The first link shows your IP.
http://www.whatismyip.com/
This site will show more information like your town…
http://www.geobytes.com/IpLocator.htm?GetLocation
If you pass this test your Proxys / Programs are doing their job…
https://grc.com/x/ne.dll?bh0bkyd2

Privacy Check – checks your computer privacy, looks for parasites and reveals your computer’s security information. Every website you visit can see this private information! We also attempt to reveal the IP address behind your firewall (your NATted address) and security vulnerabilities such as supercookies and clipboard vulnerabilities
http://www.auditmypc.com/freescan/info.asp

PORT SCAN
Vulnerability scans reveal port numbers, use this port search to find information on a port, Trojan or virus. Add this port search to your site!
http://www.auditmypc.com/freescan/portsearch.asp

Test your security NOW! – This is one of the few, if not the only, network port scans that checks all 65,000 TCP ports. Why conduct a port scan on just the first 1000 ports when there are more than 65,000 TCP ports that a Trojan or service could be listing on – get the complete picture and perform a vulnerability scan now
http://www.auditmypc.com/freescan/scanoptions.asp

ENVIRONMENTAL CHECKS
All Net Tools – Environmental Checker
http://www.all-nettools.com/toolbox,net
iNet-POLICE.com Internet Police – Environmental Check-DO NOT ACCEPT JAVA
http://inet-police.com/cgi-bin/env.cgi
Browser Info – Information about your navigation collected by the server and from your browser
http://www.elfqrin.com/binfo.shtml

SURFING DATA & OTHER TESTS
INTERNET EXPLORER (Vulnerability Test) – Detect a browser vulnerability. If your browser fails this test, hackers can infect your computer automatically when you visit an infected web page
http://www.lockdowncorp.com/bots/testyourbrowser.html
Single Vulnerability Test – Examines your system with any one of the available 1864 vulnerability tests. Username: hemelia – Password: abcdef
http://www.securityspace.com/smysecu…gle_index.html

Explore More

Software Firewalls: Programs That Stop Hackers

A good software firewall for home users should have the following attributes: * It’s easy to configure. * It’s frugal with system resources so it doesn’t bog down the computer.

Anonymous Connections Over the Internet – Using Socks Chains Proxy Proxies

IntroductionThis tutorial is an attempt to help you re-route all internet winsock applications in ms windows trough a socks chain, thus making your connections much more anonymous.TheoryThe more different hops

Trace an Email

How to trace email addresses Method 1 So, have you ever wanted someones I.P address? but there is no standard way of getting it, today i will be teaching you