘localhost’ or ‘127.0.0.1’ into the ‘address’ box and ‘8088’ into the ‘port’ box of your browser’s proxy settings menu and then forget about it. All future proxy switching is then orchestrated from within your proxy seeking software, which subsequently relays the information to your browser or whatever type of application you are attempting to make anonymous. For those of you who are curious ‘localhost’ and the IP address ‘127.0.0.1’ are the names by which every computer on the Internet refers to itself.
Here’s a good selection of links, which should help you to get started – Code:
hxxp://www.a4proxy.com/ Anonymity 4 Proxy
hxxp://www.helgasoft.com/hiproxy/ Hi Proxy
hxxp://www.proxy-verifier.com/ Proxy Verifier
hxxp://www.photono-software.de/ Stealther.
You may find that even when using these programs you have difficulty finding good proxy servers. It is for this reason that many people choose only to use proxy servers temporarily whilst doing something which may land them in trouble with their ISP, or in a worst case scenario with the law. The most obvious example of a situation in which you would want to cover your tracks is when scanning for public FTP servers and subsequently uploading to them. Most other net activities are unlikely to incur serious consequences so under these circumstances you can safely surf the web without a proxy. If you’re really serious about protecting your privacy, however, your best bet is probably to invest in a dedicated, stable proxy such as the ones offered by Code:
hxxp://www.ultimate-anonymity.com/ Ultimate Anonymity
These aren’t free, but may be worth the expense if you aren’t keen on continuously switching proxy servers.
Before splashing out though it may be worth checking if your current ISP has a proxy server of its own which you can use. These aren’t there to help you to commit cyber crimes and get away with it, they actually have a legitimate purpose as well – otherwise they wouldn’t exist. You see, proxy servers were originally designed to help speed up web page loading times. Proxy servers contain a cache of all the web pages which have been requested via the browsers of the people using the proxy. When someone surfs the web using a proxy, the proxy first checks to see if it already has a copy of the web page stored in its cache. If this version of the page is bang up to date, it is sent to your computer and appears in your browser. If the page found in the cache of the proxy server is older than the one stored on the server hosting the page, a new request to the web server is made and the page is updated in the cache of the proxy before being sent to you. Because these servers use very fast internet connections they can retrieve web pages at much greater speeds than you can via your modest home setup. If these servers are located physically nearer to your home than the web host servers you wish to retrieve web pages from, the speed at which you browse the web will be accelerated.
Anonymity – Cookies
One last important point you need to be aware of before jumping in with both feet is that different programs have to be setup in different ways before being able to make external connections via a proxy server. For example, you can surf the web anonymously by modifying the settings in Internet Explorer or Netscape Navigator as explained earlier in this tutorial, but this will only affect your browser. If you then used Flash FXP to copy a batch of 0-day releases from one FTP server to another, this isn’t going to protect you in the slightest. What you have to do is enter the name of the proxy server into each application you wish to make anonymous before making any external connections. This can usually be done by browsing through the preferences of your program to see if there is a ‘use proxy server’ option available. If there is, make sure you use it!
Cookies:
You have little to fear from the edible variety, but the digital ones can be a major threat to your security and privacy. A cookie is a tiny text file (usually less than 1KB in size), which is created and stored on your hard drive whenever you visit a dynamic (or an interactive if you like) web site. These are used to log your personal details so that you can access members only areas of web sites without having to type in a password every time, or to retain your customised settings so that they are available the next time you visit. If you’re using a shared computer, anyone who visits the same site that you have previously logged in to can access your accounts. This is particularly worrying if you have entered your credit card details into a form on an e-commerce site. If your browser is set to automatically fill in these details whenever you
return to a previously visited site, this information could be clearly visible – you don’t need me to explain the problems this could entail.
The solution to this problem is to delete any cookies which contain sensitive data once you have completed your transactions. Your cookies will be stored in a different place depending on which operating system you are using so you will have to use your detective skills to find them. As an example, in Windows XP they are located in your ‘c:\Documents and Settings\Kylie Minogue\Cookies’ directory (that is if your name is Kylie Minogue. Mine isn’t in case you’re wondering!). If you look in this directory, in some cases it is easy to identify which cookie is associated with which web site, but in other cases it’s not so obvious. The cookie which was created when you visited Yahoo.com to check your email may be called kylie minogue@yahoo.txt for example. Unfortunately some cookies refer to the IP address of the site you visited and so look more like kylie minogue@145.147.25.21. These cookies can be selectively deleted one at a time if it’s obvious which ones are causing a threat to your security, or you can just wipe out the whole lot in one fell swoop and have them recreated as and when they are required. However, if
you’re really struggling to find your cookie jar, you could delete your cookies via your browser’s tool bar instead. In Internet Explorer this can be done through the ‘Tools’ &gt; ‘Internet Options’ menu items.
If all this sounds like too much hassle, you can always find a labour saving program which will be happy to take the job off your hands. These ‘cookie crunching’ programs allow you to be more selective when editing, viewing and deleting cookies from your system, and some of them will even prevent cookies from being created in the first place. Yes, I know you’re hungry for links so I won’t deprive you. Have a look here – Code:
hxxp://www.rbaworld.com/Programs/CookieCruncher/ Cookie
Cruncher
hxxp://www.thelimitsoft.com/ Cookie Crusher
hxxp://www.angove.com/ Cookie Killer
hxxp://www.kburra.com/ Cookie Pal
and
hxxp://www.cookiecentral.com/ Cookie Web Kit.
I can see you hiding in the shadows over there and so can the logs of all the web sites, FTP servers and other nooks and crannies you visit on the web. The sort of information gathered by these logs and which is available to the webmasters of the sites you visit include the address of the previous site you visited, your IP address, your computer’s ID name, your physical location and the name of your ISP along with less personal details such as the operating system you’re using and your screen resolution. If someone was snooping through your dustbin to gather information on consumer trends or tracking your every move to see where it is you go everyday you wouldn’t be too chuffed would you. Well the web is no different, it’s still an invasion of privacy and a threat to security and you don’t have to put up with it.
Proxy servers:
Every time you visit a web site, detailed information about your system is automatically provided to the webmaster. This information can be used by hackers to exploit your computer or can be forwarded to the market research departments of consumer corporations who by tracking your activities on the internet are better equipped to direct more relevant spam at you. Your best defense against this is to use what is known as a proxy server, which will hide revealing information from the web sites you visit, allowing you to surf the web anonymously. These work by altering the way in which your browser retrieves web pages or connects to remote servers. With a proxy server set up, whenever you ‘ask’ IE or Netscape to look at a web page, the request is first sent through an external server which is completely independent of your ISP’s servers. This third party server then does the requesting on your behalf so that it appears that the request came from them rather than you and your real IP address is never disclosed to the sites you visit. There is nothing to download and the whole process takes less than a minute.
There are two different ways to use proxy servers and both have their advantages and disadvantages. The first method is to use a web based service. What this involves is visiting the proxy’s home page each time you want to browse a web site anonymously. The core component of such a system is the dialog box where you enter the address of the web site you want to visit. Each time you enter the URL of the site you want to browse via the proxy into this box, your personal information, IP address and so on is first encrypted before being sent to the site allowing you to maintain your anonymity. Two of the best examples of this type of web based proxy service are Code:
hxxp://www.rewebber.com/
and hxxp://www.anonymizer.com/.
Obviously one disadvantage of using a web based service like Rewebber or Anonymizer, however, is that you have to visit the proxies home page each time you want to surf anonymously. You could choose to select this page as your default home page, but it’s still quite awkward if you’re forever site hopping at the speed of light. The second main ‘con’ is that you often have to put up with extra adverts on the pages you visit. These are automatically inserted into the pages by the proxy – they have to pay for service somehow. More sophisticated and convenient solutions are also on offer yet they come with a price tag.
The second method you can use to protect your privacy via a proxy server involves adjusting the settings of your web browser so that you can surf anonymously without having to visit the home page of your proxy each time. To do this you will first need to know the name of your proxy server and the port number it uses. This information can be gleaned from either a public proxy server list or the FAQ referring to a private subscription based service. Once you have the name of the proxy server you wish to use, select ‘Internet Options’ from the ‘Tools’ menu of your browser. Now select ‘Connections’ followed by ‘Settings’ and tick the ‘use a proxy server’ check box. To finish the job all you have to do now is enter the name of the server in the ‘address’ box, the port which it uses in the ‘port’ box and go forth and surf anonymously.
Free, manual proxy servers as advertised on anonymity sites, if you can find one at all, are likely to be highly oversubscribed, and as a result the speed at which they retrieve web pages can deteriorate. In which case you can go in pursuit of a public proxy server list and select an alternative from it, which can then be set up manually. To locate such a list you can investigate sites such as Code:
hxxp://www.proxys4all.com/
however, this method isn’t problem free either, so before you get too carried away and go jumping on the anonymity bandwagon there are a few things you should be aware of. It’s very easy to use proxies to protect your privacy, but often the disadvantages of using them far out weigh the benefits. You see, the problem is that, like the proxy servers provided Rewebber et al, free, public proxies are nearly all over subscribed and so they can slow down web browsing considerably. Digging out fast reliable proxy servers is an art form in itself and is a skill which takes considerable practice. You could find a list of public proxy servers and then experiment with each one until you find one that runs at a reasonable speed, but this can be very time consuming and frustrating. Instead, your search would be much more efficient if you got a dedicated program to carry out this task for you. There are literally dozens of proxy seeking programs around which can do just that, and many of them are available as freeware. What these do is scan the internet for public proxy servers. These servers are then tested for speed and anonymity (not all of them are truly anonymous, even if they claim to be!) and once you find one which suits your requirements you can select it as your default proxy with the click of a button.
One of the most significant advantages of using an automated tool to locate proxy servers is that you do not have to keep editing your proxy settings manually each time you wish to try out a new one. Instead, what you do is enter ‘localhost’ or ‘127.0.0.1’ into the ‘address’ box and ‘8088’ into the ‘port’ box of your browser’s proxy settings menu and then forget about it. All future proxy switching is then orchestrated from within your proxy seeking software, which subsequently relays the information to your browser or whatever type of application you are attempting to make anonymous. For those of you who are curious ‘localhost’ and the IP address ‘127.0.0.1’ are the names by which every computer on the internet refers to itself.
Here’s a good selection of links, which should help you to get started – Code:
hxxp://www.a4proxy.com/ Anonymity 4 Proxy
hxxp://www.helgasoft.com/hiproxy/ Hi Proxy
hxxp://www.proxy-verifier.com/ Proxy Verifier
hxxp://www.photono-software.de/ Stealther.
You may find that even when using these programs you have difficulty finding good proxy servers. It is for this reason that many people choose only to use proxy servers temporarily whilst doing something which may land them in trouble with their ISP, or in a worst case scenario with the law. The most obvious example of a situation in which you would want to cover your tracks is when scanning for public FTP servers and subsequently uploading to them. Most other net activities are unlikely to incur serious consequences so under these circumstances you can safely surf the web without a proxy. If you’re really serious about protecting your privacy, however, your best bet is probably to invest in a dedicated, stable proxy such as the ones offered by Code:
hxxp://www.ultimate-anonymity.com/ Ultimate Anonymity
These aren’t free, but may be worth the expense if you aren’t keen on continuously switching proxy servers.
Before splashing out though it may be worth checking if your current ISP has a proxy server of its own which you can use. These aren’t there to help you to commit cyber crimes and get away with it, they actually have a legitimate purpose as well – otherwise they wouldn’t exist. You see, proxy servers were originally designed to help speed up web page loading times. Proxy servers contain a cache of all the web pages which have been requested via the browsers of the people using the proxy. When someone surfs the web using a proxy, the proxy first checks to see if it already has a copy of the web page stored in its cache. If this version of the page is bang up to date, it is sent to your computer and appears in your browser. If the page found in the cache of the proxy server is older than the one stored on the server hosting the page, a new request to the web server is made and the page is updated in the cache of the proxy before being sent to you. Because these servers use very fast internet connections they can retrieve web pages at much greater speeds than you can via your modest home setup. If these servers are located physically nearer to your home than the web host servers you wish to retrieve web pages from, the speed at which you browse the web will be accelerated.
Cookies
One last important point you need to be aware of before jumping in with both feet is that different programs have to be setup in different ways before being able to make external connections via a proxy server. For example, you can surf the web anonymously by modifying the settings in Internet Explorer or Netscape Navigator as explained earlier in this tutorial, but this will only affect your browser. If you then used Flash FXP to copy a batch of 0-day releases from one FTP server to another, this isn’t going to protect you in the slightest. What you have to do is enter the name of the proxy server into each application you wish to make anonymous before making any external connections. This can usually be done by browsing through the preferences of your program to see if there is a ‘use proxy server’ option available. If there is, make sure you use it!
Cookies:
You have little to fear from the edible variety, but the digital ones can be a major threat to your security and privacy. A cookie is a tiny text file (usually less than 1kb in size), which is created and stored on your hard drive whenever you visit a dynamic (or an interactive if you like) web site. These are used to log your personal details so that you can access members only areas of web sites without having to type in a password every time, or to retain your customised settings so that they are available the next time you visit. If you’re using a shared computer, anyone who visits the same site that you have previously logged in to can access your accounts. This is particularly worrying if you have entered your credit card details into a form on an e-commerce site. If your browser is set to automatically fill in these details whenever you
return to a previously visited site, this information could be clearly visible – you don’t need me to explain the problems this could entail.
The solution to this problem is to delete any cookies which contain sensitive data once you have completed your transactions. Your cookies will be stored in a different place depending on which operating system you are using so you will have to use your detective skills to find them. As an example, in Windows XP they are located in your ‘c:\Documents and Settings\Kylie Minogue\Cookies’ directory (that is if your name is Kylie Minogue. Mine isn’t in case you’re wondering!). If you look in this directory, in some cases it is easy to identify which cookie is associated with which web site, but in other cases it’s not so obvious. The cookie which was created when you visited Yahoo.com to check your email may be called kylie minogue@yahoo.txt for example. Unfortunately some cookies refer to the IP address of the site you visited and so look more like kylie minogue@145.147.25.21. These cookies can be selectively deleted one at a time if it’s obvious which ones are causing a threat to your security, or you can just wipe out the whole lot in one fell swoop and have them recreated as and when they are required. However, if
you’re really struggling to find your cookie jar, you could delete your cookies via your browser’s tool bar instead. In Internet Explorer this can be done through the ‘Tools’ &gt; ‘Internet Options’ menu items.
If all this sounds like too much hassle, you can always find a labour saving program which will be happy to take the job off your hands. These ‘cookie crunching’ programs allow you to be more selective when editing, viewing and deleting cookies from your system, and some of them will even prevent cookies from being created in the first place. Yes, I know you’re hungry for links so I won’t deprive you. Have a look here – Code:
hxxp://www.rbaworld.com/Programs/CookieCruncher/ Cookie
Cruncher
hxxp://www.thelimitsoft.com/ Cookie Crusher
hxxp://www.angove.com/ Cookie Killer
hxxp://www.kburra.com/ Cookie Pal
and
hxxp://www.cookiecentral.com/ Cookie Web Kit.

Leave a comment

>Anonymity Proxy Servers

>

Anonymity
I can see you hiding in the shadows over there and so can the logs of all the web sites, FTP servers and other nooks and crannies you visit on the web. The sort of information gathered by these logs and which is available to the webmasters of the sites you visit include the address of the previous site you visited, your IP address, your computer’s ID name, your physical location and the name of your ISP along with less personal details such as the operating system you’re using and your screen resolution. If someone was snooping through your dustbin to gather information on consumer trends or tracking your every move to see where it is you go everyday you wouldn’t be too chuffed would you. Well the web is no different, it’s still an invasion of privacy and a threat to security and you don’t have to put up with it.
Proxy servers:
Every time you visit a web site, detailed information about your system is automatically provided to the webmaster. This information can be used by hackers to exploit your computer or can be forwarded to the market research departments of consumer corporations who by tracking your activities on the internet are better equipped to direct more relevant spam at you. Your best defence against this is to use what is known as a proxy server, which will hide revealing information from the web sites you visit, allowing you to surf the web anonymously. These work by altering the way in which your browser retrieves web pages or connects to remote servers. With a proxy server set up, whenever you ‘ask’ IE or Netscape to look at a web page, the request is first sent through an external server which is completely independent of your ISP’s servers. This third party server then does the requesting on your behalf so that it appears that the request came from them rather than you and your real IP address is never disclosed to the sites you visit. There is nothing to download and the whole process takes less than a minute.
There are two different ways to use proxy servers and both have their advantages and disadvantages. The first method is to use a web based service. What this involves is visiting the proxy’s home page each time you want to browse a web site anonymously. The core component of such a system is the dialog box where you enter the address of the web site you want to visit. Each time you enter the URL of the site you want to browse via the proxy into this box, your personal information, IP address and so on is first encrypted before being sent to the site allowing you to maintain your anonymity. Two of the best examples of this type of web based proxy service are Code:
hxxp://www.rewebber.com/
and hxxp://www.anonymizer.com/.
Obviously one disadvantage of using a web based service like Rewebber or Anonymizer, however, is that you have to visit the proxies home page each time you want to surf anonymously. You could choose to select this page as your default home page, but it’s still quite awkward if you’re forever site hopping at the speed of light. The second main ‘con’ is that you often have to put up with extra adverts on the pages you visit. These are automatically inserted into the pages by the proxy – they have to pay for service somehow. More sophisticated and convenient solutions are also on offer yet they come with a price tag.
The second method you can use to protect your privacy via a proxy server involves adjusting the settings of your web browser so that you can surf anonymously without having to visit the home page of your proxy each time. To do this you will first need to know the name of your proxy server and the port number it uses. This information can be gleaned from either a public proxy server list or the FAQ referring to a private subscription based service. Once you have the name of the proxy server you wish to use, select ‘Internet Options’ from the ‘Tools’ menu of your browser. Now select ‘Connections’ followed by ‘Settings’ and tick the ‘use a proxy server’ check box. To finish the job all you have to do now is enter the name of the server in the ‘address’ box, the port which it uses in the ‘port’ box and go forth and surf anonymously.
Free, manual proxy servers as advertised on anonymity sites, if you can find one at all, are likely to be highly oversubscribed, and as a result the speed at which they retrieve web pages can deteriorate. In which case you can go in pursuit of a public proxy server list and select an alternative from it, which can then be set up manually. To locate such a list you can investigate sites such as Code:
hxxp://www.proxys4all.com/
however, this method isn’t problem free either, so before you get too carried away and go jumping on the anonymity bandwagon there are a few things you should be aware of. It’s very easy to use proxies to protect your privacy, but often the disadvantages of using them far out weigh the benefits. You see, the problem is that, like the proxy servers provided Rewebber et al, free, public proxies are nearly all over subscribed and so they can slow down web browsing considerably. Digging out fast reliable proxy servers is an art form in itself and is a skill which takes considerable practice. You could find a list of public proxy servers and then experiment with each one until you find one that runs at a reasonable speed, but this can be very time consuming and frustrating. Instead, your search would be much more efficient if you got a dedicated program to carry out this task for you. There are literally dozens of proxy seeking programs around which can do just that, and many of them are available as freeware. What these do is scan the Internet for public proxy servers. These servers are then tested for speed and anonymity (not all of them are truly anonymous, even if they claim to be!) and once you find one which suits your requirements you can select it as your default proxy with the click of a button.
One of the most significant advantages of using an automated tool to locate proxy servers is that you do not have to keep editing your proxy settings manually each time you wish to try out a new one. Instead, what you do is enter ‘localhost’ or ‘127.0.0.1’ into the ‘address’ box and ‘8088’ into the ‘port’ box of your browser’s proxy settings menu and then forget about it. All future proxy switching is then orchestrated from within your proxy seeking software, which subsequently relays the information to your browser or whatever type of application you are attempting to make anonymous. For those of you who are curious ‘localhost’ and the IP address ‘127.0.0.1’ are the names by which every computer on the Internet refers to itself.
Here’s a good selection of links, which should help you to get started – Code:
hxxp://www.a4proxy.com/ Anonymity 4 Proxy
hxxp://www.helgasoft.com/hiproxy/ Hi Proxy
hxxp://www.proxy-verifier.com/ Proxy Verifier
hxxp://www.photono-software.de/ Stealther.
You may find that even when using these programs you have difficulty finding good proxy servers. It is for this reason that many people choose only to use proxy servers temporarily whilst doing something which may land them in trouble with their ISP, or in a worst case scenario with the law. The most obvious example of a situation in which you would want to cover your tracks is when scanning for public FTP servers and subsequently uploading to them. Most other net activities are unlikely to incur serious consequences so under these circumstances you can safely surf the web without a proxy. If you’re really serious about protecting your privacy, however, your best bet is probably to invest in a dedicated, stable proxy such as the ones offered by Code:
hxxp://www.ultimate-anonymity.com/ Ultimate Anonymity
These aren’t free, but may be worth the expense if you aren’t keen on continuously switching proxy servers.
Before splashing out though it may be worth checking if your current ISP has a proxy server of its own which you can use. These aren’t there to help you to commit cyber crimes and get away with it, they actually have a legitimate purpose as well – otherwise they wouldn’t exist. You see, proxy servers were originally designed to help speed up web page loading times. Proxy servers contain a cache of all the web pages which have been requested via the browsers of the people using the proxy. When someone surfs the web using a proxy, the proxy first checks to see if it already has a copy of the web page stored in its cache. If this version of the page is bang up to date, it is sent to your computer and appears in your browser. If the page found in the cache of the proxy server is older than the one stored on the server hosting the page, a new request to the web server is made and the page is updated in the cache of the proxy before being sent to you. Because these servers use very fast internet connections they can retrieve web pages at much greater speeds than you can via your modest home setup. If these servers are located physically nearer to your home than the web host servers you wish to retrieve web pages from, the speed at which you browse the web will be accelerated.
Anonymity – Cookies
One last important point you need to be aware of before jumping in with both feet is that different programs have to be setup in different ways before being able to make external connections via a proxy server. For example, you can surf the web anonymously by modifying the settings in Internet Explorer or Netscape Navigator as explained earlier in this tutorial, but this will only affect your browser. If you then used Flash FXP to copy a batch of 0-day releases from one FTP server to another, this isn’t going to protect you in the slightest. What you have to do is enter the name of the proxy server into each application you wish to make anonymous before making any external connections. This can usually be done by browsing through the preferences of your program to see if there is a ‘use proxy server’ option available. If there is, make sure you use it!
Cookies:
You have little to fear from the edible variety, but the digital ones can be a major threat to your security and privacy. A cookie is a tiny text file (usually less than 1KB in size), which is created and stored on your hard drive whenever you visit a dynamic (or an interactive if you like) web site. These are used to log your personal details so that you can access members only areas of web sites without having to type in a password every time, or to retain your customised settings so that they are available the next time you visit. If you’re using a shared computer, anyone who visits the same site that you have previously logged in to can access your accounts. This is particularly worrying if you have entered your credit card details into a form on an e-commerce site. If your browser is set to automatically fill in these details whenever you
return to a previously visited site, this information could be clearly visible – you don’t need me to explain the problems this could entail.
The solution to this problem is to delete any cookies which contain sensitive data once you have completed your transactions. Your cookies will be stored in a different place depending on which operating system you are using so you will have to use your detective skills to find them. As an example, in Windows XP they are located in your ‘c:\Documents and Settings\Kylie Minogue\Cookies’ directory (that is if your name is Kylie Minogue. Mine isn’t in case you’re wondering!). If you look in this directory, in some cases it is easy to identify which cookie is associated with which web site, but in other cases it’s not so obvious. The cookie which was created when you visited Yahoo.com to check your email may be called kylie minogue@yahoo.txt for example. Unfortunately some cookies refer to the IP address of the site you visited and so look more like kylie minogue@145.147.25.21. These cookies can be selectively deleted one at a time if it’s obvious which ones are causing a threat to your security, or you can just wipe out the whole lot in one fell swoop and have them recreated as and when they are required. However, if
you’re really struggling to find your cookie jar, you could delete your cookies via your browser’s tool bar instead. In Internet Explorer this can be done through the ‘Tools’ &gt; ‘Internet Options’ menu items.
If all this sounds like too much hassle, you can always find a labour saving program which will be happy to take the job off your hands. These ‘cookie crunching’ programs allow you to be more selective when editing, viewing and deleting cookies from your system, and some of them will even prevent cookies from being created in the first place. Yes, I know you’re hungry for links so I won’t deprive you. Have a look here – Code:
hxxp://www.rbaworld.com/Programs/CookieCruncher/ Cookie
Cruncher
hxxp://www.thelimitsoft.com/ Cookie Crusher
hxxp://www.angove.com/ Cookie Killer
hxxp://www.kburra.com/ Cookie Pal
and
hxxp://www.cookiecentral.com/ Cookie Web Kit.
I can see you hiding in the shadows over there and so can the logs of all the web sites, FTP servers and other nooks and crannies you visit on the web. The sort of information gathered by these logs and which is available to the webmasters of the sites you visit include the address of the previous site you visited, your IP address, your computer’s ID name, your physical location and the name of your ISP along with less personal details such as the operating system you’re using and your screen resolution. If someone was snooping through your dustbin to gather information on consumer trends or tracking your every move to see where it is you go everyday you wouldn’t be too chuffed would you. Well the web is no different, it’s still an invasion of privacy and a threat to security and you don’t have to put up with it.
Proxy servers:
Every time you visit a web site, detailed information about your system is automatically provided to the webmaster. This information can be used by hackers to exploit your computer or can be forwarded to the market research departments of consumer corporations who by tracking your activities on the internet are better equipped to direct more relevant spam at you. Your best defense against this is to use what is known as a proxy server, which will hide revealing information from the web sites you visit, allowing you to surf the web anonymously. These work by altering the way in which your browser retrieves web pages or connects to remote servers. With a proxy server set up, whenever you ‘ask’ IE or Netscape to look at a web page, the request is first sent through an external server which is completely independent of your ISP’s servers. This third party server then does the requesting on your behalf so that it appears that the request came from them rather than you and your real IP address is never disclosed to the sites you visit. There is nothing to download and the whole process takes less than a minute.
There are two different ways to use proxy servers and both have their advantages and disadvantages. The first method is to use a web based service. What this involves is visiting the proxy’s home page each time you want to browse a web site anonymously. The core component of such a system is the dialog box where you enter the address of the web site you want to visit. Each time you enter the URL of the site you want to browse via the proxy into this box, your personal information, IP address and so on is first encrypted before being sent to the site allowing you to maintain your anonymity. Two of the best examples of this type of web based proxy service are Code:
hxxp://www.rewebber.com/
and hxxp://www.anonymizer.com/.
Obviously one disadvantage of using a web based service like Rewebber or Anonymizer, however, is that you have to visit the proxies home page each time you want to surf anonymously. You could choose to select this page as your default home page, but it’s still quite awkward if you’re forever site hopping at the speed of light. The second main ‘con’ is that you often have to put up with extra adverts on the pages you visit. These are automatically inserted into the pages by the proxy – they have to pay for service somehow. More sophisticated and convenient solutions are also on offer yet they come with a price tag.
The second method you can use to protect your privacy via a proxy server involves adjusting the settings of your web browser so that you can surf anonymously without having to visit the home page of your proxy each time. To do this you will first need to know the name of your proxy server and the port number it uses. This information can be gleaned from either a public proxy server list or the FAQ referring to a private subscription based service. Once you have the name of the proxy server you wish to use, select ‘Internet Options’ from the ‘Tools’ menu of your browser. Now select ‘Connections’ followed by ‘Settings’ and tick the ‘use a proxy server’ check box. To finish the job all you have to do now is enter the name of the server in the ‘address’ box, the port which it uses in the ‘port’ box and go forth and surf anonymously.
Free, manual proxy servers as advertised on anonymity sites, if you can find one at all, are likely to be highly oversubscribed, and as a result the speed at which they retrieve web pages can deteriorate. In which case you can go in pursuit of a public proxy server list and select an alternative from it, which can then be set up manually. To locate such a list you can investigate sites such as Code:
hxxp://www.proxys4all.com/
however, this method isn’t problem free either, so before you get too carried away and go jumping on the anonymity bandwagon there are a few things you should be aware of. It’s very easy to use proxies to protect your privacy, but often the disadvantages of using them far out weigh the benefits. You see, the problem is that, like the proxy servers provided Rewebber et al, free, public proxies are nearly all over subscribed and so they can slow down web browsing considerably. Digging out fast reliable proxy servers is an art form in itself and is a skill which takes considerable practice. You could find a list of public proxy servers and then experiment with each one until you find one that runs at a reasonable speed, but this can be very time consuming and frustrating. Instead, your search would be much more efficient if you got a dedicated program to carry out this task for you. There are literally dozens of proxy seeking programs around which can do just that, and many of them are available as freeware. What these do is scan the internet for public proxy servers. These servers are then tested for speed and anonymity (not all of them are truly anonymous, even if they claim to be!) and once you find one which suits your requirements you can select it as your default proxy with the click of a button.
One of the most significant advantages of using an automated tool to locate proxy servers is that you do not have to keep editing your proxy settings manually each time you wish to try out a new one. Instead, what you do is enter ‘localhost’ or ‘127.0.0.1’ into the ‘address’ box and ‘8088’ into the ‘port’ box of your browser’s proxy settings menu and then forget about it. All future proxy switching is then orchestrated from within your proxy seeking software, which subsequently relays the information to your browser or whatever type of application you are attempting to make anonymous. For those of you who are curious ‘localhost’ and the IP address ‘127.0.0.1’ are the names by which every computer on the internet refers to itself.
Here’s a good selection of links, which should help you to get started – Code:
hxxp://www.a4proxy.com/ Anonymity 4 Proxy
hxxp://www.helgasoft.com/hiproxy/ Hi Proxy
hxxp://www.proxy-verifier.com/ Proxy Verifier
hxxp://www.photono-software.de/ Stealther.
You may find that even when using these programs you have difficulty finding good proxy servers. It is for this reason that many people choose only to use proxy servers temporarily whilst doing something which may land them in trouble with their ISP, or in a worst case scenario with the law. The most obvious example of a situation in which you would want to cover your tracks is when scanning for public FTP servers and subsequently uploading to them. Most other net activities are unlikely to incur serious consequences so under these circumstances you can safely surf the web without a proxy. If you’re really serious about protecting your privacy, however, your best bet is probably to invest in a dedicated, stable proxy such as the ones offered by Code:
hxxp://www.ultimate-anonymity.com/ Ultimate Anonymity
These aren’t free, but may be worth the expense if you aren’t keen on continuously switching proxy servers.
Before splashing out though it may be worth checking if your current ISP has a proxy server of its own which you can use. These aren’t there to help you to commit cyber crimes and get away with it, they actually have a legitimate purpose as well – otherwise they wouldn’t exist. You see, proxy servers were originally designed to help speed up web page loading times. Proxy servers contain a cache of all the web pages which have been requested via the browsers of the people using the proxy. When someone surfs the web using a proxy, the proxy first checks to see if it already has a copy of the web page stored in its cache. If this version of the page is bang up to date, it is sent to your computer and appears in your browser. If the page found in the cache of the proxy server is older than the one stored on the server hosting the page, a new request to the web server is made and the page is updated in the cache of the proxy before being sent to you. Because these servers use very fast internet connections they can retrieve web pages at much greater speeds than you can via your modest home setup. If these servers are located physically nearer to your home than the web host servers you wish to retrieve web pages from, the speed at which you browse the web will be accelerated.
Cookies
One last important point you need to be aware of before jumping in with both feet is that different programs have to be setup in different ways before being able to make external connections via a proxy server. For example, you can surf the web anonymously by modifying the settings in Internet Explorer or Netscape Navigator as explained earlier in this tutorial, but this will only affect your browser. If you then used Flash FXP to copy a batch of 0-day releases from one FTP server to another, this isn’t going to protect you in the slightest. What you have to do is enter the name of the proxy server into each application you wish to make anonymous before making any external connections. This can usually be done by browsing through the preferences of your program to see if there is a ‘use proxy server’ option available. If there is, make sure you use it!
Cookies:
You have little to fear from the edible variety, but the digital ones can be a major threat to your security and privacy. A cookie is a tiny text file (usually less than 1kb in size), which is created and stored on your hard drive whenever you visit a dynamic (or an interactive if you like) web site. These are used to log your personal details so that you can access members only areas of web sites without having to type in a password every time, or to retain your customised settings so that they are available the next time you visit. If you’re using a shared computer, anyone who visits the same site that you have previously logged in to can access your accounts. This is particularly worrying if you have entered your credit card details into a form on an e-commerce site. If your browser is set to automatically fill in these details whenever you
return to a previously visited site, this information could be clearly visible – you don’t need me to explain the problems this could entail.
The solution to this problem is to delete any cookies which contain sensitive data once you have completed your transactions. Your cookies will be stored in a different place depending on which operating system you are using so you will have to use your detective skills to find them. As an example, in Windows XP they are located in your ‘c:\Documents and Settings\Kylie Minogue\Cookies’ directory (that is if your name is Kylie Minogue. Mine isn’t in case you’re wondering!). If you look in this directory, in some cases it is easy to identify which cookie is associated with which web site, but in other cases it’s not so obvious. The cookie which was created when you visited Yahoo.com to check your email may be called kylie minogue@yahoo.txt for example. Unfortunately some cookies refer to the IP address of the site you visited and so look more like kylie minogue@145.147.25.21. These cookies can be selectively deleted one at a time if it’s obvious which ones are causing a threat to your security, or you can just wipe out the whole lot in one fell swoop and have them recreated as and when they are required. However, if
you’re really struggling to find your cookie jar, you could delete your cookies via your browser’s tool bar instead. In Internet Explorer this can be done through the ‘Tools’ &gt; ‘Internet Options’ menu items.
If all this sounds like too much hassle, you can always find a labour saving program which will be happy to take the job off your hands. These ‘cookie crunching’ programs allow you to be more selective when editing, viewing and deleting cookies from your system, and some of them will even prevent cookies from being created in the first place. Yes, I know you’re hungry for links so I won’t deprive you. Have a look here – Code:
hxxp://www.rbaworld.com/Programs/CookieCruncher/ Cookie
Cruncher
hxxp://www.thelimitsoft.com/ Cookie Crusher
hxxp://www.angove.com/ Cookie Killer
hxxp://www.kburra.com/ Cookie Pal
and
hxxp://www.cookiecentral.com/ Cookie Web Kit.

Leave a comment