Showing posts with label private proxy. Show all posts
Showing posts with label private proxy. Show all posts

Monday, June 9, 2014

Something Else to Worry About: Web Bugs

Spammers use them all the time, but have you ever heard of web bugs?  Sure, we all know what cookies are, but what about web bugs?  Well, these are a type of spyware that allows a spammer to know when an e-mail he sent was viewed.  They are also used to confirm the validity of the e-mail address.

Advertisers are also using these web bugs to see which sites people are visiting and how often they visit.  By using this information, the advertisers are able to generate reports on Internet users so that related ads can be placed on each particular user’s browser.

Browsers can either accept or reject cookies, but web bugs are a different story.  They are usually formatted as a GIF (Graphic Interchange Format), which is commonly used on the Internet.  This is why a browser will normally accept the web bugs.  Even though it’s a GIF (which people associate with pictures), the web bug will go unnoticed in a spammer’s e-mail.  This is because the image is very small; usually no bigger than 1 X 1 pixel.  The image will also blend into whatever background it’s on; if the background is white, the web bug will be white.  As for advertisers, they are very clever, too.  They can hide a web bug in a site’s logo, so even though it is right in front of you, you will never see it.

If you’ve ever received an e-greeting card, you have encountered web bugs.  When a card is sent, the sender will be given an option to be e-mailed when the card is received and viewed.  This is a prime example of web bugs at work.

Because spammers are one of the main users of web bugs, concerns about privacy are high.  With the use of web bugs, a spammer will have access to an incredible amount of information about the recipients of his e-mails.  The web bugs will tell the spammer the IP Address of the computer receiving the web bug, it identifies the URL the web bug came from, it identifies the URL of the page it was viewed on and it can identify the exact time the web bug was viewed.  These web bugs are like tiny little stalkers, keeping track of your movements.

Privacy concerns also arise when a web bug is placed on a particular website.  The main concern is that an individual’s Internet browsing is being tracked without that individual’s knowledge or consent.  To make matters worse, this tracking isn’t going against any website’s privacy policy since the bugs are generally placed by third parties.  Third parties aren’t required to adhere to the privacy policy terms and conditions.

Whether they come from a spammer’s e-mail or a website, these web bugs are putting everyone’s privacy in jeopardy.  Personal information is being gathered, yet there’s nothing you can do to stop it.  One thing you can do to help guard against the web bugs is to turn off your browser cookies.  A safer option would be to use a proxy server.  With a proxy server, you and your activities can’t be tracked by web bugs because it’s not your IP Address that is being tracked; it’s the IP Address of the proxy server.

You can also keep your privacy secure by using the proxy servers of Privacy Partners.  They offer a FREE trial so that you may see firsthand how using a proxy server can work to your advantage.  Besides changing your IP Address, each connection is encrypted and NEVER monitored, so you can be sure that your information will be safe. 

Thursday, November 21, 2013

What Is An IP Address?



Anyone who uses a computer has heard the term “IP Address”, but what exactly does that mean?  What is an IP Address?
 
An IP Address, or Internet Protocol Address, is the digital “address” assigned to every device connected to the Internet. Internet Protocol is the technical standard that should be followed while using the Internet.  This protocol was developed in the 1970s.

There are two versions of IP that support the computer network addressing.  They are:  Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6).  The most commonly used version is IPv4.  With this version, the IP Addresses are four bytes (or 32 bits) long.  IPv6 is the newer version, which allows IP Addresses of 16 bytes (or 128 bits) long.  Whichever version is used, the IP Address has two main purposes:  host or network interface identification and location addressing. 

IPv4 addresses are typically shown in a “dot-decimal” sequence.  They are made up of four parts, using numbers that range from 0 to 255.  Each part is separated by a decimal (or dot) and each group consists of 8 bits.  An example of this is shown below:

The Internet Assigned Numbers Authority (IANA) is responsible for coordinating the global pool of IP Addresses and then providing them to the Regional Internet Registries (RIRs) so they can be assigned to end users, including Internet service providers.  The main address pool used by IANA was depleted on February 3, 2011.  This is the date that the last blocks were assigned to the 5 RIRs.

IPv4 addresses were depleting so rapidly due to the explosive growth of the Internet, that the Internet Engineering Task Force (IETF) was forced to look into new technologies in order to expand the address capacities.  The solution they decided on was to completely redesign the Internet Protocol.   In 1995, IPv6 was named as a means to replace IPv4.

In this new version, the address size was increased to 128 bits from the original 32 bits.  Even considering a growth explosion, this should give a sufficient amount of available addresses well into the future.  A typical IPv6 address would look like this:
This new formula is capable of automatically changing the routing prefix of whole networks without the need to redesign or renumber the system.  This will be necessary if global routing policy changes. 

Thursday, May 16, 2013

What are the Advantages of Using a Proxy Server?



I have been asked many times if it’s worth it to use a proxy server.  My answer is always an emphatic “YES”!  

I travel a lot.  Since my means of transportation is usually a car, I often work while on the road.  This means using public hotspots, whether it’s when I stop at Starbucks for a quick snack, or when I stop for the night at a motel.  This always worried me before I started using Private Proxy’s proxy servers.  You never know if someone at the next table or in the next room is a hacker, but now, I don’t have to worry because I know that everything I send out from my computer is encrypted.  Sure, you can find some free proxies, but some may not be so trustworthy.  Because they’re free, they can be used by anyone and they are usually not encrypted, so you’re not really safe from hacking.  You also have to be careful because some of these proxies are monitored by the owners of the sites.  By monitoring, they can get your personal information.  

Another advantage is that no one knows when I’m traveling or when I’m at home.  With Private Proxy, I have a choice of many servers, both rotating and static, in many areas of the United States, Canada and the Netherlands.  This way, I can use a server in my area of the country when I want my travels to remain private or, I can choose a server across the country when I’m invited to the hundredth kid’s birthday party of the year at Chuck E Cheese!  After all, there is a limit on how much bad pizza and how many screaming kids one person can take.  

Even when I travel outside of the United States, I can still keep in touch with friends, family and my local news.  Since some websites aren’t available all over the world, all I have to do is choose which one of the US servers I would like to use and no matter where I am, the Internet will be “fooled” into thinking I’m home.  I will then have access to sites that would normally be blocked in whatever country I’m traveling in.  I can watch my favorite TV shows, read my local newspapers and shop on sites that would only be available to me in the United States.  All of this without worrying that someone could steal my information by breaking into my data stream.

When I chose Private Proxy as my proxy service, encryption was one of the major selling points.  I like knowing that no matter where I go in the world, even if I’m just around the corner or at home using my wireless router, no one will be able to grab my information and use it to their advantage.  Also, the proxies are never monitored and only Private Proxy clients have access to their servers.  Add that to the choice of multiple servers in different areas of the United States, Canada and the Netherlands and I was hooked.  

Private Proxy offers a free trial period so you can see all the advantages for yourself.  Simply go to the home page and click on the link for the Risk Free Trial at the right of the screen. 

Monday, August 6, 2012

So, You Think You Can’t Be Hacked?


I’m a Customer Service Representative at Private Proxy.  Every day, I speak with people about Internet privacy issues.  Most of the people I speak with feel that they cannot be hacked because they are careful.  They know all about identity theft, but are sure that it won’t happen to them.  That’s when I ask them if they ever use the free, public WiFi in hotspots like Starbucks and Panera.  I then tell them how they can be jeopardizing their Internet privacy by giving them this example:

You are in a store making a small purchase and your credit card is denied.  You don’t think anything of it, and swipe another card.  That one, too, is denied.  Now you start to wonder what’s up, so you call the credit card companies.   When you speak to Customer Service, you are told that your cards are maxed out.  These cards aren’t used that much and you always pay your bills in full as soon as they’re due, so how could you be maxed out?  You ask for copies of your transaction reports so you can see where the problem is.

You get your reports and, sure enough, not only are the cards maxed out, they are each over the credit limit!  Big problem!  As you look at the transactions, you see purchases made in stores you never heard of.  These purchases include gaming systems, computers and flat-screen TVs.  There was even a vacation at a Tahitian resort on there.  None of these purchases were made by you, so you call the card companies again and cancel those two cards.  Just to be on the safe side, you also cancel your other credit cards and bank card.

For the life of you, you can’t understand how this could be happening.  After wracking your brain trying to think of when you last used these credit cards, you remember that a couple of weeks before, you used both cards shopping on-line while you were taking your lunch hour at Panera.  Since this is a free public hotspot, everyone can use it.  Because it’s for the public to use, the data stream isn’t encrypted, so anyone with computer knowledge and the right software can intercept your data stream and get hold of your username, password and credit card information.   Mystery solved, but how do you stop it from happening again?

Well, for starters, you should download our Internet Privacy Guide.  When you read this, you will learn how your identity can and will be stolen.  When you learn of all that could go wrong, it would help you tremendously to take part in our FREE trial of Private Proxy.  It’s very easy to understand how the product works and it’s also easy to use.  You will have a choice of many servers, all using encryption to keep your data safe from cyber-crooks.

Protect Your Internet Identity!

Thursday, April 19, 2012

US IP Address - How To Get One

When living outside of the United States there are a couple of reasons why you should use an anonymous proxy to surf the Internet.

1. If you need to access US-based websites, they might be blocked because of your IP address.
2. If the country you are in censors the Internet, by using a private proxy you can bypass their filters and gain unrestricted access to any website.

Here's an example of using anonymous proxy from China.


If you need to change your IP address to be a US IP address, Sign up for a free trial of Private Proxy at www.privateproxysoftware.com.