I'm not sure I understand what you're saying. The purpose of using a proxy is to prevent a web site you are visiting from having a record you visited. When using a proxy, the web site you visit will record the proxy's IP address instead of yours.catman said:I'm a bit more paranoid about my ip being on a proxy where it would be easy pickings to catch someone's eye... i mean, has anyone ever heard of getting busted because their isp ratted them out?
No. The government doesn't have easy access to that info, at least not anywhere near the level of authority involved in investigating you (unless you're doing something way worse than growing).Bulénath said:So I understand it is possible to find anyones I.P. through any post you make.
Is it also possible to run a search on that I.P. and find all other posts, on other websites, even if using a different user name?
Yes, what Yamaha said.VirginHarvester said:Tony Aroma, I understand what you're doing because I was wondering if I could do that myself. So how can I... is there an easy way?
hehateme19 said:Damn Ic mag folks have done it again. Its crazy if you look hard enough or keep checking active topics all of your questions will be answered.
Thanks for the info yamaha, tony and everyone else.......
Tony: so obviousley what you are saying is the proxy servers that you dont have to download anything for wouldn't really work for this site...correct?? I mean if you can't access the top menu's its pretty worthless right? Or am I missing something.
Or for someone who is using a free proxy server that you dont have to download anything from please enlighten us with your expierence using these, and also if possible a name of a site. I googled it but you know how that goes, soemtimes the best thing isnt always what google suggests.
Thanks
Yes and no. The one that I normally use, JonDonym, occasionally goes down, sometimes for days at a time. That's the free proxies it connects to -- the ones you pay for seldom go down for any length of time. But if I need to post to my blog or I just can't wait to read the latest postings on ICMag, then I use one of the other kind. Some let you do more than others. You just have to try them and see what you can and can't do. For example, after some experimenting, I found one that lets me access and post to my blog. And on most sites there is more than one way to navigate. So it's better than nothing.hehateme19 said:Tony: so obviousley what you are saying is the proxy servers that you dont have to download anything for wouldn't really work for this site...correct?? I mean if you can't access the top menu's its pretty worthless right? Or am I missing something.
Yes, but first they have to have the skill, then they have to pick up the signal, then they have to know the location of the signal they are finding. What I mean is, my wireless doesn't work beyond the borders of my yard for the most part- the signal isn't that strong. So my perception is anyone looking to hack might have to be in my yard, a close neighbor- which I don't have- or someone down the street finding a real weak signal. To do anything with that info they have to know it's me and my location, right? Now, with what I'm describing I'm talking about my perception that they intercept your signal and just unscramble it to see what you're sending and receiving over the net. But a lot of that is just surfing and doesn't identify me. If they can unscramble my signal and hack into my computer somehow to find my identity and location that would be pretty scary. It just seems pretty unlikely is all I'm saying. Not that it doesn't concern me, just that it seems pretty unlikely. Now, if I were growing at my location you can bet I would stop communicating on this board via wireless and only on a hard-wired line. That seems obvious just in case for whatever reason the cops decided to sit outside my house and collect info.SpacedCWBY said:There are a lot of teenage kids that have figured out how to crack WEP encryption using specialized linux distros. Can be done in about 10-15 minutes. That's where I'd be a little more concerned.
VirginHarvester said:By the way, I have one computer connected via ethernet cable coming out of my wireless router. So as I understand it that computer though pulling bandwidth through the router is not getting wireless, that is its communications cannot be hacked by someone picking up wireless transmissions. I guess what I'm trying to say is that I understand that computer to be pulling bandwidth directly from my high speed connection out of the wall, it just passes through the router. I hope that's right so that it's more secure than my wireless laptop.