Proxy list

A proxy list is a list of open HTTP/HTTPS/SOCKS proxy servers all on one website. Proxies allow users to make indirect network connections to other computer network services. Proxy lists include the IP addresses of computers hosting open proxy servers, meaning that these proxy servers are available to anyone on the internet. Proxy lists are often organized by the various proxy protocols the servers use. Many proxy lists index Web proxies, which can be used without changing browser settings.

Proxy scraper tool, ProxSearch, showing list of proxies


Proxy Annonymimity Levels

  • Elite proxies - Such proxies do not change request fields and look like a real browser, and your real IP address is hidden. Server administrators will commomnly be fooled into believing that you are not using a proxy.
  • Anonymous proxies - These proxies do not show a real IP address, however, they do change the request fields, therefore it is very easy to detect that a proxy is being used by log analysis. You are still anonymous, but some server administrators may restrict proxy requests.
  • Transparent proxies - (not anonymous, simply HTTP) - These change the request fields and they transfer the real IP. Such proxies are not applicable for security or privacy uses while surfing the web, and should only be used for network speed improvement.

SOCKS is a protocol that relays TCP sessions through a firewall host to allow application users transparent access across the firewall. Because the protocol is independent of application protocols, it can be (and has been) used for many different services, such as telnet, FTP, finger, whois, gopher, WWW, etc. Access control can be applied at the beginning of each TCP session; thereafter the server simply relays the data between the client and the application server, incurring minimum processing overhead. Since SOCKS never has to know anything about the application protocol, it should also be easy for it to accommodate applications that use encryption to protect their traffic from nosy snoopers. No information about the client is sent to the server – thus there is no need to test the anonymity level of the SOCKS proxies.

gollark: It's actually quaternionic.
gollark: To some extent I guess you could ship worse/nonexistent versions of some machinery and assemble it there, but a lot would be interdependent so I don't know how much. And you'd probably need somewhat better computers to run something to manage the resulting somewhat more complex system, which means more difficulty.
gollark: Probably at least 3 hard. Usefully extracting the many ores and such you want from things, and then processing them into usable materials probably involves a ton of different processes you have to ship on the space probe. Then you have to convert them into every different part you might need, meaning yet more machinery. And you have to do this with whatever possibly poor quality resources you find, automatically with no human to fix issues, accurately enough to reach whatever tolerances all the stuff needs, and have it stand up to damage on route.
gollark: 3.00005.
gollark: Without GregTech. I haven't used it recently, which is probably for the best.

References


    This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.