Anonymity In Question


Can you really surf the web anonymously? Not so sure. If you got rid of the web bugs, cookies and other identifiers, you have an advantage over ordinary mortals. But, it does not guarantee perfect anonymity. When you connect to a website, your browser sends various information that you do not necessarily have an idea about. It notes, so your type of operating system (OS), type your e-mail software (if your e-mail address), the resolution of your monitor, java configuration, the address of the last site you visited before we get there, etc.. And, above all, it communicates your IP address, the famous address that identifies you as a user of the Net and can – unfortunately – help you locate and identify you.


The usefulness of online anonymity


In fact, it is really helpful to be totally anonymous on the Net? From the moment the information you provide is kept to a minimum, why protect more? It would be like if you go out from you that wearing a raincoat, with a fake beard, felt hat and dark glasses.

In fact, I do not have an answer on this point. A judge whether each of his desire for anonymity justifies further efforts. Personally, I think yes. But, everyone acts as he wishes…


New fresh proxies and stuff


Proxy (plural “proxies”), what is it? Simply a server (a “computer”) that works like a “cache” external relays your queries and receptions where you are on the Net. Consider an example. When you visit a web page, your browser sends requests (like “Hey, I want to see this page with its images, java elements, etc…”) The server in question, which, in turn, will return the elements of the web page (images, html pages, etc…) When you use a proxy, your browser sends its requests to it, which then redirects to the site you want. When it responds, new fresh proxies that receive the information sent … before you redirect. Those specialists do not want me to be schematic, but, roughly speaking, that’s how it works.


The interest of new fresh proxies


There are at least two advantages to use a proxy…

1) The speed. In principle, proxies store the web pages they charge, so that those who are consulted most often can be more quickly accessed.

2) Safety. Some new fresh proxies are configured to be “non-transparent”, and your IP address is never shared with servers consulted (web, ftp, etc…). You are now virtually “anonymous” on the Network.


The truth


In fact, things are not so simple. Because if there are thousands of new fresh proxies in the world, very few are absolutely “non-transparent” and many are terribly slow… especially when they are free. In addition, you should know that the proxies they record all communications relay (or at least the IP addresses involved). For now, the data collected have never – to my knowledge – been used illegally. But who knows? Especially disturbing rumors about the proxies used by U.S. service providers have circulated in recent months.

However, with a little perseverance, it is possible to find proxies that are fast enough and “safe” to be used in good conditions. If you use several at once, and randomly, you can enjoy a level of anonymity quite appreciable.

Note: some sites use mini-applications to determine your real IP address. For now, this technique is mainly used by websites to check online security.

Change Proxy Settings In Internet Explorer


These settings work for Windows Internet Explorer 7 and Windows Internet Explorer 8.


The new fresh proxies are used to tell Internet Explorer the network address of an intermediary server called proxy server that is used between the browser and the Internet on some networks. Generally you should change the proxy settings if you are connected to the Internet through a limited network. Internet Explorer automatically detects proxy settings. However, it is possible to manually set a proxy with information provided by your network administrator. Here’s how:


To change the proxy server settings


If you follow the steps to change proxy server settings and you still find that the address you type for a new proxy server is not saved, check these:


If you enter a URL or Internet address for the proxy server, ensure that you are using forward slashes (/) instead of backslashes (\) when typing the address. For example, you must type http://servername and not http: \ \ servername.


If you enter a local network address for the proxy server, make sure you use backslashes (\) rather than forward slashes (/). For example, you must type \ \ servername, not / / servername.

Anonymous Browsing


Anonymous proxy websites are there to help you surf anonymously in the World Wide Web; you can visit your favorite websites with a hidden identity: the IP address + the location of your computer.


The efficiency of anonymous surfing


It’s a well known technique with its ability to eliminate restrictions faced in the internet connection. New fresh proxies are used inside companies, offices and even schools where they find limits on web pages.


The risks of anonymous surfing


You must pay attention and know the inconvenient side before using anonymous proxies; it can be harmful since all information is sent to the server like: passwords, logins and the numbers of credit cards. This information may be used in a bad way.


The levels of anonymity


  •  Level 1: There is anonymity the distant host knows your IP address also knows that you’re using a proxy.
  •  Level 4:  Poor anonymity the distant host doesn’t have your IP address however it knows that you’re using a proxy.
  •  Level 8:  Medium anonymity the distant host knows that you’re using a new fresh proxy and it thinks that it knows you your IP address however it’s not yours; in fact it’s the proxy used to show its entering interface.
  • Level 16: high anonymity the distant host have no information about your IP address or the proxy used. And if the host doesn’t send additional header strings it will be considered as high anonymous.

Features and Notes


You have to make sure that you’re selecting an anonymous proxy server among new fresh proxies that sustain all the records you need to use.

To hide your address IP anonymous new fresh proxies will take off traffic like:

  •  Scripts
  •  Banners
  •  Cookies
  •  Pop-ups
  •  Referring information


Web browsers


  •  Google chrome:  Options > Under the hood > Network > change proxy settings > use a proxy server > advanced> HTTP.
  •  Mozilla Firefox: Tools > Options > Advanced > Settings > Manual proxy configuration.
  •  Internet Explorer: Tools > Internet options > Connections > LAN settings > Use a proxy server > Advanced > HTTP.
  •  Opera: Tools > Preferences > Advanced > Network.






The proxies


What is it?

A proxy server is basically a machine acting as an intermediary between a local network and the Internet. It is generally used for web (HTTP proxy) but there are proxy servers for all application protocols (FTP, etc.)…


A proxy works in the following way: it is mandated by an application to query the Internet instead. More specifically, when a user (using a proxy) connects to the Internet makes it connects to the proxy and it is this that will make the request. The answer lies in the same path but in “reverse.”

The cache function

Computer language cache is a function to remember the pages that users visit a local network more often so as to provide as quickly as possible.

This function presents the new fresh proxies allows among others to save bandwidth to the Internet but also to reduce the access time to the various company documents for LAN users. Nevertheless, if the cache is working optimally, it must compare the data regularly to stay up to date.


Another function provides a proxy is filtering data. Indeed, it is possible to monitor the requests made by users on the LAN through activity logs (logs). These systematically record all Internet connections.

The filter and proxy requests by referring either to a list of connections allowed (white list) or a list of unauthorized connection (blacklist).

The reverse-proxies

A reverse proxy is a proxy that is the reverse of normal. It does not allow users to send a local network to the Internet but Internet users to achieve indirectly LAN.

In this configuration, the proxy also serves to protect from attacks from the outside and through the cache function, alleviate server load which results in a considerable saving of time.

The use of new fresh proxies


What is a proxy site?

A proxy site is considered as a web page that enables you to skim your most used websites. But the access to these websites might be blocked by a filter.

In this case and if you discover that you are blocked then you must unblock using a proxy site.


The work of a proxy site


A proxy site allows you to avoid using your internet provider and run through the website proxy. You have just to type the address of your favorite website or the one you need to work as your provider and then you can start using you favorite websites with their form, by this way you will be protected also you will not be blocked.


The proxy in general is a web page that gives to the users of internet the ability to run through their favorite websites without being blocked. In addition the proxy site is able to mask your visits to the site.




Some filters can be used by many companies to restrict access to web pages that have no relation with job tasks that may be used by their employees. Generally they program the filter with some keywords that blocks any page containing those keywords. They can also limit access to help pages.


The use of new fresh proxies


News fresh proxies have many advantages for example; the IP of users is not logged when they use a proxy site. This way the internet users browse safely with anonymity and privacy.




New Proxies


A proxy is software that resides in-between a client computer and a server. All communications between the client and the server are routed through the proxy. Proxy software can reside either on a dedicated computer, sandwiched between the client and the server, or exist in the client computer itself. The proxy acts as a filter that sifts through all communication that occurs between the client and the server.

New fresh proxies are widely used in the business environment to control internal computer network communication with the outside world. The data flow is constricted through the proxy for the purposes of security and policy enforcement. Any data that violates the policies of the company or it is a threat to the internal network Security is immediately filtered. New fresh proxies are also used in schools and public institutions such as libraries for the same purpose.

Proxies may be used for a wide variety of purposes. Based on their functions, they are called by different names. A proxy that is used for monitoring and content filtering, as explained above, is known as a content filtering proxy. On the other hand, a proxy that forwards all calls without changing the content of traffic is known as a gateway.

A proxy cache is one that maintains a cache of frequently requested information. It is mainly used to reduce bandwidth usage and network acceleration. When a client requests a piece of information, the proxy normally passes this request to the server and relays the response from the server to the client. But if the same information is requested on several occasions, the proxy maintains a copy of the information in its cache and sends information directly to the client instead of sending a request to the server. This speeds up the response time and also reduces the bandwidth requirement of the entire network.

Quality Paid Proxies


There are lots of reasons to choose new fresh proxies of a real service proxy

Here are a few:

  • Quality of service mastered and announced. More proxy in the wind or unreachable destroys your campaign (or spam!)
  • New fresh proxies, uncompromised, not blacklisted by spam servers
  • Rate of failure in your campaign terribly lower than you would have had with free proxies.
  • One service after sales to turn since there is a purchasing service.
  • Finally, the time gained for a set cost at the start: Finishes searching for proxies’ hours, finished restart a campaign whose failure rate is discouraging.


Internet access through a proxy

If your site uses new fresh proxies to provide access to the Internet, you must configure an instance of the proxy so that your application can communicate with the Web proxy.

This section includes the following topics: Configuring proxy servers, Suitable proxy servers.

Configuring proxy servers

A proxy server handles requests from client resources. It can return a requested resource from its cache or forwards the request to the server where the resource. Proxy servers can improve network performance by reducing the number of requests sent to remote servers. They can also be used to restrict access to resources.

Suitable proxy servers

Proxy servers can be of two types: static and adaptive. Adaptive proxy servers adjust their settings when the network configuration changes. For example, when the user starts a laptop connection remote access, if the proxy is an adaptive proxy, it recognizes this change, finds and executes the configuration script again and adjusts its settings accordingly.


Adaptive proxy servers are configured by a configuration script (see Automatic Proxy Detection). This script produces a set of application protocols and proxy for each protocol.


Several options control the execution of the configuration script. You can specify:


  • The frequency of downloading and running the configuration script.


  • The waiting time for downloading the script.


  • Credentials that your system must use to access the proxy.


  • Credentials that your system will use to download the configuration script.


Changes in the network environment may require the system to use a new set of proxy servers. If a network connection is broken or if a new network connection is initialized, the system must discover the appropriate source configuration script in the new environment and run the script again.

Proxy Sites and Software


Proxy sites

Proxy sites allow individuals to access websites and servers through another server to keep the location and identity of the unknown individual. This helps to limit the amount of spam, cookies and other information is collected or placed on the computer. This helps to keep your computer running quickly and efficiently.


Cookies and other identification software that is placed on your computer by websites can greatly slow down the computer. These cookies and other identification software to help identify a computer on the back on the website for items that the site thinks you want become available. This is one of the main reasons that people use new fresh proxies’ sites.


In addition to protection against cookies, new fresh proxies’ sites stop gleaning information from the computer through the website. It is often glean information about what other websites that you are viewing, but can be much more pervasive. The possibility of hackers and others who could use the information gleaned to steal one? Identity of bank accounts is significantly reduced by using a proxy site.


These proxy sites can be either true that websites will help in viewing additional sites, while keeping the computer safe, or they may be servers that protect the computer. Proxy sites are websites that tend to provide true security lines of communication between the website and the computer. This helps to cover any loss or glean information from the computer and limit the cookies that may be placed on your computer.


Servers that are used as new fresh proxies’ sites are often more server that allows the computer to access a website. This server is a computer replacement and takes all the cookies, spyware, and other computer components so that it can be harmful ransacked and destroyed before any damage can be done. This server can be part of the computer itself, or it could be part of the units ISP’s server. Anyway, new fresh proxies’ sites can be extremely useful and helpful for all those who use them.


Proxy software

There are two famous pieces of proxy software on the internet: CGIProxy and PHProxy.


PHProxy is more customizable and proposes a lot more than CGIProxy however its anonymity is not very good!


There are options when using PHProxy such as:

– Comprises a mini URl form on every HTML page

– Accept HTTP cookies

– Show images

– Strip meta HTML tags

– Strip website title

– open URL in a new window

And there are few other options non-listed here…



It’s not very customizable but proposes full anonymity options and it’s a big benefit.

Options while using CGIProxy:

– No cookies

– No ads

– No scripts

– No referrer

– Show current form






Proxy Detection


How to detect the type of an anonymous proxy server?


We may occasionally find ourselves struggling with spam robots acting suspicious on our website. To be anonymous and avoid locking in their IP address, they use new fresh proxies servers.


There are 3 main types of proxy server


– Transparent proxy: we know that the HTTP request comes from a proxy and you can know about the real address of the visitor.

– Anonymous Proxy: we know that the HTTP request comes from a proxy but we cannot know the actual address of the visitor.

– High anonymous (elite) proxy: Unable to determine the use of a proxy and unable to know the IP address of the visitor. Must See!


I noticed that many spam tools use “transparent” proxies (the “transparent proxy” is most common). It therefore suffices to detect this type of proxy to retrieve the actual visitor’s IP address (the IP address is sent in the HTTP header by the X-Forwarded-For). In this way it is possible to enforce a ban of access to the site’s IP address.


Automatic proxy detection


The automatic new fresh proxies detection is the process by which a Web proxy server is identified by the system and used to send requests from the client. This is also called the Web Proxy Auto-Discovery (WPAD, Web Proxy Auto-Discovery). When this feature is enabled, the system attempts to locate a proxy configuration script which is responsible for returning the set of proxies that can be used for the request. If this script is found, it is downloaded, compiled, and executed on the local computer when obtaining information on the proxy, the request flow or the response to an application that uses a Web Proxy instance.

The automatic new fresh proxies detection is performed by the Web Proxy class and can use the parameters of the level of demand, the parameters of configuration files and parameters specified using the Settings dialog box on the LAN of Internet Explorer.



Elite Proxy


A “high anonymous” or “elite proxy” does not stand of a system without new fresh proxies in an external point of view. There is no way to detect that it is a proxy; the system is seen as a normal customer, to a server.

Well, even if privacy is better managed, we are still faced with the quality of service. Moreover, an Elite free proxy of new fresh proxies is not a service but a resource which cannot master anything. From one day to another, it can jump; the owner can notice of illegitimate traffic that goes through the IP and secure it, making your username Elite proxy unusable.


Frustration of free proxies


You have been confronted with this IPs who walked on two at once? Even those who don’t work anymore and for which you could not trust?


It is terribly frustrating to have to start hunting for free proxies too regularly because the IP were blocked sites.


Yes, forums, blogging services and other websites are organized to counter the spam generated behind these screens fortune. And they organize great especially if platforms are designed to be high quality and therefore be enhanced by Google (and either traffic or positioning).


Free on the internet, it is expensive


Unfortunately, to seek information; you spend more time looking for that use and produce.


Not only research resource is time-consuming, but the probability of finding the same low quality is not very high.


Your research will ultimately cost because:


  • You spend all your time on forums or websites
  • The rejection rate as proxy is only 5 or 10% of the existed proxies
  • The rate of unavailability proxies is unacceptable: After 5 days, how many are online? And after 10, 15, 20 days, how much is still remaining?
  • The downtime tools using proxy is to recognize: Indeed, how many treatments stripped? How many hours lost? How many grilled plans because the proxy is unresponsive?
  • Time to test new fresh proxies to replace those who are offline, to revive the process
  • Finally all these how much cost you of productivity?


What are the main shortcomings of these proxies which do not hide that much?


  • They quickly become out of service. The obsolescence of IPs is fast.
  • They are slow, very slow, because millions are enjoying these IPs
  • (And) they are blocked by the best web platforms
  • They often come from countries already blacklisted (Russia, Romania, India)
  • They are not secure and may be honey pots to trace queries or data being compromised.

Why an Elite Proxy?


  • An elite proxy does not reveal any information about your connection or your computer (or IP or country or service provider, or logs)
  • An elite proxy really hide all the information about your browsing and your requests
  • An elite proxy doesn’t record anything on your behavior
  • A High Anonymous Proxy has not the same capabilities to hide: the server, on the other side knows that you are AT LEAST a proxy. And the worst? It depends on the quality of the proxy. Another point, the anonymous proxy is not private. How many users are on this IP? What do they do and what risk is there that this IP is detected and listed as endangered?