Solved

Interesting problem with real payment.... https proxy

Posted on 2003-11-06
7
220 Views
Last Modified: 2010-04-05
  The application has to go through a proxy server and the webpage is secured or not by a username and password. I need this part. The application then will go through few proxy servers like this :  PC ->encrypted transmision-> Server1 ->encrypted transmision-> Server2 ->etc-> FinalWebServer.
   The 'proxy server' can be any program running as http proxy but can receive information on any ports. Also this 'proxy' must be able not to trace back the transmision.
   My e-mail is : mnuntel@yahoo.com
   I will pay money for any working source (not asm) in delphi 6,7.
0
Comment
Question by:TheNew-Old
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 3
7 Comments
 
LVL 6

Expert Comment

by:swift99
ID: 9699174
The proxy itself will always be able to trace back the source, or it would be incapable of completing a connection.  However, since ICMP is not HTTP, tracert will not be able to traverse proxies.

You could build something like this using ICS - see http://overbyte.delphicenter.com for some ideas.
0
 

Author Comment

by:TheNew-Old
ID: 9704076
  Yes I know that. What I mean is if someone, let say finalwebserver ask "the proxy" who am I the proxy should answer 'white house' or anything i need (or just to say that is no proxy and is a direct connection).  My english is not that good and is hard for me to say what I have to say.
   I can build something like this myself but it must be perfect without any errors. So only a brain can overpass some problems but more brains :))
0
 

Author Comment

by:TheNew-Old
ID: 9704112
 Anyway the important part for me is to make a transfer from PC ->encryted transmision + extra data -> proxy -> http://www.nothing.com
  I want that my ISP to see only encrypted transmisions.
0
Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 
LVL 6

Expert Comment

by:swift99
ID: 9704204
That is what a proxy does ... to the "internet" it looks like it is the only user, and to the user, it looks like it is the entire internet.
0
 

Author Comment

by:TheNew-Old
ID: 9710961
 Yes....but my ISP will be able to see what I send to the "proxy" if not encrypted. And so on from proxy to proxy.
  If encrypted then ISP !#@?!@$#!#@$
  That's what I mean.
0
 
LVL 6

Accepted Solution

by:
swift99 earned 450 total points
ID: 9715207
ISP generally doesn't care, unless you generate excessive traffic.

You generally have to infer the presence of a proxy, unless the proxy has open ports on the exposed side for internet to internet relaying.  At that point in time, it doesn't matter what you do encryption wise because what goes in comes out on the same physical wire.  The ISP can tell that you are relaying with automated mechanisms, and if it is against your service agreement then they don't have to know the contents to legally cut your service.

SSL provides encryption.  There is a project to add SSL to ICS.  I believe that there are commercial products with SSL also.

No encryption is totally secure - A math professor in Florida showed emprically that 128 bit encryption can be cracked with home equipment in about 3 days.  You may want to check out the security forums for more hints.
0
 

Author Comment

by:TheNew-Old
ID: 9759974
 10x anyway man...

   The idea is that the proxy server is located at another ISP. If you can help me how to connect encrypted to that proxy server on port 32432 (no importance) and after that the proxy to connect to the internet without encryption please let me know at : mnuntel@yahoo.com

   
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Have you ever had your Delphi form/application just hanging while waiting for data to load? This is the article to read if you want to learn some things about adding threads for data loading in the background. First, I'll setup a general applica…
Introduction Raise your hands if you were as upset with FireMonkey as I was when I discovered that there was no TListview.  I use TListView in almost all of my applications I've written, and I was not going to compromise by resorting to TStringGrid…
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…
Do you want to know how to make a graph with Microsoft Access? First, create a query with the data for the chart. Then make a blank form and add a chart control. This video also shows how to change what data is displayed on the graph as well as form…
Suggested Courses
Course of the Month11 days, 6 hours left to enroll

631 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question