heres a pic of the ap
Thanks for the info... AND the warning. It is greatly appreciated! Now will you please train me? I make a very good monkey! (you know.... a trained monkey can do it) Anyways, I went to proxy-list.org and copied a few proxy addresses down. For example:
proxy:port latency type Country SSL Uptime last work time
202.103.215.203:80 0.0000 Transp. CN ? 100% 2012-01-18 21:22:32
61.157.217.31:80 0.0000 Transp. CN ? 100% 2012-01-18 21:22:32
112.65.219.72:80 0.0000 Transp. CN ? 100% 2012-01-18 21:22:32
and was wondering about what is meant by some of the terms?
Proxylist.org has good definitions for 'type' so I'm pretty sure those are terms I know.
Does latency mean the lag time between when the command is issued and when the command is acted upon?
Country doesn't really matter to me.... or should I be concerned about that?
I only copied down proxies with 100% uptime.... or does that matter?
last work time must be the last time it was worked on. that probably matters because you want a proxy that has recently been worked on.
now then--- why do you say I would want to use a socks proxy. Will it hide me better? My 'Network Proxy Preferences' has a socks host setting. Is there a free socks proxy server I could use? Free is always good!
So for the first one, HTTP proxy, would I enter '61.157.217.31' and then enter '80' into the port setting? What if I don't want to use port 80? What I mean is could have '61.157.217.31:80' as a proxy and still ftp or would I have to find a proxy with an ftp port attached to it? Perhaps someone can explain better to me what a port is. From a dictionary definition the best I could guess is that it is an opening into a computer.
What about HTTPS? There is a separate configuration setting for an address and port for it, FTP, and the socks host.
What about the automatic configuration space. What is that about?On Wed, Jan 18, 2012 at 2:44 PM, Sam Kreimeyer <skreimey@gmail.com> wrote:
What I meant was that whomever is hosting the proxy server might be looking to steal your information (ie you connect to YourBank.com through the proxy and they use a MitM attack to strip the SSL from the session and take your account info). I never assumed you had any interest in illegal activity of any kind. As for knocking on doors, a proxy will provide a good layer of obfuscation. Daisy-chaining them is even better. You'll probably want to use a SOCKS proxy.y---------------------------------------------------
Any public access point like Starbucks provides great anonymity as well. All roads eventually lead to the IP, but if that IP is used by hundreds of different people, then you could only be reliably identified by other factors. Unfortunately, though, most public access points run their traffic through a local web proxy that limits what kind of traffic you can send (generally doesn't play well with any traffic destined for ports not typical for web browsing).
PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us
To subscribe, unsubscribe, or to change your mail settings:
http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss
--
:-)~MIKE~(-: