Monday, February 18, 2013

What is a vpn and why use a vpn?


What is a vpn?
VPN

The VPN is a virtual private network that allows connecting two or more networks.
To keep it simple, because it is the purpose of this blog, it keeps on the same network while away. You can connect several servers with vpn and transfer documents so secure.
Indeed, the VPN is a tunnel that encapsulates the data to make them pass so secure. According to the protocols used by the VPN to transmit data, your communication is more or less secure.
Here are some protocols that enable data encryption PPTP, OpenVPN, L2TP, IPSec, SSH...
This may sound technical, but we will see that you can use a vpn for uses other than the creation of a network between multiple PC / Servers:
Why use a vpn?
It is now necessary to use a vpn to be able to surf anonymously.
The main uses of a VPN:
Watch tv foreign: If you are in France, you can watch TV in the United States by changing your IP address to an IP address U.S... If you like Englishwomen chains, you can also look at using a service vpn.
Download anonymously: If you're a fan of downloading torrent or P2P, know that you can hide your identity with a vpn. Indeed, it will replace your real IP address with a new one that will not allow the authorities to trace you.
Unblock websites: You may experience crashes, either in your country or just business or school. To bypass the blocking of a site like Facebook, Twitter (works with all sites), you can use a VPN, which will allow you to access these sites because your connection will no longer pass through the network in your country / business / school.
Secure data: With encryption protocols that are used by a VPN, you can send files while on they will not be intercepted and read by third person.
Use a VPN service
You know what a vpn, but concretely how to use every day?
It's pretty simple and you do not need to be a computer to put in place.
When we speak of a vpn, made ​​in, we must speak vpn service. This service is provided by a service provider. This provider proposes vpn services free or paid.
The supplier also offers software that is installed on your computer. You should know that these programs are often compatible with the Mac, but with smartphones (iPhone, Android etc).
This software allows you to choose and change IP address and identity on the Internet. You just have to launch the software, click on the server (for your new ip) or the country you want to be, choose your encryption protocol and start the connection.

Wednesday, February 13, 2013

Privacy: the guide to remain anonymous on the Internet


Hadopi Acta: laws that monitor Internet multiply. Instructions for the use of non-geeks to use the web without leaving a trace.

A hooded man
Surfing the Internet is like jumping with both feet into the fresh concrete: it leaves traces (almost) everywhere indelible. It is also said that Bruce Schneier, security expert:
"If you think technology can solve your security problems, then you do not understand the issues or technology.’
The computer and particularly the Internet, is a great way to freedom of expression, but also a machine to be monitored. Or, browse anonymously may be desirable for many reasons, not just for the paranoid. It may be necessary to want to be anonymous on the Internet at some point in his life. List is not exhaustive and not exclusive:
flicage escape from his boss;
Avoid the prying eyes of his wife / her husband;
Thwart surveillance by the authorities (this only applies if you live in an authoritarian country, of course), as do many dissidents, Belarus to Syria;
Prevent large companies - preferably American - to collect a wealth of personal data;
Protect his work or sources (if you're a journalist or activist).
Strengthen its anonymity on the Internet, this is not a "geek thing" is often said that the solution (or problem) is between the chair and the keyboard.
It can be very simple and always free to protect their privacy and surf anonymously on the Internet. The following solutions are not applied to "block", but more of a catalog in which draw according to his needs.
1
Browser
History
It is sometimes as simple as that. Most browsers store all the pages that you visit. Many indiscretions on your online activities for those who have access to your computer (boss, spouse (s) ...).
Available in the options or by typing Ctrl (Command) + H on most browsers, it is also possible to delete the history with Ctrl (Command) + Shift + Delete.
Cookies
These are small files created by certain websites you visit and are stored in your browser. They swarm (among others) personal details: some store the username and password (so you do not have to re-enter), others store a shopping cart on an e-commerce site.
They are all your tracks and crossings on the web. It is possible to disable or remove them (via the menu "Preferences" on your browser).
Most modern browsers have a feature that allows you to navigate without a trace (history and cookies). But beware, this connection method has no impact on your software for sending e-mail or instant messaging, only the history and cookies from your browser.
2
Connection
To view a web page, the HTTP protocol is most often used (yes, the one which is in your address bar): data exchanged with this protocol are not encrypted.
Sometimes, especially on commerce sites online, an "s" is added to "http" in the address bar. This means that communication between your computer and the website is encrypted, so much more secure.
But to avoid his identity compromised on the Internet, this precaution should not be confined to business services online. In 2010, a developer was developing a small program that could add to the Firefox browser, which allowed for example, particularly via the WiFi network, steal Facebook or Twitter IDs of those who were connecting to the network.
A simple precaution to avoid such mishaps, installing the Firefox extension "HTTPS Everywhere", which is aptly named: it forces all sites to communicate with your computer in encrypted form. A good way to prevent prying eyes knows what you're doing with your connection. Note that some sites do not allow a secure connection (check if the presence of a small padlock in the address bar or one of he’s after 'http').
However, the safety of navigation lies in HTTPS certificates that authenticate sites using this technology. These certificates are increasingly stolen and forged, even pushing to change the WikiLeaks submission system of its confidential documents.
3
IP
The IP address is a central element to understand in order to be discreet on the Internet.
It's a little identity card of your Internet connection (which means that several computers that share the same connection have the same IP) all sites or services you visit keep track of your connection (or more less long according to the laws of the country where they are located) - the 'logs': it is possible to know who is connected, where and when.
When you leave a comment or post a photo online, the IP address is 'stored'. Providers are generally able to make the connection between an IP address and a real identity (in the U.S., the retention period 'logs are usually one year).
Fortunately, several solutions exist to be discreet.
The proxy
A proxy is a computer which will pass your connection to hide your IP address.
Reporters without Borders, in its guide to blogging anonymously, explain (through the example of Sarah, a servant who wants to expose through his boss using a proxy):
'Instead of connecting directly to Hotmail.com, it connects to the proxy, which in turn connects to Hotmail. When Hotmail sends a page, it is initially received by the proxy server, which sends back. '
This is the IP address of the proxy, and not that of the computer that is strewn everywhere on the Internet.
The proxy has four problems:
It is the proxy that stores IP addresses: this is not without problems;
A proxy parameter directly from the web browser or applications (e-mail, instant messaging ...): these do not provide all this functionality (it is possible to force them to do so);
Navigation becomes slower, since the connection is constantly going back and forth;
Communications with the proxy are generally not encrypted.
A list of proxies (as well as how to install) is available on this collaborative platform.
The Tor network
Tor is a network of multiple nodes (or layers, hence its name, which means 'onion' in English). A computer that connects to access the Internet (websites, as well as messaging, emails ...) through a 'path' route randomly in these nodes: it cannot know where the connection - encrypted, although course - comes or what it contains.
This system is often used by dissidents in countries where Internet is monitored.
Flowsheet Tor (Torproject / CC)
Tor is in the form of software quite easy to install. It is widely used in authoritarian countries, was even funded by the U.S. government and has been used by WikiLeaks. Problems:
Using navigation software is sometimes slow;
Security of Tor is not complete, and faults were discovered.
4
Cryptography
Until the end of the 90s, cryptographic software were seen as a weapon of war, and therefore subject to strict regulation.
Since anyone can encrypt its communications (e-mail, chat, or even its files and entire hard drive).
Several solutions exist to encrypt communications.
IM
Many 'plugins' (small modules are added to software) says OTR ('off the record') let you enable encryption of communications.
Some software on which this feature can be enabled: Adium, Pidgin, Miranda ...
E-mail
The e-mails are often monitored. Same as instant messaging: plugins can be enabled on many programs, including the famous Thunderbird.
Most of the time, the PGP is used and provides the quality / usability most interesting.
Files
Software TrueCrypt to encrypt a file easily, folder or even his entire hard drive.
This is often the AES algorithm, approved by the NSA (an intelligence service in the United States) for encrypting information top secret U.S. government is used. Officially, we are just beginning to find flaws in this algorithm, deemed inviolable.
5
Various precautions
Operating system on USB ultra discreet
It is possible to use a computer without leaving any trace. Tails is a variant of the Linux operating system, which combines the tools mentioned above to encrypt e-mails and surf the Internetanonymously.
It starts very easily from a CD or USB stick, without leaving any trace of his passage on the computer used.
Free Software
Generally, to strengthen its confidentiality, it is advisable to focus on free software. Source code is available and modifiable wish: tens of thousands of programmers who are the 'open source community' have dissected and analyzed most of this software.
There is therefore much less likely that these programs contain features' malicious' as' backdoors that could threaten the security or anonymity. In contrast, only companies that have developed software called owners' access to the source code of these.
Framasoft site maintains a list of over 1500 free software.
Paid services and cloud computing
For purposes of anonymity, it is obviously necessary to avoid all the services that require bank details. Problem: many free services (like Gmail or Facebook) are subject to U.S. law (including its Patriot Act), and can be fed on demand justice, to transmit personal data (like Google, that communicates a lot about this issue).
Many paid services are services of cloud computing - a buzzword. These techniques, which include host and process data online rather than on your own computer (Gmail or Google Docs includes, for example) are obviously used with caution.
Data 'in the cloud' does not belong to you more fully, and you do not have full control over who does what and are not immune to a bug or negligence.
Multiple digital identities
Another precaution, if you use many different services, is to use a large number of aliases and different email addresses in order to make more complicated the intersection between databases and compromise anonymity.
Metadata
Details contained in Word, PDF, Excel or images may compromise the identity of the creator of the document or its issuer.
This is called 'metadata': these can indicate which computer created the document, what software was used, or is its owner! There are ways to delete [PDF] little discrete data.
Impossible to be completely anonymous
These precautions may seem unnecessary. However, threats to the freedoms of Internet users have multiplied:
WikiLeaks has revealed the ability of some firms to monitor Internet across an entire country;
And initiatives such as Acta Hadopi and increase monitoring of state and corporate users.
Despite all these techniques, anonymity and security generally are not absolute concepts: it is impossible to be completely anonymous on the Internet, as noted by the journalist Jean-Marc Manach:
"Security is a process, not a product, and nothing is worse than a false sense of security created by an accumulation of things, or because they bought a particular 'product' or security software."

Tuesday, January 15, 2013

How to surf anonymously 2nd part: how to protect your anonymity

Anonymous Web Proxy

Welcome to the second part of the article "How to surf anonymous means to protect your anonymity"
After you have presented in the first part of the dangers to your personal information (or business) because of aggressive legislative authorities of many countries (including Western), information services and major players in the web for spying always what you do on the web and deprive you of your freedom of expression we will see how best to protect you from their assaults.
To start: the difference between anonymity and confidentiality
There is often a confusion that is made by many people is to equate anonymity with privacy and vice versa:
Anonymity
To show you just say something when you surf the web monitoring tools are what you do but do not know your identity (for example the IP address of your computer, your browsing history, your behavior navigation, etc..). It is a bit like a ghost began to push a soccer ball, you can not see but you get the ball moving.
Confidentiality
Unlike the anonymity it clear who you are on the web but you cannot see what you are doing. Your business on the web is "normally" known only to you and the online service that you use to make your browsing private.
You can imagine that it is clearly preferable to mix the two to secure the most of your web browsing.
A note size: existing solutions to become "invisible" on the web will not protect you if you ever have any intelligence who decide to spy on you in particular. Their computer experts will quickly break your confidentiality and anonymity unless you're a computer security Cador (which is not the case for everyone).
Be vigilant and do not have blind faith in technology.

Difference between open source and non-free

Here are two concepts that must also include: free software versus proprietary software is software that opens the "source code" for software developers and users of software, ie YOU! This transparency ensures, among other software that respects your privacy.
In contrast software published by major publishers of this world like Microsoft, Apple, Oracle, etc.. do not give access to their source code under the pretext of trade secrets, intellectual property compliance etc..
But in fact it is rather to integrate the code of their application of "backdoors" to spy on what their users do is get their data without their knowledge.
The Free Software Guidelines are focused on four principles called "freedom":
The freedom to run the program, for any purpose (freedom 0).
The freedom to study how the program works, and adapt it to your needs (freedom 1). For this, access to source code is a precondition.
The freedom to redistribute copies so you can help your neighbor (freedom 2).
The freedom to distribute copies of your modified versions to others (freedom 3). By doing this, you can enjoy your whole community changes. Access to source code is a precondition.
Some basic tips
Never believe totally anonymous. This is the base. Software, techniques, laws are constantly changing. This is technically impossible today is possible tomorrow. What is legal today will be illegal tomorrow. You can NEVER know everything that exists in real time. Keep this constantly in mind without becoming paranoid but simply vigilant. The more you improve your expertise, you will be less prone to irrational paranoia.
Never open an account on a web service by giving your real contact information (Name, address). Keep in mind that the files can be easily crossed (by law, by the sale of files between companies, but also by security flaws which make the data available on many sites, even those allegedly secure).
Use different passwords. If you cannot cross your login files as you use a different login, you can do it with a password, so use a different password (same for the secret question). Same advice regarding your e-mail address. Do not use the same email address everywhere: create aliases with the same e-mail address or create different email addresses.
The more you create logins and passwords different, the more you "morcelez" your identity, and you take less risks duty (if needed, eg for a meeting or other) break your anonymity. It is obvious that if you give a single login corresponding to 50 and what is more, a centralized service type (MSN / Windows Live Messenger, Skype, Facebook), if you reveal your identity to the corresponding one of these, your anonymity is potentially compromise the remaining 49 (and with the centralized service, we need to know, keep the conversations LIFE! (United uniennes laws)). This approach helps you stay anonymous while having a real flexibility in managing your anonymity.
Use only free software, free hardware and Internet services using free software.
Do NOT write your passwords on your PC (it seems obvious but it is always good to remember). Same for your login and your secret questions and secret answers.
NEVER trust any free web service EVEN. This is for one simple reason: A bug, hacking, malice may corrupt your anonymity isolated partially or totally without you even knowing it immediately. Small example: charter Join the forum "Student" says: As a user you agree to any information you have entered to being stored in our database. While this information will not be disclosed to any third party without your consent, neither "Student forums" nor phpBB shall be held responsible for any hacking attempt to compromise data... Says it all ... and that goes for all web services, even if they do not say that in their conditions of use. To protect yourself, the better to protect your freedom, at least for security issues.
A web service / free software is not necessarily free at all levels (hardware, software, developer community, funding, etc.), and is not necessarily anonymous. Especially targeting services / free software respects your privacy (not recording logs, etc.) or in countries where the law allows you to keep very little time logs.
Do SELL nor GIVE, THROW nor anything that can contain memory (PC, Mobile Phone, Printer, Copier, Game Console etc). In fact, your data "thrown away" can be retrieved for analysis. And if you think this is paranoia, look at this article which illustrates this reality. Use software erase professionals (who erased dozens of times the data) and then destroy the hammer, fire, acid (whatever, lol) your data or use your electronic components to introduce you to the learning electronics.
Security is to ensure that things work. Secure your PC by making it unusable is stupid.

When you open an account on a web service and it asks you to define an answer to a secret question mark is one that can. Answer Y really makes it easier for a potential pirate because since it will be easier to find your response rather than your password.
Security is not 0 or 1:
Use a WEP key for your wifi is not zero. Nothing is worse than a WEP key, which is less than WPA, which is less than WPA2 key, etc... So, conversely, if you can put WPA2, WPA put, or WEP, etc...
Windows is not the shit: good to know Windows is more secure than evil know Linux, BSD... MacOsX
Security is not absolute:
What works for someone will not work for a company
What works now will not work tomorrow (old: remember the board "cannot be infected by mail ....")
What is bearable for some (change password every month) will be unbearable for others, and will be bypassed (thank you post it on the screen)
Check what you have done / planned is actually applied (to class, you say quality under ISO)

I put the rules with a firewall, I checked with NMAP.
I have a virus: I check that it is current
Remember that pimply pirates is finished. Now they are professionals who are paid dearly to earn money.
Do not be afraid to do things gradually. Fort Knox is later.
Do not save your passwords in your web browser either Internet Explorer or another (avoid this software also ;) Anyone using your computer will have access to your emails.
Think about putting a strong password to lock your computer and your session when you leave (Windows + L combination for Windows or Ctrl + Alt + L on Ubuntu).
Webmasters: decentralize your sites, your files and emails abroad offering these services in countries quite uncooperative with your country like China, or Eastern countries (excluding Europe preferred)
Read the news, keep you constantly informed of news relevant to new technologies (legislation, security, new media ... etc...), It is a good way to get a head start on everyone (Google News)
When you register on a site, if you are offered a secret question in case you forget your password, do not answer the question. If you must respond, answer something that has nothing to do with the question.
Use nicknames (or nickname): Do not put your real name
Use public connections (Wi-Fi, for example) what great invention! It's free, broadband and anonymous!
Better to be too cautious to limit the paranoid, can never be too careful!
Do not ignore security patches or important updates
Do not disable the firewall on your computer
Do not trust your friends on Facebook (and elsewhere)
And finally, do not sit idly by and help the community to keep its net freedom (if you program, do it for the glory and satisfaction of making your stone building, do it for everyone to maintain its civil liberties and the Internet remains a place where freedom of expression and exchange of land rather than profit for majors or politicians.
Nb:Navigate in entire safety and comfort with Anonymous Web Proxy.

Friday, January 11, 2013

How to surf anonymously 1st part: threats to your privacy

Anonymous Web Proxy

Why do you want to surf anonymously? Many of us do not see (yet) utility. Yet the respect of our privacy is being violated constantly and more! Whether you're a friendly grandmother just sending emails to grandchildren or activist denouncing poisoning to large scale pharmaceutical companies on their populations with drugs you are constantly touted to know what you say, do and think.

Seen all the evil that governments, media groups, the web giant like Google, Facebook and the rest of their clique to give ownership of the web where they can control everything that is said and done there We must quickly put us to protect our privacy on the web and our freedom of expression.

There is the dreamers who do not yet see the world elite of the supposed "modern, intelligent and free" turn increasingly internet dictatorship ruthlessly punishing those who do not submit them. Julian Assange the founder of Wikileaks is the finest example...
The dream of internet control

Over the past 10 years we have been entitled to a flurry of bills or laws designed to increase the intrusiveness of the authorities of many countries in the privacy of their citizens on the web for the monitor.

Some other past were rejected but we note that this does not necessarily discourage legislators who are struggling for their implementation: they modify the text of a bill rejected without changing the background and return to load.

Let's take a look at a few (because there are a lot) laws and actions of governments in the U.S. and around the world to make a centralized platform where internet censorship and thought crime is already unfortunately, many sad realities.
For more informations please visit this article:

How to stay anonymous online?

Monday, January 7, 2013

How to stay anonymous online?

If you want to be sure people can collect information about you during your online surfing there is not 36 solutions: either you do not give this information, or you made you pretending to be someone other connecting from a different location than where you are. The most reliable is obviously nothing to give but it is not always possible (an order online and you must provide an address, credit card, etc.)...

To be more discreet you need a proxy serveror a VPN (virtual private network). With the right combination you will not only be able to surf anonymously minimum but you can also access websites blocked or censored in your country.
Proxies are not really for beginners but if you have some skills with them and that you use the services Mozilla just take a look at FoxyProxy, an add-on management proxy that works with Firefox, Thunderbird, Songbird and SeaMonkey. Recent versions of Internet Explorer and Chrome have also emerged. For less than 15 euros per month you can get the paid version which will ensure a better speed, can choose which proxy passes by from the list.
If you are ready to install a program, The Onion Router (TOR famous) is a good option. it is a free network of 'tunnels' which allows you to route your web requests and surf to other places to make it as difficult as possible any identification by the final site. More concretely instead of sending information from your computer to final site, you will go through different relays: the final site will only see the last relay and no further. There is a browser version that you can install on Windows, Mac or Linux as well as a portable version for use via USB or a version of Android.

Once installed you will need to start the browser and you will see the digital control panel Vidalia TOR browser (which is a modified version of Firefox) will be available and you can start surfing. Closing the browser will return to a normal surf, your browser will not normally impacted by anonymous unless you explicitly in the options. To avoid these various manipulations there is a Firefox plugin to move more easily from one mode to the other: TorButton.
Another free way (and perhaps easier) to protect yourself is to use Hotspot Shield. A base developed to protect Wi-Fi spots this free VPN does not stop there, of course be used with any laptop or home computer. It can be installed on all machines running Windows or Mac and provides full HTTPS encryption for all pages viewed online, hide your IP address and bypass the firewall restrictions. If you are in a country blocking YouTube, Facebook or other sites, you can bypass it and access it as if you were resident elsewhere. The counterpart of this tool is to put up an advertisement window all along your surf, drawback may be partly undermines pub with a Blocker (type AdBlock for Firefox, etc.).
From a point of view there are many payment methods such protections Anonymizer Universal which offers a easy to use VPN service from $ 50 per year. Little more is that it works on Windows, Mac and even iPhone.
If you have no choice and must (for whatever reason) use a standard browser or old, consider deleting your cookies and browsing history as often as possible. Or better, use stealth mode available on most modern browsers as you have a minimum of cookies & Co. For firefox just go to Tools> Options> Privacy and check "Always use the mode Private Browsing "(enjoy it also check" Show websites do not track me "). Google Chrome just does Ctrl + Shift + N to open a private instance.
There are also browsers specifically focused on the protection of privacy, this is the case, for example Browzar that does not even require installation since it suffices to run it from an executable file to be used (thus ideal for do it from a USB key when you are traveling). Browzar uses the rendering engine of Internet Explorer but in terms safe. Other browsers such market we can also mention xB Browser, which is a component suite which XeroBank also offers VPN services and anonymous emails.
Do not hesitate to serve you so that Meta search engines like Google are not aware of what you are looking for personally. Through other engines Google ask them you dilute your footsteps. There are dozens of metasearch, some other less complete, some focus on other social research devoted to compare results from Google and Bing, etc..

Thursday, January 3, 2013

The advantages of Free Anonymous Web Surfing Proxy


When you browse the Internet, your IP address and your location can be found. These are some of the most important data, through which other useful information can also be found: name, address and even your social security number. This exposes you to hackers and you can also be a target of numerous advertising agencies. These are some of the many reasons why anonymous surfing free web proxy sites and were created.
In addition, when a person surfs the web surfing habits can also be tracked and marketing agencies can then send you a large amount of unsolicited mail, spam. There are also many sites that are promoting is using spyware, unwanted advertising or spam and you will be the target of all these if you do not use the free anonymous web surfing proxy sites that are your provision.
Another reason why you must use the web proxy anonymous surfing and is free if you visit some websites that you do not have access. This occurs mainly in schools, universities, some companies where servers are used to prevent users from browsing some sites. However, with the help of web proxy surf anonymous and free, this as well can be a problem, because the user can bypass filters and then he / she has access to any information he / she desires.
OK, so if you are convinced that the free and anonymous web surfing proxy is what you need, so how do you do that? Nothing simpler. You only visit one of the sites that can give you the entire free and anonymous web surfing proxy sites and choose the one you want to use. Note the IP address and port number, and then use them to configure your web proxy. After that, you'll have no problem at all with the data that is sent over the Internet. Instead of your address that is revealed, surf the web free proxy server's IP address will be displayed. There are different ways to configure web proxy for Mozilla FireFox or Internet Explorer. If you use the first person, you will only need the IP address.
It is also something that you should really take into consideration when you decide to use the free and anonymous web surfing proxy server and that is: how to choose the right server proxy. Well, if you want to ensure that your privacy is fully respected and the results are what you expect them to be, the use of free web most highly rated surfing anonymous proxy server and who has the most political clear privacy.

Sunday, December 30, 2012

The difference between a proxy and a VPN



Common goal
Proxies and VPN (Virtual Private Network) are two technologies that let you surf the internet anonymously; protect your privacy by hiding your IP address. For the record, an IP address is a number assigned by your ISP to your computer when you connect to the web. This number is identified and provides contact you left your ISP.
What is a proxy?
A proxy server is a computer that provides the customer with an internet connection indirect, which prevents those who use it to go through its own internet connection. Instead, the user connects to the proxy server.
What is a VPN?
It is a technology that creates a secure connection to the user, using sophisticated encryption means. The goal is to prevent malicious interception of internet and data. VPNs are often used to disseminate information to a large population.
Proxies paid or free?
We speak here of pay and proxies private proxies free public not that you can find on the internet but are sometimes of poor quality:
1 / they do not always work and are not always reliable
2 / many users around the world can use them, what makes them so "toasted" by some internet sites that recognize immediately and can be banned.
Compare VPN and proxies
If you just want to remain anonymous on the internet, both methods are valid and will provide the same security. Both methods hide your real IP address. Your traffic will be coming from another server; the real source (your computer and your internet connection) can not be raised.
However, some differences:
1 / A proxy must be configured within the application that you use to connect to the internet (eg you must enter its references within your web browser or other software that connects you to the web ). This leads to three consequences:
- First, all software cannot use a proxy.
- Then all the other applications that will access internet outside the proxy will reveal your real IP.
- Finally, even inside the web browser using the proxy, Flash applications, Java, JS and Active X will not be taken into account by the proxy and show your true identity.
2 / A VPN, conversely, made him go through all of your traffic, which does not restrict you to a particular application. All your applications will access the Internet via the VPN configured in your OS, so it is a complete system. A VPN is also a bit more secure because encrypts the traffic through a tunnel 128-bit (256-bit depending on the VPN) between your computer and the server. The VPN also protects against all malicious attacks: it is a filter.
Conclusion
1 / it all depend on the use you want. If you only want to remain anonymous, a proxy may be sufficient and it is easier to use since there is nothing to install: only returning the proxy address in your web browser or software that accesses internet.
2 / by cons, if you want to be anonymous, but at the same time protect all your data, a VPN is required. It is also useful for users who often connect to public Wi-Fi spots.
Another advantage of proxy in relation to the VPN
It is easy to use multiple proxies and not just one: whether free public proxies or other private pay, it is best to always have a dozen available. Therefore, it is not difficult to switch proxies, especially the lists of public proxies are changed every minute, and you will find thousands of internets. The advantage is: your IP address will never be the same because you will change regularly proxy. This can be useful to prevent a site ban you because you do not recognize.