?
Solved

How to review current proxy settings

Posted on 2004-04-24
2
Medium Priority
?
9,746 Views
Last Modified: 2007-12-19
When I visit Starbucks I fire up my browser and I get the Starbuck page.  Recently when I visted an airport I fired up my browser and I got an airport page.  Back at home, I get the normal default page I have set.  I'm trying to understand how proxies work.  Sometimes at home when I fire up my browser, I'll see the message "detecting proxy settings" in the status bar of IE.  This will last sometimes for a minute before my page loads.  Once that's done however, surfing is at normal speed.

So 1, I'm looking for a good explaination of what's going on when I on the road and simply fire up my browser, and 2, I'm looking for a way to review my proxy settings so if I want to I can see what proxy I'm connected to.    
0
Comment
Question by:mskvarenina
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 2

Accepted Solution

by:
LeftofCool earned 500 total points
ID: 10910858
By definition a proxy is defined as a firewall mechanism that replaces the IP address of a host on the internal (protected) network with its own IP address for all traffic passing through it. A software agent that acts on behalf of a user, typical proxies accept a connection from a user, make a decision as to whether or not the user or client IP address is permitted to use the proxy, perhaps does additional authentication, and then completes a connection on behalf of the user to a remote destination.

By default, IE is set to detect your proxy settings whether you have one or not. This option can be turned off in the Internet Options Menu>Connections>LAN Settings. If automatically detect settings is checked, then IE will give the message that it is detecting your settings in your status bar. Most airports and coffee shops use proxies in order to filter what you wish to access while using their internet connection. Usually, you won't be able to disable this unless you use a proxy of your own that bypasses theirs. Such proxies are innumerable in terms of where you can find them on the web. For example, one would be http://www.megaproxy.com/ . One way to review a proxy you are connected to is to fire up your command prompt and type netstat. This shows all active connections to your computer, which usually includes the name of the proxy you are currently connected to. Sometimes, IE is already programmed to connect to a specific proxy. If you wished to disconnect from this proxy, simply go to Tools>Internet Options>Connections>LAN Settings, you will then see an option under 'Proxy Servers' that allows you to use or bypass a proxy if there is one entered in the field. The field is usually only filled in a school or library that isn't too concerned about security.
0
 
LVL 1

Expert Comment

by:djluff
ID: 10917159
Wireless access networks often run a transparent proxy that redirect all HTTP requests to their home page. This is normally so you can login or whatever you need to do to get access. Once you're authenticated or whatever you can access the internet as usual.

A transparent proxy is different to a normal proxy. With a transparent proxy, you don't need to configure the proxy in your browser. The network is configured so that all HTTP requests go to the proxy, whatever IP address they were originally addressed to.
0

Featured Post

Bringing Advanced Authentication to the SMB Market

WatchGuard announces the acquisition of advanced authentication provider, Datablink, with one mission – to bring secure authentication to SMB, mid-market, and distributed enterprises with a cloud-based solution, ideal for resale via their established channel & MSSP community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

There is a lot to be said for protecting yourself and your accounts with 2 factor authentication.  I found to my own chagrin, that there is a big downside as well.
A look at what happened in the Verizon cloud breach.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question