Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Annonymity !

Posted on 2004-03-26
5
Medium Priority
?
242 Views
Last Modified: 2013-12-04
Hello

I am not sure whether this is the place to post this question but this concerns a win network so i thought here would be good?

I would like to know, what proxy stylee is best (from experience) and why! Does a win machine include a proxy? etc.

Web
Direct
Client

linuxunil

0
Comment
Question by:linuxunil
5 Comments
 
LVL 12

Expert Comment

by:trywaredk
ID: 10694140
CC Proxy is an easy-to-use proxy software
http://www.youngzsoft.net/ccproxy/

BlackICE PC Protection and Firewall
http://blackice.iss.net/product_pc_protection.php

Many Regards
Jorgen Malmgren
IT-Supervisor
Denmark

:o) Your brain is like a parachute. It works best when it's open
0
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 100 total points
ID: 10695194
Not natively, no OS itteration of M$ contains proxy software- they are able to use them, and run them-- ISA might come with it though. I am partial to FreeProxy, easy to use- setup and has never failed me: http://www.alphalink.com.au/~gregr/freeproxy.htm#release  Although my ultimate preference is Linux based: Squid-proxy  can be run on windows with cygwin or mingw
http://www.squid-cache.org/ I feel it's more secure than any proxy run on winblows. Just an opinion
-rich
0
 
LVL 57

Assisted Solution

by:Pete Long
Pete Long earned 100 total points
ID: 10698183
0

Featured Post

Cyber Threats to Small Businesses (Part 1)

This past May, Webroot surveyed more than 600 IT decision-makers at medium-sized companies to see how these small businesses perceived new threats facing their organizations.  Read what Webroot CISO, Gary Hayslip, has to say about the survey in part 1 of this 2-part blog series.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
Security measures require Windows be logged in using Standard User login (not Administrator).  Yet, sometimes an application has to be run “As Administrator” from a Standard User login.  This paper describes how to create a shortcut icon to launch a…
this video summaries big data hadoop online training demo (http://onlineitguru.com/big-data-hadoop-online-training-placement.html) , and covers basics in big data hadoop .
Look below the covers at a subform control , and the form that is inside it. Explore properties and see how easy it is to aggregate, get statistics, and synchronize results for your data. A Microsoft Access subform is used to show relevant calcul…
Suggested Courses

927 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question