Solved

Proxy Server

Posted on 1999-01-05
13
139 Views
Last Modified: 2013-12-25
Actually I´m not sure if I should post this question on this topic area, but anyway, if I´m wrong, someone could please tell me where to post it.
So, here it goes:
I have a conection to internet via a proxy server that is writing a log file daily. I´d like to know if it´s possible to avoid writing this log file from my workstation, I mean, from ONLY one workstation. Maybe changing some configuration...

Thanks for you help.

Ricardo
0
Comment
Question by:Ricarddo
  • 6
  • 6
13 Comments
 

Author Comment

by:Ricarddo
ID: 1830468
Adjusted points to 300
0
 
LVL 4

Expert Comment

by:davidmwilliams
ID: 1830469
 Check the log settings for the proxy server; it may well allow you to specify an address or range of addresses, or even whole domains, that it shouldn't log.
0
 
LVL 4

Expert Comment

by:davidmwilliams
ID: 1830470
 Also, you could schedule a simple script to run right after the log file is written, to use 'grep -v' to remove all references to your workstation.  You can get grep for Windows, freely, if that's your OS.
0
 
LVL 1

Expert Comment

by:cox
ID: 1830471
Are you using MS-Proxy??? or what?
0
 

Author Comment

by:Ricarddo
ID: 1830472
Cox,

We are using MS-Proxy Server 2.0.

----------------------

Davidmwilliams,

I didn´t get grep for Windows yet, so I´m not able to test it.
Anyway, I think I´ll have some problems with file permission. Don´t you think so?

Thanks.

0
 
LVL 4

Expert Comment

by:davidmwilliams
ID: 1830473
 It depends on how your NT server is configured - though, I'd expect the proxy server to run as a fairly unprivileged user, so if you have access to the server, you may well be able to write/modify the PROXY log file.  Certainly, if you are an administrator user then you should have no difficulty.  If the proxy log is on a special volume that has restricted access, you could possibly add yourself to one of the relevant groups using the Windows NT User Manager.
0
Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

 

Author Comment

by:Ricarddo
ID: 1830474
Hi All!

Maybe it´ll make the things clearer:
I just have the IP address and my proxy server machine has no shared drivers. So, I just have the IP address.

Thanks
0
 
LVL 4

Expert Comment

by:davidmwilliams
ID: 1830475
 You just have the IP address of your proxy driver, and you can't get interactive access onto it?
  In that case, I think there's not much you can do ... because you need to be able to alter the proxy server's configuration, or at worst tamper with its log files.  You need access to it, and its files, to do this.
0
 

Author Comment

by:Ricarddo
ID: 1830476
OK davidmwilliams.
What I want to know if it´s possible to access internet via a proxy server that is logging your actions and, do something so you can be an "invisible" user for the log file or even change/modify the log file.
It´s just a question about security and as you told me I can conclude it´s not possible if I have no permitions.

Thanks.

Ricardo

P.S.: I´ll leave this question more 3 or 4 days, if noone could give me a way to do it, I´ll accept your comment. So, after that put your comment as an answer.
0
 
LVL 4

Expert Comment

by:davidmwilliams
ID: 1830477
 Thanks for the P.S.
  Unfortunately though, unless you have access to the server there is really nothing you can do.
  The only final thing I can think of is maybe try looking through some hacking type sites to see if there are any security holes in your particular proxy server that you can exploit !
0
 

Author Comment

by:Ricarddo
ID: 1830478
Hi davidmwilliams!

Put your comment as an answer, so I can grade you OK?

Thanks

Ricardo
0
 
LVL 4

Accepted Solution

by:
davidmwilliams earned 300 total points
ID: 1830479
Thanks, Ricardo, nice working with you !
0
 

Author Comment

by:Ricarddo
ID: 1830480
Thank you.
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

Introduction:   Welcome to my first article ever. To begin with, the reason I write this article.  I participated in a question on Experts Exchange about the start command in Windows and there were some discussion about the usage. The discussio…
It is a general practice to get rid of old user profiles on a computer  in a LAN environment. As I have been working with a company in a LAN environment where users move from one place to some other place at times. This will make many user profil…
Learn the basics of strings in Python: declaration, operations, indices, and slicing. Strings are declared with quotations; for example: s = "string": Strings are immutable.: Strings may be concatenated or multiplied using the addition and multiplic…
Learn the basics of lists in Python. Lists, as their name suggests, are a means for ordering and storing values. : Lists are declared using brackets; for example: t = [1, 2, 3]: Lists may contain a mix of data types; for example: t = ['string', 1, T…

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now