Proxy Mask 5.8.4.0 free anonymous browsing & privacy protection

Proxy Mask is a network tool to protect your privacy.

proxy mask

In short it allows users to increase online privacy, bypass internet censorship and filtering, access blocked and censored websites, hide your real IPs from websites, access geo-restricted content, use the TOR network with all web browsers and applications, etc.

Main characteristics

TOR Network: Use the TOR network with all or specific applications
Multi-TOR: Create multiple TOR proxies and use them separately to increase your download speed over TOR
Chain TOR: Multiple TOR server chain. e.g. proxy-TOR-TOR-Proxy
Proxy Checker & Switcher: Proxy testing/testing up to 40 simultaneous tests.
Proxy Converter & chain: Chain multiple proxies and socks to HTTP proxy.
VPN: List VPN you can use.
Change MAC address: Change (spoof) Media Access Control (MAC) Network Interface Card (NIC) address and bypass network MAC address filtering.
DNS Changer: Bypass Internet censorship and DNS filtering. Or set a restrictive DNS to block harmful content for .
IP Leak Protection: Firewall rules that block all incoming and outgoing connections except for specific IP addresses (IP address, TOR etc.)
FORCE to HTTPS: forces all connections to websites to use a secure encrypted connection (HTTPS). Highly recommended
DOH: DNS over HTTPS for socks4 proxies.

Download the application

DOWNLOAD (Portable Zip)

More information

https://www.rentanadviser.com/products/proxy-mask/proxy-mask.aspx

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.089 registrants.
Proxy Mask, anonymous browsing, privacy protection

Written by newsbot

Although the press releases will be from very select to rarely, I said to go ... because sometimes the authors are hiding.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).