Solved

Proxy Server

Posted on 1999-01-05
13
140 Views
Last Modified: 2013-12-25
Actually I´m not sure if I should post this question on this topic area, but anyway, if I´m wrong, someone could please tell me where to post it.
So, here it goes:
I have a conection to internet via a proxy server that is writing a log file daily. I´d like to know if it´s possible to avoid writing this log file from my workstation, I mean, from ONLY one workstation. Maybe changing some configuration...

Thanks for you help.

Ricardo
0
Comment
Question by:Ricarddo
  • 6
  • 6
13 Comments
 

Author Comment

by:Ricarddo
ID: 1830468
Adjusted points to 300
0
 
LVL 4

Expert Comment

by:davidmwilliams
ID: 1830469
 Check the log settings for the proxy server; it may well allow you to specify an address or range of addresses, or even whole domains, that it shouldn't log.
0
 
LVL 4

Expert Comment

by:davidmwilliams
ID: 1830470
 Also, you could schedule a simple script to run right after the log file is written, to use 'grep -v' to remove all references to your workstation.  You can get grep for Windows, freely, if that's your OS.
0
 
LVL 1

Expert Comment

by:cox
ID: 1830471
Are you using MS-Proxy??? or what?
0
 

Author Comment

by:Ricarddo
ID: 1830472
Cox,

We are using MS-Proxy Server 2.0.

----------------------

Davidmwilliams,

I didn´t get grep for Windows yet, so I´m not able to test it.
Anyway, I think I´ll have some problems with file permission. Don´t you think so?

Thanks.

0
 
LVL 4

Expert Comment

by:davidmwilliams
ID: 1830473
 It depends on how your NT server is configured - though, I'd expect the proxy server to run as a fairly unprivileged user, so if you have access to the server, you may well be able to write/modify the PROXY log file.  Certainly, if you are an administrator user then you should have no difficulty.  If the proxy log is on a special volume that has restricted access, you could possibly add yourself to one of the relevant groups using the Windows NT User Manager.
0
3 Use Cases for Connected Systems

Our Dev teams are like yours. They’re continually cranking out code for new features/bugs fixes, testing, deploying, testing some more, responding to production monitoring events and more. It’s complex. So, we thought you’d like to see what’s working for us.

 

Author Comment

by:Ricarddo
ID: 1830474
Hi All!

Maybe it´ll make the things clearer:
I just have the IP address and my proxy server machine has no shared drivers. So, I just have the IP address.

Thanks
0
 
LVL 4

Expert Comment

by:davidmwilliams
ID: 1830475
 You just have the IP address of your proxy driver, and you can't get interactive access onto it?
  In that case, I think there's not much you can do ... because you need to be able to alter the proxy server's configuration, or at worst tamper with its log files.  You need access to it, and its files, to do this.
0
 

Author Comment

by:Ricarddo
ID: 1830476
OK davidmwilliams.
What I want to know if it´s possible to access internet via a proxy server that is logging your actions and, do something so you can be an "invisible" user for the log file or even change/modify the log file.
It´s just a question about security and as you told me I can conclude it´s not possible if I have no permitions.

Thanks.

Ricardo

P.S.: I´ll leave this question more 3 or 4 days, if noone could give me a way to do it, I´ll accept your comment. So, after that put your comment as an answer.
0
 
LVL 4

Expert Comment

by:davidmwilliams
ID: 1830477
 Thanks for the P.S.
  Unfortunately though, unless you have access to the server there is really nothing you can do.
  The only final thing I can think of is maybe try looking through some hacking type sites to see if there are any security holes in your particular proxy server that you can exploit !
0
 

Author Comment

by:Ricarddo
ID: 1830478
Hi davidmwilliams!

Put your comment as an answer, so I can grade you OK?

Thanks

Ricardo
0
 
LVL 4

Accepted Solution

by:
davidmwilliams earned 300 total points
ID: 1830479
Thanks, Ricardo, nice working with you !
0
 

Author Comment

by:Ricarddo
ID: 1830480
Thank you.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Ever wondered how to display how many visitors you have online. In this tutorial I will show you an easy but effective way to display the number of online visitors in WhizBase. In this article I assume you have read my previous articles and know …
This tutorial will discuss the log-in process using WhizBase. In this article I assume you already know HTML. I will write the code using WhizBase Server Pages, so you need to know some basics in WBSP (you might look at some of my other articles abo…
Learn the basics of if, else, and elif statements in Python 2.7. Use "if" statements to test a specified condition.: The structure of an if statement is as follows: (CODE) Use "else" statements to allow the execution of an alternative, if the …
Learn the basics of while and for loops in Python.  while loops are used for testing while, or until, a condition is met: The structure of a while loop is as follows:     while <condition>:         do something         repeate: The break statement m…

867 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now