Skip to main content

Hide Ur IP - sockcaps tutorial

Hide Ur IP


SocksCap is an application wrapper developed by NEC. SocksCap enables the Internet applications to run through a socks server so that the server end of the application can't know your real IP address. SocksCap does not require modifications to the Winsock applications or the Winsock stacks. On a SOCKS enabled firewall SocksCap offers a client-only solution. Socks is now owned by Permeo.

SocksCap allows Windows users to enable their Winsock applications to traverse a SOCKS server. SocksCap does not require modifications to the Winsock applications or the Winsock stacks. However, due to the multitude of available Winsock stacks, SocksCap may not work in every situation.

Other Program that Support SOCKS
Each program that support SOCKS proxy should have a section in their configuration for Proxy Setup. In this section the following information will be asked for:

1. SOCKS Server:
Fill in the socks server address such as "sock5.my-proxy.com" or 128.58.14.99

2. Port:
Usually 1080. (port 1080 is the default port for socks server)

3. User Name:
Fill in it if the server need.

4. Password:
Fill in it if the server need.

Sockscap Makes Using Socks Easy

If the Internet program that you are using does not have a proxy setup option, or if you want to make configuring easier, then you can use a freeware application such as SocksCap.

Once sockscap is configured for our proxy server, you do not need to configure any of your Internet programs. Simply click and drag your Internet programs into the sockscap program control window, start the program, and you are runing on the proxy! It is this easy.

Downloading Sockscap Of Oficial Website:

Send SocksCap comments and bug reports to:

sockscap-comments@list.permeo.com

Permeo Application Security Platform:

http://www.permeo.com/


Socks WWW site:

http://www.socks.permeo.com/

After Downloading SocksCap you can configure your settings as shown in the following screen captures.
Sockscap Fast / EASY Setup

Select 'File' from the Top left of the SocksCap interface, then select 'Setup' from the drop down menu. Enter the socks server address and port you have.

Under the 'Protocol' section, you should enter your user name when using a SOCK4 server. If you use a Sock5 server, commonly you can select "Resolve all names removely" under the 'Name Resolution' section. Ask help from the Sock5 server master if you have a problem here.

Under "Supported authentication" check the box for "Username/ Password" if you have. A Sock5 proxy server usuall need one.

From the main SocksCap control window, add your applications the same way you would create a Windows shortcut as in the following screen captures. You can drag and drop your favourite applications from your desktop or program directory into the SocksCap control window for easy "socksification".

Click and drag your program icon into the blank control window and you will see...

Click on New application profile and you will see..

Simply click on the Ok button and your program will be added to the sockscap control window. Repeat this step for each of your Internet programs that you would like to use on the LockDown Proxy. When you are finished your sockscap control window will look something like the example below.

Now you are ready to use sockscap to launch your programs.

1. Close or Exit Sockscap.
2. Close or Exit your Internet Programs.
3. Make sure that you are connected to the Internet.
4. Launch sockscap and enter the user name and password for the sock5 proxy server you set.
5. Launch your Internet programs from the sockscap control window.

When you setup your new applications to run "socksified" you no longer need to use the proxy settings in the application itself, simply start them through the SocksCap interface and they will be working under our proxy service and hide your real connection.

Testing Your Connection

You can test your browser by loading the

http://info.my-proxy.com

web page from IE in the SockCap control. If you are connecting through the proxy, you will see what your real IP address is hided.

*NOTE* You can drag and drop your newly created "socksified" clients from the main SocksCap control window, to your desktop so you don't have to re-open the SocksCap control window to start your sessions.

Now you are ready. Any time you like you can start your SocksCap program and launch your Internet programs "socksified" under The Proxy Connection Proxy Servers.

Comments

Popular posts from this blog

Place Files Inside EXE and Execute them using Gamemaker

I am fond of creating games in Gamemaker and Mugen. However I found an interesting way to create executable files that may contain anything inside them (may be a whole cracked Program) and may act as extractors or copy protectors Tools required  GameMaker 7 or above Procedure  1) Download and Install Gamemaker and start a Game Project by going to File -> New.  2) Every game consists of a Room in which all objects shall act and interact with each other.So Create a new room by either clicking on the icon on Standard toolbar or by going to Resources Menu -> Create Room.Name it anything you want.In my case ROOM0  3)Every Game consists of Objects which are responsible for all interactions. So create a new object by either clicking on the icon on Standard toolbar or by going to Resources Menu -> Create Object.Name it anything you want.In my case VIRUS  4)Now create a new script (Press CTRL+ALT+C or Resources Menu -> Create Script),Name it SCRIPT0...

Basic Introduction To SQL Injection

SQl injection is a vulnerability that allows an attacker to influence the queries that are passed to the back-end database.It has been present since the time databases have been attached to the web applications.However, the main credit of bringing SQL injection into public notice goes to Rain Forest Puppy who in 1998 wrote an article on it and in 2000 he wrote another article describing how he hacked one of the popular website on the internet using SQL injection. Before understanding the how SQL injection attacks we need to understand the Simple Three Tier Architectureor a Four Tier Architecture.This will clear your basics and give you a rough idea of how database-driven web applications work. Three Tier Architecture In a simple three tier datbase-driven architecture the three layers that are used are:- Presentation Tier(Browsers) Logic Tier Storage Tier(Database) The three tier architecture follows a linear relationship i.e Presentation Tier connects to the Logic Tier and...

How to Hack a Twitter Account

Twitter is one of the topmost widely running social networking sites,Its alexa ranking is 14(As per now).So therefore it is largely becoming target of hackers,Many requests keep coming to me ,please tell us a way to Hack twitter accounts or How to hack twitter accounts,so therefore i today i have written a post on How to hack twitter accounts Well for this purpose i will tell you the most used method to hack twitter accounts i.e phishing How to hack twitter accounts - Phishing First of all download:   Twitter fake login page ( Latest Version ) Click Here To Download : NOTE : You will be asked to enter a password while extracting the Documents. Please Insert the password as : IHA Step 1 First extract the contents into a folder Step 2 Then edit login.php .(right click and then select edit) In that ,find (CTRL+F) ‘http://rafayhackingarticles.blogspot.com’ then change it to your destined URL but don’t forget ‘'. Now rename the script to pass....