Interesting problem with real payment.... https proxy

Posted on 2003-11-06
Last Modified: 2010-04-05
  The application has to go through a proxy server and the webpage is secured or not by a username and password. I need this part. The application then will go through few proxy servers like this :  PC ->encrypted transmision-> Server1 ->encrypted transmision-> Server2 ->etc-> FinalWebServer.
   The 'proxy server' can be any program running as http proxy but can receive information on any ports. Also this 'proxy' must be able not to trace back the transmision.
   My e-mail is :
   I will pay money for any working source (not asm) in delphi 6,7.
Question by:TheNew-Old
  • 4
  • 3

Expert Comment

ID: 9699174
The proxy itself will always be able to trace back the source, or it would be incapable of completing a connection.  However, since ICMP is not HTTP, tracert will not be able to traverse proxies.

You could build something like this using ICS - see for some ideas.

Author Comment

ID: 9704076
  Yes I know that. What I mean is if someone, let say finalwebserver ask "the proxy" who am I the proxy should answer 'white house' or anything i need (or just to say that is no proxy and is a direct connection).  My english is not that good and is hard for me to say what I have to say.
   I can build something like this myself but it must be perfect without any errors. So only a brain can overpass some problems but more brains :))

Author Comment

ID: 9704112
 Anyway the important part for me is to make a transfer from PC ->encryted transmision + extra data -> proxy ->
  I want that my ISP to see only encrypted transmisions.
Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.


Expert Comment

ID: 9704204
That is what a proxy does ... to the "internet" it looks like it is the only user, and to the user, it looks like it is the entire internet.

Author Comment

ID: 9710961
 Yes....but my ISP will be able to see what I send to the "proxy" if not encrypted. And so on from proxy to proxy.
  If encrypted then ISP !#@?!@$#!#@$
  That's what I mean.

Accepted Solution

swift99 earned 450 total points
ID: 9715207
ISP generally doesn't care, unless you generate excessive traffic.

You generally have to infer the presence of a proxy, unless the proxy has open ports on the exposed side for internet to internet relaying.  At that point in time, it doesn't matter what you do encryption wise because what goes in comes out on the same physical wire.  The ISP can tell that you are relaying with automated mechanisms, and if it is against your service agreement then they don't have to know the contents to legally cut your service.

SSL provides encryption.  There is a project to add SSL to ICS.  I believe that there are commercial products with SSL also.

No encryption is totally secure - A math professor in Florida showed emprically that 128 bit encryption can be cracked with home equipment in about 3 days.  You may want to check out the security forums for more hints.

Author Comment

ID: 9759974
 10x anyway man...

   The idea is that the proxy server is located at another ISP. If you can help me how to connect encrypted to that proxy server on port 32432 (no importance) and after that the proxy to connect to the internet without encryption please let me know at :


Featured Post

Announcing the Most Valuable Experts of 2016

MVEs are more concerned with the satisfaction of those they help than with the considerable points they can earn. They are the types of people you feel privileged to call colleagues. Join us in honoring this amazing group of Experts.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

This article explains how to create forms/units independent of other forms/units object names in a delphi project. Have you ever created a form for user input in a Delphi project and then had the need to have that same form in a other Delphi proj…
Objective: - This article will help user in how to convert their numeric value become words. How to use 1. You can copy this code in your Unit as function 2. than you can perform your function by type this code The Code   (CODE) The Im…
Two types of users will appreciate AOMEI Backupper Pro: 1 - Those with PCIe drives (and haven't found cloning software that works on them). 2 - Those who want a fast clone of their boot drive (no re-boots needed) and it can clone your drive wh…

861 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question