Solved

Override Squid on a Linux machine !!!!

Posted on 2004-03-26
9
221 Views
Last Modified: 2010-04-22
Hai Friends !!

I browse da internet from a LAN through a proxy. Our administrator uses Squid 2.4 on a Linux machine as a proxy. Through squid he restricted da number of requests for a user to 5. So now v can open only 5 pages at a time.
Suppose no1 is connected to internet in da LAN. Even then i can open only 5 pages and couldnt utilise da net. I want to open more than 5 pages ie i want to override da property of squid.

So i feel some1 here can suggest me how 2 do this....its ok even if its a tricky one...

Awaiting 4 a +ve reply !!!!!!

with regards,
 n@v
0
Comment
Question by:ITkid
9 Comments
 
LVL 9

Expert Comment

by:Alf666
ID: 10687893
Content deleted
--
jlevie, Page editor
0
 
LVL 40

Accepted Solution

by:
jlevie earned 500 total points
ID: 10689195
If the site administrator has done his job properly you won't be able to override or bypass the restrictions enforced by the Squid proxy.
0
 
LVL 9

Expert Comment

by:Alf666
ID: 10689501
Jlevie,

I totally agree with you. Hence my asking for moderators to excuse me in advance.
I would not have allowed myself to do if I had thought that this "language" was not used on purpose.

I'm French, and I know how tought it is sometimes to write proper English.

To be honest, I expected if to be removed :-). No offense taken.
0
Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

 
LVL 17

Expert Comment

by:owensleftfoot
ID: 10690721
Ask your administrator to increase the request number. Any other answer would be breaking EE guidelines.
0
 

Author Comment

by:ITkid
ID: 10814051
As i couldnt get the right answer, I kindly request the Moderator to delete the question.
0
 
LVL 2

Expert Comment

by:alain_tesio
ID: 10859747
If the proxy is on a specific port and you choose to use it or not, you wouldn't ask this question.
If it is a transparent proxy which intercepts requests to port 80, the point is that you cannot bypass it.
So either way da question is pointless.
0

Featured Post

VMware Disaster Recovery and Data Protection

In this expert guide, you’ll learn about the components of a Modern Data Center. You will use cases for the value-added capabilities of Veeam®, including combining backup and replication for VMware disaster recovery and using replication for data center migration.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Python Exploit Script 7 113
Port Scanner 5 107
redhat linux directory and file level permissions 4 164
Hardening guide / standard used on ATM machines 4 305
Hello EE, Today we will learn how to send all your network traffic through Tor which is useful to get around censorship and being tracked all together to a certain degree. This article assumes you will be using Linux, have a minimal knowledge of …
Fine Tune your automatic Updates for Ubuntu / Debian
In a recent question (https://www.experts-exchange.com/questions/28997919/Pagination-in-Adobe-Acrobat.html) here at Experts Exchange, a member asked how to add page numbers to a PDF file using Adobe Acrobat XI Pro. This short video Micro Tutorial sh…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

785 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question