100 percentage working proxy server ip address list

Here is the list of proxy server address. use it and enjoy.

94.125.27.20:8080
93.91.200.146:8080
81.18.116.66:8080
79.125.28.242:3128
72.52.96.9:80
72.52.96.11:80
69.13.229.214:3128
68.96.75.146:9090
64.87.46.57:3128
64.23.156.82:8080
62.142.57.72:8080
61.79.87.93:3128
61.6.163.30:8080
61.244.235.34:3128
61.156.25.222:8080
58.215.78.157:808
58.17.71.121:8080
41.190.16.17:8080
222.77.69.210:3128
217.197.121.188:8080
216.27.81.163:8080
216.185.4.200:8080
213.192.246.133:80
213.192.246.133:80
213.192.246.130:80
213.192.246.130:80
213.151.33.58:3128
213.151.033.058:3128
213.109.130.80:54321
212.158.160.96:80
212.118.224.151:80
212.118.224.151:80
212.118.224.150:80
212.118.224.150:80
212.118.224.148:80
211.138.124.232:80
211.138.124.232:80
211.138.124.217:80
211.138.124.213:80
211.138.124.212:80
211.138.124.209:80
211.138.124.200:80
211.138.124.199:80
211.138.124.199:80
211.138.124.180:80
211.138.124.179:80
211.138.124.178:80
211.138.124.174:80
211.138.124.173:80
211.138.124.170:80
211.138.124.169:80
211.138.124.167:80
210.212.55.194:3128
210.187.51.43:8080
210.125.51.41:80
210.107.100.251:8080
209.203.19.2:8080
208.92.249.118:80
208.115.60.146:8080
208.100.40.46:80
208.100.40.46:80
208.100.40.43:80
208.100.40.42:80
207.135.129.5:8080
207.135.129.5:8080
206.196.111.110:80
205.213.195.70:8080
203.139.145.2:3128
202.201.34.101:3128
202.169.226.208:8080
202.162.192.232:8080
202.149.25.43:8080
202.143.146.205:8080
202.115.12.162:808
201.76.211.246:8080
201.20.18.165:3128
200.57.88.164:80
200.36.104.230:8080
200.36.104.230:8080
200.101.82.4:8088
199.3.183.242:8088
196.30.6.186:80
196.29.161.85:8080
196.29.161.84:8080
196.29.161.84:80
196.29.161.82:80
196.29.161.81:80
190.202.124.18:3128
190.141.4.5:8080
190.128.169.122:3128
190.120.10.71:3128
189.72.251.166:8080
189.61.196.10:3128
189.45.245.126:3128
189.17.118.10:3128
189.114.58.242:3128
189.11.211.237:3128
188.59.252.190:80
188.165.205.62:80
187.87.203.209:3128
187.45.232.176:8080
187.45.232.176:8000
187.45.213.100:3128
187.115.162.6:3128
187.115.162.6:3128
184.73.50.88:8118
184.73.131.27:80
184.73.120.223:80
184.73.114.189:8080
184.73.114.189:3128
184.72.9.242:8080
184.72.9.242:8000
184.72.9.242:80
184.72.9.242:443
184.72.9.242:3128
184.106.242.128:80
175.106.17.229:8080
174.143.202.39:80
174.143.168.38:8081
174.142.40.86:3128
174.142.40.84:3128
173.203.78.165:8080
173.203.78.165:3128
168.216.38.209:8080
164.78.252.24:80
164.78.252.24:80
164.078.252.110:80
164.078.252.025:80
125.95.189.82:8080
125.21.227.206:80
122.228.202.236:3128
122.184.133.210:8080
122.183.136.59:80
121.30.255.38:8080
120.50.57.234:3128
119.167.219.78:80
119.167.219.078:80
119.110.97.28:3128
119.110.97.28:3128
118.98.212.242:3128
118.98.160.99:80
118.98.160.99:3128
118.97.224.2:8080
118.97.224.2:8080
118.97.224.2:80
118.97.224.2:3128
118.97.169.173:8080
118.69.127.34:3128
117.40.29.89:80
111.1.32.93:80
111.1.32.92:80
111.1.32.91:80
111.1.32.8:80
111.1.32.7:80
111.1.32.72:80
111.1.32.71:80
111.1.32.69:80
111.1.32.61:80
111.1.32.59:80
111.1.32.4:80
111.1.32.47:80
111.1.32.45:80
111.1.32.44:80
111.1.32.19:80
111.1.32.15:80
110.164.66.98:3128
087.224.133.108:8080
082.206.129.160:3128
061.079.087.093:3128
058.056.108.114:80

What is IP Masking? How to use Fake IP address?


What is IP Masking? How to use Fake IP address?

What is Ip Masking?
IP masking is hiding your Original(Dynamic/Static) IP address so that you can not be traced.  IP masking is using Fake IP address for your machine.


For Example, Let us assume your ip address is 173.23.22.212 and your location is xxxx.

Using IP masking, you can make your IP address is 202.102.12.123(fake IP Address) and your location becomes yyyy.

Using Proxy IP Address , you can hide your IP.  Read this article : What is Proxy IP Address?

This can be achieved by the following methods:

So won't i be traced now?  The Answer is yes and No.  It is depending on your anonymity level of your Proxy IP address.

Different Types of Anonymity Levels: 
Transparent Proxy

      This type of proxy server identifies itself as a proxy server and also makes the original IP address available through the http headers. These are generally used for their ability to cache websites and do not effectively provide any anonymity to those who use them. However, the use of a transparent proxy will get you around simple IP bans. They are transparent in the terms that your IP address is exposed, not transparent in the terms that you do not know that you are using it (your system is not specifically configured to use it.)

Anonymous Proxy
   This type of proxy server indentifies itself as a proxy server, but does not make the original IP address available. This type of proxy server is detectable, but provides reasonable anonymity for most users.

Distorting Proxy
   This type of proxy server identifies itself as a proxy server, but make an incorrect original IP address available through the http headers.

High Anonymity Proxy
   This type of proxy server does not identify itself as a proxy server and does not make available the original IP address

Fastest way to hack into someone's computer

Well as I already mentioned u can hack any system as it is conected to what we call INTERNET . To connect internet a system allocates a port for communication and Data Transfer. SO here it goes all we goto do is get into that port thats hacking.

steps: -

1.Download software PORT SCANNER. Also you could use port scanner from Nettools.
Download link on my blog or just Google for it


2.Copy the IP address of the victim whose port is open.
3.Download NETLAB which gives you all information including the victim ip 
address and area from where he is accessing internet.
4.Paste the ip of victim u found initially into NETLAB .Thats it u access his system.

Update Empty Facebook status

This is a simple trick which allows you to post empty facebook statuses or comments ( yes, they are not allowed by deafult).


Steps-

Just type “@[0:0: ]” or “alt+0173″ (without " ") and you are done.

The 5 Most Common Tactics Used To Hack Passwords


When you think of a serious security threat, you may think of some clever malicious program that steals your data or takes over computer. In reality, you’re just as (if not more) likely to be hit by a much simpler breach – a hacked password.
Once someone has your password for an online account, they can use it however they like. There are a number of methods commonly used to obtain a password, and knowing them can help you protect yourself.

Trying Common Passwords

hack passwords
Any hacker trying to break through a password will first try the most common passwords in the book. Silly though it may seem, a disturbingly large number of people rely on passwords that consist of just a few common numbers of letters. Even the word “password” is commonly used as a password.
Hackers know this, and can reference common passwords to try and gain entry. Though it won’t work on most passwords, it works frequently enough to be worth a try. If successful, the hacker can lean back and sip his Mountain Dew.
How to Protect Yourself: This one is simple. Don’t use common passwords. This includes single words, popular phrases, and simple combinations of a particular character type (like numbers). Even passwords like “superman” and “dragon” are common enough to earn mention in some studies of commonly used passwords.

Social Engineering

how to hack passwords
If commonly used passwords don’t work, and a hacker knows the owner of the password they’re trying to bypass, social networking can be used to try and figure out what the password might be.
Hackers know that people who don’t use common passwords are still likely to use passwords that have some personal significance. The password might be the name of a pet or a favorite TV show. Such information is often included on social networking profile.
Should trying this tactic still not work, the information available on a social network can be used to construct phishing attacks. Perhaps the target lists that they play a popular online game. A fake email could then be sent asking for password information or linking to a site where password information must be entered.
How to Protect Yourself: There are two steps you can take here. One is to make your social network private to people who are not your friends, and the second is to make sure that you don’t use information about your personal life to form a password.

The Weakest Link

how to hack passwords
Should a hacker still fail to guess a password, they’ll have to start breaking out some true hacking skill – but perhaps not much. Most people use the same password on multiple sites, and many use just one password for everything. Hackers know this, and they also know that many sites have weak security.
Using the information found while reviewing your social networking profiles, a hacker may be able to identify sites you visit. Some are sure to be heavily guarded. Others, however, probably aren’t. They may be vulnerable to simple exploits that allow for the retrieval of stored passwords, and the owners may never even realize they were hacked. Alternatively, a brute force attack might be used.
How to Protect Yourself: Don’t use a single password for every website. Ideally you should use a different password for every site, but that can be difficult. A compromise you might find effective is to use the same password for low security risks, like a blog you visit and comment on, but use unique passwords to protect more important accounts, like your web mail. Yet another option is to use a password manager.

Sniffing Wi-Fi Packets

how to hack passwords
Open wireless networks can be a nasty security issue because they are – well – open. Information transmitted on them can be picked up by anyone within range of the network, and that includes passwords.
Wi-Fi sniffing can be utilized either personally or impersonally. If someone is trying to hack your passwords specifically, they might see if you frequently visit a place with open Wi-Fi, like a coffee shop. Or a hacker might just set up an operation in such a location and pick up as many passwords as possible.
How to Protect Yourself: One answer is to just not use open Wi-Fi, but that’s not a realistic expectation for everyone. If you do use open Wi-Fi, make sure that you do not log in to sensitive accounts. If you have varied your passwords, you’ll be safe if a hacker obtains your less sensitive passwords. Also use HTTPS whenever possible. Many sites can use it, but some offer it only as an option.

Keylogging

hack passwords
Like sniffing Wi-Fi, keylogging can be used personally or impersonally. Using information gained about you while attempting to guess your password, a hacker might find a way to send you a file that you think is legitimate but actually contains a keylogger. Once installed, it can detect your passwords as you enter them.
A keylogger can also be installed as a part of any piece of malware to hack passwords. The information can then be transmitted to a location where it is compiled and passwords found. Such wide-scale keylogging attacks don’t focus on any particular person, but can be just as damaging.
How to Protect Yourself: Security software can help detect keyloggers and prevent them from being installed on your system. You can find effective solutions for free, so there’s no reason to skip it.

Conclusion

Do you have any tips that can help beef up password security? Let us know in the comments. Makeuseof readers are likely to be a bit more security-aware than the average, but nobody is perfect. Sharing information can help us keep our passwords as strong as possible.

4 General Methods You Can Use To Detect Phishing Attacks


The internet is one of the best tools known to mankind to do basically whatever you want. But Facebook, Twitter, Gmail, Dropbox, Paypal, eBay, bank portals, and so many more sites have twins that are actually phish.
anti phishing
A “phish” is a term for a scam website that tries to look like a site that you know might well and visit often. The act of all these sites trying to steal your account information is called phishing. While it’s very easy to spot some sites as a phish, others aren’t nearly as easy.
Here are four different anti-phishing methods you can use so that you don’t fall victim to phishing.

1. Use a Custom DNS Service

anti phishing
You need a DNS resolution service so that you can access all the sites that you go to. Your computer doesn’t automatically know where Facebook is (as far as its Internet address, or IP address, goes), so it needs to ask a DNS resolution service for that IP address. The good thing is, all Internet users have this service, thanks to their internet service provider. The bad news is that’s all they do.
Aside from name resolution, the DNS servers at ISPs do nothing else. However, there are some custom and independent DNS companies that do more than just name resolution. They can also filter sites based on content and malware/phishing concerns. There are many out there that can do this, but the most popular one (last time I checked) is OpenDNS.

2. Use Your Browser’s Phishing List

phishing scams
Did you know that modern browsers offer a phishing list? The browsers check the site you’re visiting against the list to see if it’s possibly a phishing site. If it is, your browser will start freaking out about it in your face like a good boy. For possible phishing attacks, why notthrow out a big red page to warn you?

3. Use Sites To Check Links

In case you’re presented a link but you’re not sure about clicking it, you can copy and check it on a number of different sites. These can tell you whether there’s something bad about these sites, including malware and phishing. Where can you find all these wonderful sites that do this for you? Try checking out one of our articles on the subject.

4.  Use Your Own Ninja Skills

anti phishing
This may sound like useless advice, but using your own skills to detect phishing sites can go a very long way as well, and may even protect you from phishing sites that haven’t made it onto any lists that would throw an immediate flag. There are a few things that you should look for to see if you’re being faked:
  1. Look for a secure connection. This is usually identified by a green area in the address bar, along with https in the URL.
  2. Look at the domain of the URL. If you don’t know what the domain of a URL is, here is an example: The domain of MakeUseOf is makeuseof.com, while the domain of PayPal is paypal.com, and so on. Look to see that the domain is as it should be, and not something bizarre.
  3. Look at the site itself. If it doesn’t look exactly like the site you’re always used to, it may be a scam site. You can double check by opening a new tab and visiting the main page of the site you think you’re on (if possible). If they’re quite different, then you’re more than likely dealing with a phishing site.
Now that you’re equipped with these tips, you can take this handy little Phishing Quizprovided by OpenDNS where you are presented with screenshots of some websites. Some are real, while others are phish. You can take the quiz and see how well you do. Afterwards, you can see why a certain site is a phish and not real.

Conclusion

With these anti-phishing tools and tips, you are well equipped to spot phishing attempts and avoid them. Therefore, you’re much safer and your account information will remain private. If you feel enough like a pro, go and spread the word! The more people know how to spot phishing attacks, the better off they will be while surfing the internet.
How do you detect phishing sites? Do you think it is getting easier or harder to identify them? Let us know in the comments!

Keyboard Shortcuts For Facebook



Keyboard Shortcuts For Facebook
If you spend a lot of time on facebook then why not spend it more efficiently.There are a lot of browser specific keyboard shortcuts for facebook.You can create new messages,view account settings,View notifications etc .Once you get familiar with these shortcuts you can easily navigate on facebook.In this post I will give the shortcut keys for Google Chrome,Firefox and Internet Explorer.
Here is a comprehensive list of facebook Shortcuts for each browser.

Google Chrome Facebook Shortcuts

  • Alt+1: View your News Feed
  • Alt+2: View your own Profile
  • Alt+3: View pop-up of friend requests
  • Alt+4: View pop-up of messages
  • Alt+5: View pop-up of notifications
  • Alt+6: View Account Settings
  • Alt+7: View Privacy Settings
  • Alt+8: View Facebook’s own profile
  • Alt+9: Read latest Terms of Service agreement.
  • Alt+?: Search
  • Alt+m: Compose a new message
If you are using Firefox browser then you also need to press SHIFT along with the above shortcut keys.

Firefox Facebook Shortcuts

  • Shift+Alt+1: View your News Feed
  • Shift+Alt+2: View your own Profile
  • Shift+Alt+3: View pop-up of friend requests
  • Shift+Alt+4: View pop-up of messages
  • Shift+Alt+5: View pop-up of notifications
  • Shift+Alt+6: View Account Settings
  • Shift+Alt+7: View Privacy Settings
  • Shift+Alt+8: View Facebook’s own profile
  • Shift+Alt+9: Read latest Terms of Service agreement.
  • Shift+Alt+0: Open Facebook Help Center
  • Shift+Alt+?: Search
  • Shift+Alt+m: Compose a new message
If you are using Internet Explorer then you you can use the Facebook shortcuts of Google chrome,but you have to press ENTER after each shortcut 

All Facebook Chat Slang Codes

All Facebook Chat Slang Codes
Slang’s have become very common in chat’s,Sms,emails.People new  to these slang’s find really difficult to understand converstion.On the other hand it saves a lot of time and effort if slang’s are used.I will give the most commonly used Slangs with there meanings that are used in facebook chat or Sms.

Here are the Most Commonly used Facebook chat slang’s
ASAP    As Soon As Possible
GN         Good Night
M/F       Are You Male or Female?
ASL        Tell me your Age,Sex and Location
IDK        I don’t Know
SD           Sweet Dreams
BRB        Be Right Back
JK            Just Kidding
Tnx        Thanks
BTW       By The Way
K               Okay
TY           Thank You
ROFL      Rolling on Floor Laughing
LOL         Laugh out Loud
TTYL     Talk to you later
FYI          For Your Information
LMAO    Laugh My Ass Out
WTF        What The F**k
FB             Facebook
LMFAO     Laugh my f**king ass off
WTH      What the hell
GM          Good Morning
LMK       Let Me Know
zzz          Sleeping
BFF        Best Friends Forever
Jk           Just kidding
B4          Before
L8          Late
gr8        great
plz        please
sry       sorry
bbz       babes
kk         okay
kl          cool
This List is far from Complete but it has the most commonly used slang codes in facebook chat.If I missed some then do share them with our readers by posting comments.

All Facebook Chat Slang Codes

All Facebook Chat Slang Codes
Slang’s have become very common in chat’s,Sms,emails.People new  to these slang’s find really difficult to understand converstion.On the other hand it saves a lot of time and effort if slang’s are used.I will give the most commonly used Slangs with there meanings that are used in facebook chat or Sms.

Here are the Most Commonly used Facebook chat slang’s
ASAP    As Soon As Possible
GN         Good Night
M/F       Are You Male or Female?
ASL        Tell me your Age,Sex and Location
IDK        I don’t Know
SD           Sweet Dreams
BRB        Be Right Back
JK            Just Kidding
Tnx        Thanks
BTW       By The Way
K               Okay
TY           Thank You
ROFL      Rolling on Floor Laughing
LOL         Laugh out Loud
TTYL     Talk to you later
FYI          For Your Information
LMAO    Laugh My Ass Out
WTF        What The F**k
FB             Facebook
LMFAO     Laugh my f**king ass off
WTH      What the hell
GM          Good Morning
LMK       Let Me Know
zzz          Sleeping
BFF        Best Friends Forever
Jk           Just kidding
B4          Before
L8          Late
gr8        great
plz        please
sry       sorry
bbz       babes
kk         okay
kl          cool
This List is far from Complete but it has the most commonly used slang codes in facebook chat.If I missed some then do share them with our readers by posting comments.

All Facebook Chat Slang Codes

All Facebook Chat Slang Codes
Slang’s have become very common in chat’s,Sms,emails.People new  to these slang’s find really difficult to understand converstion.On the other hand it saves a lot of time and effort if slang’s are used.I will give the most commonly used Slangs with there meanings that are used in facebook chat or Sms.

Here are the Most Commonly used Facebook chat slang’s
ASAP    As Soon As Possible
GN         Good Night
M/F       Are You Male or Female?
ASL        Tell me your Age,Sex and Location
IDK        I don’t Know
SD           Sweet Dreams
BRB        Be Right Back
JK            Just Kidding
Tnx        Thanks
BTW       By The Way
K               Okay
TY           Thank You
ROFL      Rolling on Floor Laughing
LOL         Laugh out Loud
TTYL     Talk to you later
FYI          For Your Information
LMAO    Laugh My Ass Out
WTF        What The F**k
FB             Facebook
LMFAO     Laugh my f**king ass off
WTH      What the hell
GM          Good Morning
LMK       Let Me Know
zzz          Sleeping
BFF        Best Friends Forever
Jk           Just kidding
B4          Before
L8          Late
gr8        great
plz        please
sry       sorry
bbz       babes
kk         okay
kl          cool
This List is far from Complete but it has the most commonly used slang codes in facebook chat.If I missed some then do share them with our readers by posting comments.

powered by Blogger | WordPress by Newwpthemes | Converted by BloggerTheme