Solved

Annonymity !

Posted on 2004-03-26
5
237 Views
Last Modified: 2013-12-04
Hello

I am not sure whether this is the place to post this question but this concerns a win network so i thought here would be good?

I would like to know, what proxy stylee is best (from experience) and why! Does a win machine include a proxy? etc.

Web
Direct
Client

linuxunil

0
Comment
Question by:linuxunil
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
5 Comments
 
LVL 12

Expert Comment

by:trywaredk
ID: 10694140
CC Proxy is an easy-to-use proxy software
http://www.youngzsoft.net/ccproxy/

BlackICE PC Protection and Firewall
http://blackice.iss.net/product_pc_protection.php

Many Regards
Jorgen Malmgren
IT-Supervisor
Denmark

:o) Your brain is like a parachute. It works best when it's open
0
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 25 total points
ID: 10695194
Not natively, no OS itteration of M$ contains proxy software- they are able to use them, and run them-- ISA might come with it though. I am partial to FreeProxy, easy to use- setup and has never failed me: http://www.alphalink.com.au/~gregr/freeproxy.htm#release  Although my ultimate preference is Linux based: Squid-proxy  can be run on windows with cygwin or mingw
http://www.squid-cache.org/ I feel it's more secure than any proxy run on winblows. Just an opinion
-rich
0
 
LVL 57

Assisted Solution

by:Pete Long
Pete Long earned 25 total points
ID: 10698183
0

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
Security measures require Windows be logged in using Standard User login (not Administrator).  Yet, sometimes an application has to be run “As Administrator” from a Standard User login.  This paper describes how to create a shortcut icon to launch a…
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…
Add bar graphs to Access queries using Unicode block characters. Graphs appear on every record in the color you want. Give life to numbers. Hopes this gives you ideas on visualizing your data in new ways ~ Create a calculated field in a query: …
Suggested Courses

630 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question