Instructables
Picture of Hide yourself from the internet
If you have ever wanted to use your computer in complete privacy and have no worry that you are leaving a trace that you were there; you should read this tutorial.
----------------------------------------------------------------------------------------------------------------------------------
(I AM NOT RESPONSIBLE FOR HOW YOU USE THIS INFORMATION: YOU SHOULD ONLY USE THIS INFORMATION FOR LEGAL PURPOSES)
----------------------------------------------------------------------------------------------------------------------------------
 
Remove these adsRemove these ads by Signing Up

Step 1: Ultra Surf

Picture of Ultra Surf
I use this program called "Ultra Surf" that connects you to a dynamic proxy server. A proxy server is basically another computer which serves as a hub through which internet requests are processed. By connecting through one of these servers, your computer sends your requests to the proxy server which then processes your request and returns what you were wanting. In this way it serves as an intermediary between your home machine and the rest of the computers on the internet. Proxies are used for a number of reasons such as to filter web content, to go around restrictions such as parental blocks, to screen downloads and uploads and to provide anonymity when surfing the internet.


DOWNLOAD HERE




----------------------------------------------------------------------------------------------------------------------------------
For more information on Proxy Servers:
http://www.whatismyip.com/faq/what-is-a-proxy.asp#ixzz1wOpzP9a3

For more information on Ultra Surf:
http://ultrasurf.us/
----------------------------------------------------------------------------------------------------------------------------------

Step 2: PeerBlock

Picture of PeerBlock
PeerBlock lets you control who your computer "talks to" on the Internet.  By selecting appropriate lists of "known bad" computers, you can block communication with advertising or spyware oriented servers, computers monitoring your p2p activities, computers which have been "hacked", even entire countries!  They can't get in to your computer, and your computer won't try to send them anything either.


DOWNLOAD HERE




----------------------------------------------------------------------------------------------------------------------------------
For more information on Peer Block:
http://www.peerblock.com/
----------------------------------------------------------------------------------------------------------------------------------