Home » LEARN HACKING - FOR BEGINNERS, NETWORK HACKS

Proxy Servers and Anonymizers

Submitted by Srikanth on Friday, 7 November 20088 Comments

Proxy is a network computer that can serve as an intermediate for connection with other computers. They are usually used for the following purposes:

  • As firewall, a proxy protects the local network from outside access.
  • As IP-addresses multiplexer, a proxy allows to connect a number of computers to Internet when having only one IP-address.
  • Proxy servers can be used (to some extent) to anonymize web surfing.
  • Specialized proxy servers can filter out unwanted content, such as ads or ‘unsuitable’ material.
  • Proxy servers can afford some protection against hacking attacks.

Anonymizers

  • Anonymizers are services that help make your own web surfing anonymous.
  • The first anonymizer developed was Anonymizer.com, created in 1997 by Lance Cottrell.
  • An anonymizer removes all the identifying information from a user’s computers while the user surfs the Internet, thereby ensuring the privacy of the user.

Popularity: 4% [?]

Visitors who read this post, also read:

  1. How to Detect Anonymous IP Addresses

  2. What are Private and Public IP Addresses

  3. How Firewalls Work

  4. What is CAPTCHA and How it Works?


  By using/following this site you agree to our Legal Disclaimer

Subscribe to GoHacking.Com


Enjoyed this article?
Subscribe to GoHacking.Com and get daily updates in your email for free

8 Comments »

  • Slim0123 said:

    BEWARE::Proxy sites and servers can(and may be all the time) record all your activity on “The Net” including your login names, passwords, your credit card records, your bank account number etc,
    So use them on your own risk……….

  • rexter said:

    how can I setup anonymizer in a machine?

  • ankit verma said:

    i m studying in college where we were supplied with internet connection hving proxy lan..the problem is earlier we cn hv access to orkut,we cn use u torrent softwares,by using proxy sites nd tunneling softwares like your freedom…but recently our college started using watchguard proxxy having 1000ssl..nw we cant access hv access to any sites..you tube is blocked,all downloading is being blocked…u toornt has stopped working..no proxy sites nor any tunneling softwares r workin now..this watchgaurd proxxy is blockin everything..so kindly tell me the way to bipass college proxy server..or way to hack into college server so tht i cn hv acess to sites lke orkut nd softwares lke u torrent..etc..
    ur help wll be appericiated…

  • Anurag said:

    sir i m grate fan of u after reading this site. i m facing one problem that i m studying in college where they supplied with internet connection hving sonic wall.the problem is we can’t use u torrent softwares for downloading and download limit is only 60 MB. so we cant download file above the 60 MB. all sites are opened but restrtiction is in only download.they blocked downloading through sonic wall.so kindly tell me the way to bipass college proxy server or way to hack into college server so that i can ddownload above the 60 mb file and also download torrent file. sir pls help me for this.

  • ofkhj said:

    hey thanks man u doing a great job
    hey want to ask question can we use proxy sites in affiliate marketing, do they recognize us if we use them to make leads…

  • fr33style said:

    How can I create my own ip

  • Rakesh said:

    i m behind the same problem of ankit verma of 4th june 2009…!
    so please help me out with this problem….! i will be thankful to you….!

  • script kiddie said:

    HEllo, I am a script kiddie. I do know some tactics of hackiong, but I dont know how to do it. For example, I know about firewall drilling, but how? I read a lot of books on the topic, but there was no information, including the hackers underground handbook. And, bouncing attacks. How do you do it? Please! Tell me! I tried learning exploiting attacks, but I couldn’t understand! HElp me! PlEASE contact me at
    http://[email protected]

Leave your response!

Add your comment below, or trackback from your own site. You can also subscribe to these comments via RSS.

Be nice. Keep it clean. Stay on topic. No spam.

You can use these tags:
<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>

This is a Gravatar-enabled weblog. To get your own globally-recognized-avatar, please register at Gravatar.