How to remain Invisible over the internet and bypass school/college Restriction

1397249078395

Before you can go about surfing the web anonymously you need to understand how someone can discover your identity in the first place. So,the question is what leads them to you ? It’s your IP address. Your IP address is a unique numerical identifier that is assigned to each computer within a network. Your IP address is associated with your Internet Service Provider, and that can easily lead to your name, address, e-mail or even your exact GPS co-ordinates!

The other thing that you need to take care about is cookies. cookies are small text files that created when a user’s browser loads a particular website. Cookies are used by many websites and can do a number of things, eg. remembering your preferences, recording what you have put in your shopping basket, and counting the number of people looking at a website.

They are very useful to us. Take one example like you logged into your gmail account and then closed it. you open it again and find you are still logged in. so It’s the cookie stored in your computer sent by gmail that tells the website that you did not click on logout button and you are still logged in with your credentials.

Different ways to remain invisible over the internet and bypass your organization school/college  Internet restriction

 

Before testing any of these techniques visit http://www.tracemyip.org/ and note down your IP address and Location. Do it again after applying any of these techniques. If the IP address and location changes then It was successful.

1.Web proxies

According to Wikipedia In computer networks, a proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource available from a different server. 

In simple terms let’s say Bob wants to fetch some information to Alice. Bob asks Daniel(acting as a proxy server) to go and fetch that information from alice. Daniel does that but he does not tell Alice that who requested the information. In this way the identity of Bob remains hidden.

free-proxy-server-list-2014

Bob, Daniel and Alice representation

Popular web proxies

2.VPN

A Virtual Private Network (VPN) is a network technology that creates a secure network connection over a public network such as the Internet or a private network owned by a service provider. Large corporations, educational institutions, and government agencies use VPN technology to enable remote users to securely connect to a private network.

In simple words they connect you to their network and assign a different ip address. They act as a proxy their but a lot better than proxy. Any request made by you on the internet would be processed through it and they would make that request on your behalf and then forward that web page to you without revealing your identity to them.

The biggest benefit of using a vpn is that every information is encrypted between your computer and vpn server. so no intermediary can view your personal data, not even your ISP. That’s why it can bypass almost every restriction put in place in your school/college or organization. It is a lot better than a web proxy.

uk-vpn-service

VPN in action

Popular & free VPN softwares

Hotspot shieldhttp://hotspotshield.com

Cyberghost vpnhttp://cyberghostvpn.com

proxpn vpnhttp://proxpn.com

hidemyass vpn(paid) https://www.hidemyass.com/

swiss vpn(paid)http://swissvpn.net

If you are into some serious anonymity shit then consider using paid VPN’s.

scr-simontools-cyberghost-vpn

cyber ghost vpn in action

3.TOR

Tor is free software for enabling online anonymity and resisting censorship. Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than five thousand relays to conceal a user’s location or usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult for Internet activity to be traced back to the user. It also provides end to end encryption except along the exit node. It is one of the best tools to stay anonymous over the internet.

Download Tor bundle from herehttps://www.torproject.org/

online-anonymity-with-tor-works

How TOR works

Just start TOR browser and continue using internet anonymously.

 

Stay tuned and I will teach you how to remain completely untraceable over the internet in  my next post if you wanna do some serious dark shit!

 

Leave a Reply

Your email address will not be published. Required fields are marked *