Wednesday, April 6, 2011

Using Proxy


Enter a URL to visit via proxy:

A proxy is a web page that provides Internet users with the ability to browse web sites that may be blocked by a content filter, such as WebSense or SmartFilter. By making use of the proxy as the portal to the blocked site, it is possible to circumvent the work of whatever content filter is in place. At the same time, the proxy site also helps to mask the visit to the site, so that there is less evidence that the content filter was not successful in preventing the visit.


How Does A Proxy Work?

Essentially, the proxy will provide the same ability to browse the Internet as any other web browser. A proxy site allows the user to key in a specific web address and be directed to that specific page in a window. This accomplishes two things. First, the window is coded as part of the proxy site address and not the actual web site the user is visiting. Second, any information cached on in the temporary Internet files will appear to be information related to the proxy site, and not the blocked web site.
 
Why Use A Proxy?

One of the legitimate uses of a proxy site is to get around blocked content that may contain one or two words that the filter has identified as inappropriate for viewing. Many companies make use of filters to limit the ability of employees to spend time looking at web pages that are not related to job functions in some manner. This is usually accomplished with the use of key words that are programmed into the filter, which in turn blocks any page or site with those words present. While this does block access to a number of sites that have nothing to do with work, they can also inhibit access to pages and glossaries that are designed to be helpful.

When this is the case, an employee may choose to use a proxy site to get around the block and be able to get to a page that he or she legitimately needs to view in order to accomplish a work related task. Since using a proxy site does not take much longer than using a browser window, it is much faster than calling technical support and trying to get authorization to remove a given site from the filter list.

Many totalitarian nations also use content filters to block their residents from finding information on the world wide web which may not be approved by the regime in power. Residents of those nations can use proxy sites to access news and information from the free world.

Another advantage of using the proxy site is that the IP address of the user is not logged. This helps to ensure the privacy and anonymity of Internet users.

What does your IP address reveal about you?

Your IP address reveals your point of entry to the Internet and can be used to trace your communications back to your ISP, your employer's network, your school, a public terminal. Though your IP address may not identify you personally, an IP is a unique identifier which represents your computer's digital ID while you are online.

It is possible to disguise your IP address on the Web by using an anonymous proxy server. A proxy acts as an intermediary, routing communications between your computer and the Internet. A proxy specializing in anonymous surfing, however, uses its own IP address in place of yours in every outgoing request.

* Web-based Proxies: Web-based Proxies are powered by server-side softwares such as CGIProxy, PHProxy, Glype, and custom proxy scripts. These proxies work entirely through a Web browser. Usually all that is needed to hide your IP address and surf anonymously is to visit the service's homepage in a Web browser and enter a URL (website address) in the form provided. There is no requirement to download or install software or reconfigure your computer. To work, a CGI based proxy must manipulate the document you've requested and all its associated elements and objects. This can be tricky, and not all proxies are as efficient or effective as others. Some services are slow and may produce errors while rendering the many variations of Web page code. But they are popular, numerous, and easy to use. See this page for a complete list of Web proxies.





* Open Proxies: So-called "open proxies" are HTTP or SOCKS type proxy servers that are accidentally or maliciously left "open" and accessible on the Internet. HTTP or SOCKS type proxy servers require that you configure your browser's proxy settings in order to use them. These proxies have the advantage of being compatible with almost all webpages since they do not have to modify the requested page to keep you anonymous. However, there are several major disadvantages to using open proxies. Many utilize computers that are compromised, operated by government agencies, or operated by malicious individuals. Often when an attacker obtains control of an end-user's computer they will install a proxy server so the machine can be exploited to launch further attacks on other machines. It is also commonplace for open proxies to be operated as "honey pots", where all actions are logged for forensic research. Open proxies are easy to abuse and there are many people using them to commit credit card fraud, pay-per-click fraud, attack or break into computers, and hundreds of other illegal activities. We strongly discourage the use of open proxies as they provide no privacy or security and using them can result in increased exposure and liability.

* Proxy networks: Various proxy networks (Freenet, I2P, JAP, and TOR) feature layered encryption (sometimes called "onion routing") and peer-to-peer networking to allow their users to communicate anonymously with each other. Rather than operate their own equipment, most rely on end-users to donate bandwidth and other resources to the network. They do not control the servers in their network and certainly a percentage of them are operated by malicious individuals for malicious reasons. Therefore any promises of privacy and security should be evaluated with this in mind. Also, these services have developed a reputation for being relatively slow.

* Proxy Software: Other subscription-based services offer client-side application software to automatically configure your browser's proxy settings. Do not be fooled by these services as most are merely open proxies dressed up with a fancy interface.

0 comments:

Post a Comment

Twitter Delicious Facebook Digg Stumbleupon Favorites More