Go Back   Computer Forums > General Computing > Cyber Safety and Computer Security
Join Computer forums Today

Thread Tools Search this Thread Display Modes
Old 10-22-2005, 03:47 PM   #1
In Runtime
AnonymousI's Avatar
Join Date: Mar 2005
Posts: 243
Wink How to use online Proxy servers, and TOR.

The average user installs antivirus and firewall software and then call their computer secure... Reality is: your computer is still not secure. Most viruses, trojans, -wares, etc. can easily disable any protection. I would say that my computer is more secure than the average user. Up to now, I never had any viruses, -wares, etc. on my computer. It is also recommended to have the professional version of XP and the latest updates.

Here are my security tips (See end for additional notes):
- Reformat and reinstall to remove all viruses, -wares, etc.
- Get antivirus, firewall, privacy, and spam protection from reliable and reputable vendors (ex. mcafee, trendmicro, symantec, etc.)
- For wireless networks: Use the WPA or WPA2 security protocol on your wifi devices
- Create two accounts: Administrator and User
- Password protect all accounts
- Set group policy settings using Group Policy Editor (gpedit.msc)
- Use the windows classic logon style instead of the windows welcome
- Turn on DEP (Data Execution Prevention) for ALL programs

Additional Notes:
*The Administrator of the computer has full control of the system. Most computer users have one or two accounts that have administrator rights. This means that anything/body can change or disable security settings. It is recommended that you create and use an account THAT IS part of the USERS group at ALL times (Run lusrmgr.msc to do this). Members in the Users group cannot make system wide changes which makes any attempt to compromise security useless. Therefore, if viruses, -wares, etc. were to get on your computer, it wouldnt affect the security because members of the Users group cannot make changes to system and program files due to restricted permissions; also, the antivirus and/or firewall will notify you. If you need to install something, right-click the setup executable and select runas and enter the admin login info.

*The Group Policy Editor (only available on Pro) is a powerful tool that system/network admins use to reinforce security. For example, the "LAN Manager Authentication Level" is a crucial security setting for windows passwords. Most password crackers generally get the password fastest by cracking the LANMAN hashing algorithm (easiest to crack) that is applied to windows passwords. Setting the "LAN Manager Authentication Level" to "Send NTLMv2 response only - refuse NTLM and LM" greatly increases password security because of the complexity of the NTLMv2 hashing algorithum. To crack this type of security would take forever and nearly uncrackable.

*The DEP prevents protects your computer from damages caused by viruses, trojans, etc. It is NOT a substitute for anti-virus.

AnonymousI is offline   Reply With Quote
Old 04-15-2007, 01:24 PM   #2
0x0161's Avatar
Join Date: Apr 2007
Posts: 441
Wink How to use online Proxy servers, and TOR.

This is for people with broadband connections (cable, ADSL)

This is my little tutorial/guide on how to use TOR for windows XP. I did this actually because its raining outside and IM bored. Lets begin.

This is for Windows XP with IE6 or IE7 firefox same setup (basically)

Go to http://tor.eff.org/download.html.en and download the bundle which consists of Tor & Privoxy & Vidalia bundle: (sig), (sig).

Download it, and save it on your system. Next, run it and install it on your system. After you click 'finish' the white privoxy window will display. Keep this window open just minimize it.

Next, is Vidalia (GUI for TOR) the icon, in the system tray which is a little grey icon for TOR, before starting Vidalia lets configure our web browser. If your running IE6 OR IE7 use this configuration setup. For additional security, I would recommend disabling cookies in your web browser before configuring TOR to work with your web browser.

Open IE go to tools, internet options, click on connections tab, click on LAN settings below, place a check in 'Use a proxy Server,' leave those two white fields blank. Next, click on the advanced button:

Under 'Proxy address to use'

Under HTTP: enter localhost port 8118

Under SECURE: localhost port 8118

under FTP: localhost port 8118

Under Gopher: leave the field blank.

under SOCKS: localhost port 9050

Do not check "use the same proxy server for all protocols" also leave the bottom box blank. Click on OK. and OK and OK. This will close it.

Now go to start, all programs, click on TOR, this will bring up a command prompt box: saying something similiar;

Apr 15 10:58:00.665 [notice] Tor v0.1.1.26. This is experimental software. Do no
t rely on it for strong anonymity.
Apr 15 10:58:00.735 [notice] Initialized libevent version 1.1b using method win3
2. Good.
Apr 15 10:58:00.735 [notice] connection_create_listener(): Opening Socks listene
r on
Apr 15 10:58:17.930 [notice] We now have enough directory information to build c
Apr 15 10:58:22.517 [notice] Tor has successfully opened a circuit. Looks like c
lient functionality is working.
Minimize this box or close it.

Next, right click on the grey icon (tor) and go to start. It should now have a green onion instead of the grey icon. To see if TOR is successfully installed go to www.ipchicken.com or www.ip2location.com and see what it IP address it detects. Or you can open command prompt an issue netstat -ano and look for the established connections. Or you can open comand prompt and issue netsh diag connect ieproxy

C:\Documents and Settings\sysadmin>netsh diag connect ieproxy

Internet Explorer Web Proxy (localhost)
IEProxyPort = 8118
IEProxy = localhost
Server appears to be running on port(s) [8118]

C:\Documents and Settings\sysadmin>

Just a little FYI, Tor uses SSL to encrypt all data, and doesn't even leak DNS requests, unlike some proxy servers. As long as it's configured properly and using an appropriate proxy (such as Privoxy, which comes in the bundle).

TOR cannot offer 100% total anonmity so If the connection to the website is not secure (e.g https) then the last gateway will be able to see (and potentially sniff) all traffic.

Thus, it is vitally important when using TOR to check the server certificates and only use encrypted protocols (pop3-ssl, https) if you are logging in.

However, it is true that communication between nodes is encrypted so an intermediate node cannot intercept it.


Another way to use a proxy server to assist in your web surfing a website proxy server such as www.hidemyass.com where you enter the website you want to visit in the field provided. It will connect to them with their information instead of yours. Again, disabling cookies in your web browser first before configuring TOR to work with your web browser.


Another method is to use a public proxy server from sites such as http://www.publicproxyservers.com/page1.html

I perfer to use a proxy server from this site but in another country, and perferrably a so called* high anonymity* proxy server running on port 8080.

To do this Open IE go to tools, internet options, click on connections tab, click on LAN settings below, place a check in 'Use a proxy Server,' this time fill in the two white fields with any of the proxy servers from this site or any proxy site. Hit OK and OK. Go to www.ipchicken.com and see what IP address it detects.

A little more FYI I have the best luck from this site http://www.publicproxyservers.com/page1.html
when I select proxy servers running on port 8080.

Only downfall they leak DNS request so your not as anoymous as you think you are.

I hope this helps. Cheers,
0x0161 is offline   Reply With Quote

Thread Tools Search this Thread
Search this Thread:

Advanced Search
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are Off

All times are GMT -5. The time now is 05:23 PM.

Powered by vBulletin® Version 3.8.8 Beta 4
Copyright ©2000 - 2016, vBulletin Solutions, Inc.
Search Engine Friendly URLs by vBSEO 3.6.0