X

anoymous

Will you worry about the privacy issue of Silk browser?

The $199 price tag of Kindle Fire is really irresistible. Of course, Amazon need earn money. Some analysts say Amazon will earn back the profit margin in contents. This is absolutely true. But the overlooked (potentially) big earning machine of this cheap tablet is users' browsing data handled by the built-in Silk browser.

Glype

Glype proxy script is a free-to-use, web-based proxy script written in. It is open source, but it is NOT released as GPL or a similar license. Its license requires: either keeping the back link or getting a (paid) license. Glype script has become very popular after PHProxy project ceased. Glype is similar to PHProxy, but there is one fundamental difference: Glype uses curl to retrieve web pages. In addition, compared to PHProxy, Glype has more caching controls. On May 7, 2010, Baron Munchausen, the administrator of Proxy.org announced that he acquired Glype. (source: http://forums.glype.com/news-updates/1286-baron-acquires-glype.html and http://proxy.org/forum/1273292889.html) The official website of Glype is: http://www.glype.com. A live example of Glype is UtopianPal.com. Some tutorials for Glype: How To Install and Configure Glype Proxy Script. http://www.youtube.com/watch?v=aV6TQk3C2c4  

tunneling

Tunneling proxy may have various meanings; but most time, this refers to socks proxy. As the name suggests, socks proxy use sock 4 or 5 protocol, which performs at an intermediate layer between the presentation layer and the transport layer. Socks (tunneling) proxy can be used for any form of TCP or UDP socket connection. This means it can be used for most application software (in addition to http connections), e.g., instant messenger.  

open proxy

Open proxy may have different interpretations, e.g., some geeks deem web-based proxy as open proxy; others may confuse open proxy with unauthentic proxies. Open proxy usually is similar to web-based proxy (e.g., using http protocol), but there are some differences. Web-based proxy retrieves resources for the client, and at the same time some modifications were also made. For example, most web-based proxy scripts rewrite the java script and act as client directly. But most open proxy only fetch the resources and do not make any modifications. Because open proxy uses http protocol for the connections between the client and the proxy server. This makes it different from tunneling, or socks proxy.  

Tutorial 1: How to use secure (https) web proxy

Using secure web proxy through https connections may bypass the monitor of your local ISP. This is a SWF video. This tutorial show you how to use one of the secure web proxy (Utopianpal.com).

web-based proxy

Web-based proxy, some times called web proxy, usually refers to a type of proxy service through web servers. A client connects to the service provider's website (proxy server), then type the web address he/she wants to browse. The proxy server fetches the contents, and passes them to the client. By using web-based proxy, the client may access sites blocked by their local ISP or parents. For example, social networking sites, e.g., myspace and facebook, were blocked in some US and UK schools. The pupils may use web-based proxy to bypass the blocking and access these sites. Similarly, in some countries, the internet is censored for various purposes. Some users in these countries may also use web proxy to access the blocked sites. Some users use web proxy for privacy considerations, and they do not want to disclose their IP info to such untrusted sites. In this case, their info will very likely only be recorded in the proxy server. Web-based proxy usually is powered by a few proxy scrips, including CGIProxy, PHProxy, Glype, Zelune and Surrogafier.

How to make money from your proxy site (Part I)

Most of proxy webmasters are losing money, and eventually out of business. This is the reality. This article introduces you on how to generate revenue to run your proxy successfully. In Part II, some revenue sources will be reviewed and in Part III, a few real cases will be analyzed.

proxy

In WWW world, proxy usually refers to the intermediary that retrieves information from other sources (e.g., websites) for the client. This is sensible when: the client cannot directly connect to the resources, e.g., some ISPs' firewall blocks these resources erratically or deliberately; the client does not want to disclose his/her info (e.g., IP address) to the resources There are different types of proxy: web-based proxy, open proxy and tunneling.