Solved

Override Squid on a Linux machine !!!!

Posted on 2004-03-26
9
219 Views
Last Modified: 2010-04-22
Hai Friends !!

I browse da internet from a LAN through a proxy. Our administrator uses Squid 2.4 on a Linux machine as a proxy. Through squid he restricted da number of requests for a user to 5. So now v can open only 5 pages at a time.
Suppose no1 is connected to internet in da LAN. Even then i can open only 5 pages and couldnt utilise da net. I want to open more than 5 pages ie i want to override da property of squid.

So i feel some1 here can suggest me how 2 do this....its ok even if its a tricky one...

Awaiting 4 a +ve reply !!!!!!

with regards,
 n@v
0
Comment
Question by:ITkid
9 Comments
 
LVL 9

Expert Comment

by:Alf666
Comment Utility
Content deleted
--
jlevie, Page editor
0
 
LVL 40

Accepted Solution

by:
jlevie earned 500 total points
Comment Utility
If the site administrator has done his job properly you won't be able to override or bypass the restrictions enforced by the Squid proxy.
0
 
LVL 9

Expert Comment

by:Alf666
Comment Utility
Jlevie,

I totally agree with you. Hence my asking for moderators to excuse me in advance.
I would not have allowed myself to do if I had thought that this "language" was not used on purpose.

I'm French, and I know how tought it is sometimes to write proper English.

To be honest, I expected if to be removed :-). No offense taken.
0
Free Trending Threat Insights Every Day

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

 
LVL 17

Expert Comment

by:owensleftfoot
Comment Utility
Ask your administrator to increase the request number. Any other answer would be breaking EE guidelines.
0
 

Author Comment

by:ITkid
Comment Utility
As i couldnt get the right answer, I kindly request the Moderator to delete the question.
0
 
LVL 2

Expert Comment

by:alain_tesio
Comment Utility
If the proxy is on a specific port and you choose to use it or not, you wouldn't ask this question.
If it is a transparent proxy which intercepts requests to port 80, the point is that you cannot bypass it.
So either way da question is pointless.
0

Featured Post

Complete Microsoft Windows PC® & Mac Backup

Backup and recovery solutions to protect all your PCs & Mac– on-premises or in remote locations. Acronis backs up entire PC or Mac with patented reliable disk imaging technology and you will be able to restore workstations to a new, dissimilar hardware in minutes.

Join & Write a Comment

​Being a Managed Services Provider (MSP) has presented you  with challenges in the past— and by meeting those challenges you’ve reaped the rewards of success.  In 2014, challenges and rewards remain; but as the Internet and business environment evol…
Hello EE, Today we will learn how to send all your network traffic through Tor which is useful to get around censorship and being tracked all together to a certain degree. This article assumes you will be using Linux, have a minimal knowledge of …
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now