In computer networks, a proxy server is a server (a computer system or an application program) which services the requests of its clients by forwarding requests to other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. The proxy server provides the resource by connecting to the specified server and requesting the service on behalf of the client. A proxy server may optionally alter the client's request or the server's response, and sometimes it may serve the request without contacting the specified server. In this case, it would 'cache' the first request to the remote server, so it could save the information for later, and make everything as fast as possible. A proxy server that passes all requests and replies unmodified is usually called a gateway or sometimes tunneling proxy. A proxy server can be placed in the user's local computer or at specific key points between the user and the destination servers or the Internet.

26 November 2007

If You've Been Proxy Hacked

The simplest test, if you are experiencing a problem, is to examine Google search results for a phrase (search term in quotes) that should be unique to your page. For example, if your home page says "Fred's Widget Factory sells the best down-home widgets on Earth" then you can search for that phrase.

You want to use a phrase (or combination of phrases) that should only appear on your page, and nowhere else on the web… or very few places at least. Then you do the search - if there's more than one result (your page), then you need to examine the other URLs that are listed. If some of them are delivering an exact copy of the page, you just may be dealing with a proxy that has hijacked your content.


A typical proxy link looks something like this:
www.example.com/nph-proxy.pl/011110A/http/www.mattcutts.com/blog/
It's easy to see what URL that would fetch, if example.com were a real proxy. Other proxy URLs encode the target URL so it's not always that easy to determine what they're going to fetch just by looking.

The mere presence of proxies in the index doesn't necessarily mean you'll be dropped or penalized. The situation inside Google's systems is no doubt very complex. I have seen sites with multiple proxies indexed, and no ill effects. It's possible that there are certain factors (trust, authority, domain age, etc.) that make one site more susceptible than another. I have no idea how they make the decision on which copy of a page to keep.

If you discover that you have a problem (pages knocked out of the index, -999 "penalty"), and you can identify proxies as duplicate content, a reinclusion request is likely to work in the short term, while you implement countermeasures. If you don't mind sharing your information with me so that I can use it for further research, send an email to proxyreports@gmail.com with the affected URL and the URL of the search result page that shows the proxy duplicates, along with any search terms where your ranking appears to be affected.

[+/-] Readmore...

22 November 2007

Firefox Add-ons

FoxyProxy 2.5.4
by Eric H. Jung

FoxyProxy is an advanced proxy management tool that completely replaces Firefox's proxy configuration. It offers more features than SwitchProxy, ProxyButton, QuickProxy, xyzproxy, ProxyTex, TorButton, etc...

FoxyProxy is an advanced proxy management tool that completely replaces Firefox's proxy configuration. It offers more features than SwitchProxy, ProxyButton, QuickProxy, xyzproxy, ProxyTex, TorButton, etc...

Works with:
Firefox: 1.5 – 3.0.0


Instal Now


Reviews for FoxyProxy......

Gmail
by Ronny Tankersley on November 18, 2007 (rated 8)
Works great everywhere but disables chat in Gmail

great addon, latest slightly broken on linux
by speculatrix on September 11, 2007 (rated 9)
this is a really useful tool for the sys and network admins, allowing you to switch proxy in very clever ways
the latest version is a bit buggy on linux - doesn't show the list of proxies defined, and doesn't offer the status bar menu thing - go back to v 2.4 and it works fine.

Good
by BlackHalt on July 22, 2007 (rated 10)
Good for TOR ;)

very good, with a annoying glitch?
by nomo17k on April 22, 2007 (rated 8)
Overall, this is a very useful add-on if you have a need for switching proxies on occasion. However, if you try to launch Firefox to establish a connection at some paid access point (like HotSpot or at airport, which requires you to login using your paid service), the browser simply does not launch properly, even if FoxyProxy is installed (you have to *totally* disable using Tools->Add-ons menu); it seems the initial checking of some sort by FoxyProxy is getting in the way. Other than that, this add-on offers a lot more functions than regular users would need, but is very useful.

Outstanding Wrk
by walking dolphins on April 5, 2007 (rated 9)
I'm very particular abut my internet use which means I manage through a number of proxies and every single connection gets assigned to one of them. With a moderate amount of thought, use of FoxyProxy's White List/Black List features with very easy to use wildcard patterns I have gone from a large amount of address-specific maintenance to basically a completely transparetn system. This tool is fantastic. As for the cautions on privacy, if you subscribe to an annonymizing proxy like anonymizer.com, you can get the best of all worlds.

To the author: I greatly appreciate your work and until you start charging a significant usage fee you owe none of us any apologies, especially for the stuff that is obviously beyond your control. The level of support you provide for this free tool is much higher than most commercial software offers.

aka Marshall

best proxy extension yet
by wish on April 4, 2007 (rated 10)
this is the best one yet.

[+/-] Readmore...

20 November 2007

Proxy+

Gives the complete solution to accessing the internet from the lan

  • Firewall increases security by separating LAN from the Internet
  • Disc cache with advanced manageability
  • Mail server with intranet mail capability
  • Automatic sorting of incoming messages
  • Automatic dialing/hanging-up of a switched telephone line
  • Support of synchronous and asynchronous dedicated line
  • WWW server for intranet
  • Management of all functions via a WWW interface
  • Lifetime free upgrade, free e-mail support
  • Full function 3-user free version, 31-days unlimited trial free version


Download the newest version of proxy+ for free

[+/-] Readmore...

The Solution

Using an anonymous proxy server you don’t give anybody chance to find out your IP address to use it in their own interests. We can offer you three ways to solve your IP problem:

1. Secure Tunnel - pay proxy server with plenty of features. Effective for personal use, when your Internet activities are not involved in web site development, mass form submitting, etc. The best solution for most of Internet users. Ultimate protection of privacy - nobody can find out where you are engaged in surfing. Blocks all methods of tracking. Provides an encrypted connection for all forms of web browsing, including http, news, mail, and the especially vulnerable IRC and ICQ. Comes with special totally preconfigured software.


2. ProxyWay Pro - multifunctional anonymous proxy surfing software which you can use together with a wide variety of web applications (web browsers, Instant Messengers, Internet Relay Chat (IRC), etc.) to ensure your anonymity. ProxyWay Pro provides an extended proxy management system that enables you to search for, check proxy (multithreaded proxies checking), analyze, validate proxy servers for speed, anonymity, type (HTTP/HTTPS/SOCKS), geographical location, create proxy chains. Allows update proxy list automatically using scheduler. ProxyWay Pro lets you clear history, block ads and popups, change User-Agent and Referrer fields, block harm code and much more. Also it can be used as a simple local proxy server.

3. Our own small proxy list is also a good place to start with if you are a novice.

[+/-] Readmore...

19 November 2007

Caching Proxy Server

By setting your proxy configuration at your web browser program, your browsing speed will increase. Wasantara Net Proxy Server do the following things that can make surfing speed faster :

  • The route to the ultimate destination is shorter and less troublesome (increasing speed tremendously)
  • Popular documents that're being accessed by users are kept in our Proxy Server hard drive so it can increase browsing speed.

How to setup proxy
  • Netscape Navigator
  • Netscape Communicator
  • Internet Explorer 2.0 (for Windows 3.1)
  • Internet Explorer 2.0 (for Windows 95)
  • Internet Explorer 2.0 (for Macintosh)
  • Internet Explorer 3.0 (for Windows 95)
  • Internet Explorer 5.x/6.x (for Windows 9x)
  • Opera
  • Other Browser please mail noc@wasantara.net.id


NETSCAPE NAVIGATOR
  1. Run Netscape Navigator
  2. Open Option menu
  3. Choose Network Preferences
  4. Choose Proxies tab (see picture)
  5. Activate Manual Proxy Configuration/B> option
  6. Click View button
  7. Fill HTTP Proxy with proxy.wasantara.net.id and port : 8080 (see picture)
  8. ClickOK to close the dialog box.


NETSCAPE COMMUNICATOR
  1. Run Netscape Communicator
  2. Open Edit menu
  3. Choose Preferences
  4. Doble click Advanced
  5. Activate Manual Proxy Configuration
  6. Fill HTTP Proxy with proxy.wasantara.net.id
  7. and Port with 8080 Click OK to close the dialog box.

INTERNET EXPLORER 2.0 (Windows 3.1)
  1. Run Internet Explorer
  2. Open View menu
  3. Choose Option
  4. Choose Proxy tab (see picture)
  5. Fill HTTP with proxy.wasantara.net.id , and port : 8080
  6. Click OK

INTERNET EXPLORER 2.0 (Windows 95)
  1. Open Control Panel
  2. Double click Internet Icon
  3. Activate Use Proxy Server option
  4. Fill Proxy Server field with proxy.wasantara.net.id:8080
  5. Click OK

INTERNET EXPLORER 2.0 (Macintosh)
  1. Run Internet Explorer
  2. Open Edit menu
  3. Choos Option
  4. Choose Proxy tab (see picture)
  5. Fill HTTP Proxy field with proxy.wasantara.net.id ,port:8080
  6. Click OK

INTERNET EXPLORER 3.0 (Windows 95)
  1. Run Internet Explorer
  2. Open View menu
  3. Choose Option
  4. Choose Connection tab
  5. Activate Connect through a proxy server option (see picture)
  6. Click Settings... button
  7. Fill HTTP field with proxy.wasantara.net.id and port:8080 (see picture)
  8. Click OK

INTERNET EXPLORER 5.x/6.x (Windows 9x)
  1. Run Internet Explorer
  2. Open Toolsmenu
  3. Choose Internet Options
  4. Choose Connections menu
  5. Click Lan Setting
  6. Activate Use a Proxy Server
  7. Fill Address field with proxy.wasantara.net.id and port field with 8080
  8. Click OK

OPERA
  1. Run Opera
  2. Open File menu
  3. Choose Preference
  4. Choose Network menu
  5. Click button Proxy Servers
  6. Click HTTP, field with proxy.wasantara.net.id and port field with 8080
  7. Click Ok.

[+/-] Readmore...

14 November 2007

Safe Web Surfing With Web Proxy

Internet is the modern day storage house of all kinds of information. There are sites that provide information, fun, news, business and great shopping experience. Whatever you want is there on the Internet. That is why more and more people are joining the Internet society everyday. Here we surf through sites to find the desired information or resources. Many people use the facility of web proxy, which is a type of a proxy server. But do you know why such a service is used?

While you are surfing the net, there are people who are always trying to track your location, even your social security number. These people are the hackers and online advertising agencies. They track down information about you and target you.


The advertising agencies will send unwanted advertisements on your email IDs while the hackers are famous for causing a lot of damage. For protecting their information and IDs from such attacks, Internet surfers use web proxy. This facility involves the formation of a proxy ID by a net user. This facility is being provided by many web surfing proxy sites.

For using this unique surfing facility, simply log onto one of the proxy sites. The site will provide a port number and an IP address. This information can then be used for figuring out your web proxy. The proxy IP address and port number that you create at the site can be used by you for protecting your identity and keeping your email free from all kinds of junk emails and spam.

All these emails and information will first come on the proxy IP address that you have created. Whatever information will be found to be important will be forwarded to your original email. This way your email will not get spammed continuously.

Apart from web proxy, such sites also provide CGI proxy. This facility works in the same manner as web proxy but with a little difference.CGI proxy is while visiting a website. Here, a CGI proxy site will develop a script for communication between an Internet user and a website.

The script will not allow the site to procure any kind of information related to the user. It will also prevent the site from storing any cookies on the user's system.

The two services can also be used by downloading or installing the Multi proxy software. There are various sites that provide this software online. After downloading this software, you will be provided with a list of all the proxy servers. This is actually the list of the IP addresses and port numbers that are available on the net. This software is more effective and safe as compared to the web-based sites that offer the service of web proxy.

Web proxy services are also used for increasing the efficiency and speed of a network. The information that is stored in the database of a proxy server is used for the purpose. In this case, a proxy server uses the Internet feature of cache. All the information that a user searches on the Internet is stored in a separate database which is called cache.

Whenever a new user will search for the same information, the proxy server will first search the cache database and then search some where else. This way the time of the user is saved.

[+/-] Readmore...

13 November 2007

Protection from Internet Threats

A proxy list comprises of SOCKS, HTTPS and HTTP proxy servers all on a single website. Proxies offer the flexibility to the users to form indirect connection of network with other services of computer network. Commonly the compilation of Proxy lists is done through automated software that examines the internet for some common identifiers of proxy that includes HTTP headers or open ports.

The proxy lists are reorganized actively as the proxy servers can be availed in periodic manner. There are proxy lists that can be acquired by the user for no cost, but for others a subscription is necessary.


Several servers are incorporated in a proxy list either inadvertently or sometimes the proxy server is installed spitefully by the criminals of the computer.There are various companies that are offering free proxy services such as Unblock MySpace Proxy, which aid a person in serving the internet secretly and carefully.

Their fast, reliable and at no cost MySpace compatible proxy will aid a person in unclogging MySpace from the filters of web either at offices or at schools. This company is also equipped with the facility to unclog Bebo and Facebook. The services are offered o you free of cost as long as you play pleasant and straight. They do not entertain any sort of malevolent activity and any kind of abuses such as bombing imagery. So, a person who is interested in avail these services should go through the terms and conditions.

There are times when it is essential to look out for information regarding the PHP version that the server is running currently. A person can come across several PHP versions and peculiar settings, by simply running a program of one line from the browser.

The purposes that serve the availability of proxy server list is for helping the administrators to search and cease open access to the proxy servers that is released by fault. There can be a possibility that there are proxies in these proxy lists that were not locked by an administrator of the system or by a home user who is not experienced. So, the administrator of these systems can see through these public listings in order to make sure whether the Internet servers are established or not.

It also serves to aid the people to stay unidentified on the Internet. It is essential to be aware that the public server that is being used is legal by all means. In case a person is using a server that is opened, then sooner or later the administrator will be aware of his error. And, a person should definitely avoid proxy servers for unlawful or spiteful deeds.

The few packages of software that is equipped with multi proxy can be availed with pro and platinum and Ghost Surf standard. This makes anonymous proxy servers as a perfect solution to combat against the spammers as they aid in offering you safety by hiding your IP address and other important information from the webmasters.

[+/-] Readmore...

Tracert

Tracert is a low level tool that can be invaluable when diagnosing network problems, it is normally run from a command prompt within Windows, and for the information to be meaningful must be run with no other internet activity being carried out.

To run a tracert from a command prompt type "tracert www.bbc.co.uk" or whatever the site or ip address is that you wish to trace to.

When reading a tracert there are certain things to be aware of, first and most important is that not all routers or web sites respond to icmp traffic and you may see timeouts which do not necessarily indicat a problem. Second is that icmp traffic is generally treated as lowest priority by routers and occasionally abnormally high figures will show up which do not necessarily indicate a problem.

Some sample tracerts and what they mean are shown below.


1 1 ms 1 ms 1 ms 192.168.2.1
2 10 ms 11 ms 9 ms 10.149.79.254
3 10 ms 9 ms 9 ms swan-t2cam1-b-ge910.inet.ntl.com [80.0.254.149]
4 29 ms 10 ms 9 ms swa-t2core-b-ge-wan61.inet.ntl.com [213.105.225.145]
5 12 ms 31 ms 13 ms win-bb-b-so-220-0.inet.ntl.com [62.253.187.241]
6 19 ms 13 ms 15 ms pop-bb-a-so-000-0.inet.ntl.com [62.253.185.201]
7 * * * Request timed out.
8 14 ms 15 ms 14 ms 212.58.239.217
9 19 ms 16 ms 16 ms www22.thdo.bbc.co.uk [212.58.224.122]

Hop 1 is my home network and I would be very concerned if this was showing a response time above 10ms

Hop 2 is the private side of my local UBR, this is the hop that will normally show very high figures if there is too much traffic being fed from my local cable loop. The figure will be higher the further away you are from the UBR and high figures do not necessarily indicate a problem. It is more important that the responses are consistent.
A response of 48 ms 11 ms 83 ms would suggest some issues here.

Hop 3 is the local cam, a big ring road around each headend that routes the traffic to the core.

Hop 4 the core, data is now transferred onto fibre optic cables and transmitted through the service backbone.

Hops 5 and 6 are hops across the ntl backbone - note the bb in the host name, these route the data to the peering point at telehouse.

Hop 7 - This is the interesting one, a repeat of the test reveals that this one is telehouse and first observation would seem to indicate that there is a problem here. (see the same entry in the following example also.)
The router in the first trace appears to drop all packets, and in the second trace appears to drop 33% of packets and to slow the remaining packets down. However this is an example of the low icmp priority and can be seen by looking at Hop 8.

Hop 8 - All traffic reaching hop 8 has to pass through hop 7. The times given for the hop are cumulative through each hop on the trace and the fact that hop 8 shows 100% replies and at low ping times indicates that hop 7 though replying to the traffic very poorly, is actually passing traffic with no problems. Hop 8 is the transfer point from telehouse to the bbc website.

Hop 9 - Final destination. Return times of less than 20ms indicate no problems with this route despite the timeouts on hop 7

Repeat test

1 1 ms 1 ms 1 ms 192.168.2.1
2 39 ms 10 ms 9 ms 10.149.79.254
3 10 ms 10 ms 8 ms swan-t2cam1-b-ge910.inet.ntl.com [80.0.254.149]
4 10 ms 12 ms 10 ms swa-t2core-b-ge-wan61.inet.ntl.com [213.105.225.145]
5 14 ms 12 ms 24 ms win-bb-b-so-220-0.inet.ntl.com [62.253.187.241]
6 15 ms 16 ms 49 ms pop-bb-a-so-000-0.inet.ntl.com [62.253.185.201]
7 43 ms 86 ms * tele-ic-2-so-000-0.inet.ntl.com [62.253.185.86]
8 14 ms 20 ms 14 ms 212.58.239.217
9 16 ms 15 ms 14 ms www22.thdo.bbc.co.uk [212.58.224.122]

OK on this one I am seeing some variation at Hop 2, but hop 3,4,5 are ok suggesting again that the variation on hop 2 should not cause a problem
Hop 7 again looks decidedly dodgy, but again hops 8 and 9 need to be looked at and indicate no problems with data passing though hop 7.

A bad trace from an oversubscribed cable would something like this
(I forced this one by downloading at 980k while running the test)

1 2 ms 1 ms 1 ms 192.168.2.1
2 177 ms 25 ms 12 ms 10.149.79.254
3 218 ms 93 ms 154 ms swan-t2cam1-b-ge910.inet.ntl.com [80.0.254.149]
4 198 ms 215 ms 247 ms swa-t2core-b-ge-wan61.inet.ntl.com [213.105.225.145]
5 256 ms 175 ms 92 ms win-bb-b-so-220-0.inet.ntl.com [62.253.187.241]
6 210 ms 119 ms 59 ms pop-bb-a-so-000-0.inet.ntl.com [62.253.185.201]
7 * * * Request timed out.
8 123 ms 143 ms 142 ms 212.58.239.217
9 157 ms 174 ms 179 ms www15.thdo.bbc.co.uk [212.58.224.115]

OK hop 2 high and variable, but this time note the lag on hop 2 has transferred itself right through the trace and given an average 160ms to the final destination.

This next one would be what I would expect to see where packet loss is involved. I have doctored this as it is very difficult to find a proper example.

1 1 ms 1 ms 1 ms 192.168.2.1
2 39 ms 10 ms 9 ms 10.149.79.254
3 10 ms 10 ms 8 ms swan-t2cam1-b-ge910.inet.ntl.com [80.0.254.149]
4 10 ms * 10 ms swa-t2core-b-ge-wan61.inet.ntl.com [213.105.225.145]
5 * 12 ms * win-bb-b-so-220-0.inet.ntl.com [62.253.187.241]
6 15 ms * 49 ms pop-bb-a-so-000-0.inet.ntl.com [62.253.185.201]
7 43 ms * * tele-ic-2-so-000-0.inet.ntl.com [62.253.185.86]
8 * 20 ms 14 ms 212.58.239.217
9 16 ms * * www22.thdo.bbc.co.uk [212.58.224.122]

Note packet loss here starting at Hop 4 will transfer itself right through the trace as traffic from hop 5 and above needs to pass through the troublesome hop.

My last example is to a site in the USA

Tracing route to www2.microsoft.akadns.net [207.46.250.252]
over a maximum of 30 hops:

1 1 ms 1 ms 1 ms 192.168.2.1
2 9 ms 9 ms 11 ms 10.149.79.254
3 9 ms 9 ms 10 ms swan-t2cam1-a-ge910.inet.ntl.com [80.0.254.21]
4 9 ms 12 ms 10 ms swan-t2cam1-b-ge11.inet.ntl.com [80.0.255.10]
5 10 ms 11 ms 10 ms swa-t2core-b-ge-wan61.inet.ntl.com [213.105.225.145]
6 13 ms 33 ms 12 ms win-bb-b-so-220-0.inet.ntl.com [62.253.187.241]
7 15 ms 15 ms 43 ms P4-0.BRSBB1.Pop.opentransit.net [193.251.254.145]
8 19 ms 19 ms 19 ms So5-0-0.LONCR1.London.opentransit.net [193.251.243.242]
9 92 ms 91 ms 92 ms P3-0.NYKCR3.New-york.opentransit.net [193.251.243.21]
10 98 ms 111 ms 96 ms P12-0.OAKCR1.Oakhill.opentransit.net [193.251.242.254]
11 97 ms 97 ms 99 ms So4-0-0.ASHBB1.Ashburn.opentransit.net [193.251.248.109]
12 97 ms 120 ms 98 ms 207.46.45.69
13 96 ms 98 ms 100 ms 207.46.46.129
14 97 ms 99 ms 98 ms 207.46.34.25
15 189 ms 191 ms 189 ms 207.46.33.61
16 190 ms 188 ms 188 ms 207.46.36.214
17 195 ms 191 ms 191 ms 207.46.155.13
18 * * * Request timed out.
19 * * * Request timed out.
20 * * * Request timed out.

Points of interest here are hop 9 time jumps from 19 to 90ms, this is entirely normal for traffic crossing the Atlantic. Data travels through cables at the speed of light, and even at this speed there is a huge overhead on data being bounced off a server in USA.
Hop 15 this is New York on the east coast of the USA to Seattle on the West coast, another huge jump is to be expected.
Hop 18 and onwards. This does not indicate a problem with the final destination, merely that the Microsoft servers are blocked to UDP and ICMP traffic. The site responds fine to page requests.

[+/-] Readmore...

06 November 2007

Anonymous Proxy

An anonymous proxy is a piece of software designed to protect the privacy and anonymity of web browsers from web site operators, Internet snoops, and even unfriendly governments.

The anonymous proxy software resides on a proxy server. The web browser connects to the proxy server and the proxy server connects to the web server.

The web server does not know who you are, it only knows who the proxy server is. The proxy server does know who you are -- so you had better choose a proxy server that you trust.

A good web proxy will allow you to setup a TLS or SSL tunnel. This will prevent packet sniffers from eavesdropping on you while you are surfing anonymously.

Some anonymous proxy servers support FTP, while others only support HTTP. Better anonymous proxy servers also support HTTPS. Make sure to select an anonymous proxy server which supports the protocols you wish to use.

In addition to hiding your IP address, an anonymous proxy server will typically remove traffic such as:

  • Cookies
  • Pop-ups
  • Banners
  • Scripts
  • Referrer information

These options should be configurable by the end-user to enable to proxy server to work with web sites which require cookies or pop-ups.

[+/-] Readmore...

Articles on how to build a successful proxy website!

Here’s a list of articles and links that might help you run a more efficient and effective proxy website using my templates. I definitely recommend you bookmark this page immediately :

  • Immortality’s Proxy Secrets
    A straight forward guide on how to optimize, run and maximize revenue with your proxy websites.

  • IP Unblock - Building & making money with your proxy site
    Another in-depth guide on how to monetize and get traffic to your proxy website.

  • Get A Proxy
    A five step tutorial on how to start a proxy website from scratch, from picking your host to choosing your proxy script to getting traffic.

  • Proxy Users Network
    A discussion forum for Proxy Webmasters. Learn everything there is to know about running a proxy website. You will also get to meet up with other proxy webmasters in the community and share and tell your experiences with each other.

  • Bypasser.org
    A proxy toplist site that provides proxy users and webmasters with great relevant tools and information.

  • Mubin Ahmed
    This guy writes amazing up-to-date articles concerning proxy websites.

  • Proxy: Introduction and Installation
    A simple article detailing the installation process of setting up your own proxy site.

  • Proxy: Earning and Maximising Profits
    Great article, telling you some of the ways you can maximize your proxy websites revenue.

  • Free 2 Surf Privacy Blog
    A great proxy blog site containing in depth information on proxies, proxy scripts and templates.

  • IP Unblock - Proxy hosting
    How to pick the right Proxy Hosting for you!

  • 443 Proxy
    A proxy website containing various articles and guides on how to optimize your proxy website.

  • Dave Turnbull’s - Making a successful proxy
    A massive 7 page article guide on how to run a proxy website. He literally covers everything you need to know about building a successful proxy website.

  • Proxy Bucket Directory
    Various articles related to running, monetizing, optimizing and designing a proxy website.

  • Proxy Sphere
    Another set of great articles on how to optimize a proxy website with your server configurations.

  • Payment Blogger - Pros and Cons
    Great article outlining the Pros and the Cons of making a proxy website.

  • Web Proxy Blog
    A relatively new blog dedicated to helping users like yourself make money from proxy websites.

  • Proxy.Org Forum
    One of the original Proxy Webmaster Forums. They have almost everything there is to know about proxy. Basically your FAQ for proxy websites.

  • Digital Point Forums
    Another massive forum dedicated to webmasters alike. You can find lots of tips on how to sell, buy and manage proxy websites. You can also do link sales and exchanges with other related proxy sites.

  • Proxy Builder
    A neat tool allowing users to create fast free PHP and CGI proxy websites instantly. They also have a few good tips to get started with making web proxies.

[+/-] Readmore...

Xroxy Proxy Lists

Proxy RSS | Popular

Free Proxy Lists RSS Feed

Submit your website to 20 Search Engines - FREE with ineedhits!

@Submit!-FREE Promotion


Internet Blogs - BlogCatalog Blog Directory
Directory of Computers/Tech Blogs
Subscribe with Bloglines
eXTReMe Tracker