Solved

Glype software

Posted on 2012-04-09
5
779 Views
Last Modified: 2012-08-13
Hi experts,

I need to bypass the company firewall and i found Glype. Please let me know what it is used for and how it works. I do understood that i have to install it on a host server, which i did, but from here i have no idea. Ive asked at Glype official forum but i got no answer.

Many thanks in advance.

Regards,
Raul M.
0
Comment
Question by:raulmonda
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
5 Comments
 
LVL 9

Expert Comment

by:wasiftoor
ID: 37823160
Well there are a few steps to take care of with any proxy server:

- Make sure that you have the proxy server hosted outside the company firewall.
- Make sure that the proxy server has a static ip or you can use a dynamic dns server like no-ip.
- Test proxy redirection by adding the proxy server references in your browser. For IE that is under tools, Internet options, Connections, LAN settings.

This should hopefully work. Good Luck!
0
 

Author Comment

by:raulmonda
ID: 37823170
I did all of those and nothing. how its used glype? a short example if you can please.
0
 
LVL 9

Accepted Solution

by:
wasiftoor earned 500 total points
ID: 37823210
Try this short tutorial on how to install and configure Glype Proxy Script

http://www.youtube.com/watch?v=aV6TQk3C2c4
0
 

Author Comment

by:raulmonda
ID: 37823249
thanks for the link. I do have installed Glype on an external server. What it is used for? i know its a weird question.
0
 

Author Closing Comment

by:raulmonda
ID: 37823408
thanks
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
IP Jumping 6 73
line utilization 4 29
CISCO WIFI 6 73
why Remotely access to security camera (DVR Model DVST PST960H-16) fails  recently. 5 30
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
For many of us, the  holiday season kindles the natural urge to give back to our friends, family members and communities. While it's easy for friends to notice the impact of such deeds, understanding the contributions of businesses and enterprises i…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question