Краткая помощь

Published on a commercial basis:

Frequently Asked Questions

Can a proxy make me anonymous to HotMail, Yahoo! Mail, etc, so that I can send anonymous e-mail?

Yes. As long as you are connected to the HotMail server through an anonymous proxy server, your IP address is hidden, and all e-mail that you send with the web-forms on the HotMail server has no track of your true location. It is so for all web-based e-mail services, like mail.com, as well as for web-based chat boards like Yahoo! Chat. There is a possible trap, however: many of such services use a secure connection when you send e-mail or when you logon to your account. Therefore it is very important to make sure that your proxy supports HTTPS and configure your browser to use the proxy for the Secure protocol in addition to the ordinary HTTP.

What is an anonymous proxy server?

Any web site in the world can track your movements through its pages and monitor your reading interests using your IP address, a unique ID assigned to each computer on the Internet. Depending on the policies of the Internet resource, you might not be able to get access to the information you need. Also, your visit can be registered and used later to gather some personal information about you.

It is widely agreed that governments and organizations publish dummy websites on controversial topics for the purpose of monitoring interested parties. Also, this information, in combination with your e-mail address, can be used to increase the number of targeted advertisements fired at you by the marketers.

Using only your IP address and the information about your operating system, a Web site can automatically exploit security holes in your system using some not-very-complex, ready-made, free hacking programs. Some of such programs may just hang your machine, making you reboot it, but other, more powerful ones, can get access to the content of your hard drive or RAM. The anonymous proxy prevents this by hiding your IP address so that no one can access your computer via the network. In most cases, however, proxies do inform the target server about the address of the computer that made the request, transmitting your IP-address in different forms.

Anonymous (real anonymous!) proxy servers don't transfer the information about the IP-address of the client, and thus effectively hide the information about you and your surfing interests. Besides that, some proxy servers can also hide the very fact that you are surfing through a proxy server! Anonymous proxies can be used for all kinds of Web-services.

CGI And PHP Proxies

Normal HTTP Servers, that is, servers which are used for example for web browsing, can be used to run proxy scripts for different reasons, mainly security and privacy.

The most common scripts run on HTTP servers are CGI and PHP scripts.

CGI scripts retrieve information from the URL which we want to access, either HTTP or FTP, and update any resource or embedded URLs to point back to the server through the script. This way, our personal information is not sent to the server, providing additional security. These scripts allow extended filtering of ads and cookies and can even remove JavaScript and VBScript from the information retrieved, among other protective uses.

PHP scripts are very similar to CGI proxy scripts and can be run on HTTP proxies mainly to bypass proxy restrictions through a web interface. An additional use of PHP proxies, other than those of CGI proxies, is to bypass restricted access to URLs that may be blocked from the proxy itself.

How to bypass a corporate proxy server?

In this case you can use:

  • anonymizers (PHP proxy) like our service
  • a chain of proxy servers (read about proxy chaining in our proxy FAQ)

What is a free proxy server?

It is a proxy server which is free and open for everybody on the Internet. There is quite a large number of public proxy servers in many countries but most of them are not anonymous.

How Does A Proxy Server Work When Browsing The Internet?

When browsing the internet from a home PC, there are several elements that make the whole process possible.

First of all, on one end, we have our home PC. This PC is connected via its modem to the ISP’s server, which in turn is interconnected to servers around the world that host the specific web sites that we are requesting.

From a web browser, we send a request to access a specific website by typing the site’s address

When we hit “Enter”, this request is sent to our ISP’s server, which identifies the request. If the ISP has a proxy server with cached requests, when retrieving our request it will look up the information in its cache to determine if the proxy can comply or not. This means that the proxy server saves all requests made from users to its cache, so that the next time another user makes the same request, it does not have to retrieve that same information from the original server. The proxy server responds by sending the information to our PC from its cache.

On the other hand, if the proxy server cannot comply, it will send the request to the real server that hosts the specific website that we are requesting. The host server sends that information to the proxy server, which can then cache the response for future requests, and then sends the information to our PC. Sometimes, more than one proxy server can be involved, as some sites, like MSN, Yahoo, and AOL have several proxy servers that respond to requests from their cache, thus reducing the amount of petitions to the main server and reducing response times.

In a corporate network, even more elements form part of the process. Apart from the possibility of having its own proxy server to improve performance, the proxy can also act as a filter from the employees’ terminal, blocking attempts to access specific content from their web browsers. Additionally, companies have mail servers that store and distribute emails over its local network and WAN. All potential viruses are filtered at this stage before it can reach an employee’s PC. Servers also provide additional security through firewalls either from the proxy itself or from a firewall server dedicated to such purpose.

Is the "anonymous proxy server" I came across on the Internet really an anonymous one?

Most probably, No. We have studied more than 8,000 public proxy servers and found that only a few hundred of them are true anonymous proxy servers. Although almost half of all servers call themselves "anonymous" because they do not transfer the client's IP address in the standard way, nevertheless the address is present in their requests in other different forms and therefore they do not provide any anonymity. Besides, we found that some proxies transfer the IP address of the client occasionally, from time to time.

Proxies Classification for "Dummies"

There are several types of proxies. Proxy of each type is designed to solve its specific tasks, however they have much in common, and their abilities coincide in many features.

HTTP Proxy

It is the most widespread type of proxy servers and when you hear just "proxy", it means nothing, but this type of a server. Earlier with a help of this proxy it was only possible to view web pages and pictures and download files. Now, new program versions (ICQ, etc.) know how to work through the HTTP proxies. Browsers of any versions know how to work with this type of proxy.


These proxy servers know how to work practically with any type of information on the Internet (TCP/IP protocol), however for their use in programs there should be obviously indicated a ability to work with SOCKS proxy. Some additional programs are necessary for using of SOCKS proxies within a browser (browsers do not know how to work through SOCKS proxy). However, any ICQ versions (and many other popular programs) can work perfectly through the SOCKS proxies. At last, we want to pay attention, while working with socks proxies it is necessary to specify its version: socks 4 or socks 5.

CGI Proxy (anonymizer)

This type of proxy server could be accessed only with a browser. In other programs their using is complicated (and one does not need it, there are HTTP proxies). However as this type proxy is initially designed for operation through a browser, one can use it in a very simple way. Moreover, you can construct a chain from CGI proxies without any problems.

FTP proxy

This type of proxies is highly specialized and aimed for work only with FTP servers. You can use these proxies in most popular file managers (FAR. Windows Commander, etc.), download managers (CuteFTP, GetRight, etc.) and in browsers.

I have downloaded a free proxy server, but proxy doesn’t work, though it’s a successfully tested. What could be the reason?

There could be several reasons:

  1. The proxy server is operational, but because it's remote from you and the proxy is too slow, it takes quite a while for the response to reach your PC - therefore, you think the proxy doesn't work;
  2. Your ISP has restricted access to certain web-sites and then it has found out your were using the proxy server to access these prohibited web-sites. As a result, your ISP has restricted access to this proxy server (only!) for you (only!).
  3. The proxy server's ISP (a proxy-server is a computer connected to the Internet, it also has its own ISP) has denied access to the proxy server from your network (or from your ISP - for competition reasons). In fact, there could be many reasons for this, absolutely beyond you and not anyhow related to you;
  4. The proxy server's settings prohibit the use of the proxy server from your network (see item 3);
  5. This proxy server is a corporate proxy, that means it has a list of computers (allowed IP addresses) which are allowed to use it. In this case, even if your neighbour uses this proxy successfully, access to this proxy server may be closed for you;
  6. And finally. It could be that you have set your proxy incorrectly! These things also happen. See proxy FAQ on how to set up a proxy server.
© 2007-2021 HideMeFirst.com
For personal use only.
Terms of Service


Основан на анонимайзере HideME.ru

Error: Cache dir: Permission denied!
Error: Can't open cache file!
Error: Can't write cache!