In computer networks, a proxy server is a server (a computer system or an application program) which services the requests of its clients by forwarding requests to other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. The proxy server provides the resource by connecting to the specified server and requesting the service on behalf of the client. A proxy server may optionally alter the client's request or the server's response, and sometimes it may serve the request without contacting the specified server. In this case, it would 'cache' the first request to the remote server, so it could save the information for later, and make everything as fast as possible. A proxy server that passes all requests and replies unmodified is usually called a gateway or sometimes tunneling proxy. A proxy server can be placed in the user's local computer or at specific key points between the user and the destination servers or the Internet.

09 December 2007

Proxy fight from the boardroom to the courthouse

OLDSMAR -- A South Florida investor who waged a proxy fight for control of Cryo-Cell International Inc. has asked a judge to put his nominees for directors on the Cryo-Cell board.

David Portnoy said in a lawsuit filed in the Delaware Court of Chancery that Mercedes Walton, chairman and CEO of Cryo-Cell, and four board members engaged in an illegal vote-buying scheme designed to ensure the defeat of Portnoy's dissident slate of nominees during the company's annual meeting July 16.

Walton did not return a call for comment. Portnoy declined to comment on the suit.

A three-day trial was held Nov. 14-16 in the New Castle County division of the chancery court, which is considered the nation's preeminent forum for the determination of business disputes. The judge in the case, Vice Chancellor Leo Strine Jr., reserved a decision, pending the filing of post-trial briefs.

[+/-] Readmore...

Google free proxy!

Access restricted web sites using Google language tools service as a proxy.
Ok, let's start from the beginning. We all know that Google is more than a search engine; we do use it as provider for email, mapping, news and many other services. Google is now also a free proxy service. Proxy is a device that stands between a PC and the internet, providing all the connections to the world wide web. What a proxy does is to receive all data from a requested site, so when you access web pages all data come from proxy.

What's the purpose for Google as a proxy? We often use office/school/university connections, usually those services are set to provide more safety, blocking the access to undesidered web sites (the "black list"). What you can do now is use Google translator service (language tools) as a proxy to bypass the restrictions set for our connection!

You just need to type the following URL:

http://www.google.com/translate?langpair=en|en&u=www.forbiddensite.com
(www.forbiddensite.com stands for the URL you need to go to...)

What you'll get is the translation (english to english!) of the page you want to see... your connection is directed to a google.com page so this page won't be blocked (would be blocked only with google.com on the black list), no matter what's the content.

Notice that the URL has been a little hacked because the parameter "langpair"(1) is set to "en|en" (english/english) so the page is processed by Google but you can keep the original language of the page (no need to translate!). If you need another language (e.g. french) you just need to set the parameter langpair to "fr|fr" and you'll be able to read french pages in french!

[+/-] Readmore...

04 December 2007

Proxy Server Guide

Here is your comprehensive Guide to Proxy Servers, and their usage. Please feel free to browse through and link to any of the following articles
by : proxy-server.info

[+/-] Readmore...

03 December 2007

Microsoft Investigating Vulnerability

Microsoft Corp. announced that it is investigating new public reports of a vulnerability in the way Windows resolves hostnames that do not include a fully-qualified domain name (FQDN). The technology that the vulnerability affects is Web Proxy Auto-Discovery (WPAD).

The company has not received any information to indicate that this vulnerability has been publicly used to attack customers, and it is not aware of any customer impact at this time. Microsoft said it is aggressively investigating the public reports.

Customers whose domain name begins in a third-level or deeper domain, such as "contoso.co.us", or for whom the following mitigating factors do not apply, are at risk from this vulnerability.

Upon completion of this investigation, Microsoft said it will take the appropriate action to help protect our customers. This may include providing a security update through our monthly release process or providing an out-of-cycle security update, depending on customer needs.

Mitigating Factors:

  • Customers who do not have a primary DNS suffix configured on their system are not affected by this vulnerability. In most cases, home users that are not members of a domain have no primary DNS suffix configured. Connection-specific DNS suffixes may be provided by some Internet Service Providers (ISPs), and these configurations are not affected by this vulnerability.
  • Customers whose DNS domain name is registered as a second-level domain (SLD) below a top-level domain (TLD) are not affected by this vulnerability. Customers whose DNS suffixes reflect this registration would not be affected by this vulnerability. An example of a customer who is not affected is contoso.com or fabrikam.gov, where "contoso" and "fabrikam" are customer registered SLDs under their respective ".com" and ".gov" TLDs.
  • Customers who have specified a proxy server via DHCP server settings or DNS are not affected by this vulnerability.
  • Customers who have a trusted WPAD server in their organization are not affected by this vulnerability.
  • Customers who have manually specified a proxy server in Internet Explorer are not at risk from this vulnerability when using Internet Explorer.
  • Customers who have disabled 'Automatically Detect Settings' in Internet Explorer are not at risk from this vulnerability when using Internet Explorer.


Microsoft has tested the following workarounds. Although these workarounds will not correct the underlying vulnerability, they help block known attack vectors.
  • Create a WPAD.DAT Proxy Auto Configuration File on a Host Named WPAD in Your Organization to Direct Web Browsers to Your Organization's Proxy
  • Disable Automatically Detect Settings in Internet Explorer
  • Disable DNS Devolution
  • Configure a Domain Suffix Search List

Microsoft has thanked Beau Butler for working with the company and reporting the vulnerability in Web Proxy Auto-Discovery (WPAD).

[+/-] Readmore...

26 November 2007

If You've Been Proxy Hacked

The simplest test, if you are experiencing a problem, is to examine Google search results for a phrase (search term in quotes) that should be unique to your page. For example, if your home page says "Fred's Widget Factory sells the best down-home widgets on Earth" then you can search for that phrase.

You want to use a phrase (or combination of phrases) that should only appear on your page, and nowhere else on the web… or very few places at least. Then you do the search - if there's more than one result (your page), then you need to examine the other URLs that are listed. If some of them are delivering an exact copy of the page, you just may be dealing with a proxy that has hijacked your content.


A typical proxy link looks something like this:
www.example.com/nph-proxy.pl/011110A/http/www.mattcutts.com/blog/
It's easy to see what URL that would fetch, if example.com were a real proxy. Other proxy URLs encode the target URL so it's not always that easy to determine what they're going to fetch just by looking.

The mere presence of proxies in the index doesn't necessarily mean you'll be dropped or penalized. The situation inside Google's systems is no doubt very complex. I have seen sites with multiple proxies indexed, and no ill effects. It's possible that there are certain factors (trust, authority, domain age, etc.) that make one site more susceptible than another. I have no idea how they make the decision on which copy of a page to keep.

If you discover that you have a problem (pages knocked out of the index, -999 "penalty"), and you can identify proxies as duplicate content, a reinclusion request is likely to work in the short term, while you implement countermeasures. If you don't mind sharing your information with me so that I can use it for further research, send an email to proxyreports@gmail.com with the affected URL and the URL of the search result page that shows the proxy duplicates, along with any search terms where your ranking appears to be affected.

[+/-] Readmore...

22 November 2007

Firefox Add-ons

FoxyProxy 2.5.4
by Eric H. Jung

FoxyProxy is an advanced proxy management tool that completely replaces Firefox's proxy configuration. It offers more features than SwitchProxy, ProxyButton, QuickProxy, xyzproxy, ProxyTex, TorButton, etc...

FoxyProxy is an advanced proxy management tool that completely replaces Firefox's proxy configuration. It offers more features than SwitchProxy, ProxyButton, QuickProxy, xyzproxy, ProxyTex, TorButton, etc...

Works with:
Firefox: 1.5 – 3.0.0


Instal Now


Reviews for FoxyProxy......

Gmail
by Ronny Tankersley on November 18, 2007 (rated 8)
Works great everywhere but disables chat in Gmail

great addon, latest slightly broken on linux
by speculatrix on September 11, 2007 (rated 9)
this is a really useful tool for the sys and network admins, allowing you to switch proxy in very clever ways
the latest version is a bit buggy on linux - doesn't show the list of proxies defined, and doesn't offer the status bar menu thing - go back to v 2.4 and it works fine.

Good
by BlackHalt on July 22, 2007 (rated 10)
Good for TOR ;)

very good, with a annoying glitch?
by nomo17k on April 22, 2007 (rated 8)
Overall, this is a very useful add-on if you have a need for switching proxies on occasion. However, if you try to launch Firefox to establish a connection at some paid access point (like HotSpot or at airport, which requires you to login using your paid service), the browser simply does not launch properly, even if FoxyProxy is installed (you have to *totally* disable using Tools->Add-ons menu); it seems the initial checking of some sort by FoxyProxy is getting in the way. Other than that, this add-on offers a lot more functions than regular users would need, but is very useful.

Outstanding Wrk
by walking dolphins on April 5, 2007 (rated 9)
I'm very particular abut my internet use which means I manage through a number of proxies and every single connection gets assigned to one of them. With a moderate amount of thought, use of FoxyProxy's White List/Black List features with very easy to use wildcard patterns I have gone from a large amount of address-specific maintenance to basically a completely transparetn system. This tool is fantastic. As for the cautions on privacy, if you subscribe to an annonymizing proxy like anonymizer.com, you can get the best of all worlds.

To the author: I greatly appreciate your work and until you start charging a significant usage fee you owe none of us any apologies, especially for the stuff that is obviously beyond your control. The level of support you provide for this free tool is much higher than most commercial software offers.

aka Marshall

best proxy extension yet
by wish on April 4, 2007 (rated 10)
this is the best one yet.

[+/-] Readmore...

20 November 2007

Proxy+

Gives the complete solution to accessing the internet from the lan

  • Firewall increases security by separating LAN from the Internet
  • Disc cache with advanced manageability
  • Mail server with intranet mail capability
  • Automatic sorting of incoming messages
  • Automatic dialing/hanging-up of a switched telephone line
  • Support of synchronous and asynchronous dedicated line
  • WWW server for intranet
  • Management of all functions via a WWW interface
  • Lifetime free upgrade, free e-mail support
  • Full function 3-user free version, 31-days unlimited trial free version


Download the newest version of proxy+ for free

[+/-] Readmore...

The Solution

Using an anonymous proxy server you don’t give anybody chance to find out your IP address to use it in their own interests. We can offer you three ways to solve your IP problem:

1. Secure Tunnel - pay proxy server with plenty of features. Effective for personal use, when your Internet activities are not involved in web site development, mass form submitting, etc. The best solution for most of Internet users. Ultimate protection of privacy - nobody can find out where you are engaged in surfing. Blocks all methods of tracking. Provides an encrypted connection for all forms of web browsing, including http, news, mail, and the especially vulnerable IRC and ICQ. Comes with special totally preconfigured software.


2. ProxyWay Pro - multifunctional anonymous proxy surfing software which you can use together with a wide variety of web applications (web browsers, Instant Messengers, Internet Relay Chat (IRC), etc.) to ensure your anonymity. ProxyWay Pro provides an extended proxy management system that enables you to search for, check proxy (multithreaded proxies checking), analyze, validate proxy servers for speed, anonymity, type (HTTP/HTTPS/SOCKS), geographical location, create proxy chains. Allows update proxy list automatically using scheduler. ProxyWay Pro lets you clear history, block ads and popups, change User-Agent and Referrer fields, block harm code and much more. Also it can be used as a simple local proxy server.

3. Our own small proxy list is also a good place to start with if you are a novice.

[+/-] Readmore...

19 November 2007

Caching Proxy Server

By setting your proxy configuration at your web browser program, your browsing speed will increase. Wasantara Net Proxy Server do the following things that can make surfing speed faster :

  • The route to the ultimate destination is shorter and less troublesome (increasing speed tremendously)
  • Popular documents that're being accessed by users are kept in our Proxy Server hard drive so it can increase browsing speed.

How to setup proxy
  • Netscape Navigator
  • Netscape Communicator
  • Internet Explorer 2.0 (for Windows 3.1)
  • Internet Explorer 2.0 (for Windows 95)
  • Internet Explorer 2.0 (for Macintosh)
  • Internet Explorer 3.0 (for Windows 95)
  • Internet Explorer 5.x/6.x (for Windows 9x)
  • Opera
  • Other Browser please mail noc@wasantara.net.id


NETSCAPE NAVIGATOR
  1. Run Netscape Navigator
  2. Open Option menu
  3. Choose Network Preferences
  4. Choose Proxies tab (see picture)
  5. Activate Manual Proxy Configuration/B> option
  6. Click View button
  7. Fill HTTP Proxy with proxy.wasantara.net.id and port : 8080 (see picture)
  8. ClickOK to close the dialog box.


NETSCAPE COMMUNICATOR
  1. Run Netscape Communicator
  2. Open Edit menu
  3. Choose Preferences
  4. Doble click Advanced
  5. Activate Manual Proxy Configuration
  6. Fill HTTP Proxy with proxy.wasantara.net.id
  7. and Port with 8080 Click OK to close the dialog box.

INTERNET EXPLORER 2.0 (Windows 3.1)
  1. Run Internet Explorer
  2. Open View menu
  3. Choose Option
  4. Choose Proxy tab (see picture)
  5. Fill HTTP with proxy.wasantara.net.id , and port : 8080
  6. Click OK

INTERNET EXPLORER 2.0 (Windows 95)
  1. Open Control Panel
  2. Double click Internet Icon
  3. Activate Use Proxy Server option
  4. Fill Proxy Server field with proxy.wasantara.net.id:8080
  5. Click OK

INTERNET EXPLORER 2.0 (Macintosh)
  1. Run Internet Explorer
  2. Open Edit menu
  3. Choos Option
  4. Choose Proxy tab (see picture)
  5. Fill HTTP Proxy field with proxy.wasantara.net.id ,port:8080
  6. Click OK

INTERNET EXPLORER 3.0 (Windows 95)
  1. Run Internet Explorer
  2. Open View menu
  3. Choose Option
  4. Choose Connection tab
  5. Activate Connect through a proxy server option (see picture)
  6. Click Settings... button
  7. Fill HTTP field with proxy.wasantara.net.id and port:8080 (see picture)
  8. Click OK

INTERNET EXPLORER 5.x/6.x (Windows 9x)
  1. Run Internet Explorer
  2. Open Toolsmenu
  3. Choose Internet Options
  4. Choose Connections menu
  5. Click Lan Setting
  6. Activate Use a Proxy Server
  7. Fill Address field with proxy.wasantara.net.id and port field with 8080
  8. Click OK

OPERA
  1. Run Opera
  2. Open File menu
  3. Choose Preference
  4. Choose Network menu
  5. Click button Proxy Servers
  6. Click HTTP, field with proxy.wasantara.net.id and port field with 8080
  7. Click Ok.

[+/-] Readmore...

14 November 2007

Safe Web Surfing With Web Proxy

Internet is the modern day storage house of all kinds of information. There are sites that provide information, fun, news, business and great shopping experience. Whatever you want is there on the Internet. That is why more and more people are joining the Internet society everyday. Here we surf through sites to find the desired information or resources. Many people use the facility of web proxy, which is a type of a proxy server. But do you know why such a service is used?

While you are surfing the net, there are people who are always trying to track your location, even your social security number. These people are the hackers and online advertising agencies. They track down information about you and target you.


The advertising agencies will send unwanted advertisements on your email IDs while the hackers are famous for causing a lot of damage. For protecting their information and IDs from such attacks, Internet surfers use web proxy. This facility involves the formation of a proxy ID by a net user. This facility is being provided by many web surfing proxy sites.

For using this unique surfing facility, simply log onto one of the proxy sites. The site will provide a port number and an IP address. This information can then be used for figuring out your web proxy. The proxy IP address and port number that you create at the site can be used by you for protecting your identity and keeping your email free from all kinds of junk emails and spam.

All these emails and information will first come on the proxy IP address that you have created. Whatever information will be found to be important will be forwarded to your original email. This way your email will not get spammed continuously.

Apart from web proxy, such sites also provide CGI proxy. This facility works in the same manner as web proxy but with a little difference.CGI proxy is while visiting a website. Here, a CGI proxy site will develop a script for communication between an Internet user and a website.

The script will not allow the site to procure any kind of information related to the user. It will also prevent the site from storing any cookies on the user's system.

The two services can also be used by downloading or installing the Multi proxy software. There are various sites that provide this software online. After downloading this software, you will be provided with a list of all the proxy servers. This is actually the list of the IP addresses and port numbers that are available on the net. This software is more effective and safe as compared to the web-based sites that offer the service of web proxy.

Web proxy services are also used for increasing the efficiency and speed of a network. The information that is stored in the database of a proxy server is used for the purpose. In this case, a proxy server uses the Internet feature of cache. All the information that a user searches on the Internet is stored in a separate database which is called cache.

Whenever a new user will search for the same information, the proxy server will first search the cache database and then search some where else. This way the time of the user is saved.

[+/-] Readmore...

13 November 2007

Protection from Internet Threats

A proxy list comprises of SOCKS, HTTPS and HTTP proxy servers all on a single website. Proxies offer the flexibility to the users to form indirect connection of network with other services of computer network. Commonly the compilation of Proxy lists is done through automated software that examines the internet for some common identifiers of proxy that includes HTTP headers or open ports.

The proxy lists are reorganized actively as the proxy servers can be availed in periodic manner. There are proxy lists that can be acquired by the user for no cost, but for others a subscription is necessary.


Several servers are incorporated in a proxy list either inadvertently or sometimes the proxy server is installed spitefully by the criminals of the computer.There are various companies that are offering free proxy services such as Unblock MySpace Proxy, which aid a person in serving the internet secretly and carefully.

Their fast, reliable and at no cost MySpace compatible proxy will aid a person in unclogging MySpace from the filters of web either at offices or at schools. This company is also equipped with the facility to unclog Bebo and Facebook. The services are offered o you free of cost as long as you play pleasant and straight. They do not entertain any sort of malevolent activity and any kind of abuses such as bombing imagery. So, a person who is interested in avail these services should go through the terms and conditions.

There are times when it is essential to look out for information regarding the PHP version that the server is running currently. A person can come across several PHP versions and peculiar settings, by simply running a program of one line from the browser.

The purposes that serve the availability of proxy server list is for helping the administrators to search and cease open access to the proxy servers that is released by fault. There can be a possibility that there are proxies in these proxy lists that were not locked by an administrator of the system or by a home user who is not experienced. So, the administrator of these systems can see through these public listings in order to make sure whether the Internet servers are established or not.

It also serves to aid the people to stay unidentified on the Internet. It is essential to be aware that the public server that is being used is legal by all means. In case a person is using a server that is opened, then sooner or later the administrator will be aware of his error. And, a person should definitely avoid proxy servers for unlawful or spiteful deeds.

The few packages of software that is equipped with multi proxy can be availed with pro and platinum and Ghost Surf standard. This makes anonymous proxy servers as a perfect solution to combat against the spammers as they aid in offering you safety by hiding your IP address and other important information from the webmasters.

[+/-] Readmore...

Tracert

Tracert is a low level tool that can be invaluable when diagnosing network problems, it is normally run from a command prompt within Windows, and for the information to be meaningful must be run with no other internet activity being carried out.

To run a tracert from a command prompt type "tracert www.bbc.co.uk" or whatever the site or ip address is that you wish to trace to.

When reading a tracert there are certain things to be aware of, first and most important is that not all routers or web sites respond to icmp traffic and you may see timeouts which do not necessarily indicat a problem. Second is that icmp traffic is generally treated as lowest priority by routers and occasionally abnormally high figures will show up which do not necessarily indicate a problem.

Some sample tracerts and what they mean are shown below.


1 1 ms 1 ms 1 ms 192.168.2.1
2 10 ms 11 ms 9 ms 10.149.79.254
3 10 ms 9 ms 9 ms swan-t2cam1-b-ge910.inet.ntl.com [80.0.254.149]
4 29 ms 10 ms 9 ms swa-t2core-b-ge-wan61.inet.ntl.com [213.105.225.145]
5 12 ms 31 ms 13 ms win-bb-b-so-220-0.inet.ntl.com [62.253.187.241]
6 19 ms 13 ms 15 ms pop-bb-a-so-000-0.inet.ntl.com [62.253.185.201]
7 * * * Request timed out.
8 14 ms 15 ms 14 ms 212.58.239.217
9 19 ms 16 ms 16 ms www22.thdo.bbc.co.uk [212.58.224.122]

Hop 1 is my home network and I would be very concerned if this was showing a response time above 10ms

Hop 2 is the private side of my local UBR, this is the hop that will normally show very high figures if there is too much traffic being fed from my local cable loop. The figure will be higher the further away you are from the UBR and high figures do not necessarily indicate a problem. It is more important that the responses are consistent.
A response of 48 ms 11 ms 83 ms would suggest some issues here.

Hop 3 is the local cam, a big ring road around each headend that routes the traffic to the core.

Hop 4 the core, data is now transferred onto fibre optic cables and transmitted through the service backbone.

Hops 5 and 6 are hops across the ntl backbone - note the bb in the host name, these route the data to the peering point at telehouse.

Hop 7 - This is the interesting one, a repeat of the test reveals that this one is telehouse and first observation would seem to indicate that there is a problem here. (see the same entry in the following example also.)
The router in the first trace appears to drop all packets, and in the second trace appears to drop 33% of packets and to slow the remaining packets down. However this is an example of the low icmp priority and can be seen by looking at Hop 8.

Hop 8 - All traffic reaching hop 8 has to pass through hop 7. The times given for the hop are cumulative through each hop on the trace and the fact that hop 8 shows 100% replies and at low ping times indicates that hop 7 though replying to the traffic very poorly, is actually passing traffic with no problems. Hop 8 is the transfer point from telehouse to the bbc website.

Hop 9 - Final destination. Return times of less than 20ms indicate no problems with this route despite the timeouts on hop 7

Repeat test

1 1 ms 1 ms 1 ms 192.168.2.1
2 39 ms 10 ms 9 ms 10.149.79.254
3 10 ms 10 ms 8 ms swan-t2cam1-b-ge910.inet.ntl.com [80.0.254.149]
4 10 ms 12 ms 10 ms swa-t2core-b-ge-wan61.inet.ntl.com [213.105.225.145]
5 14 ms 12 ms 24 ms win-bb-b-so-220-0.inet.ntl.com [62.253.187.241]
6 15 ms 16 ms 49 ms pop-bb-a-so-000-0.inet.ntl.com [62.253.185.201]
7 43 ms 86 ms * tele-ic-2-so-000-0.inet.ntl.com [62.253.185.86]
8 14 ms 20 ms 14 ms 212.58.239.217
9 16 ms 15 ms 14 ms www22.thdo.bbc.co.uk [212.58.224.122]

OK on this one I am seeing some variation at Hop 2, but hop 3,4,5 are ok suggesting again that the variation on hop 2 should not cause a problem
Hop 7 again looks decidedly dodgy, but again hops 8 and 9 need to be looked at and indicate no problems with data passing though hop 7.

A bad trace from an oversubscribed cable would something like this
(I forced this one by downloading at 980k while running the test)

1 2 ms 1 ms 1 ms 192.168.2.1
2 177 ms 25 ms 12 ms 10.149.79.254
3 218 ms 93 ms 154 ms swan-t2cam1-b-ge910.inet.ntl.com [80.0.254.149]
4 198 ms 215 ms 247 ms swa-t2core-b-ge-wan61.inet.ntl.com [213.105.225.145]
5 256 ms 175 ms 92 ms win-bb-b-so-220-0.inet.ntl.com [62.253.187.241]
6 210 ms 119 ms 59 ms pop-bb-a-so-000-0.inet.ntl.com [62.253.185.201]
7 * * * Request timed out.
8 123 ms 143 ms 142 ms 212.58.239.217
9 157 ms 174 ms 179 ms www15.thdo.bbc.co.uk [212.58.224.115]

OK hop 2 high and variable, but this time note the lag on hop 2 has transferred itself right through the trace and given an average 160ms to the final destination.

This next one would be what I would expect to see where packet loss is involved. I have doctored this as it is very difficult to find a proper example.

1 1 ms 1 ms 1 ms 192.168.2.1
2 39 ms 10 ms 9 ms 10.149.79.254
3 10 ms 10 ms 8 ms swan-t2cam1-b-ge910.inet.ntl.com [80.0.254.149]
4 10 ms * 10 ms swa-t2core-b-ge-wan61.inet.ntl.com [213.105.225.145]
5 * 12 ms * win-bb-b-so-220-0.inet.ntl.com [62.253.187.241]
6 15 ms * 49 ms pop-bb-a-so-000-0.inet.ntl.com [62.253.185.201]
7 43 ms * * tele-ic-2-so-000-0.inet.ntl.com [62.253.185.86]
8 * 20 ms 14 ms 212.58.239.217
9 16 ms * * www22.thdo.bbc.co.uk [212.58.224.122]

Note packet loss here starting at Hop 4 will transfer itself right through the trace as traffic from hop 5 and above needs to pass through the troublesome hop.

My last example is to a site in the USA

Tracing route to www2.microsoft.akadns.net [207.46.250.252]
over a maximum of 30 hops:

1 1 ms 1 ms 1 ms 192.168.2.1
2 9 ms 9 ms 11 ms 10.149.79.254
3 9 ms 9 ms 10 ms swan-t2cam1-a-ge910.inet.ntl.com [80.0.254.21]
4 9 ms 12 ms 10 ms swan-t2cam1-b-ge11.inet.ntl.com [80.0.255.10]
5 10 ms 11 ms 10 ms swa-t2core-b-ge-wan61.inet.ntl.com [213.105.225.145]
6 13 ms 33 ms 12 ms win-bb-b-so-220-0.inet.ntl.com [62.253.187.241]
7 15 ms 15 ms 43 ms P4-0.BRSBB1.Pop.opentransit.net [193.251.254.145]
8 19 ms 19 ms 19 ms So5-0-0.LONCR1.London.opentransit.net [193.251.243.242]
9 92 ms 91 ms 92 ms P3-0.NYKCR3.New-york.opentransit.net [193.251.243.21]
10 98 ms 111 ms 96 ms P12-0.OAKCR1.Oakhill.opentransit.net [193.251.242.254]
11 97 ms 97 ms 99 ms So4-0-0.ASHBB1.Ashburn.opentransit.net [193.251.248.109]
12 97 ms 120 ms 98 ms 207.46.45.69
13 96 ms 98 ms 100 ms 207.46.46.129
14 97 ms 99 ms 98 ms 207.46.34.25
15 189 ms 191 ms 189 ms 207.46.33.61
16 190 ms 188 ms 188 ms 207.46.36.214
17 195 ms 191 ms 191 ms 207.46.155.13
18 * * * Request timed out.
19 * * * Request timed out.
20 * * * Request timed out.

Points of interest here are hop 9 time jumps from 19 to 90ms, this is entirely normal for traffic crossing the Atlantic. Data travels through cables at the speed of light, and even at this speed there is a huge overhead on data being bounced off a server in USA.
Hop 15 this is New York on the east coast of the USA to Seattle on the West coast, another huge jump is to be expected.
Hop 18 and onwards. This does not indicate a problem with the final destination, merely that the Microsoft servers are blocked to UDP and ICMP traffic. The site responds fine to page requests.

[+/-] Readmore...

06 November 2007

Anonymous Proxy

An anonymous proxy is a piece of software designed to protect the privacy and anonymity of web browsers from web site operators, Internet snoops, and even unfriendly governments.

The anonymous proxy software resides on a proxy server. The web browser connects to the proxy server and the proxy server connects to the web server.

The web server does not know who you are, it only knows who the proxy server is. The proxy server does know who you are -- so you had better choose a proxy server that you trust.

A good web proxy will allow you to setup a TLS or SSL tunnel. This will prevent packet sniffers from eavesdropping on you while you are surfing anonymously.

Some anonymous proxy servers support FTP, while others only support HTTP. Better anonymous proxy servers also support HTTPS. Make sure to select an anonymous proxy server which supports the protocols you wish to use.

In addition to hiding your IP address, an anonymous proxy server will typically remove traffic such as:

  • Cookies
  • Pop-ups
  • Banners
  • Scripts
  • Referrer information

These options should be configurable by the end-user to enable to proxy server to work with web sites which require cookies or pop-ups.

[+/-] Readmore...

Articles on how to build a successful proxy website!

Here’s a list of articles and links that might help you run a more efficient and effective proxy website using my templates. I definitely recommend you bookmark this page immediately :

  • Immortality’s Proxy Secrets
    A straight forward guide on how to optimize, run and maximize revenue with your proxy websites.

  • IP Unblock - Building & making money with your proxy site
    Another in-depth guide on how to monetize and get traffic to your proxy website.

  • Get A Proxy
    A five step tutorial on how to start a proxy website from scratch, from picking your host to choosing your proxy script to getting traffic.

  • Proxy Users Network
    A discussion forum for Proxy Webmasters. Learn everything there is to know about running a proxy website. You will also get to meet up with other proxy webmasters in the community and share and tell your experiences with each other.

  • Bypasser.org
    A proxy toplist site that provides proxy users and webmasters with great relevant tools and information.

  • Mubin Ahmed
    This guy writes amazing up-to-date articles concerning proxy websites.

  • Proxy: Introduction and Installation
    A simple article detailing the installation process of setting up your own proxy site.

  • Proxy: Earning and Maximising Profits
    Great article, telling you some of the ways you can maximize your proxy websites revenue.

  • Free 2 Surf Privacy Blog
    A great proxy blog site containing in depth information on proxies, proxy scripts and templates.

  • IP Unblock - Proxy hosting
    How to pick the right Proxy Hosting for you!

  • 443 Proxy
    A proxy website containing various articles and guides on how to optimize your proxy website.

  • Dave Turnbull’s - Making a successful proxy
    A massive 7 page article guide on how to run a proxy website. He literally covers everything you need to know about building a successful proxy website.

  • Proxy Bucket Directory
    Various articles related to running, monetizing, optimizing and designing a proxy website.

  • Proxy Sphere
    Another set of great articles on how to optimize a proxy website with your server configurations.

  • Payment Blogger - Pros and Cons
    Great article outlining the Pros and the Cons of making a proxy website.

  • Web Proxy Blog
    A relatively new blog dedicated to helping users like yourself make money from proxy websites.

  • Proxy.Org Forum
    One of the original Proxy Webmaster Forums. They have almost everything there is to know about proxy. Basically your FAQ for proxy websites.

  • Digital Point Forums
    Another massive forum dedicated to webmasters alike. You can find lots of tips on how to sell, buy and manage proxy websites. You can also do link sales and exchanges with other related proxy sites.

  • Proxy Builder
    A neat tool allowing users to create fast free PHP and CGI proxy websites instantly. They also have a few good tips to get started with making web proxies.

[+/-] Readmore...

28 October 2007

Proxy servers implement one or more of the following functions

Caching proxy server

A proxy server can service requests without contacting the specified server, by retrieving content saved from a previous request, made by the same client or even other clients. This is called caching. Caching proxies keep local copies of frequently requested resources, allowing large organizations and Internet Service Providers to significantly reduce their upstream bandwidth usage and cost, while significantly increasing performance. There are well-defined rules for caching. Some poorly-implemented caching proxies have had downsides (e.g., an inability to use user authentication).


Web proxy


Proxies that focus on WWW traffic are called web proxies. Many web proxies attempt to block offensive web content. Other web proxies reformat web pages for a specific purpose or audience (e.g., cell phones and PDAs for persons with disabilities).

Many organizations — including schools, corporations, and countries — use proxy servers to enforce acceptable network use policies (see content-control software) or to provide security, anti-malware, and caching services. A traditional web proxy is not transparent to the client application, which must be configured to use the proxy (manually or with a configuration script). In some cases, where alternative means of connection to the Internet are available (e.g., a SOCKS server or NAT connection), the user might be able to avoid policy control by simply resetting the client configuration and bypassing the proxy. Furthermore, administration of browser configuration can be a burden for network administrators.

Access control: Some proxy servers implement a logon requirement. In large organizations, authorized users must log on to gain access to the WWW. The organization can thereby track usage to individuals.

Anonymizing proxy server

A proxy server that removes identifying information from the client's requests for the purpose of anonymity is called an anonymizing proxy server or anonymizer.

Hostile proxy

Proxies can also be installed by online criminals, in order to eavesdrop upon the dataflow between the client machine and the web. All accessed pages, as well as all forms submitted, can be captured and analyzed by the proxy operator. For this reason, passwords to online services (such as webmail and banking) should be changed if an unauthorized proxy is detected.

ntercepting proxy server

An intercepting proxy (often incorrectly called "transparent proxy") combines a proxy server with a Gateway. Connections made by client browsers through the gateway are redirected through the proxy without client-side configuration (or often knowledge).

Intercepting proxies are commonly used in businesses to prevent avoidance of acceptable use policy, and to ease administrative burden, since no client browser configuration is required.

It is often possible to detect the use of an intercepting proxy server by comparing the external IP address to the address seen by an external web server, or by examining the HTTP headers on the server side.

Transparent and non-transparent proxy server

The term "transparent proxy" is most often used incorrectly to mean "intercepting proxy" (because the client does not need to configure a proxy and cannot directly detect that its requests are being proxied).
However, offers different definitions:
"A 'transparent proxy' is a proxy that does not modify the request or response beyond what is required for proxy authentication and identification.
"A 'non-transparent proxy' is a proxy that modifies the request or response in order to provide some added service to the user agent, such as group annotation services, media type transformation, protocol reduction, or anonymity filtering."


Forced proxy

The term "forced proxy" is ambiguous. It means both "intercepting proxy" (because it filters all traffic on the only available gateway to the Internet) and its exact opposite, "non-intercepting proxy" (because the user is forced to configure a proxy in order to access the Internet).

Forced proxy operation is sometimes necessary due to issues with the interception of TCP connections and HTTP. For instance interception of HTTP requests can affect the usability of a proxy cache, and can greatly affect certain authentication mechanisms. This is primarily because the client thinks it is talking to a server, and so request headers required by a proxy are unable to be distinguished from headers that may be required by an upstream server (esp authorization headers). Also the HTTP specification prohibits caching of responses where the request contained an authorisation header.

Open proxy server

Main article: open proxy
Because proxies might be used for abuse, system administrators have developed a number of ways to refuse service to open proxies. IRC networks such as the Blitzed network automatically test client systems for known types of open proxy. Likewise, an email server may be configured to automatically test e-mail senders for open proxies, using software such as Michael Tokarev's proxycheck.

Groups of IRC and electronic mail operators run DNSBLs publishing lists of the IP addresses of known open proxies, such as AHBL, CBL, NJABL, and SORBS.

The ethics of automatically testing clients for open proxies are controversial. Some experts, such as Vernon Schryver, consider such testing to be equivalent to an attacker portscanning the client host. [1] Others consider the client to have solicited the scan by connecting to a server whose terms of service include testing.

Split proxy server

A split proxy is a proxy implemented as two programs installed on two different computers. Since they are effectively two parts of the same program, they can communicate with each other in a more efficient way than they can communicate with a more standard resource or tool such as a website or browser. This is ideal for compressing data over a slow link, such as a wireless or mobile data service, as well as for reducing the issues regarding high latency links (such as satellite internet) where establishing a TCP connection is time consuming.

Taking the example of web browsing, the user's browser is pointed to a local proxy which then communicates with its other half at some remote location. This remote server fetches the requisite data, repackages it, and sends it back to the user's local proxy, which then unpacks the data and presents it to the browser in the standard fashion.

Some Web accelerators are proxy servers. Some reduce the quality of JPEG images to speed transmission. Some use a split proxy with special protocols and local and remote caching. (See Google Web Accelerator.)

Reverse proxy server

Main article: reverse proxy
A reverse proxy is a proxy server that is installed in the neighborhood of one or more web servers. All traffic coming from the Internet and with a destination of one of the web servers goes through the proxy server. There are several reasons for installing reverse proxy servers:

  • Security: the proxy server is an additional layer of defense and therefore protects the web servers further up the chain.
  • Encryption / SSL acceleration: when secure web sites are created, the SSL encryption is often not done by the web server itself, but by a reverse proxy that is equipped with SSL acceleration hardware. See Secure Sockets Layer.
  • Load balancing: the reverse proxy can distribute the load to several web servers, each web server serving its own application area. In such a case, the reverse proxy may need to rewrite the URLs in each web page (translation from externally known URLs to the internal locations).
  • Serve/cache static content: A reverse proxy can offload the web servers by caching static content like pictures and other static graphical content.
  • Compression: the proxy server can optimize and compress the content to speed up the load time.
  • Spoon feeding: reduces resource usage caused by slow clients on the web servers by caching the content the web server sent and slowly "spoon feeds" it to the client. This especially benefits dynamically generated pages.
  • Extranet Publishing: a reverse proxy server facing the Internet can be used to communicate to a firewalled server internal to an organisation, providing extranet access to some functions while keeping the servers behind the firewalls.rainier


Circumventor

A circumventor is a method of defeating blocking policies implemented using proxy servers. Ironically, most circumventors are also proxy servers, of varying degrees of sophistication, which effectively implement "bypass policies".

A circumventor is a web-based page that takes a site that is blocked and "circumvents" it through to an unblocked web site, allowing the user to view blocked pages. A famous example is 'elgooG', which allowed users in China to use Google after it had been blocked there. elgooG differs from most circumventors in that it circumvents only one block.

The most common use is in schools where many blocking programs block by site rather than by code. Students are able to access blocked sites (games, chatrooms, messenger, offensive material, internet pornography, etc.) through a circumventor. As fast as the filtering software blocks circumventors, others spring up. It should be noted, however, that in some cases the filter may still intercept traffic to the circumventor, thus the person who manages the filter can still see the sites that are being visited.

Circumventors are also used by people who have been blocked from a web site.

Another use of a circumventor is to allow access to country-specific services, so that Internet users from other countries may also make use of them. An example is country-restricted reproduction of media and webcasting.

The use of circumventors is usually safe with the exception that circumventor sites run by an untrusted third party can be run with hidden intentions, such as collecting personal information, and as a result users are typically advised against running personal data such as credit card numbers or passwords through a circumventor.

At schools and offices

Many work places and schools are cracking down on the web sites and online services that are made available in their buildings. Since circumventors are used to bypass censors in computers, web sites like MySpace, Bebo, Xanga, Runescape, Youtube, Miniclip, Facebook, and other non-work or school related social web sites have become targets of mass banning.

Proxy Web server creators have become more clever allowing users to encrypt links, and any data going to and from other web servers. This allows users to access websites that would otherwise have been blocked.

A special case of web proxies are "CGI proxies". These are web sites that allow a user to access a site through them. They generally use PHP or CGI to implement the proxying functionality. CGI proxies are frequently used to gain access to web sites blocked by corporate or school proxies. Since they also hide the user's own IP address from the web sites they access through the proxy, they are sometimes also used to gain a degree of anonymity, called "Proxy Avoidance".

POP3 and SMTP proxies

Proxies are also used in email applications. Client-side anti-spam software often installs itself as a POP3 proxy, which permits it to filter the mail. Meanwhile, SMTP proxies are often installed by anti-virus software, so as to intercept any viruses that are sent onto the internet by that computer.

[+/-] Readmore...

Approaches to proxy

Proxies are commonly used for several reasons: security, load balancing, data caching in order to reduce bandwidth demands, and censorship or filtering. Filtering proxies insulate you from objectionable elements of Webpages such as cookies, ad banners, dynamic content like Javascript, Java Applets and ActiveX controls. Some anonymous proxies encrypt your Web communications, protecting you from routine monitoring or even dedicated surveillance. Be careful, though, not all proxies are anonymous! Here is an overview of the basic approaches to proxy:

  • Web-based Proxies: Web-based Proxies are powered by server-side softwares such as CGIProxy, PHProxy, Poxy, and custom proxy scripts. These proxies work entirely through a Web browser. Usually all that is needed to hide your IP address and surf anonymously is to visit the service's homepage in a Web browser and enter a URL (website address) in the form provided. There is no requirement to download or install software or reconfigure your computer. To work, a CGI based proxy must manipulate the document you've requested and all its associated elements and objects. This can be tricky, and not all proxies are as efficient or effective as others. Some services are slow and may produce errors while rendering the many variations of Web page code. But they are popular, numerous, and easy to use. See this page for a complete list of Web proxies.
  • Open Proxies: So-called "open proxies" are HTTP or SOCKS type proxy servers that are accidently or maliciously left "open" and accessible on the Internet. HTTP or SOCKS type proxy servers require that you configure your browser's proxy settings in order to use them. These proxies have the advantage of being compatible with almost all webpages since they do not have to modify the requested page to keep you anonymous. However, there are several major disavantages to using open proxies. Many utilize computers that are compromised, operated by government agencies, or operated by malicious individuals. Often when an attacker obtains control of an end-user's computer they will install a proxy server so the machine can be exploited to launch further attacks on other machines. It is also commonplace for open proxies to be operated as "honey pots", where all actions are logged for forensic research. Open proxies are easy to abuse and there are many people using them to commit credit card fraud, pay-per-click fraud, attack or break into computers, and hundreds of other illegal activities. We strongly discourage the use of open proxies as they provide no privacy or security and using them can result in increased exposure and liability.
  • Proxy networks: Various proxy networks (Freenet, I2P, JAP, and TOR) feature layered encryption (sometimes called "onion routing") and peer-to-peer networking to allow their users to communicate anonymously with each other. Rather than operate their own equipment, most rely on end-users to donate bandwidth and other resources to the network. They do not control the servers in their network and certainly a percentage of them are operated by malicious individuals for malicious reasons. Therefore any promises of privacy and security should be evaluated with this in mind. Also, these services have developed a reputation for being relatively slow.
  • Proxy Software: Other subscription-based services offer client-side application software to automatically configure your browser's proxy settings. Do not be fooled by these services as most are merely open proxies dressed up with a fancy interface.

[+/-] Readmore...

Xroxy Proxy Lists

Proxy RSS | Popular

Free Proxy Lists RSS Feed

Submit your website to 20 Search Engines - FREE with ineedhits!

@Submit!-FREE Promotion


Internet Blogs - BlogCatalog Blog Directory
Directory of Computers/Tech Blogs
Subscribe with Bloglines
eXTReMe Tracker