"Germany
 La Vie en Rose
 Sex Vacation
Escort News
escort directory

Thread: Using Proxy Servers

+ Add Report
Page 2 of 4 FirstFirst 1 2 3 4 LastLast
Results 16 to 30 of 52
This blog is moderated by Admin
  1. #37

  2. #36

  3. #35

    Today's New Fresh Proxy

    This is working in oman.i have checked this today.

    http://unrestrictedprox.info

    http://villeprox.info

    PH

  4. #34

    Follow up piece by ZHUREN

    C+P of Zhuren's post
    http://www.InternationalSexGuide.nl/forum/showthread.php?p=919152

    My write-up is based on an understanding of the business and the technology. Whether one should be paranoid or not is up to the user. As far as UltraVPN is concerned, it is fair to question the motives of its operator. We don’t know who runs UltraVPN. All we are told is that “UltraVPN servers are run by Lynanda .” Doesn’t mean a thing. My servers are run by datacenters in various parts of the world. However, I control them. And who’s Lynanda anyway? The only thing noteworthy about them I found was that they invented a piece of software that blocks Skype. Thanks a lot. Not the best reference for someone who supposedly protects your privacy. Or not.

    Bandwidth ain’t free, hardware ain’t free. Operating a high performance VPN service for gadzillions of users needs a serious investment into hardware and bandwidth. Why they do it isn’t clear at all.

    If you go to https://www.Lynanda.fr and to https://www.ultravpn.fr, your browser will throw a security certificate error, saying that the security certificate is bogus. This is common with amateur sites that don’t want to afford the $100 or so a decent certificate costs, but it is highly questionable for a company you entrust with all your data. And by the way, UltraVPN.fr is registered through an OVH company which prides itself in providing "Certificats SSL" amongst other products. They could have provided the registrant LYNANDA COMPUTING SERVICES (well, at least the website is registered to Lynanda...) with a decent certificate. I don't know what kind of certificate they use for UltraVPN, but if they can't come up with a real one for their own sites, I fear the worst. As explained here, non-bogus certificates issued by a trustworthy certificate authority is at the heart of a trustworthy OpenVPN service. (Also see "Paranoia 2" in my previous writeup. Your OpenVPN client can check for a valid certificate or certificate revokation to avoid these man-in-the middle attacks.)

    The Swedish Pirate Party, which has an ideological motive to protect privacy, runs a well-known VPN called Relakks, (note the working certificate,) but even their VPN isn’t free, it costs EUR 45 a year. At least they have a halfway decent data privacy policy.

    UltraVPN’s data privacy policy is notable by its absence. All they say is “No connection or traffic logs are kept.” With that “policy,” they could keep all data (except for the logs), or give the logs straight to the Deuxieme Bureau, or do whatever they please, except for keeping the logs.

    They don’t need any logs. Most traffic in Europe already is logged. As for most in Europe, there is even an EU directive. UltraVPN doesn’t have to log anything, their ISP is REQUIRED to do that as per EU regulation 2006/24/EC . As you correctly write, China is not alone. Just a bit hamfisted. France has an especially bad history of privacy. Until 1999, all encryption in France was against the law. After 1999, only weak encryption was allowed. It needed EU regulations to make encryption legal in France. In Germany, the government now can legally put a Trojan on your computer (and I’m not referring to the rubbers.) Many countries are surrounding themselves with their very own firewalls. Of course, they are there to protect the citizenry from kiddie porn. Yeah, sure.

  5. #33

    Post by our Senior Member ZHUREN

    zhuren is a respected and senior member who mostly post on the china boards. with his agreement and knoweldege, i herewith c+p his post from the china boards http://www.InternationalSexGuide.nl/forum/showthread.php?p=919091
    which is more appropriate here:
    use and abuse of proxies and vpns

    please be very careful when using free (and to some degree even paid) proxies and vpns. here is why.

    please keep this in mind at all times:

    everything you send through a proxy and vpn is wide open to the party operating the proxy/vpn. everything, meaning your passwords, userids, credit card numbers, any and all data you send via that link (short of encrypted traffic sent through an encrypted vpn or ssl connection…) is freely available to the party at the other end.

    when you use a proxy or vpn, you need to know that you entrust your data to another party at the other side. this party has access to your most private secrets. would you trust a perfect stranger?

    why do free proxies exist?

    setting up a proxy costs time and money. have you ever contemplated why there are free ones? for several reasons:

    1.) per chance. many proxy servers are created by mistake when someone sets up a new system. they are found by robots and included in lists. suddenly, the traffic spikes, the administrator finds out, he fixes his mistake, the proxy is gone. this explains the short shelf life of many proxies.

    2.) as a trap set up by criminals. the easiest way to collect private data is to set up a free proxy. people who use it have something to hide. people who set it up have a lot of interesting stuff to gain. many free proxies are set up by hackers. while you use their proxy, they steal your information, get access to your computer, place trojans or rootkits on your computer. from now on, your computer will operate as part of their botnet and do whatever else they want. stolen credit cards, and “rental fees” to botnets easily compensate for the cost of the proxy. when or before the illicit nature of this proxy is discovered, it is shut down. this explains the short shelf life of many proxies.

    3.) as a trap set up by law enforcement. because proxies attract people who want to hide something, many proxies are set up by le. refer to #2 for the rest. there is no need to shut down these proxies. this explains why some of the longest living and best performing proxies are operated by governments or law enforcement agencies.

    4.) as a service to society by do-gooders. but how do you know that #4 isn’t a #2 or #3? you don’t. these proxies tend to stay around for a while also, until the do-gooders are sick of doing good for free. a notable exception is the tor network. it is a distributed, peer-to-peer network of volunteers. it uses encryption. it’s usually slow like molasses. again, the encryption ends at the exit nodes of the network where it can be sniffed, recorded, analyzed. you never know.

    why do free vpns exist?

    except for the inadvertent creation (vpns need to be managed and administered,) the same applies to free vpns. they are set up by criminals, law enforcement agencies who want to entrap criminals, and by do-gooders who want to provide a public service. as above: you never know. keep in mind: the vpn traffic is encrypted (some traffic, especially via the pptp protocol is easily breakable,) but it’s only encrypted as far as the vpn-provider’s server. once there, the traffic is decrypted and passed on in the clear. on the provider’s server, the traffic can be viewed, stored, analyzed, traced back to the sender et al.

    who do you trust?

    it is up to you to decide what the intentions are to provide a free proxy or vpn service. the old “if an offer sounds too good to be true” adage applies. i trust a free proxy or vpn service as much as i trust anyone who offers me any free service: i don’t.

    paid proxies or vpns

    note that in theory (and some praxis) the same as above applies to paid proxies and paid vpns. just because you pay them doesn’t make your information more secure. the fact that they are a commercial enterprise simply raises your trust level. they invest time and money to get you as a customer, and they will lose all customers if they abuse your data. which doesn’t assure you that they won’t cheat you. a paid proxy or vpn simply raises the likelihood that it is legit. if i’d be really insidious, then i would operate a low cost, high performance, paid vpn service. i would have all my customers’ credit cards, and therefore addresses, identities, ssn#s, credit ratings. i would know what they access all day and would even make some money to cover the cost. can’t help you with that conundrum.

    proxy or vpn?

    if you pay, use someone you deem as reliable, stay away from the too good to be true offers, and pay for a vpn instead of a proxy. a vpn encrypts all traffic from and to your machine without additional fuss. proxies are headache-inducing, they need a lot of fiddling on your part and often they plainly don’t work. if you pay, pay for a vpn.

    other uses of a vpn

    if you use a hotspot in an airport or starbucks, if you use an internet connection in a hotel or any other public place, and if you value your data, always use a vpn. if you don’t, the data you send is available to anyone on that network. wifi connections to public hotspots are unencrypted and can be sniffed by anyone who knows how. the easiest way to get high value data is to camp out with a laptop in the first class lounge of an airport (keeps out the riffraff …) if you are using a hotel connection, assume that your data is being logged. wifi in public hotspots and hotel networks can be fertile grounds to harvest high value data.

    paranoia dept. 1

    when you sign up for any encrypted service, the initial sign-up stage is usually in the clear. userids, passwords, keys etc. often get sent via email. renewal notices and transactions are often sent via email. can be easily intercepted. be careful. you might be buying a complicated security system while giving the key to someone you want to lock out.

    paranoia dept. 2

    the identity and addresses of vpns and proxies are no secret. the ip numbers of the providers and ports to be used can be and are being blocked. more insidiously, they can be spoofed. you think you are connecting to your vpn provider, but instead you go through someone else’s computer. to set this up takes considerable effort and energy. it is unlikely. but not impossible. “someone else’s” identity is left as an exercise to the reader.

    most trusted solution

    the person you can trust the most is yourself. the safest vpn is the one you have set up yourself. if you know how to, you can set up a small server back home. preferably via tcp port 443, which makes your traffic look like regular https traffic. if you don’t know what i’m talking about, then you probably can’t set up that system anyway. an (expensive) alternative is to rent a private or virtual private server elsewhere and set up the endpoint there. in both cases, the identity of the vpn server can be tracked down, so don’t use it for doing something you should not. you still need to be able to trust the isp, the administrator of the datacenter on the other end, or the person who has the keys to your basement. there is no such thing as perfect security.

    firewall it!

    often forgotten: if you use a vpn, it bypasses all routers and firewalls on your premises. your home or office router usually provides a level of safety. with a vpn connection to the internet, that level of safety is removed, and you are wide open to attacks. don’t get lulled into a false feeling of safety, just because you use an encrypted connection. the other end isn’t encrypted, and your computer is as vulnerable as if you connect it straight to the internet via a cable modem or adsl connection without an intervening router. if you use a vpn, always use a personal firewall such as zonealarm etc. and set the security level to high.

    other uses for a vpn

    if you travel a lot, it probably happened to you many times: you ordered something with your credit card. the charge was denied. you call the card company and incur expensive long distance charges on your mobile. turns out your card is good. or sometimes, turns out your card was just blocked because of a possible security breach. what happened? ignorant of the fact that people travel, the webshop on the other side used a geo-location of the ip-address where you at. the ip says you are in timbuktu, whereas your address is in hicksville, usa. the charge is denied. or worse, reported to your credit card company, which blocks your card until you call them and tell them that you are on vacation in timbuktu. with a vpn that has its endpoint in the usa, this hassle is usually avoided. if the vpn server sits in los angeles, they think you are in los angeles. it usually works. the charge goes through. americans are allowed to travel freely in america, but never abroad. very paranoid shopping sites have a list of vpn servers and all alarm bells ring when you use them. then they want you to send a copy of your credit card and your driver’s license and your firstborn’s birth certificate to someone in bangalore. what a mess.

    last words

    the only halfway reliable security is end-to-end encryption. if your website supports it (this one does not) use the https protocol instead of http. to try, use https://www.yoursite.com instead of http://www.yoursite.com. for email, always use secure (ssl) connections for sending and receiving. some isps, hotels, hotspots etc. block the ports of these protocols. be very wary if they do. use your vpn. if they won’t let you use your vpn, move.

    hope that helps.

  6. #32

    Credit card

    Is it safe to use the credit card over a proxy site?

  7. #31

  8. #30
    Hi

    It seems torpark has been replaced by xb-browser. Any info on it?

    http://xerobank.com/download/xb-browser/

  9. #29
    [QUOTE=Asian Rain]Piper1 is correct as usual. TORPARK is a gem.

    Q: How to get TORPARK and what about support?

    A: You can download Torpark and access the support forums from the following address:

    http://www.torrify.com/

    You can also download the program from downloads.com.

  10. #28

    TORPARK: Beautiful Fascist Firewall Killer

    Quote Originally Posted by Piper1
    "torpark" has recently been upgraded and works well. Easy to download and use; fast and pretty reliable. Another advantage is you can load it onto a memory stick, pop the stick into any PC (internet cafe etc), and it works externally.
    Piper1 is correct as usual. TORPARK is a gem.

    Q: What is it? A: It is a FREE modified version of the portable Firefox browser integrated with Tor (the onion router) anonymiser network software. According to the Torpark site: "its small, portable, clean, open-source, free of spyware/adware, and free."

    Q: What does it do? A: What is does is allow you to surf annonymously (in fascist/dictaorial/conservative countries/places that block or screen internet usage) as well as to get past pesky company firewalls/usage screening software that try to prevent you from accessing fine sites such as ISG, online porn, football scores, etc.

    Q: Was it easy to set up? A: Yes and No. For my Home PC, I downloaded the software, unzipped it onto a USB key drive (it takes only 32Mb), fired up the software and 30sec later I was using the tor-enabled Firefox to surf past my Internet provider's impromptu block against ISG. Easy as 1-2-3. For my work PC, it was trickier because I had to modify one of the tor setting files to show which proxy server my company uses. This involved an hour or so of surfing the Torpark online forums to get some idea how to tweak settings (DON'T send me any PMs to help with this geek crap), but as of today I can now surf ISG (any any other illicit site that I want) from my cube. I know how many millions of Euros my company has spent globally to put in platinum-class routers, firewall and usage screening software, so I marvelled at the fact that Torpark cut through these obstacles. In addition, I love the fact that, since I installed it to a USB key, that there is never any evidence of illicit surfing software or my nasty surfing history on either my work or home PC.

    Q: Any downsides? Yes, it can be slow, because your traffic has to go thru the tor network - anonymity has its price! Also, there is a known conflict with Zone Alarm firewall (which I use) - not malicious, but annoying.

    Q: How to get TORPARK and what about support? A: You can download Torpark and access the support forums from the following address:

    http://www.torrify.com/

    Enjoy freedom from restricted surfing! Cheers, AR+

  11. #27
    "torpark" has recently been upgraded and works well (occasionally times out, but an extra click or two usually works). Easy to download and use; fast and pretty reliable. Another advantage is you can load it onto a memory stick, pop the stick into any PC (internet cafe etc), and it works externally.

  12. #26
    Ultrasurf works fine in Saudi.

  13. #25

    Comment on Ultrasurf

    Ultrasurf only works with win32 Internet Explorer ... not sure how much of a issue that is for people reading this board but incase you installed it (going to assume you did so on windows) and its not working with Opera or Firefox, thats why. Use tor .. it supports all browsers, all OS's, AND items like bit torrent, IRC, instant messenging, etc etc .. its a full SOCKS solution unlike Ultrasurf.

    And yes I say win32 Internet Explorer as it doesn't work for those folk running Internet Explorer on Apple nor those running win64 XP or Vista Internet Explorer .. its a very very limited application.

  14. #24

    Tor

    Going to have to concur with Moody for a couple reason (not all impartial):

    1: It is open source which means unlike the other solutions on here, you know its not spyware or a rootkit. Any of you blindly trusting any executable attached on here is asking for trouble.

    2: Considering the current tor network consists of a grid of a couple thousand servers wiyh nodes transparently coming and going all the time, I have yet to see a firewall that has blocked it.

    3: IAW with #2, I used tor successfully in the UAE, China, various governmental military networks, and a few financial networks (all which have extremely tight security) and works no problem. The MAIN problem for all your firewalled folk is they block access to the tor site so you can't actually download it to get it working. I highly suggest that you have somebody YOUTRUST download it and email it to you, host it, or next time you travel outside your blocked country, just grab a copy.

    4: I will claim partiality here as I contribute both fiscally and my personal spare time to this project. Not a developer but one of the various application porters and bug testers.

    5: It is extremely transparent to the user and Mum and Dad could use it and install it just fine.

    Can get it from: http://tor.eff.org .. I know this is blocked (see #3) so here is a list of available mirrors that also carry it (and not all of them are blocked last I checked):

    AT cypherpunks.at http://tor.cypherpunks.at/
    rsync: tor.cypherpunks.at::tor/ http://tor.cypherpunks.at/dist/
    rsync: tor.cypherpunks.at::tor/dist/
    DE Berapla - http://download.berapla.de/mirrors/tor/
    DE FU - Spline - http://rem.spline.de/tor/
    DE onionland http://mirror.onionland.org/
    rsync: mirror.onionland.org::tor/ http://mirror.onionland.org/dist/
    rsync: mirror.onionland.org::tor/dist/
    DE plentyfact http://tor.plentyfact.net/
    http://tor.plentyfact.net/ http://tor.plentyfact.net/dist/
    http://tor.plentyfact.net/dist/
    NL BIT BV - http://ftp.bit.nl/mirror/tor/
    ftp://ftp.bit.nl/mirror/tor/
    SE Swedish Linux Society - http://ftp.se.linux.org/crypto/tor/
    ftp://ftp.se.linux.org/pub/crypto/tor/
    US: CA Master Site
    hosted by the EFF http://tor.eff.org/
    rsync: tor.eff.org::tor/ http://tor.eff.org/dist/
    rsync: tor.eff.org::tor/dist/
    US: CA Meulie.net - http://tor.meulie.net/
    US: GA Libertarian Action Network - ftp://libertarianactivism.com/tor.eff.org/dist/
    US: NJ Stevens Institute of Technology - ftp://ftp.cs.stevens.edu/pub/tor/
    US: TX Ghirai.com - http://www.ghirai.com/tor/

    What you are looking for is the win32 tor + privoxy distro (though if you know what the other distro's are and are suitable, by all means use it).

    On FreeBSD you can just do: 'pkg_add -r tor-devel' and you will pull it off the main FreeBSD mirror servers as its in the port collection.

  15. #23
    Just use www.secure-tunnel.com if you need a proxy server.

    This site works very well.

Posting Limitations

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts


Page copy protected against web site content infringement by Copyscape