Anonymous is still a woman

A schematic representation of a proxy server.

Image via Wikipedia

On request for a Microsoft XP user ~ no access to Linux tools

By using a Proxy server, you can surf the internet anonymously. A proxy can also be used for mining blocked sites.

Proxy servers do what?

Using a socalled “invisible” proxy server, when you request some other service, such as a file, connection, page, or other resource, the proxy server filters out IP and protocol data, and connects with the relevant server to request the service on your behalf. The web proxy acts as anonymous proxy server.

Web services

After sign-up with an anonymous service, there is no need to install or configure anything. The services vary tremendously in terms of speed, uptime, capacity. Some are not free.

Direct services

This service requires you to modify settings in your browser to have your browser access a proxy server directly.

Find a proxy server from one of these lists.

Firefox users go to
Tools -> Options -> Advanced -> Network -> Settings.
In the Connection Settings window, click Manual proxy configuration. Enter the IP address in HTTP Proxy and Port address in Port. Also check the box ‘Use this proxy server for all protocols’.

Internet Explorer users go to
Tools -> Internet -> Options -> Connections -> LAN Settings.
Check Use a proxy server for your LAN and enter the address and port number for the proxy server.

TEST! TEST! TEST! check your IP, for example with check my IP.

Client based applications

These applications act as a proxy server on your local machine. There are many, JAP, Tor, GhostSurf, Rutschomat, A4proxy, Multiproxy, and ProxyRama, to name but a few.

Note: while you surf you still need to retest, and you still need to find an anonymous proxy server inside your leeched proxy list ~ exceptions are JAP, Tor, and GhostSurf, as these run their own proxy servers.

And then I met Charon, and crossed the river.

The “other” services aren’t sitting ducks

Either way, via a web service or directly, some servers recognise “invisible proxies” and will not grant you access to their services.

As sophisticated fraudsters confused business sites by sending a fake IP address through proxy servers, applications that can detect anonymous surfing became critical. Most such applications maintain an anonymous proxy server list that is updated regularly by proxy-scanning algorithms and checking publicly available lists.

Legal considerations

It depends on where you live, and where the proxy is located. But consider this case in all fairness:

When you knowingly access a computer without authorization from its owner or have knowingly exceeded your authorized access on that computer, you would basically be busy with illegal activities.

The proxies on the lists are open and public proxies allowing connections from anywhere in the world, without restricting access. We can infer that that has been the intent of the owner of proxy servers?

Using proxies that don’t need authentication while not having permission, though it’s their carelessness, is really NOT A LEGITIMATE ACTION.

Users themselves must be charged with all that they do

May system administrators use the available proxy lists to find servers mistakenly left open and they are responsible for.

May webmasters of webshops use the lists in applications detecting open proxy approaches by users, to prevent access by sophisticated fraudsters.

May people who wish to just surf anonymously use proxy servers for that purpose. Privacy in this increasing Big Brother like society is of the utmost importance. And as long as a proxy server is not asking for a password, you can use it. When it asks for a password, stop using it. Use another. Be response-able for how you leech your list.

Posted on September 9, 2010, in Users and tagged , , , , , . Bookmark the permalink. 2 Comments.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s