?
Solved

Anonymous browsing over the LAN

Posted on 2006-07-18
5
Medium Priority
?
267 Views
Last Modified: 2013-12-04
Hello,
        I am using a HideIP software that changes the proxy and i can surf anonymously.. this software seems working fine on the modem rather with direct connection.. but when trying to use it on Lan.. it fails sometime.. I can't surf properly.. due to many errors and slow response.. i even tried to change my proxy many time.. but that also failed.. any hint that could help to surf anonymously over the LAN.. remember I am using proxy server.
0
Comment
Question by:frontpor
  • 2
3 Comments
 
LVL 12

Accepted Solution

by:
Phil_Agcaoili earned 1000 total points
ID: 17133052
I've never heard of HideIP software before. I'm not saying that it's good or bad, but it seems like an antiquated solution.

Why not use a network based anonymous web surfing solution that is free:
http://www.the-cloak.com/anonymous-surfing-home.html

There are a ton of other solutions that are out there, some free and some paid, but all work for LAN, WLAN, cellular, and dialup services:
http://www.google.com/search?sourceid=navclient&ie=UTF-8&rls=DVXA,DVXA:2005-40,DVXA:en&q=anonymous+web+surfing
0
 
LVL 12

Assisted Solution

by:gidds99
gidds99 earned 1000 total points
ID: 17134159
Hide IP may not be able to connect to the proxys it uses to hide your IP as many LANs will use their own proxy as the only means to connect to the Internet.
0
 
LVL 12

Expert Comment

by:gidds99
ID: 17134162
But I would also agree with Phil that there are better soilutions to this issue.
0

Featured Post

Free Tool: Subnet Calculator

The subnet calculator helps you design networks by taking an IP address and network mask and returning information such as network, broadcast address, and host range.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
Our Group Policy work started with Small Business Server in 2000. Microsoft gave us an excellent OU and GPO model in subsequent SBS editions that utilized WMI filters, OU linking, and VBS scripts. These are some of experiences plus our spending a lo…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…

839 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question