You can send us a message. You should type your Email and Message.



Subscribe to RSS:

Twitter RSS Share
Your IP:

13 jul

Updated new version of Secure Kit 3.0

Now support Windows and Mac OS X.

More about Secure Kit 3.0

Security basics

The first book of the anonymity in the Internet

Types of proxy HTTP, HTTPS, Socks

There are many types of proxy, but it's enough to know just some of them for efficient and safe work. Our service offers to buy VPN and Socks proxy. There also exist other false names of this type of proxy: Sox, Soks or Socs).

HTTP proxy

HTTP-proxy is the most common type of proxy. Its main goal is to manage functioning of browsers and other programs that use HTTP. Principle of operation: a program or a browser sends a query to a proxy-server to open a definite URL resource, the proxy-server receives data from the demanded resource and gives the data to your browser. Possibility to control following queries is available due to HTTP proxy:

  • it is possible to save loaded files (images, pages etc.). Later on, if a file has been loaded formerly, it is possible to get it from the hard disk without access to Internet (caching). So, speed of opening pages increases and external traffic is saved. On practice, this economy is reduced to some percents as many sites form their pages dynamically (for example, blogs);
  • restrict access to definite resources. For example, create a "black list" of sites that should not be accessed by users;
  • delivery of another resource, different from the demanded, is possible. For example, delivery transparent images instead of banners with ads and counters. Those images won't brake site's design but will save time of loading pages and traffic considerably;
  • limitation of operation speed for definite users or resources is possible. For example, it is possible to set a limitation to loading *.avi files to 100 Kb/sec, to avoid traffic workload of your server;
  • ability to log. It is possible to estimate traffic by specified user, see attendance of popular sites;
  • routing of queries is possible. For example, send one part of users' queries directly, and the other part - through other proxies;

Pros and cons of HTTP proxy from the point of view of your safety and anonymity:

+ caching of attended pages, fast loading;

- enhanced control over clients who use this type of proxy, including logging, is possible;

- there is no support of encrypted SSL connection. You won't be able to work, for example, with your bank account, as the access to account is realized through the protocol HTTPS;

- works only with applications through the protocol HTTP;

- transmits your real IP address in heading of query; this totally excludes this type of proxy from the rank of anonymous.

HTTPS proxy

HTTPS-proxy - in fact it's an HTTP-proxy, letter "S" in this case means "secure". This protocol is used when it is necessary to transmit secret information, for example, logins/passwords of bank accounts, numbers of plastic cards. While using a common HTTP proxy, all information transmitted through it may be intercepted using the proxy or on a lower level. For example, your Internet provider intercepts and logs absolutely all your activity in Internet. According to Russian law, those logs are kept forever and are a reasonable proof of your actions in Internet. That's why the protocol HTTPS is used for safety of personal data, and all transmitted traffic is encrypted by algorithm resistant to breaks.

Principle of operation: a proxy-server connects to a resource and your traffic is encrypted. This method excludes the possibility to find out what information is transmitted though proxy-server (this limits the use of a proxy as a filter, for example, for images). Besides this, a proxy doesn't participate in the process of coding and decoding. This is done by client's program (for example, browser) and target server. Instead of HTTPS proxy recommend using secure VPN without logs. So, HTTPS proxy deals with passive transmission of coded information and doesn't make any treatment of transferred information. Such method of work allows to use HTTPS proxy to transmit almost all TCP-protocols. I.e., HTTPS may be used as POP3, SMTP, IMAP, NNTP proxy.

Pros and cons of HTTPS proxy from the point of view of your safety and anonymity:

+ caching of attended pages, fast loading;

+ support of safe connection HTTPS;

+ it's impossible to track the transmitted information;

- transmits your real IP address in heading of query; this totally excludes this type of proxy from the rank of anonymous.

Socks proxy

Today socks proxy (sometimes called Socs, Sox, Soks by mistake) is the most progressive protocol of protocol of data transmission. It was developed by (Dave Koblas). This protocol got over many changes and at the present two types of the protocol are used - Socks4 and Socks5. The protocol is a compiler, but comparing with other proxies, a Socks-client is between application and transport levels in the network. Socks-server is on application level. So, we can say that such a server does not relate to protocols of high level. The protocol Socks was developed to allow the programs that work basing on TCP and UDP to use network resources limited in access by network settings or architecture of an application (for example, for accounts that doesn't support usage of proxy: TheBat, Opera and other applications that doesn't support usage of proxy).

Socks server

There are some distinctions between versions of protocol. Socks4 supports TCP. Socks5 (RFC 1928) is an extension of 4th version of the protocol and includes support of UDP. Socks 5 extends the general structure allowing to use generalized schemes of identification, and the system of addressing with the domain name and address IPv6. In other words, Socks 4 supports only TCP. Socks 5 supports TCP, UDP, authorization by login and password and possibility of remote DNS-query.

Socks provides total anonymity in the Internet. For example, all browsers use protocol HTTP (the protocol works on TCP), and there is no difference for us when choosing a Socks version to use. Socks doesn’t have any relation to HTTP and doesn't perform moderation of HTTP-heading. That's why Socks-server will transmit the information through itself in the raw. So, all Socks-servers are anonymous. Socks proxy doesn't transmit information about your IP address. Due to this, the Web server attended by you can't define in any way that you are using the Socks proxy. Your connection will be absolutely clear for it, like you're working directly with it. The Web server will just see the IP of socks, but not yours. Another convenience while working with Socks is that it may work with many protocols such as HTTP, HTTPS, FTP and others, that's why one Socks is enough for work.

Due to Socks technology, you may easily form a chain. Your anonymity will be secured as at Socks chain all your data will pass through the Socks-servers that may be situated in different parts of the planet. For maximum safety, we recommend to use a chain Double VPN + proxy.

There exist some ways of using Socks. The process of using Socks is called socksify of an application. You may socksify the browser directly, having found the field Socks in browser's settings. But it is more comfortable to use programs-socksifiers. In most OS this process is already embedded into the system. For example, in Linux an application may be sockified by a runsocks-application. For OS Windows many programs-socksifiers exist, they are FreeCap, SocksCap, Sockschain, Proxifier and Proxy Helper. After registration on our site, into your account (FAQ section) you may find detailed instructions on setup of different applications.

Pros and cons of Socks proxy from the point of view of your safety and anonymity:

+ works with many protocols: HTTP, HTTPS, FTP and others;

+ does NOT transmit your real IP address in queries, is absolutely anonymous;

+ socks chain increases your anonymity manifold;

- a really good Socks server costs a good deal of money.

Learn how to buy elite proxies on our website. We sell a proxy with the most secure protocol Socks 5.

Our knowledge and experience will help you to be anonymous!