Solved

Annonymity !

Posted on 2004-03-26
5
219 Views
Last Modified: 2013-12-04
Hello

I am not sure whether this is the place to post this question but this concerns a win network so i thought here would be good?

I would like to know, what proxy stylee is best (from experience) and why! Does a win machine include a proxy? etc.

Web
Direct
Client

linuxunil

0
Comment
Question by:linuxunil
5 Comments
 
LVL 12

Expert Comment

by:trywaredk
ID: 10694140
CC Proxy is an easy-to-use proxy software
http://www.youngzsoft.net/ccproxy/

BlackICE PC Protection and Firewall
http://blackice.iss.net/product_pc_protection.php

Many Regards
Jorgen Malmgren
IT-Supervisor
Denmark

:o) Your brain is like a parachute. It works best when it's open
0
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 25 total points
ID: 10695194
Not natively, no OS itteration of M$ contains proxy software- they are able to use them, and run them-- ISA might come with it though. I am partial to FreeProxy, easy to use- setup and has never failed me: http://www.alphalink.com.au/~gregr/freeproxy.htm#release  Although my ultimate preference is Linux based: Squid-proxy  can be run on windows with cygwin or mingw
http://www.squid-cache.org/ I feel it's more secure than any proxy run on winblows. Just an opinion
-rich
0
 
LVL 57

Assisted Solution

by:Pete Long
Pete Long earned 25 total points
ID: 10698183
0

Featured Post

New! My Passport Wireless Pro Wi-Fi Mobile Storage

Portable wireless storage to offload, edit, and stream anywhere.

High-capacity, wireless mobile storage designed to accompany professional photographers and videographers in the field to easily offload, edit and stream captured photos and high-definition videos.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Russian pop up ad virus 8 116
How to implement SSO? 22 80
SQL management studio fails to connect after Triple DES cipher disabled. 6 69
Botnet detection help me please 21 85
No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
Our Group Policy work started with Small Business Server in 2000. Microsoft gave us an excellent OU and GPO model in subsequent SBS editions that utilized WMI filters, OU linking, and VBS scripts. These are some of experiences plus our spending a lo…
This Micro Tutorial will teach you how to censor certain areas of your screen. The example in this video will show a little boy's face being blurred. This will be demonstrated using Adobe Premiere Pro CS6.
Hi friends,  in this video  I'll show you how new windows 10 user can learn the using of windows 10. Thank you.

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now