Tor really is the ONLY choice for properly spoofing an IP. However, for it to work it must be set up correctly.I wouldn't use tor. Try another proxy program because Tor didn't always seem to work for me. When you do get a proxy program you can test it with whois.net or a similar website to see if it spoofs your ip.
Do a google search for Torpark or Xerobank. These seem pretty useful and easy to get working. You can even download one of these onto a flashdrive, then use the browser on the flashdrive to access the net. It will keep your internet activities on the flashdrive and off the computer you are using. Get a password protected flashdrive and your stuff is secure from prying eyes. This can be useful if you are using a public computer or a friends computer to do banking or other sensitive work over the net and don't want to leave behind your personal info. One drawback is TOR will slow down your activities on the net. Like I said before, I am no expert, but this seems to be working for me. I am sure that there computer geeks out there that could find weaknesses in this system. Oh well, I am not really willing to go much further for internet security at this time. I mean, I'm not a political dissident or a pervert or anything.I downloaded tor....was confused about configuring it to work....I need something that unpacks...installs....and works without being a guru
I know this is an old post, but perhaps some people don't know this. The Tor Project has released a "Browser Bundle" that works as you described. It is essentially a portable Mozilla Firefox with built in Tor integration.I downloaded tor....was confused about configuring it to work....I need something that unpacks...installs....and works without being a guru
1) Hushmail is the FBI's bitch.I use Hushmail to remain anonymous over email, although you shouldnt rely on email messages to relay sensitive info since it is inherently unsecure (BUT hushmail does offer email encryption which should make it safe)
Hushmail - Free Email with Privacy
And yes, I use Tor but mainly just on torrent sites... I wouldn't go so far as to use it for this site since i just play it cool and dont incriminate myself
OTR encrypted chat with an onscreen keyboard seems the next logical step in the arms race. Capture the screen and log the mouse will probably be their response.An agent with the Drug Enforcement Administration persuaded a federal judge to authorize him to sneak into an Escondido, Calif., office believed to be a front for manufacturing the drug MDMA, or Ecstasy. The DEA received permission to copy the hard drives' contents and inject a keystroke logger into the computers.
...
The judges' conclusion: federal agents did not violate the Fourth Amendment when spying on the Escondido DSL line without any evidence of criminal wrongdoing on his behalf, a legal standard known as probable cause. All the feds must do is prove the information is "relevant" to an ongoing investigation.