Download SURROGAFIER PROXY SCRIPT for free

SURROGAFIER PROXY SCRIPT

Surrogafier is another proxy script which is similar to PHProxy. The script only include one php file.The script is not very popular among  proxy webmasters. The initial release (0.7.4.1.b) date was January 9, 2006, and there has been no update since May 6, 2006 (Version 1.0-rc3), reported by the project website.

Surrogafier is a PHP proxy script which is easy to Setup on your server and provides a level 3 web proxy.

Features include: the ability to remove cookies, the HTTP referer field, the HTTP user-agent field, scripts on the page, and objects, altering the user-agent string to whatever you please, and tunnelling your proxied traffic through a second proxy.

Download Surrogafier Proxy


Download PHPROXY SCRIPT For free

Here You will find all the latest free proxy scripts for you to download for free !

PHPROXY SCRIPT

PHP  Proxy is a php script Developed  by Abdullah Arif for taking webpages from one server and processes so that your main server is protected/hidden. Useful for those who have or require indirect access to the web and or their server.

Advantages:

Completely free to use
Setup in minutes, just upload the files to your server and its ready to use
Has lots of Free themes available  on the internet and free Hacks to add more functionaltiy to this script

Disadvantages:


Uses  a lot of bandwidth
Cant login to certain websites/Unable to Show youtube videos Unless you fix it (there is freely available mod that you can use to fix this issue )

Download Phproxy

Some Risks of using anonymous proxy servers

By using a proxy server (for example, anonymizing HTTP proxy), all data sent to the input (eg, the HTTP server on a website) must pass through the proxy server before being sent to the service, mostly in the form encrypted. It is therefore a possible risk that a malicious proxy server can record everything sent: including unencrypted logins and passwords.

By chaining proxies which do not reveal data on the original applicant, it is possible to hide the activities of the user’s eye target. However, more traces are left on the intermediate hops, which can be used or to track user activities. If the policies and administrators of these references do not know each other, the user can fall victim to a false sense of security because the details are in sight and mind.

The conclusion of this is to be wary when using anonymous proxies, and only use proxy servers of known integrity (eg, the owner is known and trusted, has a clear privacy policy, etc.) and never use proxy servers of unknown integrity. If there is no alternative but to use unknown proxy servers, do not pass any private information through the proxy, even if the connection is believed to be encrypted, there are techniques to intercept both TLS and SSL encrypted connections.

As is more of an inconvenience than a risk, proxy users may be blocked from certain Web sites, as numerous forums and Web sites block IP addresses from proxies known to spam or controlled site.

What is a Content filter

Many schools,workplaces, and colleges  restrict websites and online services that they provide. This is done with a specialized proxy, called a content filter (both commercial and free products available), or by a cache-extension protocol such as ICAP, which allows the plug-in extensions to a storage architecture cached open.

Applications submitted to the open internet must first pass through a proxy filter output. Web filtering company offers a database of URL patterns (regular expressions) with associated content attributes. This database is updated weekly by subscription throughout the site, such as a virus filter subscription. The administrator instructs the web filter to ban broad categories of content (such as sports, pornography, online shopping, gambling, or social networking). Requests that match a banned URL pattern are rejected immediately.

Assuming the requested URL is acceptable, the content is brought by the proxy. At this point a dynamic filter may be applied on the return path. For example, JPEG files may be blocked based on Fleshtones parties or dynamically filters the language could detect the language. If the content is rejected an HTTP error is returned to seek and nothing is cached.

Most web filtering companies use a robot to crawl the Internet to scale that assesses the probability that a content is a certain type (ie “This content is 70% chance of porn, 40% chance sports, and 30% chance of news “could be the result for a website). The resulting database are corrected by manual labor based on complaints or known flaws in the content matching algorithms.

Filtering Web proxies are not capable of looking inside Secure Sockets HTTP transactions, assuming the trust chain of SSL / TLS has been handled. As a result, users who wish to avoid web filtering normally search the internet for an open and anonymous HTTPS transparent proxy. Next, set your browser to proxy all requests through the Web filter to this anonymous proxy. These applications will be encrypted with https. Web Filter can not distinguish these transactions from, say, a legitimate access to a personal finance website. Thus, content filters are only effective against unsophisticated users.

As mentioned above, / TLS SSL chain-of-trust is based on trusted root certificate authorities, working in an environment where the customer is managed by the organization, trust can be given to a root certificate which public key is known by the proxy. In particular, a root certificate generated by the proxy is installed in the form of lists of CA by the IT staff. In such scenarios, the analysis of proxy for the contents of an SSL / TLS transaction is possible. The proxy is effective functioning of an attack “man-in-the-middle, allowed by customer trust a root certificate has representation.

A special case of web proxies are “CGI proxies.” These are websites that allow a user to access a site through them. Usually use PHP or CGI to implement the proxy functionality. These types of proxy servers are often used to access web sites blocked by corporate or school proxies. Since it also hides the user’s own IP address for web sites that access via the proxy, it is sometimes used to gain a degree of anonymity, called “Proxy Prevention.”

Tunneling proxy server

A tunneling proxy server is a method of overcoming blocking policies carried out using proxy servers. Most tunneling proxy servers are also proxy servers, of varying degrees of sophistication, which efficaciously go through “bypass policies”.

A tunneling proxy server is a web-based page that takes a site that is blocked and “tunnels” it, allowing the user to view blocked pages. A famous example is elgooG, which allowed users in China to use Google after it had been blocked there. elgooG differs from most tunneling proxy servers in that it outsmarts only one block.

A September 2007 report from Citizen Lab recommended Web based proxies Proxify, StupidCensorship, and CGIProxy. Alternatively, users could partner with individuals outside the censored network running Psiphon or Peacefire/tunneling proxy server. A more elaborate approach suggested was to run free tunneling software such as FreeGate, or pay services Anonymizer and Ghost Surf. Also listed were free application tunneling software Gpass and HTTP Tunnel, and pay application software Relakks and Guardster. Lastly, anonymous communication networks JAP ANON, Tor, and I2P offer a range of possibilities for secure publication and browsing.

Other alternatives include Garden and GTunnel by Garden Networks

Students are able to access blocked sites (games, chatrooms, messenger, offensive material, internet pornography, social networking, etc.) through a tunneling proxy server,although now most of the reputed proxy sites are banning offensive material to be browse through their servers. As fast as the filtering software blocks tunneling proxy servers, others spring up. However, in some cases the filter may still intercept traffic to the tunneling proxy server, thus the person who handles the filter can still see the sites that are being visited.

Tunneling proxy servers are also used by people who have been blocked from a web site.

Another use of a tunneling proxy server is to allow access to country-specific services, so that Internet users from other countries may also make use of them. An example is country-restricted reproduction of media and webcasting.

The use of tunneling proxy servers is usually safe with the exception that tunneling proxy server sites run by an untrusted third party can be run with hidden intentions, such as collecting personal information, and as a result users are typically advised against running personal data such as credit card numbers or passwords through a tunneling proxy server.

In some network configurations, clients attempting to access the proxy server are given different levels of access privilege on the grounds of their computer location or even the MAC address of the network card. However, if one has access to a system with higher access rights, one could use that system as a proxy server for which the other clients use to access the original proxy server, consequently altering their access privileges.

What is Reverse proxy?

Reverse proxy is a proxy server that is installed on a network server. Typically, reverse proxies are used in front of Web servers. All connections from the Internet addressed to one web server are made through the proxy server, which can cope with the request itself or pass the request wholly or partially to the main web server.

A reverse proxy in network traffic offices bound for a set of servers, presenting a single interface for the caller. For example, a reverse proxy can be used to load balance a Web server cluster. By contrast, a forward proxy acts as a proxy for traffic outside the enclosure. For example, an ISP can use a forward proxy for HTTP traffic of their clients to external web servers on the Internet, but can also cache the results to improve performance.

There are several reasons for installing reverse proxy servers:

Security: the proxy server can provide an additional layer of defense by the separation or masking the type of server that is behind the reverse proxy. This configuration can protect servers further up the chain – mainly through obfuscation.
* Encryption / SSL acceleration: when secure websites are created, the SSL encryption is often not done by the Web server itself, but by a reverse proxy that is equipped with SSL acceleration hardware or software.
* Load distribution: the reverse proxy can distribute the load of several servers, each server serving its own application area. For the quarter reverse proxy Web server, the reverse proxy may need to rewrite the URLs in each webpage (translation from externally known URLs to the locations inside).
* Caching: A reverse proxy can download web servers, caching static content like images, and dynamic content, such as an HTML page delivered by a content management system. Such proxy caches can often satisfy a considerable amount of web page requests, greatly reducing the burden on the central web server, another term is Web Accelerator. This technique is also used for the Wikipedia servers.
* Compression: the proxy server can optimize and compress the content to speed up the loading time.
* Spoon feeding: a dynamically generated page can occur once and serves the reverse proxy, which can give the client a little at a time. The program that generates the page is not required to remain open and tie server resources for as long as possible to extend the client requires to complete the transfer.

What is Open Proxy, Open Proxy in Detail

What is Open Proxy?

An open proxy is a proxy server that is accessible by anyone on the Internet. Usually, a proxy server allows users within a network group to store and forward internet services such as DNS or web pages to reduce and control the bandwidth used by the group. With an open proxy, however, any Internet user can use this forwarding service.

What are the Advantages of Open Proxy.

open proxies allow a user to hide your IP address from the access service, as it is possible to use other equipment in order to hide one’s identity and / or location. This is sometimes used to abuse or disrupt the access service, which could violate their terms of service or some laws, open proxies, so often seen as a problem. However, anonymous open proxies increase the user’s anonymity or security when browsing the Web or use other Internet services: the real IP address of a user can be used to help deduce information about that user as part of an attempt crack team. Furthermore, open proxies can be used to circumvent efforts at Internet censorship by governments or organizations. Several websites offer constantly updated lists of open proxies.

Some Disadvantages of using Open Proxy

It is possible for a computer to function as an open proxy server without the computer owner knowing. This may be due to misconfiguration of proxy software running on your computer, or infection with malware (viruses, trojans or worms) designed for this purpose. If it is caused by malware, the infected computer is known as a zombie computer.

There are hundreds of thousands of open proxies online. This is rarely a matter of misconfiguration, in most cases an open proxy is unknown to the owner of the server. Using an open proxy can be legally dangerous: the current law in Germany, for example, makes it illegal to access a computer or network without the owner’s knowledge, even if the proxy is not password protected.There no reason to run a clean open proxy for an organization, so any open proxy is suspect. The main sign of an open proxy is the legal fact that the connection is not anonymous.

Running an open proxy is a high risk to the server operator, providing an anonymous proxy server can cause real legal problems for the owner. These services are often used to disrupt foreign computer systems, usually consumed through proxies, and illegal content is likely to occur through such intermediaries. Also, as a proxy may cause the use of a high-bandwidth, resulting in increased latency to the subnet and the violation of the limits of bandwidth. A wrongly configured proxy can allow open access to a private subnet or DMZ: This is a high security concern for any company or home network, because the teams that normally are out of danger or firewall can be directly attacked.

Many open proxies very slowly, sometimes below 14.4 kbit / s, or even below 300 bits / s, while other times the speed can vary from fast to slow every minute. Some, such as PlanetLab proxies, run faster and deliberately created for public use.

Because open proxies are often implicated in the abuses, a number of methods have been developed to detect and to refuse service to them. IRC networks with strict usage policies automatically test client systems for known types of open proxies. Similarly, a mail server can be configured to automatically test mail senders for open proxies, using software such as ProxyChecker. Increasingly, mail servers are configured in the box to consult various DNSBL servers to block spam, some of the DNSBLs also list open proxies

Legal Issues

Some governments are particular about the types of sites people visit  e.g Great Firewall of China, which often employ followers who scan IPs recovery of the sources of proxy, and those that appear in the scan has been flagged for a reviewer to live to see what the user sees proxy, so depending on the sites you visit, I could get a visit from his local agency law enforcement for investigation.

Suffix proxy Explained

Suffix proxy server allows the user to access web content by adding the proxy server name to the URL of the requested content (eg, “proxville.com.6a.nl).

Suffix proxy servers are easier to use than regular proxy servers. The concept appeared in 2003 in the form of IPv6Gate and 2004 in the form of the distribution of Coral content network, but the suffix proxy term was coined only in October 2008 for “6a.nl”

Forced proxy

The term “forced proxy” is equivocal. This means both “intercepting proxy” because it filters all traffic on the gateway is only available to Internet and its exact opposite, “non-intercepting proxy” (because the user is forced to configure a proxy to access the Internet) .

Forced proxy operation is sometimes necessary due to problems with the interception of TCP connections and HTTP. For example, the interception of HTTP requests can affect the usability of a proxy cache can greatly affect certain authentication mechanisms. This is mainly because the client thinks he is talking to a server, so request headers required by an agent can not be distinguished from headers that may be required by an upstream server (esp authorization headers). Also the HTTP specification prohibits caching of responses to the request contained an authorization header.

Transparent and non-transparent proxy server

Transparent proxy is most often used incorrectly to mean “intercepting proxy” (because the client does not need to configure a proxy and you can not directly detect that its requests are being proxy). Transparent proxies can be implemented using Cisco’s WCCP (Web Cache Control Protocol). This protocol owner resides in the router and is configured from the cache, allowing the cache to determine what ports and traffic is sent via transparent redirection from the router. This redirection can occur in one of two ways: GRE tunnel rewrites (OSI Layer 3) or MAC (OSI layer 2).

“Transparent Proxy ‘A’ is a proxy that modifies the request or response beyond what is required for proxy authentication and identification.”
“Non-transparent proxy ‘A’ is a proxy that modifies the request or response in order to provide some added service to the user application, such as group annotation services, the transformation of media type, protocol reduction, or anonymity “filtering.

A security flaw in the way they operate transparent proxies was published in 2009 by Robert Auger and advisory by the Computer Emergency Response Team was published list of dozens of affected transparent, and intercepting proxy servers.