Fake proxies...

Discussion in 'General Chat' started by uca, May 13, 2007.

  1. #1
    How do they work technically? I mean I know that they work through real ones, but what else?

    I asked from within another thread elsewhere, and somebody else was interested too, but no answer so far, probably the wrong thread...

    Thanks!

    :)
     
    uca, May 13, 2007 IP
  2. login

    login Notable Member

    Messages:
    8,849
    Likes Received:
    349
    Best Answers:
    0
    Trophy Points:
    280
    #2
    It will be hard to get an answer on that here, there are to many proxy owners that do not want their proxy abused, sorry :)
     
    login, May 13, 2007 IP
  3. uca

    uca Well-Known Member

    Messages:
    2,242
    Likes Received:
    69
    Best Answers:
    0
    Trophy Points:
    155
    #3
    That in fact was one of the points.

    Thanks for pointing it out, but it's not that I want to do it and asking here how to, because there's a place where you can download a ready made one.

    So, with an agreement, it's doable and legitimate, and as far as I know, it might turn out to be beneficial to the real proxy too, if it's done in a certain way.

    So, thank you for yor post, but is there anybody that can explain it better in detail from a technical point of view?

    :)
     
    uca, May 13, 2007 IP