partially blocked by websites and services, and offer a fair, general compromise
in terms of anonymity.
Through Proxy Scrapers
Proxy Scrapers are software programs designed to scrape, or collect proxies
over the web, in order to obtain the latest proxies, faster and with no efforts.
Once again, we suggest you to use any search engine; we found some for you,
hoping it can be helpful:
•
Net Ghost
•
GatherProxy Scraper
•
Proxy Harvester
•
Holy SEO Proxy Scraper
Beware using those programs. Almost all are poorly programmed or, worse,
they may contain harmful code for your Operative System (Proxy Scrapers are
not always designed for fair purposes, and you make your bed...). The best thing
you can do, then, is to make your own scraper, using a programming language
and being very, very patient.
Through Premium Lists
Premium Lists are sites or newsletters/mailing lists containing an index of
proxies not publicly shared yet. Such lists are mostly paid or reserved to elite
groups. Actually, there are very few public services offering paid proxy lists, and
the last remaining ones are not that exclusive, after all:
•
Hidemyass
(around 24€/lifetime)
•
Premium Proxy Switcher
(around 9€/month)
•
ProxySolutions
(around 18€/month)
•
SharedProxies
(around 8€/10 proxyes)
•
Coolproxies
(around 10€/month)
2.4.2.3 How to use Proxies
On the whole Operating System
At this point, every user should be able to connect to a proxy, with more or
less difficulties, according to the Operating System in use and its version.
In example: on Windows (Figure 6) you can set a proxy for the entire
computer following this path: Control Panel -> Internet options -> Connections
-> LAN settings -> Proxy Server, while you can try different methods at the
same time on Windows 8 (but it’s quite confusing). Once you reached the
location, you can enter the proxy address and port into the relevant fields.
Figure 6: using a proxy in the Windows OS environment
Fortunately, the graphical environments of GNU/Linux (Figure 7) make
things simpler: on Debian with GNOME 3, you can go to Settings -> Network -
> Network Proxies.
Figure 7: using a proxy in the Debian environment with Unity
To close this little chapter, we are mentioning the Apple operating system: in
macOS (Figure 8) you can reach the option through System Preferences ->
Network -> Advanced -> Proxy. Here you can also specify the different service
types to filter and assign each one the related authentication data (in the case of
SOCKS5).
Figure 8: using a proxy in the OSX/macOS environment
Once again, you can run the same process on Linux command line, using a
text editor (nano) and editing the file you can find in /etc/environment:
$ su
$ nano /etc/environment
As stated previously, regarding the graphical configuration, we will compile
the file pasting the following lines:
http_proxy="http://myproxy.server.com:8080/"
https_proxy="http://myproxy.server.com:8080/"
ftp_proxy="http://myproxy.server.com:8080/"
no_proxy="localhost,127.0.0.1,localaddress,.localdomain.com"
Please keep in mind, however, that some internal programs (such as APT for
Debian/Ubuntu-base distros) will bypass that reading
[8]
.
Using programs
Some software, such as sharing, chat, and other programs, allow the final
user to use internal proxy configurations. The reasons may vary (enterprise
grade, university, and other types of proxies) and this allows to use a proxy to
anonymize incoming and outgoing connections as well. In order to know
whether a program provides proxy functionalities or not, please see the official
documentation.
Proxychains
The proxychains
[9]
software is one of the best for using proxies in a targeted
way; perhaps it is the best proxifier currently available. Unfortunately, its
development halted in 2013: the good news is that a fork has been introduced,
Do'stlaringiz bilan baham: |