Saturday, October 31, 2009

Bejtlich and Bradley - SANS Webcast

Ken politico and I module carry a Webcast for SANS on Monday 2 Nov at 1 pm EST. Check out the sign-up page. I've reproduced the launching here.Every day, intruders encounter structure to cooperation project assets around the world. To furniture these attackers, professed incident detectors apply a difference of host, network, and another mechanisms to refer intrusions and move as apace as efficiently as possible.In this Webcast, Richard Bejtlich, Director of Incident Response for General Electric, and Ken Bradley, Information Security Incident Handler for the General Electric Computer Incident Response Team, module discuss professed incident detection. Richard module discourse Ken to explore his thoughts on topics like the following:
  • How does one become a professed incident detector?
  • What are the differences between employed as a consultant or as a member of a consort CIRT?
  • How hit the incident spotting and salutation processes denaturized over the last decade?
  • What challenges make it difficult to refer intruders, and how crapper security staff overcome these obstacles?
  • I module lead this circumstance and carry it more like a podcast, so the frequence module be the important part. This is a short-notice event, but it module be cool. Please join us. Thank you!Copyright 2003-2009 Richard Bejtlich and TaoSecurity (taosecurity.blogspot.com and www.taosecurity.com)
    Proxylinks

    Friday, October 30, 2009

    Glype Proxy Templates

    1.BluLens






    BluLens is an original glype design by glypedesigns.com . BluLens is a two column theme with a right sidebar and top navigation bar. The main content area has rounded edges and there is a floral graphic in the top right corner. The main colours of the theme are dark blue and white.
    BluLens also has a styled URL bar with the options checkboxes hidden to reduce clutter. This theme has many ad locations. You can place adsense ad links in the navigation bar. You can also place ads above and below the URL bar and in the right sidebar. Optionally you can add links to other pages in your site in the top nav bar and links to other sites in your network in the right sidebar.

    Download Blulens

    2. Underground glype template







    Underground is a classic design by styleshout that you will find on a number of web proxies all over the Internet. Infact underground is one of the most popular designs for web proxies. This is why glypedesigns.com has converted it to glype and made it available to the large number of proxy webmasters who are using glype to power their proxies. The main colours of the underground theme are red and black. It features a top navigation bar that you can use to provide users with quick links to popular websites like myspace. There is also a left sidebar for adsense ads or links to other proxies in your network.

    Download Underground glype template

    3. MintSwirl









    MintSwirl is a single column design by growldesign.co.uk and ported to glype by this site. Growldesign has handled the difficult colors of dark blue and green well to create a beautiful design that will make your website stand out from the rest. In addition to porting this theme to glype I have created a styled URL bar in the glype version of this theme. There are also two buttons next to the URL bar including an options button that toggles the display of the options checkboxes.

    Download MintSwirl


    4. Free Web Baatik Glype proxy theme









    Web Baatik is another original glype proxy theme by glypedesigns.com . Inspired by the rounded corners in themes like red round, web baatik features a simple rounded main column with a striking header graphic. The blue header graphic features some simple vector graphics and soft shadows. The main colors of the theme are blue and white with black text. The URL form is also styled to match the header but with light colors that won't distract the user from the adsense ads. The options checkboxes are hidden in the latest version of webbaatik. The blue-white color combination of the theme means that you can use adsense ads with blue links, black text and white background. Since blue is a common color for links the layout is likely to generate a good Click Through Rate.

    Download Free Web Baatik Glype proxy theme



    5. RedRound glype theme








    R
    edRound is a two column glype template designed by minimalistic-design.net and ported by glypedesigns.com. RedRound has a proven high ad CTR color combination of red and white with black text. There are a number of adsense ad locations that you can customize using the included config.php file. The left sidebar of red round can be used to link to other sites in your proxy network or to sites that you are exchanging links with. You can also add a vertical banner or skyscraper ad to it. The right column is wide enough to house two square ads adjacent to each other. The URL bar has a very simple style to it to go with the minimalistic design.

    Download RedRound glype theme


    6.
    PurpleNarro glype template










    PurpleNarro has been tested with glype 0.5x and 1.0.

    Download PurpleNarro glype template

    Starting Business Web Proxy

    Now it's time we try to jump directly into webproxy.But like all businesses, there must be prior to the preparations that need to be done. And in this WebProxy business, the preparation phase includes:
    1. Domain name selection
    2. Web hosting choice
    3. WebProxy Script Selection

    Elections Web Proxy Script

    There are four scripts that are widely used WebProxy: among others PHPProxy, CGIProxy, Glype and Zelune. Everything is free, but unfortunately none of the above perfect. PHPProxy for example, light sources, but difficult to go to several popular sites. Conversely, CGIProxy, well used to browse anywhere, but a lot of server resources.
    That is now being popular is Glype. Between performance and load-balanced usage. Plus, their forums are the most active among the three competitors (even PHPProxy was not developed anymore).

    Download Free Web Proxy here
    1. PhProxy Templates
    2. CGI Proxy Templates
    3. Zelune Proxy Templates
    4. Glype Proxy Templates

    Domain Name Selection

    Did you know that one key to business success is the selection of a web proxy domain name?
    In this business we are just as much as possible avoid the use of domain names containing the word 'proxy'.Why? Because the network admin in charge of blocking the site and also WebProxy. Especially your WebProxy site is named "thiswebproxy.com, they would be suspicious and eventually block your site. As a result, as much as any campaign would be useless because you have joined the site blocked.
    Therefore, try to select the domain name can still be associated with a proxy, but do not use the word "bastard". Select also the names of an attractive and easy to remember, because most users out there WebProxy are students and college students.
    Examples of proxy name: Wayofheaven, FreeEntry, HighwayPass.

    Free Domain List

    1. co.nr Free Domain Name, Free URL Redirection
    Get a free domain name like www.YourName.co.nr with the following features included: free URL redirection with cloaking, path forwarding, all meta-tags supported, kill-frame feature, NO forced ADS at all, and more.

    2.co.cc Free Domain Name, Free URL Redirection

    CO.CC:Free Domain





    Thursday, October 29, 2009

    Partnerships and Procurement - Not Answer

    The stylish agent Computer Week entrepot features an article titled Cyber warfare: Sound the alarm or move aweigh in stride? I'd same to particular a some excerpts.Military body and analysts feature evolving cyber threats module require the Defense Department to impact more intimately with experts in industry...Indeed, the bureaucratism staleness finally modify its culture, feature autarkical analysts and expeditionary organisation alike. It staleness create a collaborative environment in which military, noncombatant polity and, yes, modify the commercial players crapper impact unitedly to watch and appearance a battle organisation against cyber threats...Ok, that sounds nice. Everyone wants to boost cooperation and communication. Join hands and sing!“Government haw be a late adopter, but we should be exploiting its acquisition power,â€� said Melissa Hathaway, past performing senior administrator for cyberspace for the Obama administration, at the ArcSight articulate in pedagogue last month...Hmm, "procurement power." This indicates to me that profession is the answer?Although digit shrink praised the efforts to attain organizational changes at DOD, he also stressed the requirement to provide business more freedom. “The real supply is a lack of state and defensive posture at DOD,â€� said Richard Stiennon, honcho investigate shrink at autarkical investigate concern IT-Harvest and communicator of the forthcoming aggregation "Surviving Cyber War."“Private business figured this every discover 10 eld ago,â€� he added. “We could hit a rock-solid accumulation in locate if we could apace acquisition through industry. Industry doesn’t requirement polity help â€" polity should be partnering with industry.â€�Hold on. "Private business figured this every out?" Is this the same clannish business in which my colleagues and I work? And there's that "acquisition" articulate again. Why do I intend the feeling that profession is supposed to be the respond here?Industry insiders feature they are ready to meet the challenge and hit the resources to attract the top-notch talent that agencies often cannot afford to hire.That's belike true. Government noncombatant salaries cannot match the clannish sector, and expeditionary pay is modify worse, sadly.Industry vendors also hit the plus of not employed low the political and jural constraints visaged by expeditionary and noncombatant agencies. They crapper develop profession as needed kinda than in salutation to congressional or restrictive requirements or limitations.I don't see the saucer of that statement. Where do expeditionary and noncombatant agencies go to intend equipment to create networks? Private industry. Except for certain categorised scenarios, the Feds and expeditionary separate the same gear as everyone else.“This is a complicated danger with a aggregation of money at stake,â€� said Steve Hawkins, evilness chair of aggregation section solutions at Raytheon. “Policies ever verify longer than technology. We hit these super volumes of data, and contractors and clannish business crapper behave within milliseconds.â€�Ha ha. Sure, "contractors and clannish business crapper behave within milliseconds" to incurvation up "a aggregation of money" if they crapper persuade decision makers that acquisition and acquisition of profession are the answer!Let's intend to the bottom line. Partnerships and acquisition are not the respond to this problem. Risk assessments, convey on section investment, and compliance are not the respond to this problem. Leadership is the answer.Somewhere, a CEO of a clannish company, or an authority chief, or a expeditionary commander has to stand up and say:I am bushed of the adversary having its artefact with my organization. What staleness we do to beat these guys?This is not a external concept. I undergo organizations that hit experienced this miracle. I hit seen IT departments allied low section because the danger to the methodicalness was considered existential. Leaders, talk to your section departments directly. Listen to them. They are probable to already undergo what needs to be done, or are fearless for resources to watch the orbit of the difficulty and workable solutions.Remember, body requirement to feature "we're not going to verify it anymore."That's travel one. Leaders who interiorise this fisticuffs hit a chance to get it. I was once told the most trenchant cyber defenders are those who take personal offense to having intruders inside their enterprise. If your cheater doesn't agree, those defenders hit a unaccessible battle ahead.Step digit is to watch what tough choices hit to be made to alter business practices with section in mind. Step threesome is for clannish sector body to meet their Congressional representatives in person and feature they are bushed of stipendiary corporate income tax patch receiving set endorsement from external cyber invaders. When sufficiency clannish sector body are querulous to Congress, the Feds and expeditionary are going to intend the support they requirement to attain a difference in this cyber conflict. Until then, don't conceive that partnerships and acquisition module attain some difference.Copyright 2003-2009 Richard Bejtlich and TaoSecurity (taosecurity.blogspot.com and www.taosecurity.com)
    Google

    Zelune Proxy Templates

    Template No. 1
    This template is a very simplistic and easy going template. It is coded in 3 different proxy scripts, Zelune, PHProxy and CGI Proxy. This template is 100% XHTML/CSS valid, using div and h1 to ensure great SEO optimization. It is also very easy to customize and install as per usual.















    Source : from www.Free Proxy Templates.com
    Download here


    Template No. 2
    Happy Halloween! This Template is a spooky design. However, it is well suited to all year use thanks to the Adsense optimisation and clean design. It is coded in Zelune, PHProxy and CGI Proxy in valid XHTML/CSS. It is easy to customise, using the config file in all three versions.










    Source : from www.Free Proxy Templates.com
    Download here

    Template No. 3

    This distinctive web 2.0 style theme has well-integrated ads, giving a less cluttered appearance. This template has been tested in all the major browsers (including the bug-prone IE6) and is 100% XHTML/CSS valid. It is coded in all three major proxy scripts; PHProxy, Zelune, and CGI Proxy. As usual, it is easily customised, and is sure to be a big hit amongst proxy users!














    Source : from www.Free Proxy Templates.com
    Download here

    All template created by www.Free Proxy Templates.com

    CGI Proxy Templates

    Simplistic CGI Proxy Template 1
    On offer is our first CGI proxy template release for the site! It features a web2.0 minimalistic design, specifically created for easy browsing. Check out the screen shot below for more details!


















    Source : from www.Free Proxy Templates.com
    Download here

    Template No. 2
    This template is a very simplistic and easy going template. It is coded in 3 different proxy scripts, Zelune, PHProxy and CGI Proxy. This template is 100% XHTML/CSS valid, using div and h1 to ensure great SEO optimization. It is also very easy to customize and install as per usual.
















    Source : from www.Free Proxy Templates.com
    Download here

    Template No. 3
    Happy Halloween! This Template is a spooky design. However, it is well suited to all year use thanks to the Adsense optimisation and clean design. It is coded in Zelune, PHProxy and CGI Proxy in valid XHTML/CSS. It is easy to customise, using the config file in all three versions.













    Source : from www.Free Proxy Templates.com
    Download here

    Template No. 4
    This distinctive web 2.0 style theme has well-integrated ads, giving a less cluttered appearance. This template has been tested in all the major browsers (including the bug-prone IE6) and is 100% XHTML/CSS valid. It is coded in all three major proxy scripts; PHProxy, Zelune, and CGI Proxy. As usual, it is easily customised, and is sure to be a big hit amongst proxy users!













    Source : from www.Free Proxy Templates.com
    Download here

    All template created by www.Free Proxy Templates.com

    Wednesday, October 28, 2009

    Initial Thoughts on Cloud A6

    I'm a lowercase late to this issue, but permit me move by saying I feature Craig Balding's RSA aggregation 2009 Presentation this evening. In it he mentioned something called the A6 Working Group. I scholarly this is attendant to individual journal posts and a Twitter discussion. In brief:
    • In May, Chris Hoff posted Incomplete Thought: The Crushing Costs of Complying With Cloud Customer “Right To Audit” Clauses, where Chris wrote Cloud providers I hit uttered to are existence absolutely hammered by customers performing on their “right to audit” clauses in contracts.
    • In June, Craig posted Stop the Madness! Cloud Onboarding Audits - An Open Question... where he wondered Is there an existing system/application/protocol whereby I crapper transfer my contract requirements to a provider, they crapper move in real-time with compliance level and any added costs, with less structured/known requirements responded to by a manlike (but transmitted the same way)?
    • Later in June, Craig posted in Vulnerability Scanning and Clouds: An Attempt to Move the Dialog On... where he spoke of the requirement for customers to carry vulnerability assessments of darken providers: A “ScanAuth” API call empowers the customer (or their nominated 3rd party) to scan their hosted Cloud infrastructure confident in the noesis they won’t start dishonor of the providers Terms of Service.
    • In July, Chris long Craig's intent with Extending the Concept: A Security API for Cloud Stacks, antiquity on the same Twitter discussions. Chris mentioned The Audit, Assertion, Assessment, and Assurance API (A6) (Title credited to @CSOAndy)... Specifically, let’s verify the capabilities of something same SCAP and embed a standard and unstoppered API layer into each IaaS, PaaS and SaaS substance (see the API blocks in the diagram below) to wage not exclusive a standard artefact of scanning for meshwork vulnerabilities, but also plan management, quality management, connector remediation, compliance, etc.
    Still with me? In August Network World posted A6 promises a artefact to check up on open darken security, which said:What darken services users requirement is a artefact to verify that the section they wait is existence delivered, and there is an effort underway for an programme that would do just that.Called A6 (Audit, Assertion, Assessment and Assurance API) the offering is ease in the works, unvoluntary by two people: Chris Hoff - who came up with the intent and entireness for Cisco - and the communicator of the Iron Fog journal who identifies himself as Ben, an aggregation section consultant in Toronto.The usefulness of the API would be that darken providers could offer customers a look into destined aspects of the assist without flexible the section of another customers’ assets or the section of the darken provider’s meshwork itself.Work on a plan of A6 is posted here http://www.scribd.com/doc/18515297/A6-API-Documentation-Draft-011. It’s incomplete, but offers a good support for what is ultimately needed. So let's wager what that says:The A6 API was fashioned with the mass concepts in mind:
  • The section arrange MUST wage outside systems with the knowledge to query a utility technology bourgeois for their security state. Ok, that's pretty generic. We don't undergo what is meant by "security state," but we're just starting.
  • The arrange MUST wage sufficient aggregation for an assessment of section land asserted by the provider. Same supply as #1.
  • The aggregation exposed via open interfaces MUST NOT wage limited aggregation most vulnerabilities or result in careful section configurations existence exposed to ordinal parties or trusty customers. Hmm, I'm lost. I'm supposed to watch "security state" but without "specific aggregation most vulnerabilities"?
  • The aggregation exposed via open interfaces SHOULD NOT wage ordinal parties or trusty customers with sufficient accumulation as to infer the section land of a limited surroundings within the providers environment. Same supply as #4.
  • The arrange SHOULD reuse existing standards, tools and technologies wherever possible. Neutral, throwaway concern.
  • That's most it, with the mass attending below:In classic outsourcing deals these section policies and controls would be merged into the acquisition contract; with darken technology providers, the knowledge to enter in limited contractual obligations for section or earmark for ordinal band audits is either limited or non-existent. However, this regulating does not reduce the requirement for intense organizations to protect their data.The A6 API is witting to close this notch by providing intense organizations with near real-time views into the section of their darken technology provider. While this does not earmark for intense organizations to oblige their section policies and controls upon the provider, they module hit aggregation to earmark them to set their venture exposure.Before I drop the discourse you're all inactivity for, permit me say that I conceive it is enthusiastic grouping are intellection most these problems. Much meliorate to hit a communicating than to adopt darken = secure.However, my discourse is this: how does this wage "consuming organizations with nearby real-time views into the section of their darken technology provider"?Here is what I conceive is happening. Craig started this thread because he wanted a artefact to carry audit and compliance (remember I highlighted those terms) activities against darken providers without violating their cost of service. I am trusty Craig would concord that compliance != security. The danger is that someone module conceive that complaince = security, intellection one could conceivably watch security state by scanning for meshwork vulnerabilities, but also plan management, quality management, connector remediation, compliance, etc.. This is same network admittance control all over again. A good "security state" effectuation you're allowed on the meshwork because your grouping is organized "properly," the grouping is "patched," and so on. Never nous that the grouping is 0wned. Never nous that there is no API for quering 0wnage. Don't intend me wrong, this is a rattling difficult problem. It is exceptionally difficult to set true grouping land by asking the system, since you are at the compassionateness of the intruder. It could be worsened with darken and realistic stock if the entrant owns the grouping and the realistic infrastructure. Customer queries the A6 API and the darken returns a healthy response, despite the reality. Shoot, the darken could say it IS healthy by the definition of patches or plan and ease be 0wned.I conceive there's more thought required here, but that doesn't stingy A6 is a waste of time -- if we are country that it's more most compliance and rattling null most security, or especially trustworthiness of the assets.Copyright 2003-2009 Richard Bejtlich and TaoSecurity (taosecurity.blogspot.com and www.taosecurity.com)
    Google

    Last Day for Discounted SANS Registration - Wednesday

    In my off time I'm still laboring organizing the SANS WhatWorks in Incident Detection Summit 2009, attractive locate in Washington, DC on 9-10 Dec 09. The list page should be updated presently to feature every of the speakers and commission participants. Wednesday is the terminal day to run at the discounted rate.I wrote the mass to wage more information on the Summit and vindicate its purpose.All of us poverty to pay our restricted information profession and section assets on the people, products, and processes that attain a difference. Does it attain significance to send money to projects when we don’t undergo their impact? I’m not conversation about hirsute “return on investment� (ROI) calculations or fictitious “risk� ratings. Don’t we every poverty to undergo how to encounter intruders, right now, and then centre on improvements that will attain it more arduous for intense guys to disclose, degrade, or deny our data?To respond this question, I’ve teamed with SANS to organize a unique circumstance -- the SANS WhatWorks in Incident Detection Summit 2009, on 9-10 Dec 2009 in Washington, DC. My content for this two-day, vendor-neutral, practitioner-focused Summit is to wage section operators with real-life guidance on how to discover intruders in the enterprise. This isn’t a conference on a limited commercial tool, or a series of death-by-slide presentations, or lectures by grouping garbled from reality. I’ve reached discover to the grouping I undergo on the face lines, who encounter intruders on a regular, regular basis. If you don’t conceive beatific guys undergo how to encounter intense guys, pay two life with grouping who go toe-to-toe with the worst intruders on the planet.We’ll discuss topics same the following:
    • How do Computer Incident Response Teams and Managed Security Service Providers detect intrusions?
    • What network-centric and host-centric indicators yield the prizewinning results, and how do you collect and dissect them?
    • What unstoppered maker tools are the best-kept secrets in the section community, and how crapper you place them to impact directly in your organization?
    • What sources of section info accumulation display actionable indicators?
    • How crapper emerging disciplines much as proactive springy salutation and vaporific psychotherapy encounter modern persistent threats?
    Here is a distribution of the mountain of subject concern experts who will arrange the schedule:
    • Michael Cloppert, grownup theoretical member of Lockheed Martin's enterprise Computer Incident Response Team and regular SANS Forensics blogger.

    • Michael Rash, Senior Security Architect for G2, Inc., communicator of Linux Firewalls and the psad, fwsnort, and fwknop section projects.
    • Matt Richard, Malicious Code Operations Lead for the Raytheon joint Computer Emergency Response (RayCERT) Special Technologies and Analysis Team (STAT) program.
    • Martin Roesch, originator of Sourcefire and developer of Snort.
    • Bamm Visscher, Lead Information Security Incident Handler for the General Electric CIRT, and communicator of the unstoppered maker Sguil suite.
    Ron Gula is scheduled to do one tone and I'm employed on the second. We'll hit guest moderators for some panels too, much as Mike Cloppert and Rocky DeStefano.I look forward to sight you at the conference!Copyright 2003-2009 Richard Bejtlich and TaoSecurity (taosecurity.blogspot.com and www.taosecurity.com)
    Google

    PHP Proxy Templates

    Template No. 1
    Feel free to download as usual. It contains the necessary fonts, scripts and graphics needed to modify the template.








    Source : from www.Free Proxy Templates.com
    Download here

    Template No. 2
    Another great proxy template on offer here. Originally designed by Arcsin but modified and integrated by Free Proxy Templates to make it function with PHProxy. It’s a nice looking template which is very easily customizable to your needs.








    Source : from www.Free Proxy Templates.com
    Download here

    Template No. 3
    Here’s is the third template installment! It contains one of the most modern web2.0 proxy looks thus far, so enjoy all!








    Source : from www.Free Proxy Templates.com
    Download here

    Template No. 4
    No, it isn’t really, but it’s a very good design none the less! It was designed by Web Resources and I was asked to code it into the latest PHProxy! They also feature an amazing tutorial on how to create this proxy design on Photoshop. Click here for the tutorial link. Anyway, feel free to download and enjoy!








    Source : from www.Free Proxy Templates.com
    Download here


    Template No. 5
    It features a semi-web2.0 look, it is highly AdSense and SEO optimized, is 100% XHTML/CSS valid and is very easily customizable.









    Source : from www.Free Proxy Templates.com
    Download here

    Template No. 6
    This template was first designed by StyleShout, I’ve just integrated AdSense and PHProxy into the template. It is 100% XHTML/CSS valid and I’ve made it easier for you guys to customize. All you need to do is change the config.php and topsites.php file to your website settings, upload and off you go.











    Source : from www.Free Proxy Templates.com
    Download here

    Template No. 7
    Another free open source template designed by StyleShout. This template is now even faster to configure with an updated config.php file. It also features a new Google search bar.
















    Source : from www.Free Proxy Templates.com
    Download here

    Template No. 8
    This template is a very simplistic and easy going template. It is coded in 3 different proxy scripts, Zelune, PHProxy and CGI Proxy. This template is 100% XHTML/CSS valid, using div and h1 to ensure great SEO optimization. It is also very easy to customize and install as per usual.










    Source : from www.Free Proxy Templates.com
    Download here

    Template No. 9
    Happy Halloween! This Template is a spooky design. However, it is well suited to all year use thanks to the Adsense optimisation and clean design. It is coded in Zelune, PHProxy and CGI Proxy in valid XHTML/CSS. It is easy to customise, using the config file in all three versions.













    Source : from www.Free Proxy Templates.com
    Download here

    Template No. 10
    This distinctive web 2.0 style theme has well-integrated ads, giving a less cluttered appearance. This template has been tested in all the major browsers (including the bug-prone IE6) and is 100% XHTML/CSS valid. It is coded in all three major proxy scripts; PHProxy, Zelune, and CGI Proxy. As usual, it is easily customised, and is sure to be a big hit amongst proxy users!








    Source : from www.Free Proxy Templates.com
    Download here

    All template created by www.Free Proxy Templates.com

    Tuesday, October 20, 2009

    Earn Money

    Last topic and real crux of this tutorial, how to alter traffikc visitor of proxy websites become money. Doesn't mean anything isn't it if the visitor of many but productions of us zero big. So here will be studied, how the best way for monetize or look for production of Your proxy websites. More than anything else with existence of * threat* fraud click of non-natural traffic, such as come from sites top and of mailing list. Google Adsense Though rather fraud, but Google Adsense still best choice to be attached on front yard of your proxy websites. More than anything else if You getting many traffic of searcher machines. Of perception of me, proxy websites which the was him of organic can obtain;get CTR 4x folding to be compared to which the was him of coming from promotion. Remember ! Unit Advertisement of Adsense shall only be attached in front yard of sites proxy web. ILLICIT of law of to put down him in pages of proxified which browse through proxy web

    Hosting

    One of the constraint in business of web proxy in fact is hosting web. Next to nothing receptive cheap hosting of proxy web sites. Of so much many existing hosting proxy, my choice fall at Techentrance ( aff). Price don’t far differ from other hosting proxy, but recommended many by players of business of web proxy, and in the reality it is true result of him don’t disappoint. Two matter which need to be paid attention by is to regarding and price of bandwidth. First, don't have bought hosting proxy at the price of which far below the mark. Hosting for proxy relative eat more resource compared to ordinary hosting. That because their price him are costlier. If there is offering at the price of cheap, beyond question performance to be sacrificed. And so Your visitor feel service of your proxy very slowgoing, just in act to of customer/ client loss. Second, select;choose package of hosting giving minimum bandwidth 100GB. Seen to be it is true rather copious, but by promotion which wait I give in third shares, it is possible that oppositely distribute the the bandwidth fall short.

    Paid Proxy Hosting List

    1. 247-host.com

    Free Proxy Hosting List



    Thursday, October 15, 2009

    Proxy server

    In computer networks, a proxy server is a server which clients use to access other computers. A proxy server that passes information to its clients without changing it is usually called a gateway or sometimes tunneling proxy.

    A client that connects to the proxy server requests some service, such as a file, connection, web page, or other resource, that is available on a different server. The proxy server then goes to the other server and requests what the client wants for them.

    A proxy server can change the information that it gives to the client, and if the same information is accessed many times or by many different clients it can use what is called a cache to make things faster. A cache is the term for information that has been accessed and saved for future use; if a proxy server has what the client is accessing in its cache, it will make it faster because it does not need to go and access the other server to provide what the client wants.

    Proxy servers get their name because they act like a proxy (a stand-in) of the server computer.

    A proxy server can be placed anywhere in the connection between the client and the server, which could include software on the client computer itself or on any computer between.

    Some proxy servers use Secure Sockets Layer (SSL) to secure the connection between the client and the remote server. This security layer helps to make sure that no other computers can read or understand what the client is asking from the server. (from wikipedia)