Anonymity using Proxy servers

Once you have properly configured your browser to use a proxy server, and type in a url, your browser summons the proxy server. It passes the url to the proxy server and the proxy server then retrieves the page you requested and sends it back to you. Any transfers you make while configured for proxy will be conducted through it therefore, since it is the proxy and not you thats hitting sites, all the site will see is the proxy and you remain invisible! Think of the proxy server as a "middle man". Sites you visit will see only the country and proxy you are using.

Anonymity : Available Proxies
The easiest way to set up a proxy is to cut the proxy address, then paste it to your proxy box in your configuration. There MUST be NO spaces at the end OR beginning of the proxy OR the port as you will get an unable to connect or locate error. Because availability of proxy servers varies from week to week, the best way to find one is to use this search engine.

Search Google

Anonymity : Classical versus Transparent IP Proxies
This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind. Distribution of this memo is unlimited.

Anonymity : Chaining Proxies
Many proxy servers keep logs of the IP's that have connected to them, however, if you use a proxy physically located in a country that is not especially friendly with the one in which you reside, it can make it difficult for someone to obtain the logs, even with a subpoena. You can increase the level of difficulty by "chaining" proxies, or having one proxy connect to another proxy. To maximize the difficulty of tracing the originating IP, each proxy should be located in a different country. Click here for a detailed explanation of how to chain proxies, and how how to set up proxy servers.

Anonymity : Google Proxy
A simple Google search and you'll find dozens of really good PHP scripts on the Internet to help you create proxy servers in minutes for free. The only limitation with PHP based proxies is that you require a web server to host the proxy scripts and second, you also need a domain name to act as an address for your proxy site. If you don't own a domain or server space, you can still create a personal proxy server for free and that too without requiring any technical knowledge. Here's one such proxy site that you can build for your personal use (say for accessing blocked sites from office). This is created using Google App Engine and, contrary to what you assume, the process is quite simple.
Create a Free Proxy Server with Google App Engine

Anonymity : Proxy Servers
Web proxy: Proxies that focus on WWW traffic are called web proxies. Many web proxies attempt to block offensive web content. Other web proxies reformat web pages for a specific purpose or audience. Network operators can also deploy proxies to intercept computer viruses and other hostile content served from remote web pages. Many organizations – including families, schools, corporations, and countries – use proxy servers to enforce acceptable network use policies or to provide security, anti-malware and/or caching services. A traditional web proxy is not transparent to the client application, which must be configured to use the proxy. In some cases, where alternative means of connection to the Internet are available, the user may be able to avoid policy control by simply resetting the client configuration and bypassing the proxy. Furthermore administration of browser configuration can be a burden for network administrators.

Security: A proxy server is an additional layer of defense and therefore protects the web servers further up the chain.

Encryption / SSL acceleration: when secure web sites are created, the SSL encryption is often not done by the web server itself, but by a reverse proxy that is equipped with SSL acceleration hardware. See Secure Sockets Layer.

Load balancing: The reverse proxy can distribute the load to several web servers, each web server serving its own application area. In such a case, the reverse proxy may need to rewrite the URLs in each web page (translation from externally known URLs to the internal locations).

Serve/cache static content: A reverse proxy can offload the web servers by caching static content like pictures and other static graphical content.

Compression: The proxy server can optimize and compress the content to speed up the load time.

Spoon feeding: Reduces resource usage caused by slow clients on the web servers by caching the content the web server sent and slowly "spoon feeds" it to the client. This especially benefits dynamically generated pages.

Extranet Publishing: A reverse proxy server facing the Internet can be used to communicate to a firewalled server internal to an organisation, providing extranet access to some functions while keeping the servers behind the firewalls.

Circumventor:A circumventor is a method of defeating blocking policies implemented by proxy servers. Ironically, most circumventors are also proxy servers, of varying degrees of sophistication. A circumventor is a web-based page that takes a site that is blocked and "circumvents" it through to an unblocked website, allowing the user to view xtube blocked pages.
The most common use is in schools where many blocking programs block by site rather than by code; students are able to access blocked sites (games, chatrooms, messenger, weapons, racism, forbidden knowledge, etc.) through a circumventor. As fast as the filtering software blocks circumventors, others spring up. It should be noted, however, that in some cases the filter may still intercept traffic to the circumventor, thus the person who manages the filter can still see the sites that are being visited. Circumventors are also used by people who have been blocked from a website. Another use of a circumventor is to allow access to country-specific services, so that Internet users from other countries may also make use of them. An example is country-restricted reproduction of media and webcasting.
The use of circumventors is usually safe with the exception that circumventor sites run by an untrusted third party can be run with hidden intentions, such as collecting personal information, and as a result users are typically advised against running personal data such as credit card numbers or passwords through a circumventor.
Many work places and schools are cracking down on the websites and online services that are made available in their buildings. Social networking websites have become targets of mass banning. Proxy Web server creators have become more clever allowing users to encrypt links, and any data going to and from other web servers. This allows users to access websites that would otherwise have been blocked.
A special case of you tube spoofs web proxies are "CGI proxies". These are web sites that allow a user to access a site through them. They generally use PHP or CGI to implement the proxying functionality. CGI proxies are frequently used to gain access to web sites blocked by corporate or school proxies. Since they also hide the user's own IP address from the web sites they access through the proxy, they are sometimes also used to gain a degree of anonymity, called "Proxy Avoidance".

Risks of using anonymous proxy servers
In using a proxy server (for example, anonymizing HTTP proxy), all data sent to the service being used (for example, HTTP server in a website) must pass through the proxy server before being sent to the service, mostly in unencrypted form. It is therefore possible, and has been demonstrated, for a malicious proxy server to record everything sent to the proxy: including unencrypted logins and passwords.
By chaining proxies which do not reveal data about the original requester, it is possible to make money from home obfuscate activities from the eyes of the user's destination. However, more traces will be left on the intermediate hops, which could be used or offered up to trace the user's activities. If the policies and administrators of these other proxies are unknown, the user may fall victim to a false sense of security just because those details are out of sight and mind.

The bottom line of this is to be wary when using proxy servers, and only use proxy servers of known integrity and never use proxy servers of unknown integrity. If there is no choice but to use unknown proxy servers, do not pass any private information (unless it is properly encrypted) through the proxy.

In what is more of an inconvenience than a risk, proxy users may find themselves being blocked from certain Web sites, as numerous forums and Web sites block IP addresses from proxies known to have spammed or trolled the site.

Vanish.Org Copyright © 2006 All rights reserved