Solved

Annonymity !

Posted on 2004-03-26
5
227 Views
Last Modified: 2013-12-04
Hello

I am not sure whether this is the place to post this question but this concerns a win network so i thought here would be good?

I would like to know, what proxy stylee is best (from experience) and why! Does a win machine include a proxy? etc.

Web
Direct
Client

linuxunil

0
Comment
Question by:linuxunil
5 Comments
 
LVL 12

Expert Comment

by:trywaredk
ID: 10694140
CC Proxy is an easy-to-use proxy software
http://www.youngzsoft.net/ccproxy/

BlackICE PC Protection and Firewall
http://blackice.iss.net/product_pc_protection.php

Many Regards
Jorgen Malmgren
IT-Supervisor
Denmark

:o) Your brain is like a parachute. It works best when it's open
0
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 25 total points
ID: 10695194
Not natively, no OS itteration of M$ contains proxy software- they are able to use them, and run them-- ISA might come with it though. I am partial to FreeProxy, easy to use- setup and has never failed me: http://www.alphalink.com.au/~gregr/freeproxy.htm#release  Although my ultimate preference is Linux based: Squid-proxy  can be run on windows with cygwin or mingw
http://www.squid-cache.org/ I feel it's more secure than any proxy run on winblows. Just an opinion
-rich
0
 
LVL 57

Assisted Solution

by:Pete Long
Pete Long earned 25 total points
ID: 10698183
0

Featured Post

Free Tool: IP Lookup

Get more info about an IP address or domain name, such as organization, abuse contacts and geolocation.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...

791 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question