<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Proxy Stash &#187; Tips</title>
	<atom:link href="/category/tips/feed" rel="self" type="application/rss+xml" />
	<link>http://proxystash.org</link>
	<description>Proxy Blog</description>
	<lastBuildDate>Fri, 19 Aug 2011 08:06:08 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.2.8</generator>
	<item>
		<title>Choosing a Domain For Your Proxy Site</title>
		<link>http://proxystash.org/choosing-a-domain-for-your-proxy-site.html</link>
		<comments>http://proxystash.org/choosing-a-domain-for-your-proxy-site.html#comments</comments>
		<pubDate>Tue, 06 Jan 2009 05:44:48 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Tips]]></category>
		<category><![CDATA[Proxy Domains]]></category>

		<guid isPermaLink="false">http://proxystash.org/?p=32</guid>
		<description><![CDATA[Choosing a domain for your proxy web site will be very important. There are three primary trains of thought when it comes to picking a proxy domain. The first one is to choose a domain name that is brandable. You want to pick something that is memorable. This is more professional and it’s easier for [&#8230;]]]></description>
				<content:encoded><![CDATA[<p><img class="alignleft" title="Domain for proxy" src="http://img143.imageshack.us/img143/6091/domainnametu5.gif" alt="" width="376" height="343" />Choosing a domain for your proxy web site will be very important. There are three primary trains of thought when it comes to picking a proxy domain. The first one is to choose a domain name that is <strong>brandable</strong>. You want to pick something that is <strong>memorable</strong>. This is more professional and it’s easier for people to remember. Therefore, they won’t have to bookmark your site to be able to come back and visit you, they will simply remember the name. A proxy site that seems professional is more likely to be passed on and recommended to other people. So in effect, it is more potentially viral.</p>
<p>The second train of thought is to simply use <strong>old domains</strong> that you have. Many times these are unpronounceable or they are not easy to remember. Now, if you are just looking to make a few bucks from Adsense and you don’t care about the long-term success of your proxy site, then this may be fine.</p>
<p>The third train of thought is to go cheap and just a purchase <strong>info domains</strong>. These are the <strong>least expensive</strong> and you can grab a lot of them. So if you want to create proxies in bulk, this is a good option.</p>
<p>Remember, certain networks block the words like “proxy”, “proxies” &#8211; so be careful</p>
]]></content:encoded>
			<wfw:commentRss>http://proxystash.org/choosing-a-domain-for-your-proxy-site.html/feed</wfw:commentRss>
		<slash:comments>4</slash:comments>
		</item>
		<item>
		<title>Proxy Software</title>
		<link>http://proxystash.org/proxy-software.html</link>
		<comments>http://proxystash.org/proxy-software.html#comments</comments>
		<pubDate>Fri, 02 Jan 2009 18:00:00 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Scripts]]></category>
		<category><![CDATA[Tips]]></category>
		<category><![CDATA[CGIProxy]]></category>
		<category><![CDATA[Glype]]></category>
		<category><![CDATA[PHProxy]]></category>
		<category><![CDATA[Proxy Scripts]]></category>
		<category><![CDATA[Proxy Software]]></category>
		<category><![CDATA[Zelune]]></category>

		<guid isPermaLink="false">http://proxystash.org/?p=17</guid>
		<description><![CDATA[Previously we talked about the method to create a proxy site without much discussing about a proxy script. So here is the tutorial regarding proxy scripts alone. Now first of all I will explain you What is a Script ? &#8211; Scripts are readymade file packages made for creating a website. There is no need [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Previously we talked about the method to create a proxy site without much discussing about a proxy script. So here is the tutorial regarding proxy scripts alone.</p>
<p>Now first of all I will explain you <strong>What is a Script ? </strong>&#8211; Scripts are readymade file packages made for creating a website. There is no need to create different webpages and edit them. Such scripts help you manage your site with a backend which only administrator or website owner sees. You can control your website from a backend admin panel. You just need to download the script, upload on your host, visit the install page, follow the onscreen instructions and you get a website within seconds. <img class="wp-smiley" src="http://www.proxyblog.org/wp-includes/images/smilies/icon_surprised.gif" alt=":eek:" /> This is how scripts work. If you have a cpanel hosting with fantastico feature, there is no need to upload scripts on your host, just with few clicks you can create a website. E.g. of various scripts are WordPress, phpads, joomla etc.</p>
<p>There are plenty of proxy scripts available like <strong>PHProxy</strong>, <strong>CGIProxy</strong>, <strong>Zelune</strong>, <strong>Glype</strong>, but the two most popular proxy software on the Internet are PHPoxy and CGIProxy.</p>
<h3>PHProxy</h3>
<p><a rel="nofollow" href="http://whitefyre.com/poxy/" target="_blank">PHProxy</a> offers a lot more customizability and offers a lot more than CGIProxy but the anonymity is not as good.</p>
<p>Here are the available options whilst using PHProxy:</p>
<ul>
<li>Includes a mini URL-form on every HTML page</li>
<li>Remove client-side scripting (i.e. JavaScript)</li>
<li>Accept HTTP cookies</li>
<li>Show images</li>
<li>Show referring website in HTTP headers</li>
<li>Use rotate13 encoding on the URL</li>
<li>Use base64 encoding on the URL</li>
<li>Strip meta HTML tags</li>
<li>Strip Website title</li>
<li>Store cookies for this session only</li>
<li>Open URL in a new window</li>
</ul>
<p>Some PHProxy instances may have been customized after the installation; these are just the default options. This is most probably all that one would need but by editing some of these abilities (e.g. enabling Client-Side Scripting), you will reduce anonymity and your original IP address will be viewable.</p>
<p>I will be giving review of all other proxy scripts in the coming articles, so be sure to check them out.</p>
]]></content:encoded>
			<wfw:commentRss>http://proxystash.org/proxy-software.html/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>How to Unlock Myspace</title>
		<link>http://proxystash.org/how-to-unlock-myspace.html</link>
		<comments>http://proxystash.org/how-to-unlock-myspace.html#comments</comments>
		<pubDate>Mon, 29 Dec 2008 09:22:40 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Tips]]></category>
		<category><![CDATA[Tutorials]]></category>
		<category><![CDATA[Myspace Proxy]]></category>
		<category><![CDATA[Unlock Myspace]]></category>

		<guid isPermaLink="false">http://proxystash.org/?p=22</guid>
		<description><![CDATA[The World Wide Web has been a tool not only for research, but also for connecting people all over the world. Nowadays, e-mails are a bit old. The more modern form of communication is through messenger applications (e.g. Yahoo Messenger) and of course the &#8220;In&#8221; thing today would be websites such as Friendster, Facebook, MySpace, [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>The World Wide Web has been a tool not only for research, but also for connecting people all over the world. Nowadays, e-mails are a bit old. The more modern form of communication is through messenger applications (e.g. Yahoo Messenger) and of course the &#8220;In&#8221; thing today would be websites such as Friendster, Facebook, MySpace, and many more. What these websites do is to allow web pages or profile pages for every member so that friends, family, colleagues, etc. can be connected.</p>
<p>For most people, MySpace is the most popular social networking site where a lot of people can get to know a person better with the blogs created, the profile descriptions, etc. People of all ages, from the students up to the elderly have MySpace accounts and they do enjoy visiting and updating their pages from time to time. As a result, schools, offices and even some homes have blocked MySpace because of they think that this website will be a distraction to students, and workers, and may even be a way for the PC to acquire viruses from the file sharing feature that is one of the many features of the site. MySpace also contains sexual material that parents need to protect their kids from and will also be a definite distraction to people at work who would just choose to unlock the site instead of focusing on work.</p>
<p>Due to MySpace being blocked, a number of techie people have come up with ways to still have access to unlock MySpace and have shared it with people who love MySpace. People can now easily access MySpace through bypassing a firewall, and also through the more famous method of using a proxy site. You can use these proxies:</p>
<p><a title="Unlock myspace" href="http://www.blingyproxy.com" target="_blank">BlingyProxy.com</a></p>
<p>A proxy site is just a mirror of a website so you can check out a certain website without actually going into the real website. Meaning, you don&#8217;t need to type the URL: http://www.myspace.com into the browser. Instead, you can type the proxy site URL into the browser, and once you are in that proxy site, you have to type the URL of the web site you want to visit in the field provided, and then you are in! You will find yourself able to see the MySpace contents without actually being inside MySpace. However, do not share your newly found proxy site to everyone because the school server or work server would be able to detect the proxy site if a lot of people are using it. Hence, the proxy site will be blocked as well.</p>
<p>Users of these proxy sites should know though that there are risks in these methods. For one, if you get caught by the IT department of your workplace, or school, you will often get suspended from the network. Another thing to remember is that some of the proxy sites will have access to your information and may use it in negative ways. The safest way to access MySpace is still in your own home, at the right place, and at the right time.</p>
]]></content:encoded>
			<wfw:commentRss>http://proxystash.org/how-to-unlock-myspace.html/feed</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>What is Anonymous Surfing?</title>
		<link>http://proxystash.org/what-is-anonymous-surfing.html</link>
		<comments>http://proxystash.org/what-is-anonymous-surfing.html#comments</comments>
		<pubDate>Fri, 26 Dec 2008 06:47:15 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Tips]]></category>
		<category><![CDATA[Advantages of Proxy]]></category>
		<category><![CDATA[Anonymous Surfing]]></category>
		<category><![CDATA[Disadvantages of Proxy]]></category>
		<category><![CDATA[Proxy]]></category>

		<guid isPermaLink="false">http://proxystash.org/?p=20</guid>
		<description><![CDATA[Anonymous browsing is simply browsing the World Wide Web with most of your identity hidden. This is primarily done through what is known as an anonymous browser based proxy. These are the websites that you can use to input the address of the web page that you wish to visit, and the service will take [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Anonymous browsing is simply browsing the World Wide Web with most of your identity hidden. This is primarily done through what is known as an anonymous browser based proxy. These are the websites that you can use to input the address of the web page that you wish to visit, and the service will take you to that website with information such as the location of your computer and the IP address hidden from the web page. For example, when the user tries to access something on a certain part of the web, the proxy will talk to that file as an ambassador of the user, maintaining the privacy of the user. The practice of anonymous browsing can also maintain the privacy of the user from potential loggers spying on the user&#8217;s connection.</p>
<h2>Effectiveness of Anonymous Browsing</h2>
<p>As anonymous browsing also lets the user bypass restrictions placed in the Internet Connections such as a simple firewall, it is a widely used technique. It is especially often used in schools and offices where there are heavy restrictions on web pages that are and are not accessible. Students will anonymously browse to gain access to social networking websites blocked by the school&#8217;s tech office, which deemed the sites as harmful to the students. Office workers will also anonymously browse as this can help them bypass the restrictions set by the employers, or to not leave behind any tracks in case that the employers are monitoring their Internet usage.</p>
<h2>Risks With Anonymous Browsing</h2>
<p>Although anonymous browsing seems to be the solution to complete anonymity, it can potentially be harmful. This is because by the user anonymously browsing, they are using an anonymous proxy, which does not encrypt data when it is sent to the proxy server. Thus, important information such as logins, passwords, and credit card numbers could potentially be recorded and leaked by a proxy server administrator who has malicious plans. Users that are constantly looking to anonymously browse could also fall into Internet traps where web pages display a wrong security measure, which the user might believe and give out too much information. This could lead to an even greater disaster than non-anonymous browsing, as the proxy server itself and any proxy chains attached to that proxy server can see all of that user&#8217;s information.</p>
<h2>Features to Look For in a Web Proxy Service for Anonymous Surfing</h2>
<p>A good web proxy service will setup a TLS or SSL tunnel with the anonymous surfer. This will prevent network sniffers from eavesdropping on the person who is anonymous surfing.</p>
<p>Some proxy servers support FTP, while others only support HTTP. Some, but not all, anonymous proxy servers support HTTPS. Make sure to select an anonymous proxy server which support the protocols you want to use.</p>
<p>In addition to hiding your IP address, an anonymous proxy server will typically remove traffic such as:</p>
<p>* Cookies<br />
* Scripts<br />
* Pop-ups<br />
* Banners<br />
* Referrer information</p>
<p>These options should be configurable by the end-user to enable to proxy server to work with web sites which require cookies or pop-ups.</p>
<h2>Web Proxy Services for Anonymous Surfing</h2>
<p>Anonymous web proxy services tend to be somewhat unstable, the list of current anonymous web proxy services changes constantly. In addition, some anonymous web proxy services are free services and others are not. Most of the current proxy services offer some version of limited free service, and then try to upsell you to a monthly subscription.</p>
<p>Anonymous browsing is a very easy way to browse without needing to worry too much about information such as the IP address being released publicly. Nonetheless, it is critical to double check whether a certain anonymous browsing service is honorable or not to prevent any, potentially even worse, disasters from occurring.</p>
]]></content:encoded>
			<wfw:commentRss>http://proxystash.org/what-is-anonymous-surfing.html/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Why Use A Proxy?</title>
		<link>http://proxystash.org/why-use-a-proxy.html</link>
		<comments>http://proxystash.org/why-use-a-proxy.html#comments</comments>
		<pubDate>Wed, 24 Dec 2008 06:42:36 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Tips]]></category>
		<category><![CDATA[Facebook proxy]]></category>
		<category><![CDATA[Myspace Proxy]]></category>
		<category><![CDATA[Proxy articles]]></category>
		<category><![CDATA[Why use a proxy]]></category>

		<guid isPermaLink="false">http://proxystash.org/?p=10</guid>
		<description><![CDATA[One of the legitimate uses of a proxy site is to get around blocked content that may contain one or two words that the filter has identified as inappropriate for viewing. Many companies make use of filters to limit the ability of employees to spend time looking at web pages that are not related to [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>One of the legitimate uses of a proxy site is to get around blocked content that may contain one or two words that the filter has identified as inappropriate for viewing. Many companies make use of filters to limit the ability of employees to spend time looking at web pages that are not related to job functions in some manner. This is usually accomplished with the use of key words that programmed into the filter, which in turn blocks any page or site with those words present. While this does block access to a number of sites that have nothing to do with work, they can also inhibit access to pages and glossaries that are designed to be helpful in many job positions.</p>
<p>When this is the case, an employee may choose to use a proxy site to get around the block and be able to get to a page that he or she legitimately needs to view in order to accomplish a work related task. Since using a proxy site does not take much longer than using a browser window, it is much faster than calling technical support and trying to get authorization to remove a given site from the filter list.</p>
<p>Many totalitarian nations also use content filters to block their residents from finding information on the world wide web which may not be approved by the regime in power. Residents of those nations can use proxy sites to access news and information from the free world.</p>
<p>Another advantage of using the proxy site is that the IP address of the user is not logged. This helps to ensure the privacy and anonymity of Internet users.</p>
<p>And specially for teenagers who always use Myspace, Facebook, Bebo, Youtube, Hi5 and other social networking websites which are blocked at their school, they use proxies to bypass filters of school and open those websites for them.</p>
]]></content:encoded>
			<wfw:commentRss>http://proxystash.org/why-use-a-proxy.html/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>What is a Proxy?</title>
		<link>http://proxystash.org/what-is-a-proxy.html</link>
		<comments>http://proxystash.org/what-is-a-proxy.html#comments</comments>
		<pubDate>Tue, 23 Dec 2008 15:24:34 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Tips]]></category>
		<category><![CDATA[How proxy work]]></category>
		<category><![CDATA[Proxy]]></category>
		<category><![CDATA[What is a Proxy]]></category>

		<guid isPermaLink="false">http://proxystash.org/?p=8</guid>
		<description><![CDATA[A proxy is a web page that provides Internet users with the ability to browse web sites that may be blocked by a content filter, such as WebSense or SmartFilter. By making use of the proxy as the portal to the blocked site, it is possible to circumvent the work of whatever content filter is [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>A proxy is a web page that provides Internet users with the ability to browse web sites that may be blocked by a content filter, such as WebSense or SmartFilter. By making use of the proxy as the portal to the blocked site, it is possible to circumvent the work of whatever content filter is in place. At the same time, the proxy site also helps to mask the visit to the site, so that there is less evidence that the content filter was not successful in preventing the visit.</p>
<h2>How Does A Proxy Work?</h2>
<p>Essentially, the proxy will provide the same ability to browse the Internet as any other web browser. A proxy site allows the user to key in a specific web address and be directed to that specific page in a window. This accomplishes two things. First, the window is coded as part of the proxy site address and not the actual web site the user is visiting. Second, any information cached on in the temporary Internet files will appear to be information related to the proxy site, and not the blocked web site.</p>
]]></content:encoded>
			<wfw:commentRss>http://proxystash.org/what-is-a-proxy.html/feed</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
