Hacker priority #1: Keep a low profile.
Let’s start from general meaning of word ‘proxy’. It’s actually an agent/substitute or anybody acting at place of any other. Technically, proxies are used to bypass some firewall restrictions, maintaining anonymity or for many other purposes. Like you can use proxies for accessing social networking sites from your college network which the firewall may restricts.
Let’s understand the common methodology (talking in general terms) You bunk the lecture, requests your friend to speak up your att
Let’s understand the common methodology (talking in general terms) You bunk the lecture, requests your friend to speak up your att
Common ways to use proxies-
endance, you get the attendance (in case professor doesn’t’ detect).
Another example, when college firewall doesn’t allow you to connect to a site (say Facebook), You requests a proxy server to bring the web page from Facebook and serve you, Now the firewall thinks you are dealing with a server other than Facebook and allows you to make a connection(in case firewall doesn’t detect ).
Hence you have successfully managed to bypass a firewall. Proxy servers simply act as intermediate between your machine and actual server that you are accessing. Proxy servers are mostly used to maintain anonymity. Suppose you are planning to commit an online crime(although you shouldn’t) you can use a proxy server. The actual webserver doesn’t come to know about you because proxy server is dealing with webserver on your behalf.
Hence you have successfully managed to bypass a firewall. Proxy servers simply act as intermediate between your machine and actual server that you are accessing. Proxy servers are mostly used to maintain anonymity. Suppose you are planning to commit an online crime(although you shouldn’t) you can use a proxy server. The actual webserver doesn’t come to know about you because proxy server is dealing with webserver on your behalf.
(1) Setting in Web Browser
Steps:-1. First of all log on to whatismyip.com and pen down your current IP.
2. Logon to google.com and search for ‘fresh proxies’ you will get many sites providing you list of IPs and respective port numbers. It must be like this IP:port. Suppose logon to
http://www.digitalcybersoft.com/ProxyList/fresh-proxy-list.shtml
3. Now copy the IP and port no.
4. In Mozilla Firefox browser, go to Tools->Options->Advanced->Network->Settings. Check the option “Manual Proxy Configuration” , fill IP and port no. You can configure the proxies in any browser.
5. Check out whatismyip.com again, hopefully it must have been changed. Similarly you can configure proxies in other web browsers.
4. In Mozilla Firefox browser, go to Tools->Options->Advanced->Network->Settings. Check the option “Manual Proxy Configuration” , fill IP and port no. You can configure the proxies in any browser.
5. Check out whatismyip.com again, hopefully it must have been changed. Similarly you can configure proxies in other web browsers.
Post a Comment