Page 2 of 2 FirstFirst 12
Results 11 to 14 of 14

Thread: Proxies

  1. #11
    Senior Member
    Join Date
    Jun 2003
    Posts
    219
    intresting... can i know more about "Proxomitron"?
    Now is the moment, or NEVER!!!

  2. #12
    Just a Virtualized Geek MrLinus's Avatar
    Join Date
    Sep 2001
    Location
    Redondo Beach, CA
    Posts
    7,323
    riya_here, you should get comfortable with using search engines. They help a lot to find the things you need:

    The Proxomitron: An Introduction

    Location to download Proxomitron
    Goodbye, Mittens (1992-2008). My pillow will be cold without your purring beside my head
    Extra! Extra! Get your FREE copy of Insight Newsletter||MsMittens' HomePage

  3. #13
    Senior Member
    Join Date
    Jun 2003
    Posts
    219
    ohh.. thanks a lot!!
    Now is the moment, or NEVER!!!

  4. #14
    AntiOnline Senior Member souleman's Avatar
    Join Date
    Oct 2001
    Location
    Flint, MI
    Posts
    2,883
    r3fus3d> Depends on the network you are connecting through. They can fingerprint your machine which will give some specifics and with enough information, it will still be traceable. You would have to forge your MAC address and close off everything and then not go to any chat rooms or websites that you would normally go to. A profile can be made up and investigated.

    IE> if you log onto AIM through their network, it would still be pretty obvious who was doing it...
    \"Ignorance is bliss....
    but only for your enemy\"
    -- souleman

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •