[Agent knowledge] definitely worth it!

Source: Internet
Author: User

I. Anonymity of HTTP Proxy
This is a proxy that hides the original users IP address and other details from the remote server. this proxy hides the IP address of the original user and other details (possibly, but not required) from the remote server ).
HTTP Proxy anonymity refers to the direct use of time-based anonymous security without technical means. (Note: The meaning of anonymity here is different from that of other FTP servers. Whether anonymous or not, the proxy server can act as a "proxy. Only anonymous proxy can ensure that the accessed party cannot trace back to the source IP address, which is more secure to a certain extent. This is not an important indicator. If it is necessary, the benevolent and wise see wisdom .)
Test whether your http proxy is anonymous, simple method: access the http://cpcug.org/scripts/env.cgi, first look at the "REMOTE_ADDR" display ip, if not your own ip, it means that the proxy server is working. Check "HTTP_X_FORWARDED_FOR" again. If yes, your ip address is displayed as a non-anonymous proxy. If not displayed, it is an anonymous proxy. (Tips: Check "HTTP_USER_AGENT" and "HTTP_ACCEPT_LANGUAGE" to see how much security your proxy provides .)

Ii. http connect Proxy
Many people have some misunderstandings about HTTP proxy. It is worth noting that not all HTTP proxies can only proxy HTTP, vice versa!
The http connect Proxy Server is a proxy server that allows users to establish TCP connections to any port. This means that this proxy can be used not only for HTTP, but also for FTP, IRC, and RM Stream Services, and even scan and attack.

Iii. Differences between the three proxies
· Anonymous proxy does not change your request fields, making the server look like a real client browser is accessing it. Of course, your real IP address is hidden. The server's network management does not think you are using a proxy.
· Normal anonymous proxy can hide your real IP address, but it will change your request fields. It may be considered as using a proxy, but it is only possible. Generally, it is okay. But do not be misled by its name. Its security may be higher than that of all anonymous proxies. Some proxies may strip some of your information (like the stealth mode of the firewall ), this prevents the server from detecting your operating system version and browser version.
· The transparent proxy (simple proxy) adapts your request fields and delivers the real IP Address

Stepping Stone is a program. It can also be called a S5 proxy application.
* Connect to the remote machine from the local machine and use the agent springboard installed in the middle. For an application, it is equivalent to a common sock proxy call.
* Data transmitted between springboards has been dynamically encrypted. Encryption seed is different each time.
* The number of springboards ranges from 1 to 255. If the number is 0, it is equivalent to the Sock5 proxy server.

Meaning of proxy format
Take 10.48.72.2: 80 @ HTTP $6 & 263,1987, 2543 # Harbin as an Example

10.48.72.2 indicates that the IP address of the proxy server is 10.48.72.2.
: 80 ":" indicates that the Service port of the proxy server is 80 (21, 23, 80, 81, 1080, 3128, 8080, etc)
@ HTTP "@" indicates that the proxy server type is HTTP proxy (HTTP, FTP, SOCKS4/5, TELNET)
The value after $ "indicates the proxy server verification status
$4: verifying
$5: verification timeout (the network connection is too slow. You will find it when you verify it multiple times)
$6: Free (this is what we want ^. ^)
$7: Password required (you can use demo/demo, guest/gues, temp/temp, share/ahare, and test/test as the password/password)
$8: non-conforming Protocol
$9: mismatch (this can happen if the proxy server is too busy)
$10: Unsupported protocols
$11: uncertain
The three values separated by "." after "&" are the three time characteristics that reflect the local connection of the proxy.
The first is the response speed, the second is the verification time, and the third is the connection time;
So of course, the smaller the value, the faster the proxy is.
# The comment proxy is Harbin (custom)
Proxy service Q &!

How does one use the address of the secondary proxy server?

Re: 1. download a sockscap32, and fill in the socks proxy server address in the settings.
2. Fill in the path of the browser
3. Start sockscap32
4. Enter the address of the foreign proxy server in the browser.


⒉ How does zmud use a proxy server?

Re: If zmud4.62 is used, you can only use nicky. However, if zmud5.x is used, you can use socks to play with mud. In the menu of zmud5.x: view-> prefeerences-> directories -- (the one on the top)-> connection-> proxy firewall, you can also set telnet proxy.


How does one set the RealPlay proxy for the consumer?

Re: If you have a very useful socks5 proxy, you can use it with the sockscap software. You don't need to set it in realplayer. I have implemented it like this. In addition, it is set to use http proxy, as if some of them are acceptable. Not all overseas broadcast Sites support the same.


⒋ Socks4 and socks5 proxies have similarities and differences. Can they be used in common?

Re: The socks4 proxy only supports the TCP protocol. The socks5 Proxy also supports TCP and UDP protocols. It also supports various authentication mechanisms and server-side domain name resolution. Socks4 can work on both socks5 and vice versa. For example, ICQ can only use socks5 proxy, while ftp can use socks4 and socks5.
When you use NetAnts to download something, if you download something on ftp, you 'd better use the ftp Proxy. Although many http proxies also support the so-called FTP Gateway function, they generally cannot be resumed, if you cannot resume data transfer, you cannot use the multi-point simultaneous transmission feature of ant Financial. Ph3 supports searching for ftp proxies, but there are few such proxies. SOCKS proxy is easy to use with sockscap software.


What is "scheduling" after the routing address?

Re: add to the Proxy Automatic scheduling list. If you enable the automatic scheduling function and set the browser's proxy server to the local machine, you can perform automatic scheduling.


How can I use the explain Socket? Is it a socks proxy?

Re: This is a TCP-based proxy. In principle, all TCP-based network programs can use it, especially after socks proxy client programs such as sockscap are used, you do not need to set a proxy in the network software. sockscap automatically switches Network Communication to the socks proxy. Those network programs do not know that they are accessing through the proxy.


Could you tell me how to set up a proxy for ftp downloads outside China?

Re: If you have a fast and stable HTTP proxy, you can also use it to download FTP software. Generally, HTTP Proxy supports the FTP GateWay function and can process such as GET requests. Try NetVampire (network vampire) and select an http proxy when downloading the ftp software.


There are so many steps of routing too much trouble. Can I add a shortcut in version 3.0 to set both the proxy address and port?

Re: You can use the proxy scheduling function, that is, use the proxy hunter as the intermediate proxy server. Set the proxy address of the browser to 127.0.0.1 on the local machine and port to 8080 (consistent with the proxy scheduling settings in the proxy Hunter ). Then select the proxy to use in the proxy Hunter (the status must be free), right-click and select "use.


Why is the speed of the education network slow?

Re: Yes, our agents are generally on ChinaNet, and the channel between CERNET and ChinaNet is said to be only 2 Mbps (256 K/s), even if it is not just that, there is not much difference. However, the access frequency between CERNET and ChinaNet can be imagined, so traffic is often congested during peak hours. In addition, the proxy speed does have some relationship with the region, but the network region is not necessarily the same as the geographical region. Use tracert to see which routes you and the proxy are going through and where the bottleneck is. The automatic scheduling function is indeed not complete yet. I am improving it, but the scheduling policy is difficult to determine because the agent speed is unstable and the same agent has different speeds for different sites.


When I use dial-up internet access (not 163, 169) to access the internet, how can I connect to the proxy server to watch some websites (such as members.xoom.com )?

Re: use proxy hunter to search for the IP address you can access.


In "parameter settings", is the page feature string in "Search verification Settings" required?

Re: use IE to enter the homepage of the website to be verified. The content displayed in the Blue status bar on the top is the page feature string. you don't need to write it all. Just write the first few letters or Chinese characters. for example: Verify Netease 163 Post Office: http://www.163.net/can fill in: Welcome to 163.net is not very simple?


Version 3.0 does not seem to have the same results. If the same results are imported 2nd times, they will be accumulated. (There is no DEL for each of the above issues ). Unadjacent results are deleted once.

Re: Please study it carefully, for example, isn't there a "avoid repeated import results" option box in the open file dialog box during import (it took me 20 minutes to know how to change "open in read-only mode" what about this, i'm depressed because I don't know it. The reason for this is that some people want to import tens of thousands of results. If you want to import and check whether there are duplicates, if you do not check duplicate results during import, use the simplified result function after import. check the checkbox of "check duplicate results" in the simplified result dialog box, you can merge repeated items, which is much faster ). Hello! Who says it cannot be checked? Press the Shift or ctrl key on the keyboard to check the results. This is the standard check method for the Windows list box. Do you know this? In addition, you can drag and drop the tasks in the task box to adjust the sequence. The proxy server in the proxy scheduling list can also adjust the sequence as follows; in the proxy scheduling task list, you can drag a task to a server in the server list to change the proxy.


Token has been initially used, and there are three small problems. I. It seems that 3.0 of data is continuously transferred in the background. What is it?

Re: Have you enabled the Ping option? If yes, the ping is ongoing.


What do you mean by the time feature of timeline?

Re: the first is the connection time, the second is the time when the data is received for the first time, and the third is the total verification time.


Can you tell me how to use the Agent Hunter?

Re: Okay. Let's just talk about it. I don't need to talk about adding tasks. This part has been done very early, so it is very detailed and explained. It seems that you have not raised any questions. Most of the questions are about the verification data settings. I am so depressed that I have spent so long as the Agent Hunter does not know the verification data and whether it is important to verify accuracy! Previous versions of help have explained this (Hey! The comrade should not bow his head to looking for bricks, but also look for a big heart ). Okay, no worries. Setting

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.