Your IP Address:, No Proxy Detected
User Agent: CCBot/2.0 (

Note: You must click allow in the browser to determine your location.

The creator.


Oct 2013

Find my IPv6 address on Windows 8

Posted by / in IP Address Tips / No comments yet

The following is a step-by-step tutorial that will guide you through the required steps to find your IPv6 address on a Windows 8 or Windows 8.1 laptop or desktop PC.

Step 1: Open Network and Sharing Center

On the Windows 8 taskbar, you should see an icon that indicates the status of your Internet connection. By default, the taskbar is located at the bottom of the screen. The taskbar shows information such as the date, time, and opened programs. The Internet connection status icon is located near the date and time. When you have found the connection status icon, right-click and choose Open Network and Sharing Center from the menu list.

Step 2: Open the Network Connections Window

Now you should have a window open for the Network and Sharing Center. This window is where users are able to view their basic network information and set-up network connections. There is a sidebar for this window located on the right. The sidebar contains navigation links related to the Network and Sharing Center. Find and click the link entitled “Change Adapter Settings”. Once you click this link, a new window will appear with icons for each of your Network Connections.

Step 3: View the Connection Status of your Internet Connection

The Network Connections window gives a graphical interface for each of the active and inactive network connections on your device. There is one icon for each Network Interface Card. For example, if you have both an Ethernet card and a wireless Internet card, you should see two icons – one for each. Some Windows 8 users may have other icons, indicating an additional virtual or physical networks available. However, you are only Interested in the adapter that allows you to connect to the Internet.

Find the icon that identifies your active Internet connection. Inactive connections are identified by a red “X”. If you are connected to the Internet using an Ethernet cable, choose the Ethernet adapter. If you are connected to the Internet via Wifi, choose the wireless adapter.

Once you’ve found the appropriate adapter, right-click on the icon. Select “Status” from the menu list. Now, the Ethernet Status or Wireless Status window should be visible.

Step 4: View the IPv6 Protocol Properties

The Status window shows information concerning your current Internet connection. There are two sections: “Connection” and “Activity”. The Connection section lists the details of your connection. The Activity section lists the number of bytes sent and received through this connection. In the Connections section, there should be a line that reads “IPv6 Connectivity”. If the details to the right of this read “No Internet Connectivity”, you are not connected to the Internet or your network adapter does not support or is not currently using IPv6.

Step 5: View the Network Connection Details

The Network Connection Details provides you with all of the IP address information for your network adapter. If your connection does not use IPv6, but your device supports IPv6, you will be able to see the “Link-Local IPv6 Address”. Next to that is your IPv6 address (for all practical purposes).

Please select the social network you want to share this page with:


Sep 2013

How to Facebook at Work or School

Posted by / in IP Address Tips, News / No comments yet

If you’re one of the many who has trouble accessing your social networking accounts while at work or at school, including Facebook, you may be in luck. The most effective method to bypass the blocked content and access restrictions on company networks is through the use of a Virtual Private Network, or VPN. The second most effective method to circumvent the social networking filter is through the use of a proxy. The third method of getting around censorship overcomes the issues with the first two methods – the secret? IP address.

Issues with VPNs

There are two major issues with using a VPN at work or at work or school. Most companies already have safeguards in place to prevent the use of VPNs. Also, the expense of a VPN may not justify its cost.

Software Requirement

Many VPNs require subscribers to download and install programs in order to access the private network. The problem with this is most employers and education institutions only allow administrators to install software on their computers.

Cost of VPNs

VPNs generally require a paid subscription for access. This makes a VPN less appealing to Internet users who simply want to use Facebook at work or school.

Issues with Proxies

Proxy connections usually require advanced knowledge of network configurations. Not only is this difficult for the average user to implement, but proxies are easily identifiable. The biggest issue with a using a proxy server at work or school is they’re banned. Proxy servers are identified in a few ways:

  1. By port number. Proxy servers usually require an outgoing connection to a suspicious port, such as 8080 or 3128.
  2. By IP address. This is difficult, but possible. Proxy lists are maintained and abundant. They’re so easy to find by users that you can imagine that network admins don’t have any trouble getting their hands on them.
  3. By domain. Proxy IP addresses may not be easy to detect on a network, but web proxies are implemented using a browser. This makes it easy for network administrators to block acces to these proxy servers.

Using Facebook IP Addresses

Most network administrators establish access restrictions according to the knowledge of the average Internet user. Many social network filters only block access to social media websites by the domain name and not the IP address.

Why? Blocking access to IP addresses is usually not a great idea. Some web servers host multiple websites. This means if access to the IP address is blocked, then access to all websites hosted on the same server would be blocked.

Actually, you could visit any website by typing the IP address directly into the browser. The only reason that domain names are used is to make web addresses easier to remember. You can find the IP address of any website by using the DNS lookup tool.

Facebook IP Address:

Type directly into the URL bar at the top of your web browser. Happy Facebooking!

Please select the social network you want to share this page with:


Sep 2013

FBI Creates Malware

Posted by / in News, Security / No comments yet

Most Americans have blind faith in our government when it comes to Internet security. We even authorize the U.S. government to listen to our phone calls, read our emails, and dig through our text messages. But what does the FBI do when it encounters resistance? They build a virus.

Freedom Hosting – Anonymous Hosting Services

Freedom Hosting, founded and run by Eric Eoin Marques, is a web hosting service for websites that require large amounts of security to access. The hosting company allows access to its websites only through “Tor Networks”.

Tor Networks

Tor networks and services are used by websites to avoid surveillance or safeguard an Internet users’ privacy to an extensive degree. More often than not, the intention is to protect a user with a legitimate and legal purpose. Some examples of these websites include Human rights activists, environmentalists, and even communication involving government whistleblowers.

Tor networks also provide services to circumvent restrictions company websites have on competitors. For example, if you work for an Internet technology company, your company website may divulge strategy information to most users. However, your company also cloaks this information when your website is viewed by a known competitor. Tor exists to get around these restrictions.

Secret and Unethical Use of Tor

Freedom Hosting was not being investigated for protecting legal practice of U.S. civil rights. The company was being closely watched by the FBI for child pornography allegations. Due to the access restrictions and security for the Tor networks, the FBI found it difficult to get the evidence and information it needed.

Mozilla Firefox Provides the Solution

Mozilla confirmed the code exploited a critical memory management vulnerability in Firefox that was publicly reported on June 25, and is fixed in the latest version of the browser. – Kevin Poulsen. Wired. September 2013.

The FBI, determined to see through to the demise of Freedom Hosting, created a malware program designed to exploit a Firefox vulnerability. The attack on Internet security by the FBI was apparently first noticed in August, when websites that were hosted by Freedom Hosting, including legitimate websites, began displaying a “Down for Maintenance” message.

The source code for the maintenance webpage contained suspicious javascript code. Embedded in the JavaScript was a Windows .exe program that merely sends a MAC address and serial number to an external IP address located in Virginia.

Now, the operator of Freedom Hosting, Eric Eoin Marques, awaits extradition to the U.S as he sits in jail in Ireland. He is being charged with child-exploitation in Maryland.

Please select the social network you want to share this page with: