This is the unofficial blog of Computer Communications; Information Science; Fifth Semester; B Section; M S Ramaiah Institute Of Technology; Bangalore
Schedule for Seminars
* 22nd September 2009, Seminar by Teams CC14 & CC19, supervised by SID * 29th September 2009, Seminar by Teams CC01 & CC07, supervised by SID * 6th October 2009, Seminar by Teams CC03 & CC04, supervised by MKN * 13th October 2009, Seminar by Teams CC05 & CC06, supervised by MKN * 20th October 2009, Seminar by Teams CC02 & CC08, supervised by RMG * 27th October 2009, Seminar by Teams CC09 & CC10, supervised by RMG * 3rd November 2009, Seminar by Teams CC11 & CC12, supervised by SRM * 10th November 2009, Seminar by Teams CC13 & CC15, supervised by SRM * 24th November 2009, Seminar by Teams CC16 & CC17, supervised by SID * 1st December 2009, Seminar by Teams CC18 & CC20, supervised by RMG
Post Directly To This Blog
You may add your post directly into this blog by mailing it to the following id- sourav894.netbrainz@blogger. com
Answers Pertaining your questions a)what are open proxies Open proxy servers are proxy servers which do not require a user to log on and verify their identity in any way. i.e If you DO NOT need to type in a user and password, it is VIRTUALLY always an open proxy server.
Dangers of using an open proxy 1) there is no way of knowing you're who you claim to be. Companies and ISP providers check for following things while encountering a proxy connection-: Server checks to see if your connection has any of the common proxy ports open. If it finds that these ports are open, the service checks to make sure it is a closed proxy by attempting to connect to it. If a connection is made, the service checks to see if the proxy requires a password. If the proxy does not require a password, the service will usually raise a red flag and deny you from using or purchasing items and services. 2)Many hackers use open proxy services to commit credit card fraud and attack online users 3)They can also access any information you give out over a proxy, including user names and passwords, credit card numbers, your name, address, phone number, just about any information you provide while behind an open proxy can be accessed if the proxy isn't secured.You may think by using a proxy you've made yourself secure but the server the proxy is located on knows where you've gone using the proxy. 4)Because you don't know who is in control of the computer you've connected yourself to and your passwords can be sniffed out and your firewall can be tunneled, revealing your real IP address.
1 comments:
Answers Pertaining your questions
a)what are open proxies
Open proxy servers
are proxy servers which do not require a user to log on and verify their identity in any way. i.e If you DO NOT need to type in a user and password, it is VIRTUALLY always an open proxy server.
Dangers of using an open proxy
1) there is no way of knowing you're who you claim to be. Companies and ISP providers check for following things while encountering a proxy connection-:
Server checks to see if your connection has any of the common proxy ports open. If it finds that these ports are open, the service checks to make sure it is a closed proxy by attempting to connect to it. If a connection is made, the service checks to see if the proxy requires a password. If the proxy does not require a password, the service will usually raise a red flag and deny you from using or purchasing items and services.
2)Many hackers use open proxy services to commit credit card fraud and attack online users
3)They can also access any information you give out over a proxy, including user names and passwords, credit card numbers, your name, address, phone number, just about any information you provide while behind an open proxy can be accessed if the proxy isn't secured.You may think by using a proxy you've made yourself secure but the server the proxy is located on knows where you've gone using the proxy.
4)Because you don't know who is in control of the computer you've connected yourself to and your passwords can be sniffed out and your firewall can be tunneled, revealing your real IP address.
Post a Comment