Solved

How can i automate proxy logon Authentication.

Posted on 2002-05-22
7
212 Views
Last Modified: 2013-11-13
How can i proxy logon Authentication from visual basic.
I just want to download a web contants from website. My i'm protected by proxy long on. And url where i'm downloading from is also protectred by NT logon Authentication. so basically i need two logon.
I have username and password for both logon. but i just want to make this automatically.


 
0
Comment
Question by:bcp5190
  • 4
  • 3
7 Comments
 
LVL 16

Expert Comment

by:Richie_Simonetti
Comment Utility
0
 

Author Comment

by:bcp5190
Comment Utility
Hello Richie,
it a great article but
If i try local url it works fine but
Every time i try www.yhaoo.com
i'm getting following
Error was occurred.
error # 10060
The attempt to connect timed out
0
 
LVL 16

Expert Comment

by:Richie_Simonetti
Comment Utility
Strange. I took that url from other EE's question with the same problem as yours and it works (Actually, asker found it by itself!)
0
Threat Intelligence Starter Resources

Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

 

Author Comment

by:bcp5190
Comment Utility
Hello every one i'm trying this for long time but i still have not find any solution. please help me. how can i authenticate for nt and proxy programatically so i can automate download.
0
 

Author Comment

by:bcp5190
Comment Utility
how can i file my proxt address and port for proxy If i look lt my proxy setting i have setup use automatic proxy
http://autoproxy.cs.mysite.com.
0
 
LVL 16

Accepted Solution

by:
Richie_Simonetti earned 50 total points
Comment Utility
Post a new question regarding this one. It seems that nobody has read it more than me.
(is that a valid url?)
0
 
LVL 16

Expert Comment

by:Richie_Simonetti
Comment Utility
?
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Having just graduated from college and entered the workforce, I don’t find myself always using the tools and programs I grew accustomed to over the past four years. However, there is one program I continually find myself reverting back to…R.   So …
You can of course define an array to hold data that is of a particular type like an array of Strings to hold customer names or an array of Doubles to hold customer sales, but what do you do if you want to coordinate that data? This article describes…
This tutorial covers a step-by-step guide to install VisualVM launcher in eclipse.
Viewers will learn how to properly install Eclipse with the necessary JDK, and will take a look at an introductory Java program. Download Eclipse installation zip file: Extract files from zip file: Download and install JDK 8: Open Eclipse and …

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now