You have seen it in the movies, the hacker broke into the system and the good guys are tracing back and it ping pongs on multiple locations...

Here i will teach how to construct one chain of http connections with your browser (not really requiring code)

In this chain i'm requesting a tor address using tor2web .ly gateway from a remote server (to bypass any malicious code) and the remote server converts the page into a image that is remotely requested from a web Glype proxy.

Code:
1 - Glype Install
2 - api.machine (To protect against malware)
3 - site onion (The site to visit - is in the dark web)
4 - + ly (Found this site following a mispeal of sinisterly and is tor2web gateway
Code:
1 - http://huntbits.com/huntbits.com/proxy/browse.php?b=6&u=http%3A%2F%2Fsinister.ly&submit=Visit+via+Proxy
2 - http://api.screenshotmachine.com/?key=4ba62b&dimension=1366xfull&device=desktop&format=jpg&cacheLimit=1&delay=0&url=http://sinister.ly&submit=Visit+via+Image
3 - http://zqktlwi4fecvo6ri.onion/wiki/index.php/Main_Page
4 - http://zqktlwi4fecvo6ri.onion.ly/wiki/index.php/Main_Page
- First start by opening notepad and copy 4 (In this example [Only registered and activated users can see links. ])
- Paste in notepad and copy 2 (This will take a printscreen from the site)
- Paste in notepad and assemble 2 with 4 (The field of interest is &url=)
- Paste in a new line
- Copy 1 and paste on notepad
- Edit 1 and paste your generated code to u= (u= is the url in glype)
- Paste the code in your browser

Something like this:::::
Code:
http://huntbits.com/huntbits.com/proxy/browse.php?b=6&u=http://api.screenshotmachine.com/?key=4ba62b&dimension=1366xfull&device=desktop&format=jpg&cacheLimit=1&delay=0&url=http://zqktlwi4fecvo6ri.onion.ly/wiki/index.php/Main_Page&submit=Visit+via+Image&submit=Visit+via+Proxy