Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

CC Proxy or other proxy servers

Posted on 2010-11-30
1
431 Views
Last Modified: 2013-12-06
Hi. Recently I posted a help on ways to set my home Internet PC as a proxy so that when I get vlocked at work when surfing any sites that I can simply connect to my home pc and have the joy of using my access to get to sites I cant at work

An expert told me to try CC Proxy but I tried this, i even chatted to the CC Proxy guy for assistance but I still cannot get this to work

Did someone set this up correctly. If so, can someone add me in so I can try to logon to their proxy and if it works then I will ask you for help to setup my proxy. My aim is to allow all my friends at work to connect to my proxy from their work if they get blocked from using sites like facebook or sites liek hotmail to check their email etc

Please help
0
Comment
Question by:BSTIT
1 Comment
 
LVL 17

Accepted Solution

by:
BudDurland earned 500 total points
ID: 34246873
I know that the firewall we use at work actively monitors for and blocks proxy traffic.  Perhaps your company has something similar, which means you may be out of luck.  You might want to tread carefully -- some company's acceptable use polices make trying to end-run around the proxy a punishable offense.
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
VPS for routing recomendations 3 64
IPv6 and IPv4 Subnetting scheme 4 39
what is mstp 6 29
Windows 10, Hotmail and AdChoices 7 12
Since pre-biblical times, humans have sought ways to keep secrets, and share the secrets selectively.  This article explores the ways PHP can be used to hide and encrypt information.
This article will inform Clients about common and important expectations from the freelancers (Experts) who are looking at your Gig.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

792 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question