Anonymizers are services that help make your own web surfing anonymous.
*
The first anonymizer developed was Anonymizer.com, created in 1997 by Lance Cottrell.
*
An anonymizer removes all the identifying information from a user's computers while the user surfs the Internet, thereby ensuring the privacy of the user.
Many anonymizer sites create an anonymized URL by appending the name of the site the user wishes to access to their own URL, e.g.:
http://anon.free.anonymizer.com/http://www.yahoo.com/
After the user anonymizes a web access with an anonymizer prefix, every subsequent link selected is also automatically accessed anonymously. Most anonymizers can anonymize at least the web (http:), file transfer protocol (ftp:), and gopher (gopher:) Internet services.
However, anonymizers have the following limitations:
o
HTTPS. Secure protocols like "https:" cannot be properly anonymized, since the browser needs to access the site directly to properly maintain the secure encryption.
o
Plugins. If an accessed site invokes a third-party plugin, then there is no guarantee that they will not establish independent direct connections from the user computer to a remote site.
o
Logs. All anonymizer sites claim that they don't keep a log of requests. Some sites, such as the Anonymizer, keep a log of the addresses accessed, but don't keep a log of the connection between accessed addresses and users logged in.
o
Java. Any Java application that is accessed through an anonymizer will not be able to bypass the Java security wall.
o
Active X. Active-X applications have almost unlimited access to the user's computer system.
o
JavaScript. The JavaScript scripting language is disabled with url-based anonymizers
Some anonymizer sites are:
o
Anonymizer.com
o
Anonymize.net
o
@nonymouse.com
o
Iprive.com
o
MagusNet Public Proxy
o
MuteMail.com PublicProxyServers.com
o
Rewebber.de
o
SilentSurf.com
o
Surfola.com
o
Ultimate-anonymity.com
Saturday, 26 February 2011
// //
0
comments
//
0 comments to "Anonymizers- Make your web surfing anonymous"
Total Pageviews
Blog Archive
-
▼
2011
(43)
-
▼
February
(28)
-
▼
Feb 26
(19)
- Anonymizers- Make your web surfing anonymous
- What is Proxy?
- Cheops-Network management tool-equivalent of a Swi...
- Passive Fingerprinting
- Active Stack Fingerprinting: This technique is cal...
- Tool: Super Scan - Port scanner
- Tool: Net Scan Tools Pro
- Ethical Hacker and Scanning Tools
- What is Nslookup?
- Footprinting - Attack Methods
- What is Footprinting?
- Hacker Classes - Black hats, White Hats, Gray Hats,
- Hacking Phase 5 - Covering Tracks
- Hacking Phase 4 - Maintaining Access
- Hacking Phase 3 - Gaining Access - The hacker expl...
- Hacking Phase 2 - Scanning
- Hacking Phase 1 - Reconnaissance
- Hacktivism
- What do Ethical Hackers do?
-
▼
Feb 26
(19)
-
▼
February
(28)



Post a Comment