Jump to content

Search the Community

Showing results for tags 'proxy'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Found 76 results

  1. Psiphon Pro By Psiphon Inc. This is the pro version of Psiphon which is a secure VPN application for Android. The application allows you to navigate freely on the internet. You will be connected to all hindered sites that are blocked due to censorship or other factors. You will also be safe when you do this. You will be able to connect to any site that has been exposed to Psyphon Pro and has blocked access. Psiphon’s work structure is quite simple. As with other VPN applications, a tunnel opens and you appear to be connecting through other countries. Whether you want to use the application only on the browser, you can use it in all applications. One of the features that Psiphon has provided is the ability to display your internet traffic. If you want to use the internet for free, Psiphon is for you. Site: https://workupload.com Sharecode: /file/twX2cTvJ Site: https://file.bz Sharecode: /UcD2R2rfb2/Psiphon_Pro_214_apk
  2. Psiphon Pro By Psiphon Inc. This is the pro version of Psiphon which is a secure VPN application for Android. The application allows you to navigate freely on the internet. You will be connected to all hindered sites that are blocked due to censorship or other factors. You will also be safe when you do this. You will be able to connect to any site that has been exposed to Psyphon Pro and has blocked access. Psiphon’s work structure is quite simple. As with other VPN applications, a tunnel opens and you appear to be connecting through other countries. Whether you want to use the application only on the browser, you can use it in all applications. One of the features that Psiphon has provided is the ability to display your internet traffic. If you want to use the internet for free, Psiphon is for you. Site: https://www52.zippyshare.comSharecode: /v/d24qihdV/file.html Site: https://workupload.comSharecode: /file/EjqUjJ4h
  3. Psiphon Pro By Psiphon Inc. This is the pro version of Psiphon which is a secure VPN application for Android. The application allows you to navigate freely on the internet. You will be connected to all hindered sites that are blocked due to censorship or other factors. You will also be safe when you do this. You will be able to connect to any site that has been exposed to Psyphon Pro and has blocked access. Psiphon’s work structure is quite simple. As with other VPN applications, a tunnel opens and you appear to be connecting through other countries. Whether you want to use the application only on the browser, you can use it in all applications. One of the features that Psiphon has provided is the ability to display your internet traffic. If you want to use the internet for free, Psiphon is for you. Site: https://www58.zippyshare.comSharecode: /v/mQaCFhq8/file.html Site: https://workupload.comSharecode: /file/5mnKbywy
  4. Psiphon Pro By Psiphon Inc. This is the pro version of Psiphon which is a secure VPN application for Android. The application allows you to navigate freely on the internet. You will be connected to all hindered sites that are blocked due to censorship or other factors. You will also be safe when you do this. You will be able to connect to any site that has been exposed to Psyphon Pro and has blocked access. Psiphon’s work structure is quite simple. As with other VPN applications, a tunnel opens and you appear to be connecting through other countries. Whether you want to use the application only on the browser, you can use it in all applications. One of the features that Psiphon has provided is the ability to display your internet traffic. If you want to use the internet for free, Psiphon is for you. Site: https://www84.zippyshare.comSharecode: /v/62VrpzXE/file.html
  5. Hello, I needed a program that allow me to quickly find good proxies for .... I won't explain what to do with ... So, yesterday evening I have coded a little tool that I d like to share with the nsaneforums Download links : Site: https://www.upload.ee Sharecode[?]: /files/8071395/MyProxyNinja.rar.html Rar Password : nsaneforums Virus Total : (exe file) https://www.virustotal.com/#/file/814bf6142253c1a5025991fe922cd5bf3adad2550610724917810d442dedd4c3/detection Enjoy
  6. compgen1534

    VpyrVPN 2.11.0.7650

    VyprVPN is an essential tool if you want to protect your privacy and prevent your Internet Service Provider from monitoring your browsing activity and online communications. It enables you to keep your location private by allowing you to switch easily to any one of the multiple global VPN server locations. Key features include: 1, 2 or 3 simultaneous connections. Unlimited Data Usage. VyprDNS. PPTP, Open VPN, L2TP/IPsec. NAT Firewall Included. 10 - 50 GB Dump Truck Storage. Golden Frog, the makers of VyperVPN, own and manage their own VPN servers, so no other 3rd party company will be handling your data, making it more secure. With over 50 worldwide server locations, more than 700 servers and 200,000+ global IPs, you are guaranteed a connection, with unlimited server switching and unlimited speeds. A cool feature of VyprVPN is VyprDNS, Golden Frog's very own zero logging DNS, which is available exclusively for VyprVPN users. The zero-knowledge policy that the VyprDNS service provides, increases user privacy and helps to defeat censorship and promote online freedom because quite simply, it does not log any information. The new VPN technology Chameleon has been developed to scramble OpenVPN packet metadata so that it's impossible to recognize via DPI. For VyprVPN users, this means that you can bypass restrictive networks put in place by governments, corporations and ISPs, without compromising security. It is also a great tool for users who experience VPN blocking and speed issues that come as a result of bandwidth throttling. In short, Chameleon will give you an open and uncensored Internet experience. As far as usability goes, VyprVPN has a reputation for being easy-to-use, mainly thanks to its simple interface and speedy response. After downloading the program, you will need to sign up for your 3-day free trial, choosing from either the Basic, Pro or Premier versions for which you will need to pay the monthly or annual fee. If you want a more open and uncensored Internet, as well as protection from hackers and third-party snoopers, then download VyprVPN now. Edit: Download links windows (x86/64) https://www.goldenfrog.com/vyprvpn/windows-download Crack isn't available right now, hope to someone assist with this, would like also.
  7. FlashVPN v1.3.2 [Ad Free] FlashVPN provides Free VPN Proxy service. One-click to connect, no configuration needed. Premium bandwidth and NO connection time limitation. 1. With simple One-click, you can connect to fastest VPN server 2. VPN servers are deploy on multi locations: United States, England and Japan 3. Unblock geographically restricted websites 4. No connection time limitation 5. Protect your privacy by secure VPN encryption 6. No system root required Requires Android: 4.0.3 and up Source URL (Contains Ads): https://play.google.com/store/apps/details?id=net.flashsoft.flashvpn.activity Modifications: -Removed Ads (all but one server based ad). -Changed orientation to landscape in order to show correctly on Android TV Boxes. Download: Site: https://www.mirrorcreator.com Sharecode[?]: /files/Z2YXF9IB/FlashVPN_Free_VPN_Proxy_v1.3.2_[Ad_Free-Cerb].apk_links Note: If any antivirus apps flag this ad free app as a virus, it is a false positive due to the signature method used to compile the apk. It is clean and safe. Tested and working. Modded by me, Cerberus.
  8. Hexatech VPN Proxy v1.8.6 [Ad Free] HexaTech VPN is a revolutionary VPN service created by Betternet, specially designed for mobile, and offers an ultra -fast speed, block-proof protocol and extremely reliable security to users all over the world, whether you want to bypass geo-restrictions, access blocked contents, or secure your devices’ connections over public WiFi hotspot. HexaTech detects your location automatically and connects you to the nearest server; as a result, your connection will be much faster than any other providers. With HexaTech, you can simply connect even when the network quality is not ideal. Get HexaTech VPN now to enjoy: ► Totally Free VPN ► Fast speed VPN ► WiFi hotspot shield Browse anonymously and securely now with HexaTech VPN Proxy: > One Tap to Connect > No credit card needed > No Registration or Logging in needed > No Logs saved HexaTech VPN is a completely free VPN service for Android that can be used to unblock all restricted websites and services such as Facebook, Twitter, Youtube, etc. In addition to bypassing banned websites, HexaTech secures your device’s connections while you’re connected to public wi-fi hotspots, cellular data networks and other public locations. It works just like proxy but even more secure! Source URL (contains ads): https://play.google.com/store/apps/details?id=tech.hexa&hl=en Thanks to Delboy who recommended this app. Modifications: -Removed Ads. -Changed Orientation to Landscape to show correctly with Android TV Boxes. Download: Site: https://www.mirrorcreator.com Sharecode[?]: /files/6GKVZSK8/Hexatech_VPN_Proxy_v1.8.6_[Ad_Free-Cerb].apk_links Note: If any antivirus apps flag this ad free app as a virus, it is a false positive due to the signature method used to compile the apk. It is clean and safe. Tested and working. Modded by me, Cerberus.
  9. ProxyFire Master Suite Professional 1.25 Proxyfire is a powerful proxy server hunter and checker, which can not only support HTTP, SOCKS4, SOCKS5, Tunnel, SSL SMTP (E-Mail) proxies checking, but also classify them into SOCKS proxy, High Anonymous proxy, Anonymous proxy, Transparent proxy and Gateway proxy. It's a strong and multifunctional tool, including Forums Proxy Leecher, Search Engines Proxy Leecher, Proxy Scan, IP to Country Query, Proxy Filter, RBL Filter, Dangerous IP Filter, Hostname Filter etc. You can get thousands of fresh proxies per day by using Proxyfire. ProxyFire Master Suite Professional Support Anonymity, SSL/Https, SMTP/EMail, Gateway, Socks4/5, Dangerous IP TestSupport SMTP/EMAIL proxy TestSupport Port, Country, dangerous IP, Duplicate FilterSupport Planetlab/CoDeeN proxies FilterSupport RBL, hostname FilterSupport different type of forums leeching(support LOGIN)Support non-forum proxy sitesSupport different search engines leechingSupport SYN scanningSupport SYN scanning before checkingSupport IP to Country lookupSupport Leech proxies from FILE, URL, FTP, EMAIL(pop3)Support proxies port connecting TestSupport SSL/HTTPS URLsMax check threads: unlimitedMax forum leech threads: unlimitedMax topic leech threads: unlimitedMax search threads: 10Website: http://www.proxyfire.net/ OS: Windows XP / Vista / 7 / 8 Language: Eng Medicine: Keymaker Size: 3,73 Mb.
  10. sudoku

    Guide To DNSCrypt

    DNSCrypt A protocol for securing communications between a client and a DNS resolver. Description dnscrypt-proxy provides local service which can be used directly as your local resolver or as a DNS forwarder, encrypting and authenticating requests using the DNSCrypt protocol and passing them to an upstream server. The DNSCrypt protocol uses high-speed high-security elliptic-curve cryptography and is very similar to DNSCurve, but focuses on securing communications between a client and its first-level resolver. While not providing end-to-end security, it protects the local network, which is often the weakest point of the chain, against man-in-the-middle attacks. It also provides some confidentiality to DNS queries. List of free, DNSCrypt-enabled resolvers To get started, you can use any of the public DNS resolvers supporting DNSCrypt . If you want to add DNSCrypt support to your own public or private resolver, check out DNSCrypt-Wrapper, a server-side dnscrypt proxy that works with any name resolver. Installation: Windows 1. Download the win zip file from here http://download.dnscrypt.org/dnscrypt-proxy/ 2. Extract it to C drive . 3. Open up a elevated cmd / Terminal. Click on start and type cmd and press ctrl+shift+enter. 4. Go to DNSCrypt directory in cmd / terminal. cd C:\dnscrypt-proxy-win64\ 5. Now we will install proxy server and we had to choose dns server. we can choose any dns from file dnscrypt-resolvers.csv which is included in download. This list mainly support DNSCypt.it has a name, description, location, and whether they support things like DNSSEC and Namecoin. It also has the necessary IP addresses and public keys. . we had chosen " okturtles". There is a resolver list with file name dnscrypt-resolvers.csv, you can choose any resolver of your choice. If all goes well, you will get an output similar to this: [NOTICE] Starting dnscrypt-proxy 1.6.0 [INFO] Initializing libsodium for optimal performance [INFO] Generating a new key pair [INFO] Done [INFO] Server certificate #808464433 received [INFO] This certificate looks valid [INFO] Server key fingerprint is 3730:AAB4:B7FD:40F6:3C42: B12C:60DF:B615:8392:B6AF:9AA4:4CFD:C282:0BAC:E68E:2624 6. Time to install dnscrypt-proxy.exe --resolver-name=okturtles --resolvers-list="C:\dnscrypt-proxy-win64\dnscrypt-resolvers.csv" --install You should see this output. [INFO] The dnscrypt-proxy service has been installed and started [INFO] The registry key used for this service is SYSTEM\Current ControlSet\Services\dnscrypt-proxy\Parameters [INFO] Now, change your resolver settings to 127.0.0.1:53 7. Change your dns setting in network connections to 127.0.0.1. Source: For linux, freebsd etc please follow the tutorial of dnscrypt which can be found here http://dnscrypt.org/. 8. To remove use this command while the directory is selected at step 4 .\dnscrypt-proxy --uninstall Benefits of DNSCrypt: Easy to set up and it’s free. Encryption of web traffic: Phishing protection. Speed up your Internet experience. Unblock Government blocked websites
  11. Fundamentally, people connect to Virtual Private Networks (VPNs) and proxies for two primary purposes: to conceal their internet activity and to gain access to geographically restricted online content. To some degree, VPNs and proxies fulfill both these needs. Yet they do so to different degrees and in different ways. A proxy is a second computer or server that acts as an intermediary between a computer or device (possibly yours) and the internet. For instance, if you wanted to access German content from Canada, you could do so by connecting to a German proxy. Websites would identify the proxy device by its German IP, and you’d likely be receiving local content. Yet proxies are subject to a number of limitations that VPN services are not. These restrictions can often lead to problems related to performance and security. So which is best for you? Let’s find out. Accessing Restricted Content As I stated above, proxies located in different locations of the world can provide the necessary tools for users to access foreign content, but not all of it. Proxies are limited by several different factors, the first being the type of proxy. HTTP Proxy Servers There are two main kinds of proxies. The first is called an HTTP Proxy Server. As you might have guessed, it deals specifically with protocols handled by HTTP and HTTPS. As a result, most websites can be fooled into believing that your IP address is that of the proxy. Other services, on the other hand, won’t be affected. You won’t be able to watch foreign Netflix or Hulu with an HTTP Proxy Server. On the other hand, this type of proxy is likely to be sufficient for basic browsing needs. Because speed isn’t as necessary for regular browsing, you’re unlikely to see a significant performance drop. Regrettably, some websites see through proxies’ tricks; intelligent use of Javascripting and Flash can be used to figure out where you’re actually connecting to the net from. SOCKS Proxy Servers The second type of proxy is known as a SOCKS Proxy Server. Unlike its HTTP counterpart, it does work with other types of connections (including things such as Netflix). Yet because most servers are public, performance is frequently limited and unreliable at best. Information is also not encrypted, which we’ll discuss in the next section. Virtual Private Networks VPNs are a different story. While they aren’t free like the proxies above (never trust a VPN you don’t pay for), they work for all kinds of internet traffic and they do so without majorly handicapping performance. These paid VPN services (look to Secure Thoughts for more information) offer support for their services and are likely your best option. Unlike proxy servers, VPN services usually have a multitude of different servers for subscribers to use. That means not having to search for a new proxy every time you want to see content from a different region of the world. Besides dealing with restricted content, security is another major issue that separates VPNs and proxies. Anonymity and Safety Proxies are by no means a bad thing. They help countless individuals reach the content they would have never had access to every day. Where they majorly run into trouble is on the front of security. Proxy servers are rarely (if ever) encrypted and they only really function as a point to bounce information from one point to another. In countries with government lockdown of the internet, a proxy does very little to circumvent censorship. Worse yet, companies looking to save money by restricting their users’ freedom are also unaffected by proxies, as many can simply bring up a log of user activity. As I mentioned earlier, some websites can also use clever tricks to identify your IP address even behind a proxy. VPNs are not completely clear of problems, but they do a much better job when it comes to handling the security of their users. A VPN service creates a direct channel between the subscriber and the service. In doing so, it encrypts all traffic (both coming and going) in a way that keeps both hackers and government away from your activities. Flash and Javascript tricks also have no effect on VPNs, so there’s no real risk of being discovered. The only area you need to be careful about is whether the VPN service keeps logs of their activities or not. The best VPN providers keep no logs of any kind. It might not seem like a critical detail, but understand what logs can be used for. Governments that are looking to oppress users or limit their rights can subpoena a company for its records. Even if the organization in question has no intention of hurting their customers, keeping logs can lead to some major future problems. Reliability and Pricing The last things to consider in the realm of VPNs and proxies fall into the categories of reliability and pricing. You will get exactly what you pay for when it comes to these services. Virtually all proxies are free. Very few require any form of payment from the user. They make up for this by cutting corners. In some cases, browser-based proxies secretly use their service as an ad delivery platform. On occasion, a proxy is set up to help other users out of good will, but that also means that the proxy isn’t likely to be as well-maintained. A simple lack of resources can mean very little goes into upkeep and infrastructure. As VPNs usually require some form of payment, they tend to be better maintained and have dedicated customer support teams. Multiple servers also afford companies the chance to spread bandwidth usage out for cases when too many users are connected at once (something that you won’t find with proxies). They’re simply more flexible with their service. Article source
  12. All Private Internet Access Settings Explained The guide provides explanations for all settings and features of the Private Internet Access client for the Windows operating system. Private Internet Access is a popular VPN provider. The company has a strict no-logging policy which have been verified in court this year. Customers may download one of the available clients for their operating system. The Windows client ships with a list of features that you may enable to improve your privacy and security while being connected to one of the company servers. The following guide lists and explains all settings that the Windows client version of Private Internet Access provides currently. We have used the latest version of the client, version 0.65, for that. We will update the guide when features change. If you notice that before us, let us know in the comments so that we can update the article. Private Internet Access VPN Settings You can open the settings by right-clicking on the Private Internet Access icon in the Windows system tray area. Please note that you can only access the settings if you are not connected to the VPN at that time. If you are, you need to disconnect first before you can do so. The client uses three configuration pages of which one, simple, is not of much use. Advanced Settings The advanced settings page, which you see on the screenshot above, lists several options that you want to check out and configure. Username: your PIA username Password: the associated password of the account. Start application at login: whether the VPN software is started on Windows boot. Auto-connect on launch: whether the software connects to the VPN server when it is started. Show desktop notifications: whether notifications are shown on the desktop (e.g. on connection or disconnect). Region: The region you want to connect to. Tip: You can run speed tests for any server region to find out how well it performs. Connection type: Select UPD or TCP as the connection type. Default is UDP. Remote port: Set to auto by default, but you may specify a port there. Local port: Set a local port. Request port forwarding: The port that is being used is shown when you hover over the PIA icon in the system tray area. This can be useful to set it up in applications. PIA MACE: This is a new feature of Private Internet Access. It acts as a blocker for advertisement, malware, trackers and other undesirable elements. You have no control currently apart from enabling or disabling the blocker. VPN Kill Switch: This terminates the Internet connection if the connection to the VPN drops. Useful if you don't want your "real" IP address to be logged by services you connect to while using a VPN. IPv6 leak protection: This disables the use of IPv6 while connected to the VPN. Use small packets: If you notice connection issues, e.g. connections that drop frequently, you may want to enable this option to see if it resolves that issue. Debug mode: You may be asked to enable debug mode by PIA support. The log is written to C:\Program Files\pia_manager\log. While it is up to you and your requirements what to enable on the settings page, it is usually a good idea to enable all features but PIA MACE and Debug mode. Encryption A click on encryption displays options to set various encryption related parameters. Data Encryption: Select one of the available encryption standards. Available are AES-128, AES-256 and None. Data Authentication: Select one of the available cryptographic hash functions. Available are SHA-1, Sha-256 and None. Handshake: Encryption used to establish a secure connection with Private Internet Access servers. Pia uses TLS 1.2. The default is RSA-2048. The selection depends largely on your requirements. Want maximum protection? Select AES-256, SHA-256 and RSA-4096. Want all speed and no safety at all? Pick None, None and ECC-256k1. The default recommendation is AES-128, SHA-1 and RSA-2048. The client displays warning if you choose none for data encryption or data authentication, or when you chose ECC for Handshake. Now Read: Private Internet Access rubyw.exe connections explained Source
  13. Sylence

    Charles Proxy

    I'm looking for a medicine (crack, patch etc.) for Charles Proxy , it's a 30 days trial license with annoying trial license notifications. anyone can help?
  14. FalseCONNECT Vulnerability Affects Software From Apple, Microsoft, Oracle, More Multiple other vendors may still be affected According to Decime, there is a flaw in how applications from several vendors respond to HTTP CONNECT requests via HTTP/1.0 407 Proxy Authentication Required responses. FalseCONNECT explained for dummies This flaw manifests itself only in network environments where users utilize proxy connections to get online. This type of setup is often used in enterprise networks where companies deploy powerful firewalls. Decime explains that an attacker that has a foothold in a compromised network and has the ability to listen to proxy traffic can sniff for HTTP CONNECT requests sent to the local proxy. When the attacker detects one of these requests, he then replies instead of the real proxy server, and issues a 407 Proxy Authentication Required response, asking the user for a password to access a specific service. Because the HTTP CONNECT requests are unencrypted, the attacker knows when the victim wants to access sensitive accounts such as email or Intranet servers, even if those services are delivered via HTTPS. The attacker can force the user to authenticate, sending the responses to him instead, hence the vulnerability's name of FalseCONNECT. WebKit software more vulnerable than others "WebKit-based clients are vulnerable to additional vectors due to the fact that HTML markup and JavaScript are rendered by the client Document Object Model (DOM) in the context of the originally requested HTTPS domain," a US-CERT alert reads. WebKit is used for software such as Chrome, iTunes, Google Drive, Safari, and many mobile applications. Multiple software vendors deploy applications that can handle proxy connections. Until know, Apple, Microsoft, Oracle, and Opera have acknowledged their products are affected. Lenovo said this bug does not impact its software. Other software vendors that are still evaluating the FalseCONNECT bug and may be affected include multiple Linux distros, Cisco, Google, HP, IBM, Juniper, Mozilla, Nokia, OpenBSD, SAP, Sony, and others. Technical details about this flaw can be found on a dedicated website. US-CERT has also issued an alert, in which users can track vendor responses for the FalseCONNECT vulnerability. Source
  15. Batu69

    Charles Proxy 4.0 released

    Charles 4 At long last, Charles 4 has been released! Charles 1 was released in 2002, nearly 14 years ago. Since then we’ve been through Charles 2 and Charles 3, both big upgrades. But for the past 11 months we’ve been hard at work on the biggest upgrade we’ve ever made to Charles! Charles 4 includes an upgrade to the latest and greatest HTTP standard, the latest and greatest IP standard, and the biggest UI update ever for Charles. It is also the first paid upgrade in Charles’s long history. HTTP 2 is all around you. It’s sneaky and you might not have noticed. Both the client and server need to support HTTP 2, otherwise they will downgrade automatically to HTTP 1.1. So with Charles 3 you would just have seen HTTP 1.1 everywhere. No more! With Charles 4 you can now see HTTP 2 working, and you can use all of your familiar tools; Repeat, Breakpoints, and so on. You’ll spot HTTP 2 hosts in Charles as they use a different icon—with a lightning bolt! IPv6 is also all around you! If you’re lucky enough to have an IPv6 network and ISP you can turn on “Prefer IPv6 addresses when connecting to dual-stack hosts” on the Options tab in the Proxy Settings. Then you’ll see IPv6 addresses being used in Charles. Feel the modern IP networking (first published in 1998) flow through you! With Charles 4 we’ve also taken the opportunity to spruce up the look of Charles, starting with the familiar, enigmatic and much-loved app icon. I’ll let that sit by itself for a moment. Fear not! It’s still the Charles jug, we’re not crazy! It’s just had a big polish, and we think it’s more beautiful than ever! We hope you do too. We’ve also designed a completely new custom set of icons, giving Charles a more unified and refined appearance. Thank you to the wonderful Wolfgang Bartelme for all of his painstaking work on these icons and on our beloved Charles Jug 4.0. Finally we’ve improved the native platform stylings on Mac OS X (soon to be macOS) and Windows; we’ve reduced border chrome and tweaked most of the dialog layouts in the app so that Charles looks more modern than ever. On Mac OS X we’re using the brand new VAqua library by the excellent Alan Snyder. VAqua provides better graphical accuracy and higher performance, especially on retina screens. The keenest eyes amongst you may also notice that Charles 4 now uses sub-pixel antialiasing! Zoom in to check it out. And on the latest versions of Mac OS X, Charles 4 uses the new San Francisco typeface. Finally, for my Charlesitans with dark menu bars—there’s a little something for you in Charles 4 too. On Windows we’re using the latest version of JGoodies, with support for Windows 8 and Windows 10. No more will your menus be odd colours! We’ve also fixed the egregious aliased text that previous appeared whenever you looked at XML responses. There are lots of other little changes and improvements in Charles 4. We’ll be documented these and updating the website over the coming weeks. Reach out to us on Twitter @charlesproxy if you have any questions or comments! Don’t forget to download Charles 4 and check it out! Article source
  16. straycat19

    Acrylic DNS Proxy

    Acrylic is a local DNS proxy for Windows which improves the performance of your computer by caching the responses coming from your DNS servers and helps you fight unwanted ads through a custom HOSTS file (optimized for handling hundreds of thousands of domain names) with support for wildcards and regular expressions.When you browse a web page a portion of the loading time is dedicated to name resolution (usually from a few milliseconds to 1 second or more) while the rest is dedicated to the transfer of the web page contents and resources to your browser. What Acrylic does is to reduce the time dedicated to name resolution for frequently visited addresses closest to zero possible. It may not seem such a great optimization but in a few weeks of Internet browsing you will probably save an hour or so, which is definitely not such a bad thing. Furthermore Acrylic's sliding expiration caching mechanism, simultaneous forwarding to multiple DNS servers and support for background DNS updates are able to improve your browsing experience independently of the browser.With Acrylic you can also gracefully overcome downtimes of your DNS servers without disrupting your work, because in that case you will at least be able to connect to your favourite websites and to your email server.Another good thing is that Acrylic is released as open source, which means that it's free and its source code, written with Borland Delphi 7, is freely available to anyone under the GNU General Public License. What's new in version 0.9.31 released on April 13, 2016 Solved a bug which prevented Acrylic to read configuration entries larger than 2048 characters. Improved resolving of A (IPv4) and AAAA (IPv6) requests from the Acrylic HOSTS file when one of the related entries is missing. (*) Hashes for file download verification 0.9.31 Acrylic.exe MD5: 7fa64c2dfba39719a78daee5eb4e8f66 SHA-1: db8ea399c21549ad18d43f54951d9b8cb6416d9c SHA-256: 3c9bc162be9a29462da18f7f0568ec1d3260476414b76b79ab8679fe743d60ea RIPEMD-160: 543324de4f508cc4a656b9c85a63db00ee49131d Acrylic-Portable.zip MD5: 7b632a2a52b0c73b1a2a017ae90891cf SHA-1: 7356beb173fd31d1857a196a2b89fabd72a7ed19 SHA-256: 821ba558f5a743e3ad73277c2ded5cc46ffdb63b4d35dad013c6626a6b6ffee5 RIPEMD-160: ab5ae9db49e4c41851a1c0b9c6cf59bab1b45150 Download Installer Portable
  17. Popular ISP utility exposed to new cache poisoning attack Squison is the name of a recently discovered security bug in the Squid proxy server, a popular Linux utility deployed by many Internet providers as a transparent and/or caching proxy. At its roots, Squid is a proxy server that takes traffic from incoming ports and relays it to its destination by masking its IP address. In most cases, Squid is used in transparent mode and does not alter the origin IP address, merely relaying traffic. The reason behind deploying Squid in such a manner is to gather more insights on Web traffic, but also for caching purposes. Small and large ISPs use this technique to speed up page loads by providing an already-cached Web page to their subscribers, but also for saving bandwidth. For these reasons, unknown to many end users, at one point or another, much of their Web traffic passes through a Squid server. Squison attack works only for HTTP traffic According to Jianjun Chen, a postgraduate student at Tsinghua University, a vulnerability exists in Squid 3.5.12 up to 3.5.17 and all 4.x versions up to 4.0.9, which allows attackers to poison a Squid proxy server's cache with malicious content. The attack relies on the attacker being able to pass malicious traffic through the proxy and works only for HTTP connections. The attacker must first access (through a Squid proxy) a site under their control, such as attack.com. The attack's next stage moves to the attack.com server, where the crook then requests any site with the following command. GET http://victim.com/ HTTP/1.1 Host: attack.com "When it inspects the destination IP address for consistency, however, it mistakenly checks it against the value of the Host header, 'attack.com', rather than 'vicitim.com,'" said Jianjun Chen. "Thus, the proxy directly passes the request to the 'attack.com' server, but caches the (malicious) reply the server returns as a resource of 'victim.com'." This request leads to cache poisoning caused by inconsistent operation of route verification and cache modules. Poisoning Web caches allows attackers to insert malicious content in the cached versions of websites considered secure and sometimes untouchable, such as Google, Facebook, or Twitter. Squison cache poisoning attacks can be carried out via Flash ads While this explanation might seem complicated, Chen says the attack is currently very easy to exploit in real-world scenarios because of the way the online advertising ecosystem works. A trivial Flash ad can be automated to carry out such attacks. The Squid team released versions 4.0.10 and 3.5.18 to address this issue. Mitre has not yet assigned a CVE identifier to the Squison attack. Proof-of-concept exploit code is available on GitHub while a video demonstration is available on Google Drive. Article source
  18. selesn777

    Charles 3.7 Eng + Serial

    Charles 3.7 Eng + Serial Charles is installed as a proxy server and can monitor the data sent and received between the server and your Internet applications. First of all, it will be interesting to software developers and server administrators do not have such tools to establish proper operation very difficult. Charles acts as a mediator not only in http connections, but in the SSL-encrypted channel. Features: SSL-proxy - SSL-view requests and responses in plain textBandwidth Limit (Bandwidth Throttling) to simulate slow connections, including delaysDebugging AJAX - view XML and JSON requests and responses in the form of a structured tree or just textTree View contents of the data AMF, transmitted Flash and Flex applicationsSending repeated requests to the server's response changesChange requests to the correct server responseBreakpoints to intercept and modify requests or responsesVerify written responses in formats HTML, CSS and RSS / Atom with W3C Validator Download link Site: http://www.tusfiles.net Sharecode: /pijqo2n1r7mp
  19. Yesterday, Opera announced they’ve added a free VPN client with unlimited data usage in the latest developer version of their browser. Sounds great, doesn’t it? Michal Špaček, a web developer and security engineer based in Prague, researched the way Opera’s VPN works and discovered there’s more marketing than security behind Opera’s claims. “What Opera offers is not a VPN as such. It’s just a proxy for the browser. You still need a full VPN if privacy is what you care about (and you should care about your privacy). Other tools you use, including for example email clients like Outlook, won’t use this ‘VPN’,” Špaček told Help Net Security. “There’s also a potential privacy issue: when setting up the VPN, the browser requests something called device_id, this is subsequently sent in every request to the proxy and it survives browser restarts and reinstalls unless you also delete your user data when uninstalling. This might be used for user tracking for whatever purpose,” Špaček added. How the “VPN” works Once the user enables the feature in settings, Opera VPN sends API requests to https://api.surfeasy.com to obtain credentials and proxy IPs. The browser then talks to a proxy like de0.opera-proxy.net, and its IP address can only be resolved from within Opera when the VPN feature is turned on. It’s an HTTP/S proxy that requires authentication. When the Opera browser with enabled VPN loads a page, it sends many requests to de0.opera-proxy.net with a Proxy-Authorization request header. The Proxy-Authorization header decoded: CC68FE24C34B5B2414FB1DC116342EADA7D5C46B:9B9BE3FAE67 4A33D1820315F4CC94372926C8210B6AEC0B662EC7CAD611D86A3 Since we’re talking about a proxy, these credentials can be used with de0.opera-proxy.net even when connecting from a different machine. This means that if you use the proxy on a computer with no Opera installed, you’ll get the same IP as when using Opera’s VPN. A caution on proxies “I am a bit surprised by Opera in this case. A proxy is a proxy, usually for one specific service. A VPN is usually an encrypted tunnel for all services going out of our computer to a remote host, before it gets decrypted and then forwarded to its final destination. While Opera may have done this little tweak of definitions with the best intentions, end users should understand that this free service by Opera is nowhere near the security provided by a real VPN solution,” Per Thorsheim, founder of PasswordsCon, commented. At the time of writing, Opera Software was not available for comment. We’ll update the story if we get an official statement. Article source
  20. Less than a week after the UK 'piracy police' shut down the proxy service Immunicity and arrested its owner, clones of the service have started to appear online. The services allow people to access The Pirate Bay and other blocked sites. Just like the original site they are completely free of charge. When Immunicity launched last year TorrentFreak spoke with the owner, who told us he created the service as a protest against increasing censorship efforts in the UK. “We are angered by the censorship that is happening in the UK and in other countries across the globe, so we got our thinking caps on and decided to do something about it,” Immunicity’s operator said. The site’s core motivation came from the famous John Gilmore quote that was prominently placed on the site’s homepage. “The Net interprets censorship as damage and routes around it.” And that was exactly what the service offered. Those who set up their browser to work with Immunicity would gain access to blocked sites, by running their traffic through its proxy server. In just a few clicks the service was able to unblock any censored site, hassle free. For more than a year Immunicity helped tens of thousands of people to unblock censored websites, but that was brought to an end last week. Tipped off by copyright holders, City of London Police labeled Immunicity a criminal operation and arrested its 20-year old owner. The idea behind the police action was to send a deterrent message and make it harder for the public to access blocked sites. However, it appears to have resulted in just the opposite. Just days after the original Immunicity site was taken offline at least two clones have appeared. Both Immunicity.co.uk and Immun.es offer the same unblocking functionality, completely free of charge. The two new services are a direct result of the Immunicity takedown, once again showing that censorship enforcement may lead to counterproductive results. TorrentFreak spoke with the operator of Immum.es who, considering recent events, has taken the necessary precautions to stay out of police sight. “When purchasing the domain and server I made steps to protect myself from potential adversaries,” the operator says. Immun.es uses a hosting service that allows proxies and has unmetered bandwidth, which should guarantee smooth sailing in the short run. The operator informs us that the backend is coded in node.js, which he may release as open source later. The end result is that the actions of City of London Police have made matters worse, from their own perspective. Instead of one Immunicity, there are now two, and possible many more to come in the future. Source: TorrentFreak
  21. selesn777

    CCProxy 8.0 Build 20140811

    CCProxy 8.0 Build 20140811 Here is a small proxy server makes it easy to get online to all available computers on the local area network in just a single connection. The product can work with different network protocols from the standard HTTP to MMS, it is possible to reassign the ports that you can distinguish between the rights of users, built a good web filter, you can monitor the traffic, plus the product has a good built-in cache, there is a dialer and automatic connection. CCProxy Main features: Modem, Cable Modem, ISDN, ADSL, Satellite, DDN and so on are supported(more).HTTP, FTP, Gopher, SOCKS4/5, Telnet, Secure (HTTPS), News (NNTP), RTSP and MMS proxy are supported.Port Mapping is supported.Web cache can enhance browsing speed. The size and refresh time of cache can be freely changed.Bandwidth control flexibly manages the traffic condition of clients.Time schedule can freely control the clients' on-line time(access time control).Web filter can ban the specified web sites or contents. Also can name specific web sites for browsing.URL filtering prevents users from downloading files with designated extended name via IE.Seven types of account authentication: IP address, IP range, MAC address, User Name/Password, IP + User Name/Password, MAC + User Name/Password and IP + MAC.Parent proxy function enables CCProxy to access the Internet via another proxy.Dial-On-Demand, remote dial up and auto disconnect are supported.Access Logging can keep a full set of the Internet access log.Enable IE, Netscape to access the Internet through HTTP/Secure/FTP (Web)/Gopher.SOCKS5 proxy support allows use of ICQ, MSN Messenger, Yahoo Messenger, CuteFTP, CuteFTP Pro and WS-FTP.Mail proxy supports Outlook, Eudora etc.Supports NetTerm accessing the Internet via Telnet proxy.Supports Outlook connecting to the News server via News proxy.Support SOCKS5 and web authentication.Support for Real Player RTSP proxy and Media Player MMS proxy.Built-in DNS can resolve domain names.Flow Stats.CCProxy News Center Website: http://www.youngzsoft.net/ OS: Windows 2000 / XP / Vista / 7 / 8 (x86-x64) Language: Eng Medicine: Keymaker Size: 1,95 Mb.
  22. This week, police took unprecedented action by shutting down proxies facilitating access to torrent sites blocked in the UK. With the surprise arrest of the sites' alleged operator leaving people scratching heads, TorrentFreak decided to find out what emboldened police to go after sites that neither carry nor link to any infringing content. Since the launch of Operation Creative last year, UK police have contacted a range of so-called ‘pirate’ sites while giving their operators the opportunity to shut down quietly to avoid further action. It was pretty much certain that torrent and streaming sites would be prime targets, and we’ve seen that play out in recent months. This week, however, PIPCU delivered a surprise. Instead of going after sites that host or link to infringing material, they targeted a series of sites that have never done so, arresting their alleged operator in the process. Reverse Proxies So-called ‘reverse proxies’ are not file-sharing sites, they merely restore access to third-party sites that have been rendered inaccessible by ISPs, as the result of a court order for example. The sites that were closed down this week enabled users to access The Pirate Bay and KickassTorrents, even if their ISP actively blocks the site. The police intervention raises many questions, none of which will be officially answered while an investigation is underway. So, in order to try and fill in some of the blanks, TorrentFreak spoke with expert intellectual property lawyer Darren Meale to explore a possible basis for this week’s arrest of a proxy site operator. “Internet users have sought ways to continue to access the sites by getting round the blocking put in place by the ISPs. One of the ways to do this is to use proxy servers. This operation is a major step in tackling those providing such services.” – FACT director Kieron Sharp commenting this week on the proxy shutdowns. Breach of a High Court order? Darren Meale: “The individual has been accused of helping Internet users access websites which the English High Court has ordered the major UK ISPs to block. That order arose in a civil, not a criminal action, and only applies to the ISPs in question. If it applied to the individual and he ignored the Court order, he would be in contempt of court and a judge could commit him to prison. But I don’t understand that to be what is going on here.” Assisting a criminal enterprise? So, with the High Court blocks a potential red herring, our attention is turned to the activities of the sites being unblocked by the proxies, and how merely facilitating access to those sites might be perceived as an offense by the Police Intellectual Property Crime Unit. Darren Meale: “Sites like The Pirate Bay and KickassTorrents have been the subject of all sorts of civil and criminal actions around the world, but are tricky to target because of where they are based and the way they operate. That’s why initiatives like site blocking have become popular in the UK. “The rights owners, police and other authorities can’t get their hands on the sites directly, at least not practically. Of course, that doesn’t mean that those sites aren’t still committing criminal offenses. “Although we tend to think of copyright infringement as a civil wrong, it is also a criminal offense provided it is carried out ‘in the course of business’. Sites like KAT run as a commercial enterprise and make a lot of money out of advertising, so there is a pretty strong case that they are committing criminal offenses, including in the UK.” If sites like The Pirate Bay and KickassTorrents are committing crimes, others can also commit crimes by helping them, Meale says. Darren Meale: “The Serious Crime Act 2007 makes it a crime to intentionally encourage or assist someone else committing a crime, in the same way as it used to be a crime to ‘incite’ someone to commit a crime. “The UK’s National Fraud Intelligence Bureau (NFIB) has previously accused operators of file-sharing websites of committing crimes of this nature. PIPCU’s statement in this matter also refers to its intention to ‘come down hard on people believed to be committing or deliberately facilitating such offenses’. “These kinds of ‘inchoate‘ offenses are, in my view, the most likely candidate for what this individual has been arrested for.” But other ISPs are facilitating access to illegal sites too.. Only six ISPs in the UK have been ordered to block sites like The Pirate Bay and KickassTorrents, the others are, at this very moment, knowingly facilitating access to these potentially criminal sites. How is it that a proxy service operator now finds himself in hot water while these ISPs continue with no repercussions? Meale points out that the L’Oreal v eBay decision found that service providers (eBay in that case) had no duty to police their services for infringement. Also, service providers benefit from safe harbors under the E-commerce Directive, rendering them immune from prosecution in certain circumstances. Darren Meale: “However, there is a difference between providing Internet access generally (which ISPs do) and providing a service or website which sets out to link to another, illegal, website. An attempt to make ISPs liable for what flows through them in the same way as someone running a file-sharing site failed in Australia in a case called iiNet. I think the same distinction would be drawn in Europe and the UK. “Providing general Internet access: OK subject to exceptions such as if the ISP is hosting. But setting up a service designed to help people access illegal websites: that’s much more dubious. That’s not to say that the legal issues that surround all this are straightforward – they’re not.” Conclusion What shines through following the events of this week is how untested the waters are in cases such as these. Whether PIPCU intends to follow this matter through to the bitter end (risking a potentially unfavorable outcome) remains to be seen, but it’s possible that won’t be needed. At this point they have already achieved the total closure of all targeted sites along with the seizure of their domains. That, along with a clear message to others mulling the same course of action might, in the overall scheme of things, be considered “mission accomplished.” Source: TorrentFreak
  23. Proxy Switcher PRO v5.10.0.6810 There are times when you have to cloak your true IP address. It might be that you want to remain anonymous when you visit a particular website. Or your access to various social networking and entertainment sites has been blocked. The solution is to use Proxy Switcher for all the anonymous browsing needs. It can be used to avoid all sorts of limitations imposed by various sites. Be that a download site that limits amount of downloads. Or video site works only in a particular country - more often than not it gets defeated by the anonymous browsing features Proxy Switcher provides. Whats New Completely revamped test targeting system:Added "negative matching" - check for string in content that should not be there.User defined targets added - full functionality in PRO version.Updated built-in targets.New target configuration window (main menu View->Configure Test Targets...)HTTP request and response trace window.For countries/places where proxy switcher domains are blocked switched from DynDns service for to DTDns as a "last resort DNS lookup".Added new wizard task named "Custom..." - user can select common sub-tasks to be performed.Reworked settings storage, most settings now are stored inside psw.lz file.Website: http://www.proxyswitcher.com/ OS: Windows XP / Vista / 7 / 8 Language: Eng Medicine: Crack Size: 7,76 Mb.
  24. selesn777

    CCProxy 8.0 Build 20140729

    CCProxy 8.0 Build 20140729 Here is a small proxy server makes it easy to get online to all available computers on the local area network in just a single connection. The product can work with different network protocols from the standard HTTP to MMS, it is possible to reassign the ports that you can distinguish between the rights of users, built a good web filter, you can monitor the traffic, plus the product has a good built-in cache, there is a dialer and automatic connection. CCProxy Main features: Modem, Cable Modem, ISDN, ADSL, Satellite, DDN and so on are supported(more).HTTP, FTP, Gopher, SOCKS4/5, Telnet, Secure (HTTPS), News (NNTP), RTSP and MMS proxy are supported.Port Mapping is supported.Web cache can enhance browsing speed. The size and refresh time of cache can be freely changed.Bandwidth control flexibly manages the traffic condition of clients.Time schedule can freely control the clients' on-line time(access time control).Web filter can ban the specified web sites or contents. Also can name specific web sites for browsing.URL filtering prevents users from downloading files with designated extended name via IE.Seven types of account authentication: IP address, IP range, MAC address, User Name/Password, IP + User Name/Password, MAC + User Name/Password and IP + MAC.Parent proxy function enables CCProxy to access the Internet via another proxy.Dial-On-Demand, remote dial up and auto disconnect are supported.Access Logging can keep a full set of the Internet access log.Enable IE, Netscape to access the Internet through HTTP/Secure/FTP (Web)/Gopher.SOCKS5 proxy support allows use of ICQ, MSN Messenger, Yahoo Messenger, CuteFTP, CuteFTP Pro and WS-FTP.Mail proxy supports Outlook, Eudora etc.Supports NetTerm accessing the Internet via Telnet proxy.Supports Outlook connecting to the News server via News proxy.Support SOCKS5 and web authentication.Support for Real Player RTSP proxy and Media Player MMS proxy.Built-in DNS can resolve domain names.Flow Stats.CCProxy News Center Website: http://www.youngzsoft.net/ OS: Windows 2000 / XP / Vista / 7 / 8 (x86-x64) Language: Eng Medicine: Keymaker Size: 1,95 Mb.
×
×
  • Create New...