Bypassing a proxy

Posted on 2006-03-24
Last Modified: 2008-01-09
We are using an activex that downloads and then uploads a changed file to a server. This works perfect except for environments with a proxy server. Environments with a proxy returns a time out error from the server so it seems the file download is stopped in the proxy. Is there any way to make a registry hack since changing settings in the proxy is out of the question in this case. We use XP for clients.
Question by:soft4u
    LVL 35

    Expert Comment

    Have you tried forcing the people with a proxy to use SSL?
    LVL 5

    Accepted Solution

    There's not going to be anything you can do on the client side if you are forced you use the proxy to access the outside world.

    If your proxy settings are simply set in IE (tools > internet options > connections tab > lan settings > use proxy server checked), try changing them so they don't use a proxy server at all and go right out (uncheck 'use proxy server for your lan').
    If you can't get on the internet after this it means web traffic is blocked at your firewall from going out from any PC on your network, except from the proxy - which means you are FORCED to go through the proxy, and the only possibility is to change settings in the proxy (which you said you can't do) or change settings in the firewall (which you probably can't do either).

    If I knew more about exactly what you're trying to do maybe I could suggest some kind of alternative?

    Sounds tough... good luck.
    LVL 6

    Assisted Solution

    if you want to change the client's proxy, you can look into this registry key:
    hkey_local_machine\software\microsoft\windows\current version\internet settings
    and set/unset values:
    proxyenabled (1=enabled, 0=disabled)
    and proxyserver -- string in format: protocol=server:port,protocol=server,port....
    however, if you disable proxy and your user is behind a firewall you might have just disabled their internet connection.
    LVL 5

    Expert Comment


    Author Comment

    At least you tried guys.. thanks!

    Featured Post

    Top 6 Sources for Identifying Threat Actor TTPs

    Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

    Join & Write a Comment

    Popularity Can Be Measured Sometimes we deal with questions of popularity, and we need a way to collect opinions from our clients.  This article shows a simple teaching example of how we might elect a favorite color by letting our clients vote for …
    I've been asked to discuss some of the UX activities that I'm using with my team. Here I will share some details about how we approach UX projects.
    This tutorial will teach you the core code needed to finalize the addition of a watermark to your image. The viewer will use a small PHP class to learn and create a watermark.
    Any person in technology especially those working for big companies should at least know about the basics of web accessibility. Believe it or not there are even laws in place that require businesses to provide such means for the disabled and aging p…

    745 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    15 Experts available now in Live!

    Get 1:1 Help Now