The first link shows your IP.
http://www.whatismyip.com/
This site will show more information like your town…
http://www.geobytes.com/IpLocator.htm?GetLocation
If you pass this test your Proxys / Programs are doing their job…
https://grc.com/x/ne.dll?bh0bkyd2

Privacy Check – checks your computer privacy, looks for parasites and reveals your computer’s security information. Every website you visit can see this private information! We also attempt to reveal the IP address behind your firewall (your NATted address) and security vulnerabilities such as supercookies and clipboard vulnerabilities
http://www.auditmypc.com/freescan/info.asp

PORT SCAN
Vulnerability scans reveal port numbers, use this port search to find information on a port, Trojan or virus. Add this port search to your site!
http://www.auditmypc.com/freescan/portsearch.asp

Test your security NOW! – This is one of the few, if not the only, network port scans that checks all 65,000 TCP ports. Why conduct a port scan on just the first 1000 ports when there are more than 65,000 TCP ports that a Trojan or service could be listing on – get the complete picture and perform a vulnerability scan now
http://www.auditmypc.com/freescan/scanoptions.asp

ENVIRONMENTAL CHECKS
All Net Tools – Environmental Checker
http://www.all-nettools.com/toolbox,net
iNet-POLICE.com Internet Police – Environmental Check-DO NOT ACCEPT JAVA
http://inet-police.com/cgi-bin/env.cgi
Browser Info – Information about your navigation collected by the server and from your browser
http://www.elfqrin.com/binfo.shtml

SURFING DATA & OTHER TESTS
INTERNET EXPLORER (Vulnerability Test) – Detect a browser vulnerability. If your browser fails this test, hackers can infect your computer automatically when you visit an infected web page
http://www.lockdowncorp.com/bots/testyourbrowser.html
Single Vulnerability Test – Examines your system with any one of the available 1864 vulnerability tests. Username: hemelia – Password: abcdef
http://www.securityspace.com/smysecu…gle_index.html

Explore More

XSS The Complete Walkthrough

Author: t0pP8uZz Description: Complete tutorial on XSS methods. Homepage: G0t-Root.net, H4cky0u.org, Milw0rm.com Date: 24/07/07 Chapters: What is XSS? Finding XSS Vulnerbilitys The Basics On XSS Deface Methods Cookie Stealing Filteration

What are whois queries?

Whois queries are used to determine the IP address ranges associated with clients. A whois query can be run on most UNIX environments. In a Windows environment, the tools such

Prevent spam in your Gmail account

Are you worried about spam in your precious gmail account ? If yes, then you would like to consider making aliases of your gmail id to use when you’re not