ezequiel + proxy   81

Installation and configuration (Linux) · ValdikSS/aceproxy Wiki · GitHub
This article assumes you have Ace Stream installed.

Python 2, gevent, psutil are required dependencies and VLC is an optional (yet highly recommended) dependency. You can install all the dependencies with pip: pip install -r requirements.txt. We use VLC only for streaming purposes, it is not required to watch streams using VLC only. [...]
acestream  proxy  configuration  wikientry  documentation  linux  installation  howto  guide  links  github 
4 weeks ago by ezequiel
Using proxy · ValdikSS/aceproxy Wiki
So you have installed AceProxy, what's next?

AceProxy can work with torrents, acelive files and Ace Stream CIDs (40-digit ID).

AceProxy supports plugins. Currently, there are plugins for torrent-tv.ru and torrent-telik.com. All plugins are stored in plugins folder.
acestream  proxy  configuration  example  tips  wikientry  documentation  cli  github 
5 weeks ago by ezequiel
AndreyPavlenko/aceproxy: Ace Stream HTTP Proxy
AceProxy allows you to watch Ace Stream live streams or BitTorrent files over HTTP. It's written in Python + gevent and should work on both Linux and Windows (Mac OS should work too, but was not tested)
acestream  proxy  github  license.mit  opensource  streaming 
5 weeks ago by ezequiel
Television via Acestream on Raspberry PI. Now in docker containers
On Habré, AceStream was repeatedly mentioned: a technology that provides the user access to video streams using the AceStream private P2P protocol, the so-called. torrent tv. AceStream provides access to a distributed content delivery network, i.e. watching the channel, the user transmits data to other users, which allows to drastically reduce the cost of services.
2016  blogpost  acestream  install  raspberrypi  osmc  raspbian  docker.container  sysadmin  howto  links  proxy  github  screenshots  xbmc  configuration 
5 weeks ago by ezequiel
Configure Docker to use a proxy server | Docker Documentation
If your container needs to use an HTTP, HTTPS, or FTP proxy server, you can configure it in different ways: [...]
docker  proxy  configuration  tips  howto  sysadmin  linux  example  documentation  reference  guide 
9 weeks ago by ezequiel
Customizing Docker | Container Linux Docker | CoreOS
The Docker systemd unit can be customized by overriding the unit that ships with the default Container Linux settings. Common use-cases for doing this are covered below.
docker  remote  configuration  example  tips  tcpip  sockets  sysadmin  coreos  linux  systemd  security  tls  ssl  proxy  http  howto  memory 
10 weeks ago by ezequiel
Features/CacheHierarchy - Squid Web Proxy Wiki
Feature: Linking Squid into a Cache Hierarchy

* Goal: To connect multiple Squid together forming a 'mesh' or hierarchy of caches.
* Status: completed.
* Version: 1.2
squid  documentation  spec  proxy  example  wikientry 
11 weeks ago by ezequiel
SquidFaq/SquidMemory - Squid Web Proxy Wiki
Squid uses a lot of memory for performance reasons. It takes much, much longer to read something from disk than it does to read directly from memory.

A small amount of metadata for each cached object is kept in memory. This is the StoreEntry data structure. This is 56-bytes on 32-bit architectures and 88-bytes on 64-bit architectures. In addition, there is a 16-byte cache key (MD5 checksum) associated with each StoreEntry. This means there are 72 or 104 bytes of metadata in memory for every object in your cache. A cache with 1,000,000 objects therefore requires 72MB of memory for metadata only. In practice it requires much more than that.

Uses of memory by Squid include: [...]
squid  memory  configuration  tips  example  wikientry  documentation  faq  proxy  performance 
11 weeks ago by ezequiel
tinyproxy/tinyproxy: tinyproxy - a light-weight HTTP/HTTPS proxy daemon for POSIX operating systems
Tinyproxy is a small, efficient HTTP/SSL proxy daemon released under the GNU General Public License. Tinyproxy is very useful in a small network setting, where a larger proxy would either be too resource intensive, or a security risk. One of the key features of Tinyproxy is the buffering connection concept. In effect, Tinyproxy will buffer a high speed response from a server, and then relay it to a client at the highest speed the client will accept. This feature greatly reduces the problems with sluggishness on the Internet. If you are sharing an Internet connection with a small network, and you only want to allow HTTP requests to be allowed, then Tinyproxy is a great tool for the network administrator.
http  https  proxy  serverapp  linux  unix  freesoftware  license.gplv2  github  links  source  tls  ssl 
11 weeks ago by ezequiel
SquidFaq/ConfiguringSquid - Squid Web Proxy Wiki
Before you start configuring:
The best all around advice I can give on Squid is to start simple! Once everything works the way you expect, then start tweaking your way into complexity with a means to track the (in)effectiveness of each change you make (and a known good configuration that you can always go back to when you inevitably fubar the thing!).
squid  faq  reference  documentation  configuration  sysadmin  networking  proxy  example  tips  wikientry  security  links  releaserelated  oldversion 
11 weeks ago by ezequiel
SquidFaq/SquidAcl - Squid Web Proxy Wiki
Squid's access control scheme is relatively comprehensive and difficult for some people to understand. There are two different components: ACL elements, and access lists. An access list consists of an allow or deny action followed by a number of ACL elements.

When loading the configuration file Squid processes all the acl lines (directives) into memory as tests which can be performed against any request transaction. Types of tests are outlined in the next section ACL Elements. By themselves these tests do nothing. For example; the word "Sunday" matches a day of the week, but does not indicate which day of the week you are reading this.

To process a transaction another type of line is used. As each processing action needs to take place a check in run to test what action or limitations are to occur for the transaction. The types of checks are outlined in the next section Access Lists followed by details of how the checks operate.
squid  faq  reference  documentation  configuration  sysadmin  networking  proxy  example  tips  wikientry  security 
11 weeks ago by ezequiel
Squid - Users - Possible Bug? "parameters()" syntax in acl dstdomain results in rule not working?
A: [...]
> I finally realized there appeared to be something wrong with the
> "parameters" handling of the external file, and turned it into:
> acl WHITELIST dstdomain "/etc/squid/whitelist.txt"
> With that one change it worked properly.
> Is this a known bug?

IIRC, to use parameters(), you need to turn
configuration_includes_quoted_values on: [...]
emailmessage  2018  squid  issue  fileformats  configuration  workaround  tips  networking  sysadmin  proxy 
11 weeks ago by ezequiel
HTTP server test
Includes several other online tools:
* Regex calculator;
* FTP server test;
* HTTP server test;
* SSH server test;
* TCP port checker;
* Ping tool;
* Detect proxy;
* Proxy checker;
* Whois tool;
* Traceroute tool;
* Mtr report tool;
* DNS lookup;
* IP bulk lookup;
* Bulk URL renderer;
* Email account verifier;
* Html color picker;
* Html and css colors;
* Epoch time converter;
* Hash calculator;
* Detect screen resolution;
* Detect screen size;
* Detect DPI;
* Url encoder and decoder;
* Html escaper and unescaper;
* Json encoder and decoder;
* HTML and Javascript editor;
* Website resolution test;
* Browser geolocation test;
* Password generator;
* Internet connection check;
internet  test  tool  online  webserver  links  tcpip  protocol  ssh  regex  ftp  http  proxy  dns  email  html  screen  desktop  textprocessing  security 
11 weeks ago by ezequiel
Using HAProxy with the Proxy Protocol to Better Secure Your Database - HAProxy Technologies
The Proxy protocol is a widely used invention of our CTO at HAProxy Technologies, Willy Tarreau, to solve the problem of TCP connection parameters being lost when relaying TCP connections through proxies. Its primary purpose is to chain proxies and reverse-proxies without losing client information, and it’s used and supported by AWS ELB, Apache, NGINX, Varnish, Citrix, and many more (here’s a longer list of Proxy protocol supported technologies).
proxy  tcpip  2017  security  blogpost  haproxy  protocol  links  article  example 
11 weeks ago by ezequiel
Nginx as forward proxy for HTTPS - Super User
Q: While I was able to successfully configure nginx to proxy HTTP traffic (using this guide), all attempts to proxy HTTPS requests resulted in code 400 (Bad Request). [...]

A: If you don't mind compiling nginx from source, you could install ngx_http_proxy_connect_module. The following worked for me in Debian 9 "Stretch" on a Raspberry Pi (after I added deb-src URLs to /etc/apt/sources.list and did apt-get update): [...]
2013  forumthread  stackexchange  nginx  extension  build  howto  proxy  privacy  tls  ssl  http  configuration  example  tips  links  linux  debian  raspbian  raspberrypi  docker.container 
11 weeks ago by ezequiel
chobits/ngx_http_proxy_connect_module: A forward proxy module for CONNECT request handling
A forward proxy module for CONNECT request handling
This module provides support for the CONNECT method request. This method is mainly used to tunnel SSL requests through proxy servers.
http  ssl  tls  nginx  proxy  github  opensource  extension  source 
11 weeks ago by ezequiel
Tinyproxy is a light-weight HTTP/HTTPS proxy daemon for POSIX operating systems. Designed from the ground up to be fast and yet small, it is an ideal solution for use cases such as embedded deployments where a full featured HTTP proxy is required, but the system resources for a larger proxy are unavailable.

Tinyproxy is distributed using the GNU GPL license (version 2 or above).
http  https  proxy  serverapp  linux  unix  freesoftware  license.gplv2  github  links  example  releaserelated  documentation  manpage  reference 
12 weeks ago by ezequiel
dannydirect/tinyproxy - Docker Hub
A quick and easy to use Dockerised Tinyproxy with configurable ACL.
proxy  docker  virtualisation  networking  security  privacy  http  docker.container 
december 2019 by ezequiel
How to make your own free VPN with Amazon Web Services
Internet users are spoiled for choice when it comes to VPN services, but they either require a monthly subscription, aren’t secure, or are just plain slow. Thankfully, alternatives do exist. They require a bit more technical know-how, but if you want something done right, you have to do it yourself.
amazon  amazon.aws  vpn  howto  tips  article  2018  blogpost  example  linux  amazon.linux  2019  windows  firewall  networking  privacy  terminal  ssh  proxy  sysadmin  cloudcomputing  free 
december 2019 by ezequiel
Re: [squid-users] ipcCreate: fork: (12) Cannot allocate memory from Amos Jeffries on 2011-03-21 (squid-users)
>>> Squid has started to NOT come back up after log rotate. Here is
>>> snippett from cache.log.
>>> Machine has 1G ram and cache_mem is set to 500MB,
>> Squid uses fork() instead of vfork() to spawn helpers, on some OS the
>> fork() implementation prevents extremely huge amounts of virtual
>> memory being "allocated" (even though it is neither allocated nor used).
> I think you mean that on some OS the form implementation 'results in'
> rather than 'prevents'
> on linux this is the 'overcommit' option, on by default in the kernel,
> but many people think it makes their systems more reliable to disable it.
2011  squid  memory  issue  mailinglistpost  kernel  docker  sysadmin  configuration  linux  proxy 
december 2019 by ezequiel
How To Route Web Traffic Securely Without a VPN Using a SOCKS Tunnel | DigitalOcean
Sometimes you're on a network that's insecure or has an overly restrictive firewall, and you need to access a website. You want to make sure no one in the middle is watching the traffic.

One solution is a VPN, but many VPNs require special client software on your machine, which you may not have rights to install.
proxy  ssh  vpn  howto  tips  blogpost  cli  unix  linux  windows  putty  terminal  configuration  security  2016 
july 2019 by ezequiel
How to access Spotify without 3rd Party VPNs – Hacker Noon
[...] If you’re like me, who mostly will be using Spotify on your PC and does not want to go through the hassle of logging every 2 weeks or so, this guide might just do it for you. [...]
proxy  vpn  amazon.aws  howto  guide  tips  example  issue  workaround  spotify 
june 2019 by ezequiel
network - Is there any solution for block the HTTPS traffic using URL filtering? - Information Security Stack Exchange
Q: The URL filtering can block the HTTP traffic but not the HTTPS traffic in Internet Explorer. For example, the website http://www.facebook.com is blocked by the URL filtering while the https://www.facebook.com cannot be blocked. You cannot also block the HTTPS traffic during InPrivate browsing in Internet Explorer.
Is there any solution for block the HTTPS traffic using URL filtering?
2014  forumthread  stackexchange  internet  contentfiltering  links  security  proxy  ssl  tls  privacy  tips 
may 2019 by ezequiel
MITM Filtering HTTPS · e2guardian/e2guardian Wiki
The SSL MITM option allows https sites to be content checked.
HTTPs interception can be configured per group.
ssl  tls  security  e2guardian  configuration  wikientry  documentation  guide  howto  tips  proxy  linux  https 
may 2019 by ezequiel
Configuration · e2guardian/e2guardian Wiki
E2Guardian is a modern fork of Dansguardian and as such it shares much of its configuration variables and settings. A lot of good documentation already exists for Dansguardian that we invite users to take a look at. It may be or particular use to take a look at the big picture installation guide.That said that can be a lot to digest so a quick intro is provided below.
e2guardian  configuration  wikientry  github  sysadmin  networking  proxy  linux  unix  howto  tips  example  links 
may 2019 by ezequiel
Editing Configuration Files · transmission/transmission Wiki
It's not always possible to set all configurations from the GUI, especially on the Daemon or the Web Interface. This guide will try to give an overview of how and what you can change. For the location of these files, look at the Configuration Files page.
bittorrent  gui  software  configuration  environment  howto  linux  unix  gtk  cli  wikientry  github  example  tips  proxy  oldversion  networking 
may 2019 by ezequiel
How to use proxy for Transmission? - Ask Ubuntu
Q: I have heard that Proxy Support in Trasmission has been removed as of version 2.12. Is it possible to use proxy by any other method?
2014  forumthread  stackexchange  bittorrent  linux  gui  proxy  configuration  networking  tips  example  links  ubuntu 
may 2019 by ezequiel
Linux: Setup a transparent proxy with Squid in three easy steps - nixCraft
Y’day I got a chance to play with Squid and iptables. My job was simple : Setup Squid proxy as a transparent server. [...]
2006  squid  proxy  howto  blogpost  sysadmin  linux  guide  centos  debian  networking  redhat  fedora  ubuntu 
may 2019 by ezequiel
How To Forward Ports through a Linux Gateway with Iptables | DigitalOcean
In this guide, we'll demonstrate how to use iptables to forward ports to hosts behind a firewall by using NAT techniques. This is useful if you've configured a private network, but still want to allow certain traffic inside through a designated gateway machine. We will be using two Ubuntu 14.04 hosts to demonstrate this.
iptables  networking  proxy  2015  blogpost  ubuntu.trusty  ubuntu  debian  linux  cli  example  tips  howto  guide  sysadmin 
may 2019 by ezequiel
iptables - Redirect port 80 to 8080 and make it work on local machine - Ask Ubuntu
Q: It works fine for all the world except my own machine. I am a developer and I need to redirect port 80 to 8080 for myself.

My IP is

My web server runs on port 8080

I wish to open website from instead of from same machine where server runs. [...]
2014  2017  forumthread  stackexchange  iptables  firewall  linux  cli  example  tips  sysadmin  networking  security  proxy  webserver 
may 2019 by ezequiel
URLBlacklist.com [archive.org]
[...] You are reminded that this is a commercial service that works upon an honour system. If you use the service then you must buy a subscription. We do not password the blacklist download to keep scripts simple for all users. Please do not abuse the service. [...]
proxy  e2guardian  squid  security  downloads  links  daily  security.list  archived.version  2017 
may 2019 by ezequiel
Blacklists UT1
The Université Toulouse 1 Capitole propose a blacklist managed by Fabrice Prigent from many years, to help administrator to regulate Internet use. This database, often used in school, can be used with many commercial or free software.
Be careful : this list should not be seen as a "to be block". It must be seen as a "web categorization" : some categories can be blocked or allowed, depending on your environnement..
proxy  e2guardian  squid  security  downloads  links  daily  security.list 
may 2019 by ezequiel
Shalla Secure Services KG
Shalla's Blacklists is a collection of URL lists grouped into several categories intended for the usage with URL filters like SquidGuard or Dansguardian. But the usage is not limited to this. Some people use the lists to include them (that is parts of them) into their Squid installation without using a redirector or other webfilters or use them for their IPCop or IPFire installation.
proxy  e2guardian  squid  security  downloads  links  daily  security.list 
may 2019 by ezequiel
Filter Content on Your Home Network with E2guardian | Linux.com | The source for Linux information
[...] E2guardian works in conjunction with another caching proxy (e.g., Squid) and offers all the features you’d need in a home network content filter: [...]
proxy  configuration  blogpost  2015  howto  guide  sysadmin  networking  linux  debian  ubuntu  raspberrypi  raspbian  installation  e2guardian 
may 2019 by ezequiel
Run Chrome/Chromium with proxy settings on Linux - Internal Pointers
[...] Fair enough: Chrome and Chromium cannot read environment parameters I set up for my proxy, so the solution lies in the command line. What follows is the generic option flag for when you invoke Chrome/Chromium from the terminal: [...]
blogpost  2016  cli  chrome.browser  chromium  configuration  proxy  howto  example  tips 
may 2019 by ezequiel
Arm Raspbian Jessie package - e2guardian - Google Groups
Q: [...] it would be good if somebody had the resources/time to run some tests to get some basic benchmarks of what's possible on a pi3. [...]
raspberrypi  forumthread  links  arm  downloads  packages  tips  example  proxy  security  raspbian  e2guardian 
may 2019 by ezequiel
squid : Optimising Web Delivery
Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. It reduces bandwidth and improves response times by caching and reusing frequently-requested web pages. Squid has extensive access controls and makes a great server accelerator. It runs on most available operating systems, including Windows and is licensed under the GNU GPL.
proxy  serverapp  squid  web  freesoftware  license.gpl  links  documentation  reference  howto  tips  downloads  sourcecode  performance 
may 2019 by ezequiel
ConfigExamples/Intercept/SslBumpExplicit - Squid Web Proxy Wiki
Warning: Any example presented here is provided "as-is" with no support or guarantee of suitability. If you have any further questions about these examples please email the squid-users mailing list.
networking  proxy  ssl  tls  configuration  howto  tips  links  example  cli  wikientry  documentation  squid 
may 2019 by ezequiel
Main Index | DansGuardian Documentation Wiki
DansGuardian is an active web content filter that filters web sites based on a number of criteria. These include the website URL, words and phrases included in the page, file type, mime type and more. Below you will find an unofficial collection of documentation, FAQs and HowTos that will help in installing, configuring and managing DansGuardian.
wiki  proxy  opensource  free  linux  documentation  reference  tips  configuration  sysadmin  networking  howto  guide  links  e2guardian 
may 2019 by ezequiel
linux - force LAN hosts to go through proxy - Server Fault
Q: [...] I want the hosts behind my firewall to automatically go through the proxy server without each host needing to set up proxy on their own (mostly because I want to be able to change the proxy address in a single point, because I have different proxies for different network scenarios).

Is there a way to have IPTables force all outgoing traffic on port 80 and 443 to go through the proxy? If not, can I use some other readily available software to get the behavior I need?
2013  forumthread  stackexchange  firewall  iptables  linux  networking  sysadmin  configuration  cli  example  tips  proxy  dhcp 
may 2019 by ezequiel
firewall - How to use iptables in linux to forward http and https traffic to a transparent proxy - Stack Overflow
Q: [...] I now need to create an iptables rule that filters out and redirects all tcp port 80 and 443 traffic leaving my network through the eth1 interface and send it to a proxy server that resides on a loopback interface on tcp port 9090. [...]
2012  forumthread  stackexchange  firewall  iptables  linux  networking  sysadmin  configuration  cli  example  tips  proxy 
may 2019 by ezequiel
Web filtering solution
e2guardian is an Open Source web content filter, It filters the actual content of pages based on many methods including phrase matching, request  header and URL filtering, etc. It does not purely filter based on a banned list of sites
parenting  github  opensource  web  proxy  linux  links  antivirus  e2guardian 
may 2019 by ezequiel
nginx [engine x] is an HTTP and reverse proxy server, a mail proxy server, and a generic TCP/UDP proxy server, originally written by Igor Sysoev. For a long time, it has been running on many heavily loaded Russian sites including Yandex, Mail.Ru, VK, and Rambler. According to Netcraft, nginx served or proxied 25.91% busiest sites in January 2019. Here are some of the success stories: Dropbox, Netflix, Wordpress.com, FastMail.FM.
http  proxy  serverapp  nginx  links  documentation  opensource  license.bsd  linux  sourcecode  downloads 
february 2019 by ezequiel
SquidFaq/SquidMemory - Squid Web Proxy Wiki
Squid uses a lot of memory for performance reasons. It takes much, much longer to read something from disk than it does to read directly from memory.
squid  proxy  wikientry  reference  memory  performance  tips  documentation  faq  http  unix  linux  bsd 
february 2017 by ezequiel
X-Forwarded-For - Wikipedia, the free encyclopedia
The X-Forwarded-For (XFF) HTTP header field was a common method for identifying the originating IP address of a client connecting to a web server through an HTTP proxy or load balancer. As of 2014 RFC 7239 standardized a new Forwarded header with similar purpose but more features compared to XFF.[1] An example of a Forwarded header syntax: [...]
wikipedia  wikientry  http  internet  protocol  links  proxy 
april 2016 by ezequiel
How to configure emacs behind an authenticated http proxy? - Stack Overflow
There's another question that answers this though it doesn't specify anything regarding proxy authentication.

Its solution is

(setq url-proxy-services '(("no_proxy" . "work\\.com")
("http" . "proxy.work.com:911")))
emacs  configuration  proxy  editor  unix  linux  windows  macosx  forumthread  issue  fix  workaround  stackexchange 
february 2015 by ezequiel
Emacs behind http proxy - Stack Overflow
Emacs is able to access the internet with packages such as url.el or the W3 web browser.
Also, the Emacs Lisp Package Archive is heavily dependant on package url.el.
Now, how do I configure Emacs to use my HTTP proxy to connect to the internet in general ?
Bonus points for any help with ELPA behind a proxy
emacs  proxy  editor  linux  unix  configuration  forumthread  stackexchange 
february 2015 by ezequiel
Use ELPA (emacs) behind proxy requiring authentication - Stack Overflow
I have read this and this thread. In both they say Emacs can deal with authentication, but it does not work for me.
emacs  packagemanager  issue  proxy  editor  workaround  patches  fix  forumthread  stackexchange 
february 2015 by ezequiel
How To Connect To CVS Via Proxy Server [tech.gaeatimes.com]
CVS is commonly used by open source project to provide access to their source code. Here is a simple way how you can connect to CVS server from behind a proxy server.
cvs  tips  howto  proxy  firewall  networking  2007  linux  unix  windows 
february 2015 by ezequiel
How to configure a HTTP proxy for svn - Stack Overflow
I want to check code from the repository [...] . I can only access the the repository url by setting a proxy. [...]
proxy  configuration  subversion  howto  tips  forumthread  cli  unix  linux  windows  macosx  networking  stackexchange 
january 2015 by ezequiel
How can I access Red Hat Network (RHN) Classic, Red Hat Satellite or Proxy server via an HTTP proxy? - Red Hat Customer Portal
I use an HTTP proxy when accessing external web sites.  How can I access Red Hat Network (RHN) Classic, my Red Hat Satellite or Red Hat Satellite Proxy server via a HTTP proxy?
redhat  centos  issue  proxy  networking  security  howto  guide  tips  configuration  sysadmin  linux  article 
november 2014 by ezequiel
CentOS • View topic - [SOLVED] CentOS proxy authentication
[...] For internet access I need to authorise via proxy server. CentOS 6 is installed on an esx-server. If I start Firefox an authorise-popup apper. Using my usernam and password access is granted. But in the terminal and other services (yum) is no access to internet. [...]
centos  redhat  forumthread  proxy  issue  fix  sysadmin  configuration  networking  security  linux 
november 2014 by ezequiel
txt » CVS Through Proxy
cvs command using "-d pserver"... to connect to a cvs server through a http proxy.
cli  tips  cvs  proxy  development  scm  linux  unix  blogpost 
october 2014 by ezequiel
Nginx Community
nginx (pronounced engine-x) is a free, open-source, high-performance HTTP server and reverse proxy, as well as an IMAP/POP3 proxy server
http  proxy  server  serverapp  webserver  opensource  linux  unix  software  performance  nginx 
august 2014 by ezequiel
Getting git to work with a proxy server - Stack Overflow
How do I get git to use a proxy server?

I need to check out code from a git server, it shows "Request timed out" every time. How do I get around this?

Alternatively, how can I set a proxy server?
git  github  bitbucket  proxy  howto  forumthread  stackexchange 
august 2014 by ezequiel
How to use git behind a proxy - Stack Overflow
I am using msysgit from behind a proxy. As I said in question Getting git to work with a proxy server. I have set system variable http_proxy to a value. Later I call [...]
git  github  bitbucket  proxy  howto  forumthread  stackexchange 
may 2014 by ezequiel
How do I pull from a Git repository through an HTTP proxy? - Stack Overflow
Note: while the use-case described is about using submodules within a project, the same applies to a normal git clone of a repository over HTTP.
git  github  bitbucket  proxy  howto  forumthread  stackexchange 
may 2014 by ezequiel
Free Proxy Servers - Protect Your Online Privacy with Our Proxy List
Proxy 4 Free is a free proxy list and proxy checker providing you with the best free proxy servers for over 10 years. Our sophisticated checking system measures many parameters and combine them to compute our unique rating. One index to rule them all :-) that includes dozens of various characteristics and how do they change in time. Only the best proxies receive the maximum rating of 100. View our Proxy List Sorted By Rating!
free  privacy  proxy  internet  web  links 
august 2013 by ezequiel
Privoxy - Home Page
Privoxy is a non-caching web proxy with advanced filtering capabilities for enhancing privacy, modifying web page data and HTTP headers, controlling access, and removing ads and other obnoxious Internet junk. Privoxy has a flexible configuration and can be customized to suit individual needs and tastes. It has application for both stand-alone systems and multi-user networks.
privacy  proxy  web  internet  software  freesoftware  linux  unix  license.gplv2  manual  documentation  faq 
august 2013 by ezequiel
How Proxied Torrents Could End ISP Subpoenas - Slashdot
"With the announcement of Verizon's "six strikes plan" for movie pirates (which includes reporting users to the RIAA and MPAA), and content companies continuing to sue users en masse for peer-to-peer downloads, I think it's inevitable that we'll see the rise of p2p software that proxifies your downloads through other users. In this model, you would not only download content from other users, but you also use other users' machines as anonymizing proxies for the downloads, which would make it impossible for third parties to identify the source or destination of the file transfer. This would hopefully put an end to the era of movie studios subpoenaing ISPs for the identities of end users and taking those users to court."
Read below for the rest of Bennett's thoughts.
internet  privacy  p2p  piracy  bittorrent  software  slashdot  2013  geek  protocol  proxy 
january 2013 by ezequiel
« earlier      
per page:    204080120160

bundles : computing

related tags

acestream  amazon  amazon.aws  amazon.linux  amd64  android.app  antivirus  apt  archived.version  arm  article  astaro  bitbucket  bittorrent  blogpost  browser  bsd  build  centos  chrome.browser  chromium  cli  cloudcomputing  configuration  contentfiltering  coreos  cvs  cygwin  daily  debian  desktop  development  dhcp  dns  docker  docker.container  documentation  downloads  e2guardian  editor  emacs  email  emailmessage  environment  example  extension  faq  fedora  fileformats  firewall  fix  flash  forumpost  forumthread  free  freesoftware  freeware  ftp  geek  git  github  google  gtk  gtk2  gtk3  gui  guide  haproxy  howto  html  http  https  install  installation  internet  iptables  issue  it  kernel  license.apache  license.bsd  license.gpl  license.gplv2  license.mit  links  linux  macosx  mailinglistpost  manpage  manual  memory  midori.browser  networking  nginx  oldversion  online  opensource  osmc  p2p  packagemanager  packages  parenting  patches  performance  piracy  posix  postgresql  ppa  privacy  protocol  proxy  putty  raspberrypi  raspbian  redhat  reference  regex  releaserelated  remote  repository  resources  reverseproxy  samba  scm  screen  screenshots  scripting  scripts  security  security.list  server  serverapp  slashdot  sme  sockets  software  source  sourcecode  sourceforge  spec  spotify  sql  squid  ssh  ssl  stackexchange  streaming  subversion  support  sysadmin  systemd  tcpip  tech  technology  terminal  test  textprocessing  tips  tls  tool  tutorial  ubuntu  ubuntu.lucid  ubuntu.trusty  uk  unix  virtualisation  vpn  web  webkit  webserver  wiki  wikientry  wikipedia  windows  workaround  x11  x86  xbmc 

Copy this bookmark: