The first link shows your IP.
http://www.whatismyip.com/
This site will show more information like your town…
http://www.geobytes.com/IpLocator.htm?GetLocation
If you pass this test your Proxys / Programs are doing their job…
https://grc.com/x/ne.dll?bh0bkyd2

Privacy Check – checks your computer privacy, looks for parasites and reveals your computer’s security information. Every website you visit can see this private information! We also attempt to reveal the IP address behind your firewall (your NATted address) and security vulnerabilities such as supercookies and clipboard vulnerabilities
http://www.auditmypc.com/freescan/info.asp

PORT SCAN
Vulnerability scans reveal port numbers, use this port search to find information on a port, Trojan or virus. Add this port search to your site!
http://www.auditmypc.com/freescan/portsearch.asp

Test your security NOW! – This is one of the few, if not the only, network port scans that checks all 65,000 TCP ports. Why conduct a port scan on just the first 1000 ports when there are more than 65,000 TCP ports that a Trojan or service could be listing on – get the complete picture and perform a vulnerability scan now
http://www.auditmypc.com/freescan/scanoptions.asp

ENVIRONMENTAL CHECKS
All Net Tools – Environmental Checker
http://www.all-nettools.com/toolbox,net
iNet-POLICE.com Internet Police – Environmental Check-DO NOT ACCEPT JAVA
http://inet-police.com/cgi-bin/env.cgi
Browser Info – Information about your navigation collected by the server and from your browser
http://www.elfqrin.com/binfo.shtml

SURFING DATA & OTHER TESTS
INTERNET EXPLORER (Vulnerability Test) – Detect a browser vulnerability. If your browser fails this test, hackers can infect your computer automatically when you visit an infected web page
http://www.lockdowncorp.com/bots/testyourbrowser.html
Single Vulnerability Test – Examines your system with any one of the available 1864 vulnerability tests. Username: hemelia – Password: abcdef
http://www.securityspace.com/smysecu…gle_index.html

Explore More

Critical SQL Injection in Stamps Myanmar

PlanetCreator has reported another critical SQL Injection (vulnerability) on Stamps Myanmar http://www.stampsmyanmar.com and powered by indexmyanmar SQL injection is a code injection technique that exploits a security vulnerability occurring in

Investigate Google’s Gmail, Docs and other products: EPIC Petitions to FTC

Electronic Privacy Information Center (EPIC) a privacy group based in Washington, D.C filed a petition to Federal trade commission to investigate the Google’s cloud computing offerings. They asked FTC to

What are the various countermeasures to a buffer overflow?

The countermeasures to a buffer overflow are as follows: * Perform manual auditing of the code. * Stack execution should be disabled. * Take the support of the functions which