Proxify
Encyclopedia
Proxify is a non-free, single-serving website that enable users to communicate more anonymously
Anonymizer
An anonymizer or an anonymous proxy is a tool that attempts to make activity on the Internet untraceable.It is a proxy server computer that acts as an intermediary and privacy shield between a client computer and the rest of the Internet...

 on the Internet. An example of this is to have Proxify use an SSH tunnel, already created and listening in on the localhost.
This can be done using PuTTy to dynamically listen in to the host and redirecting traffic through the tunnel. Proxify is then used to hook applications into using the tunnel without configuring the different applications itself.

Proxify matches its registration information with a WHOIS
WHOIS
WHOIS is a query and response protocol that is widely used for querying databases that store the registered users or assignees of an Internet resource, such as a domain name, an IP address block, or an autonomous system, but is also used for a wider range of other information. The protocol stores...

 database, as reassurance. There are three general pre-configured options (max speed, max security, or compatibility) with users able to tweak the settings otherwise.

Although free searches are offered, a message may appear: Proxify is experiencing higher than normal traffic volume. We must restrict access to our free service during peak usage times to ensure the best possible experience for paid subscribers. Please login to your account or signup for immediate access.

Because it uses the HTTPS
Https
Hypertext Transfer Protocol Secure is a combination of the Hypertext Transfer Protocol with SSL/TLS protocol to provide encrypted communication and secure identification of a network web server...

 protocol, it can be considered to be secure to eavesdropping and man-in-the-middle attacks
Man-in-the-middle attack
In cryptography, the man-in-the-middle attack , bucket-brigade attack, or sometimes Janus attack, is a form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other...

, but it has the disadvantage of requiring the users to connect to particular IP addresses
IP address
An Internet Protocol address is a numerical label assigned to each device participating in a computer network that uses the Internet Protocol for communication. An IP address serves two principal functions: host or network interface identification and location addressing...

, making it fairly easy to block by almost any firewall
Firewall (computing)
A firewall is a device or set of devices designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass....

.
The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK