Anonymous Browsing

Thanks to http://hackershandbook.org/tutorials/browseanonymously
This tutorial will show you how to setup and use the Tor browser in the most effective, anonymous way. Tor is a free browser that, when setup correctly, can prevent websites and other systems from detecting your location and browsing habits. It also is one of the few ways to access the Deep Web which is outlined in a tutorial in the Misc. Hacks section of this app. Tor is free and works on Windows, Mac, Linux, and Android.

What you need:

You are now able to browse in privacy!
 * Tor Browser Bundle - http://www.torproject.org/download/
 * 1) Download the Tor Browser Bundle from the link above. It requires no installation, simply extract it and run.
 * 2) Make sure Vidalia is working. Vidalia indicates Tor is running via the green onion icon in your task bar, or a dark onion icon with an X if it is not. You can start or stop this by right clicking the icon and choosing start or stop.
 * 3) Try using your browser with Tor and make sure your IP is being anonymized. You can do this by visiting http://check.torproject.org (if you're using a firewall, make sure you allow local application connections to local port 8118 and 9050, and outgoing connections on TCP port 80 and 443.)
 * 4) Using Tor alone isn't enough to be completely anonymous. To ensure your privacy, it is highly recommended you disable all browser plugins such as: Java, Flash, ActiveX, RealPlayer, Quicktime, and Adobe's PDF plugin.
 * 5) Disable cookies when possible, as malicious websites can use them to track your browsing history. Always use HTTPS instead of HTTP when available.
 * 6) In the Firefox browser, goto Tools > Options > ...
 * 7) ...Content > Uncheck Enable Javascript
 * 8) ...Privacy > History settings changed to Use custom settings for history
 * 9) ...Privacy > Uncheck all but Automatically start Firefox in private browsing session
 * 10) Tools > Add-ons > Torbutton/Options > Security Settings > ...
 * 11) ...Dynamic Content > Check Disable updates during Tor usage
 * 12) ...Dynamic Content > Check Close all Tor windows and tabs on toggle
 * 13) ...Dynamic Content > Check Close all Non-Tor windows and tabs on toggle
 * 14) ...History > Check Block history reads during Non-Tor
 * 15) ...History > Check Block history writes during Non-Tor
 * 16) ...History > Check Clear history on Tor toggle
 * 17) ...Forms > Check Block password+form saving during Non-Tor
 * 18) ...Cookies > Check Clear cookies on Tor toggle
 * 19) ...Startup > Uncheck Tabs loaded in Non-Tor
 * 20) ...Shutdown > Check Clear cookies during any browser shutdown
 * 21) ...Headers > Check Don't send referer during Tor usage
 * 22) Navigate in Firefox > Navigation Bar > ...
 * 23) ...about:config > privacy.clearOnShutdown.passwords change value to true
 * 24) ...about:config > privacy.clear.OnShutdown.siteSettings change value to true
 * 25) ...about:config > network.http.keep-alive.timeout change value to 600
 * 26) ...about:config > network.http.max-persistent-connections-per-proxy change value to 16
 * 27) ...about:config > network.http.pipelining change value to true
 * 28) ...about:config > network.http.pipelining.maxrequests change value to 8
 * 29) ...about:config > network.http.proxy.pipelining change value to true
 * 30) ...about:config > network.http.sendRefererHeader change value to 0
 * 31) ...about:config > network.http.sendSecureXSiteReferer change value to false
 * 32) ...about:config > network.prefetch-next change value to false
 * 33) The following steps are to be applied in ...Tor BrowserDataPolipopolipo.conf
 * 34) censorReferer change value to true
 * 35) serverMaxSlots change value to 32
 * 36) maxConnectionRequests change value to 3000
 * 37) maxPipelineTrain change value to 32
 * 38) dontIdentiyToClients change value to true
 * 39) Use the following websites to check your anonymity:
 * http://decloak.net
 * http://anonymous-proxy-servers.net/en/anontest
 * http://deanonymizer.com
 * http://panopticlick.eff.org
 * http://browserspy.dk
 * 1) Configure Tor as a non-exit relay by going to Vidalia Settings > Sharing > Check Relay Traffic for the Tor network > Exit Policies > Uncheck all

Thanks to http://new-world-order-plan.org
When thinking of a VPN service, think first about the legislation of the country. A USA VPN might provide user data upon warrant issue. In other countries such as Sweden and Iceland, this is unlikely to happen. They have a strong privacy policy, which makes it harder for law enforcement agencies to get access. In addition, some servers do not keep logs of users. Also try to get VPN services that accept anonymous payments (For those that keep user billing information) More info: http://en.wikipedia.org/wiki/Virtual_private_network

Free VPNs -- Not recommended. If they aren't selling you a service, they are selling you.

Proxies
There are various kinds of proxies. Some allow media and some do not. Others do not allow log in information. Note: Proxies are not recommended unless used in conjunction with a VPN.

For more information: http://en.wikipedia.org/wiki/Proxy_server