The first link shows your IP.
http://www.whatismyip.com/
This site will show more information like your town…
http://www.geobytes.com/IpLocator.htm?GetLocation
If you pass this test your Proxys / Programs are doing their job…
https://grc.com/x/ne.dll?bh0bkyd2

Privacy Check – checks your computer privacy, looks for parasites and reveals your computer’s security information. Every website you visit can see this private information! We also attempt to reveal the IP address behind your firewall (your NATted address) and security vulnerabilities such as supercookies and clipboard vulnerabilities
http://www.auditmypc.com/freescan/info.asp

PORT SCAN
Vulnerability scans reveal port numbers, use this port search to find information on a port, Trojan or virus. Add this port search to your site!
http://www.auditmypc.com/freescan/portsearch.asp

Test your security NOW! – This is one of the few, if not the only, network port scans that checks all 65,000 TCP ports. Why conduct a port scan on just the first 1000 ports when there are more than 65,000 TCP ports that a Trojan or service could be listing on – get the complete picture and perform a vulnerability scan now
http://www.auditmypc.com/freescan/scanoptions.asp

ENVIRONMENTAL CHECKS
All Net Tools – Environmental Checker
http://www.all-nettools.com/toolbox,net
iNet-POLICE.com Internet Police – Environmental Check-DO NOT ACCEPT JAVA
http://inet-police.com/cgi-bin/env.cgi
Browser Info – Information about your navigation collected by the server and from your browser
http://www.elfqrin.com/binfo.shtml

SURFING DATA & OTHER TESTS
INTERNET EXPLORER (Vulnerability Test) – Detect a browser vulnerability. If your browser fails this test, hackers can infect your computer automatically when you visit an infected web page
http://www.lockdowncorp.com/bots/testyourbrowser.html
Single Vulnerability Test – Examines your system with any one of the available 1864 vulnerability tests. Username: hemelia – Password: abcdef
http://www.securityspace.com/smysecu…gle_index.html

Explore More

What Damage Can Hackers Do?

Hackers like to subvert computer security without permission. They are cyber criminals. This can mean gaining access to a computer across the Internet for illicit purposes. They might engage in

Login Bypass vulnerability of Myanmar Sites (Fixed)

Last week PlanetCreator informed Security Weakness of Myanmar Uready http://www.myanmaruready.com/ and Su Aung Phyo Co., Ltd. http://www.suaungphyo.com to their webmaster and fixed as long as we reported. SQL injection is

Critical SQL Injection in Perfect Magazine

PlanetCreator has reported another critical SQL Injection (vulnerability) on Perfect Magazine : Myanmar Fashion, Entertainment, News, Wrtitings and Asrology for all myanmar people http://www.perfectmagazineonline.com This vulnerability has been alerted to