Solved

optimizing my VPS proxy for windows browsing

Posted on 2010-11-15
3
306 Views
Last Modified: 2012-05-10
Hi, can you share a few suggestions to configure a decent web proxy running linux? I am frequently in China and other places with filtered internet access, so I'd like to connect to my linux server via putty, and browse the web freely.

I have ordered a linux VPS that runs CentOS. the VPS has 128MB of memory only. its sole purpose is to be used as a proxy for my personal use.

Is there anything I can do on the server side that will make the VPS perform better? I had heard that squid was the best linux proxy, is this true? Is there a basic "howto" for people without linux experience? should I change the O/S to Ubuntu or is CentOS ok for my purposes?

Thank you
0
Comment
Question by:darkbluegr
3 Comments
 

Accepted Solution

by:
rkdiv earned 250 total points
ID: 34142588
I think the most simple way is just using a VPN to your system at home and use the remote gateway (still the default setting in Windows pptp VPN),you can also use pptp or openVPN under Linux.
0
 
LVL 6

Assisted Solution

by:Patrick Tallarico
Patrick Tallarico earned 250 total points
ID: 34250092
The VPN option would work, but there appears to be better options to increase performance using Squid, or even Apache as a proxy server.  Apache has a module that allows it to act as a proxy, and another module that allows for caching.  Squid has a caching feature also.  This helps to speed up your performance by storing information from frequently visited sites for quicker retrieval.

I haven't had experience with CentOS, but Ubuntu and Fedora are pretty simple to install configure and maintain.  Plus they both have pretty decent online documentation.



0
 

Author Comment

by:darkbluegr
ID: 34365821
thanks stpmt11, as I am not familiar with linux, are there any guides you could point me to for setting up either apache or squid to act as a proxy?

thank you
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Suggested Solutions

Over the last ten+ years I have seen Linux configuration tools come and go. In the early days there was the tried-and-true, all-powerful linuxconf that many thought would remain the one and only Linux configuration tool until the end of times. Well,…
SSH (Secure Shell) - Tips and Tricks As you all know SSH(Secure Shell) is a network protocol, which we use to access/transfer files securely between two networked devices. SSH was actually designed as a replacement for insecure protocols that sen…
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now