Solved

where can i get fake ip

Posted on 1998-12-04
3
736 Views
Last Modified: 2013-12-28
where can i get fake ip or something similar that will work on win 98?
0
Comment
Question by:citizen
3 Comments
 
LVL 4

Expert Comment

by:whoami
ID: 1648420
Ok, citizen you are a hacker and don't want to get caught....


http://www.anonymizer.com/

will mask your ip address and it does work with win98


CShenberger
0
 

Author Comment

by:citizen
ID: 1648421
dont i have to pay for that - isnt there an alternative that i dont have to pay for? a prog maybe?
0
 

Accepted Solution

by:
thankyouall earned 50 total points
ID: 1648422
Alright hacker, here's a list of anonymous public proxy servers which you can use....
----------------------------------------------------------------------------------------------
proxy.cybergate.co.zw 8080   www/ftp  subnet 194.133.122.44
proxy.telekom.yu      8080    www/ftp         195.178.32.19
proxy2.turnet.net.tr   8080    www             194.54.36.130
proxy1.turnet.net.tr   8080    www             194.54.36.130
sunsite.icm.edu.pl     8080    www/ftp         193.219.28.2
proxy.qatar.net.qa     8080    www/ftp            194.133.33.19
w3cache.us.edu.pl      8080     www/ftp/gopher  155.158.248.254
mpls.cache.mr.net      3128     www/ftp          137.192.241.247
proxy1.jaring.my       3128      www              161.142.216.11
magicall2.dacom.co.kr   8080     www/ftp          210.120.128.216
proxy.galactica.it      8080     www/ftp          196.27.1.71
linux.softec.es          8080    www/ftp           194.224.102.2
infosun-fd.rus.uni-stuttgart.de   8080   www/ftp/gopher  129.69.18.18
proxye1-atm.maine.rr.com       8080       www/ftp       204.210.64.20
webcache.ms.mff.cuni.cz        8080   www/ftp/gopher/wais   195.178.64.178
conan.gocis.bg                  8080   www/ftp              195.138.133.11
proxy.co.rmit.edu.au            8080        www/ftp         131.170.32.127
noc.uncu.edu.ar                 8080         www/ftp        170.210.2.97
------------------------------------------------------------------------------------------------------
Good luck buddy! Duh!
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Windows Mobile Barcode Scanning These days almost every product has a barcode in some way... amongst there are 1D barcodes en 2D barcodes.. From http://www.barcodeman.com/faq/2d.php I found some handy definitions and insights. 1D barcodes …
NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
This video Micro Tutorial explains how to clone a hard drive using a commercial software product for Windows systems called Casper from Future Systems Solutions (FSS). Cloning makes an exact, complete copy of one hard disk drive (HDD) onto another d…
Windows 8 comes with a dramatically different user interface known as Metro. Notably missing from the new interface is a Start button and Start Menu. Many users do not like it, much preferring the interface of earlier versions — Windows 7, Windows X…

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now