Someone can possibly think that you leave no trace while browsing. This is completely wrong. One can not stay unknown and unnoticed so simply. If you want to hide some of your actions in the worldwide web this article is not for you. It is about quite different things. If, for example, you have a lot of spam incoming or having a similar problem then you should use some techniques that allow you to build up a reliable defense system for your personal data.
How do you hide your IP-address? Do you know that the Internet data transmission is active only when receiver’s IP-address is known to a transmitting PC? This is why you are able to see website pages in a browser window or a file download process. I.e. your PC sends its own IP-address to a place where the page or file is located. Then the server system sends requested information to your PC’s IP. It is known that the server keeps the information about which addressee had connected and which data had been requested. In addition it will be able to identify the actions taking place on a particular IP addressee. This kind of manipulations is not complicated.
It is well-known that IP addresses can be static or dynamic. In the last case, user defense will be most effective. For example, your provider gives you one certain address. It will not be given to other users. Your computer may use different addresses to establish Internet connection. That means, it is hard to trace such a user out.
All Internet service providers keep IP assignment data. So if the website owner wants to track one of the website visitors he can contact the provider, and provider will be forced to give out the requested address. In the best case provider will grant him a phone number, which was used to establish connection. It is not always the personal data to be granted but some providers will give out your data easily. To achieve internet anonymity you need to mask your IP address. There are several different ways to do that. The most common way is to use proxy, which acts like a mediator (intermediate node), connecting your computer with a remote server. In this case proxy server will be the authorized data receiver. One should know that all proxies divide into standard, anonymous and transparent. The standard proxies are able to transmit user’s address. So if you want to browse and stay cloaked you should use anonymous or distorting proxy. To hide behind the anonymous proxy you just need to put its address into your operating system’s options.