Interesting problem with real payment.... https proxy

Posted on 2003-11-06
Last Modified: 2010-04-05
  The application has to go through a proxy server and the webpage is secured or not by a username and password. I need this part. The application then will go through few proxy servers like this :  PC ->encrypted transmision-> Server1 ->encrypted transmision-> Server2 ->etc-> FinalWebServer.
   The 'proxy server' can be any program running as http proxy but can receive information on any ports. Also this 'proxy' must be able not to trace back the transmision.
   My e-mail is :
   I will pay money for any working source (not asm) in delphi 6,7.
Question by:TheNew-Old
  • 4
  • 3

Expert Comment

ID: 9699174
The proxy itself will always be able to trace back the source, or it would be incapable of completing a connection.  However, since ICMP is not HTTP, tracert will not be able to traverse proxies.

You could build something like this using ICS - see for some ideas.

Author Comment

ID: 9704076
  Yes I know that. What I mean is if someone, let say finalwebserver ask "the proxy" who am I the proxy should answer 'white house' or anything i need (or just to say that is no proxy and is a direct connection).  My english is not that good and is hard for me to say what I have to say.
   I can build something like this myself but it must be perfect without any errors. So only a brain can overpass some problems but more brains :))

Author Comment

ID: 9704112
 Anyway the important part for me is to make a transfer from PC ->encryted transmision + extra data -> proxy ->
  I want that my ISP to see only encrypted transmisions.
PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.


Expert Comment

ID: 9704204
That is what a proxy does ... to the "internet" it looks like it is the only user, and to the user, it looks like it is the entire internet.

Author Comment

ID: 9710961
 Yes....but my ISP will be able to see what I send to the "proxy" if not encrypted. And so on from proxy to proxy.
  If encrypted then ISP !#@?!@$#!#@$
  That's what I mean.

Accepted Solution

swift99 earned 450 total points
ID: 9715207
ISP generally doesn't care, unless you generate excessive traffic.

You generally have to infer the presence of a proxy, unless the proxy has open ports on the exposed side for internet to internet relaying.  At that point in time, it doesn't matter what you do encryption wise because what goes in comes out on the same physical wire.  The ISP can tell that you are relaying with automated mechanisms, and if it is against your service agreement then they don't have to know the contents to legally cut your service.

SSL provides encryption.  There is a project to add SSL to ICS.  I believe that there are commercial products with SSL also.

No encryption is totally secure - A math professor in Florida showed emprically that 128 bit encryption can be cracked with home equipment in about 3 days.  You may want to check out the security forums for more hints.

Author Comment

ID: 9759974
 10x anyway man...

   The idea is that the proxy server is located at another ISP. If you can help me how to connect encrypted to that proxy server on port 32432 (no importance) and after that the proxy to connect to the internet without encryption please let me know at :


Featured Post

VMware Disaster Recovery and Data Protection

In this expert guide, you’ll learn about the components of a Modern Data Center. You will use cases for the value-added capabilities of Veeam®, including combining backup and replication for VMware disaster recovery and using replication for data center migration.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this tutorial I will show you how to use the Windows Speech API in Delphi. I will only cover basic functions such as text to speech and controlling the speed of the speech. SAPI Installation First you need to install the SAPI type library, th…
Creating an auto free TStringList The TStringList is a basic and frequently used object in Delphi. On many occasions, you may want to create a temporary list, process some items in the list and be done with the list. In such cases, you have to…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
A short tutorial showing how to set up an email signature in Outlook on the Web (previously known as OWA). For free email signatures designs, visit If you want to manage em…

773 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question