How do they work technically? I mean I know that they work through real ones, but what else? I asked from within another thread elsewhere, and somebody else was interested too, but no answer so far, probably the wrong thread... Thanks!
It will be hard to get an answer on that here, there are to many proxy owners that do not want their proxy abused, sorry
That in fact was one of the points. Thanks for pointing it out, but it's not that I want to do it and asking here how to, because there's a place where you can download a ready made one. So, with an agreement, it's doable and legitimate, and as far as I know, it might turn out to be beneficial to the real proxy too, if it's done in a certain way. So, thank you for yor post, but is there anybody that can explain it better in detail from a technical point of view?