1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

I got bit! Got a email from ISP about a torrent!

Discussion in 'Windows - P2P software' started by smiffff, Jun 23, 2006.

Thread Status:
Not open for further replies.
  1. ashwin18

    ashwin18 Regular member

    Joined:
    Jun 30, 2006
    Messages:
    422
    Likes Received:
    0
    Trophy Points:
    26
    OK, I get it now. Instead of taking a direct route to download data, it has to travel upto Korea (or wherever the proxy routes you to), then back to the download server, and then to your computer. It all makes sense now...

    craftyzan,
    What is CCleaner?
     
  2. mybulldog

    mybulldog Guest

    sorry about the caps. svtstang
     
  3. svtstang

    svtstang Regular member

    Joined:
    Apr 23, 2006
    Messages:
    4,565
    Likes Received:
    0
    Trophy Points:
    46
    LOL np man, there are just so many people in the forums that do that expecting help, and honestly it hurts my retinas reading it. You made a simply mistake, no harm, no foul. Have fun dl'ing, and take every measure you can to portect yourself from baddies.
     
  4. ddp

    ddp Moderator Staff Member

    Joined:
    Oct 15, 2004
    Messages:
    39,264
    Likes Received:
    109
    Trophy Points:
    143
  5. mark5hs

    mark5hs Guest

    what exactley is this HideIP Platinum ?
     
  6. Argentum

    Argentum Member

    Joined:
    Jul 5, 2006
    Messages:
    4
    Likes Received:
    0
    Trophy Points:
    11
    It looks like it does the same thing as Proxyway, except that Proxyway is free. (There is a "pro" version, though it simply allows unlimited proxies in it's list. The freebie "only" allows 100 proxies in your list. ;) )
    There are websites that usually have a forum full of enthusiasts and contributers, that build up and continually update IP address lists for proxy user programs to use.
    You run the program and import the list (which can be dozens or even hundreds of IP addresses), and the proxy serving program runs through and tests each one's connectivity details; location, whether or not it's "hidden" (something I still don't understand), and it's download/upload bit rate.
    Some on the list are simply dead connections that fail, and you discard them. You end up with a list of foriegn IP addresses fromk which to choose your proxy server.
    You can choose one from Thailand, for example, and everything that you send and recieve over the web automatically gets routed through that IP address in Thailand before leaving and returning to you.
    It's not a failsafe that you cannot be traced. Rather rudimentary procedures can track down your IP, but because you complicate the process, it's more difficult to prove that YOU actually actively sought the use of the foriegn IP address when it sent data to you. (IE, for all they know, you were stupid and let an unknown IP address in Thailand hack into your system. "They" [the piracy-cops] KNOW what the deal is, they just can't really be bothered to try to prove it.)

    You can use multiple proxies, which would PROBABLY allow you even greater chance of never being tracked at all (this is what hackers and email scammers do), but the download times would be excrutiatingly slow and subject to frequent bumping off, depending upon the reliability of the various providers.
    For example, you could bounce around from Iran to Pakistan to Brazil to China, but who knows how reliable all those places are? (Maybe being bumped off the connection every twenty minutes is a way of life for some of those places, I don't know.)
    I also have no idea how to run multiple proxies. (Perhaps that is another thing the "Pro" versions of many of these free proxy servers can do.)

    Hope this helps. I'm a n00b, so I expect I may be corrected on some things. (Get a second opinion.)
     
  7. craftyzan

    craftyzan Member

    Joined:
    Aug 2, 2006
    Messages:
    26
    Likes Received:
    0
    Trophy Points:
    11
    HIPP provides you with working and reliable proxies, no dead stuff. You play the switching game to give the trackers headaches, and let them chase less lively game.
     
  8. mark5hs

    mark5hs Guest

    I read the review of hide ip on cnet and they gave it a 2 and said that many of the proxies didn't work and user reviews said that they turned it on and went to whatismyip.com and it still gave them it. Is it really a good program?
     
    Last edited by a moderator: Aug 22, 2006
  9. svtstang

    svtstang Regular member

    Joined:
    Apr 23, 2006
    Messages:
    4,565
    Likes Received:
    0
    Trophy Points:
    46
    For the millioonth time, proxies are false protection. Ok for everyday browsing, not to good for P2P or the likes. The people you are using the proxy to hide from arnt stupid, and can easily see through the proxy if they gave a sh!t.
     
  10. tocool4u

    tocool4u Guest

    Actually they don't see through them. They trace the IP to that proxy server and the server keeps logs of the IPs that go to a proxy server IP. The people would have to contact admin and tell them to check the logs for that IP. They can also ping their IP and it will report back the "real Ip" Because ping requests don't lie.
     
    Last edited by a moderator: Aug 22, 2006
  11. svtstang

    svtstang Regular member

    Joined:
    Apr 23, 2006
    Messages:
    4,565
    Likes Received:
    0
    Trophy Points:
    46
    Wow you are dense man. See through=they know you are using a proxy=being able to trace your true IP. just cause I dont explain the process doesnt mean you should feel the need to correct a perfectly legitamite statement. Thanks though.

    BTW, just because an angency has your IP doesnt mean jack. Until they contact your ISP and either your ISP caves in or you pull a stupid and admit something, they have no clue who you are, or what you have actually done. Tocool4u please do what you do and correct that also.
     
  12. scorpNZ

    scorpNZ Active member

    Joined:
    Mar 23, 2005
    Messages:
    4,263
    Likes Received:
    59
    Trophy Points:
    78
    @smiffff ... You are correct in your assumption that they track uploaders from p2p,torrents etc ,and yes they have powerful software that they use to see who's uploading music,movies,porn etc, it's that software that gets them the results and how one gets caught, there was a doco here in NZ that showed antipiracy companies searching the web etc for illeagal file sharing with that software ,i think they can see who's downloading also tho i can't be 100 % sure, meh anyway i've downloaded more than a few mp3's and only on 3-4 occasions in the last 2 years have had the firewall detect an attempted intrusion with the same signature.Basicly don't allow uploading from any folders,if you have to upload limit the amount of files to 1 and reduce the kb to 1-5 kbps if poss,make sure your download folder is cleared of all finished files,as it maybe able to be browsed from the net by the antipiracy software


    As for surfing anonymously ,there is no such thing everything you do is logged
     
    Last edited: Aug 22, 2006
  13. Pop_Smith

    Pop_Smith Regular member

    Joined:
    Nov 26, 2003
    Messages:
    970
    Likes Received:
    0
    Trophy Points:
    26
    smifff, sent you a PM.

    If you use PG2, make sure its updated (update it EVERY day, make sure its running at all times too, sense it never takes up more then 1% cpu power).
     
  14. tocool4u

    tocool4u Guest


    Dude stop it with the dense stuff man.......Are you that low to put stuff down and to jump down peoples backs. I wasn't correcting you .....Jeez are you still mad at me about the sig thread..Please be a man and do you attacks in PM and not bring it in forums....Just for that

    *Reported*
     
  15. svtstang

    svtstang Regular member

    Joined:
    Apr 23, 2006
    Messages:
    4,565
    Likes Received:
    0
    Trophy Points:
    46
    LOL, didnt see that coming, wait I did! Sure I will get suspended for absolutely nothing, if thats the case, i really dont care anymore.
     
  16. craftyzan

    craftyzan Member

    Joined:
    Aug 2, 2006
    Messages:
    26
    Likes Received:
    0
    Trophy Points:
    11
    Doing things with proxies doesn't guarantee no one is looking at you and that no one can track you. Hense change proxies often... It just makes you harder pray to track. Any predator goes after the easy catch. It is critical to keep more than one form of protection going. It's like staying within a flock.
     
  17. Nephilim

    Nephilim Moderator Staff Member

    Joined:
    Feb 13, 2003
    Messages:
    14,942
    Likes Received:
    1
    Trophy Points:
    116
    Come on stang - there's no need to call anyone dense. TooCool was just making a point and didn't call anyone names.

    Miserable thread closed.
     
    Last edited: Aug 23, 2006
Thread Status:
Not open for further replies.

Share This Page