In computer networks, a proxy server is a server (a computer system or an application program) which services the requests of its clients by forwarding requests to other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. The proxy server provides the resource by connecting to the specified server and requesting the service on behalf of the client. A proxy server may optionally alter the client's request or the server's response, and sometimes it may serve the request without contacting the specified server. In this case, it would 'cache' the first request to the remote server, so it could save the information for later, and make everything as fast as possible. A proxy server that passes all requests and replies unmodified is usually called a gateway or sometimes tunneling proxy. A proxy server can be placed in the user's local computer or at specific key points between the user and the destination servers or the Internet.

09 December 2007

Proxy fight from the boardroom to the courthouse

OLDSMAR -- A South Florida investor who waged a proxy fight for control of Cryo-Cell International Inc. has asked a judge to put his nominees for directors on the Cryo-Cell board.

David Portnoy said in a lawsuit filed in the Delaware Court of Chancery that Mercedes Walton, chairman and CEO of Cryo-Cell, and four board members engaged in an illegal vote-buying scheme designed to ensure the defeat of Portnoy's dissident slate of nominees during the company's annual meeting July 16.

Walton did not return a call for comment. Portnoy declined to comment on the suit.

A three-day trial was held Nov. 14-16 in the New Castle County division of the chancery court, which is considered the nation's preeminent forum for the determination of business disputes. The judge in the case, Vice Chancellor Leo Strine Jr., reserved a decision, pending the filing of post-trial briefs.

[+/-] Readmore...

Google free proxy!

Access restricted web sites using Google language tools service as a proxy.
Ok, let's start from the beginning. We all know that Google is more than a search engine; we do use it as provider for email, mapping, news and many other services. Google is now also a free proxy service. Proxy is a device that stands between a PC and the internet, providing all the connections to the world wide web. What a proxy does is to receive all data from a requested site, so when you access web pages all data come from proxy.

What's the purpose for Google as a proxy? We often use office/school/university connections, usually those services are set to provide more safety, blocking the access to undesidered web sites (the "black list"). What you can do now is use Google translator service (language tools) as a proxy to bypass the restrictions set for our connection!

You just need to type the following URL:

http://www.google.com/translate?langpair=en|en&u=www.forbiddensite.com
(www.forbiddensite.com stands for the URL you need to go to...)

What you'll get is the translation (english to english!) of the page you want to see... your connection is directed to a google.com page so this page won't be blocked (would be blocked only with google.com on the black list), no matter what's the content.

Notice that the URL has been a little hacked because the parameter "langpair"(1) is set to "en|en" (english/english) so the page is processed by Google but you can keep the original language of the page (no need to translate!). If you need another language (e.g. french) you just need to set the parameter langpair to "fr|fr" and you'll be able to read french pages in french!

[+/-] Readmore...

04 December 2007

Proxy Server Guide

Here is your comprehensive Guide to Proxy Servers, and their usage. Please feel free to browse through and link to any of the following articles
by : proxy-server.info

[+/-] Readmore...

03 December 2007

Microsoft Investigating Vulnerability

Microsoft Corp. announced that it is investigating new public reports of a vulnerability in the way Windows resolves hostnames that do not include a fully-qualified domain name (FQDN). The technology that the vulnerability affects is Web Proxy Auto-Discovery (WPAD).

The company has not received any information to indicate that this vulnerability has been publicly used to attack customers, and it is not aware of any customer impact at this time. Microsoft said it is aggressively investigating the public reports.

Customers whose domain name begins in a third-level or deeper domain, such as "contoso.co.us", or for whom the following mitigating factors do not apply, are at risk from this vulnerability.

Upon completion of this investigation, Microsoft said it will take the appropriate action to help protect our customers. This may include providing a security update through our monthly release process or providing an out-of-cycle security update, depending on customer needs.

Mitigating Factors:

  • Customers who do not have a primary DNS suffix configured on their system are not affected by this vulnerability. In most cases, home users that are not members of a domain have no primary DNS suffix configured. Connection-specific DNS suffixes may be provided by some Internet Service Providers (ISPs), and these configurations are not affected by this vulnerability.
  • Customers whose DNS domain name is registered as a second-level domain (SLD) below a top-level domain (TLD) are not affected by this vulnerability. Customers whose DNS suffixes reflect this registration would not be affected by this vulnerability. An example of a customer who is not affected is contoso.com or fabrikam.gov, where "contoso" and "fabrikam" are customer registered SLDs under their respective ".com" and ".gov" TLDs.
  • Customers who have specified a proxy server via DHCP server settings or DNS are not affected by this vulnerability.
  • Customers who have a trusted WPAD server in their organization are not affected by this vulnerability.
  • Customers who have manually specified a proxy server in Internet Explorer are not at risk from this vulnerability when using Internet Explorer.
  • Customers who have disabled 'Automatically Detect Settings' in Internet Explorer are not at risk from this vulnerability when using Internet Explorer.


Microsoft has tested the following workarounds. Although these workarounds will not correct the underlying vulnerability, they help block known attack vectors.
  • Create a WPAD.DAT Proxy Auto Configuration File on a Host Named WPAD in Your Organization to Direct Web Browsers to Your Organization's Proxy
  • Disable Automatically Detect Settings in Internet Explorer
  • Disable DNS Devolution
  • Configure a Domain Suffix Search List

Microsoft has thanked Beau Butler for working with the company and reporting the vulnerability in Web Proxy Auto-Discovery (WPAD).

[+/-] Readmore...

Xroxy Proxy Lists

Proxy RSS | Popular

Free Proxy Lists RSS Feed

Submit your website to 20 Search Engines - FREE with ineedhits!

@Submit!-FREE Promotion


Internet Blogs - BlogCatalog Blog Directory
Directory of Computers/Tech Blogs
Subscribe with Bloglines
eXTReMe Tracker