- Mailing
- Phishing
- Brute-forcing
- Carding, payment systems
- View, post and distribute pornographic content
- Download files using torrent
- Internet fraud
- Do not use third-party checkers
- Clean cache and cookies before using proxies
- In case of problems with the proxy operability - timely report it to an online consultant