Home | JSP | EJB | JDBC | Java Servlets | WAP  | Free JSP Hosting  | Spring Framework | Web Services | BioInformatics | Java Server Faces | Jboss 3.0 tutorial | Hibernate 3.0 | XML

Tutorial Categories: Ajax | Articles | JSP | Bioinformatics | Database | Free Books | Hibernate | J2EE | J2ME | Java | JavaScript | JDBC | JMS | Linux | MS Technology | PHP | RMI | Web-Services | Servlets | Struts | UML


Open Source Resources

*Open source Home
*Open source Books
*Open source Browser
*Open source Code
*Open source Community
*Open source CRM
*Open source Download
*Open source Hardware
*Open source HTML
*Open source Image
*Open source Java
*Open source Software
*Open source Voip
*Open source Jobs
*Open source E-mail
*Open source E-mail Server
*Open source Exchange
*Linux Open Source
*Open Source CMS
*Open Source Groupware
*Open Source e-commerce
*Open Source Frameworks
*Open Source PDF
*HTML Editor Open source
*Open Source Database
*Open Source DBMS
*Open Source FTP
*Open Source Reports
*Open Source Shopping Cart
*Open Source Calendar
*Open Source Ajax
*Open Source Blog
*Open Source Text Editor
*Open Source chat
*Open Source CD
*Open Source ERP
*Open Source Wiki
*Open Source Content Management
*Open Source Defination
*Open Source Directory
*Open Source Document management
*Open Source Forum
*Open Source Games
*Open Source Identity
*Open Source Java Database
*Open Source Knowlegement base software
*Open Source point of sales
*Open Source portals
*Open Source RFID
*Open Source Server
*Open Source Project
*Open Source C++
*Open Source Firewall
*Open Source Intelligence
*Open Source Accounting Software
*Open Source router
*Open Source SQL
*Open Source XML Editor
*Open Source PHP
*Open Source Templates
*Open Source content Management system
*Open Source Metaverse
*Open Source Outlook
*Open Source Web Templates
*Open Source Bug Tracking
*Open Source Game Engine
*Open Source GPS
*Open Source Intranet
*Open Source POS
*Open Source Proxy
*Open Source Sound
*Open Source Web Mail
*Open Source PIM
*Open Source Media Center
*Open Source Backup Software
*Microsoft Open Source
*Best Open Source Software
*Mac OS X Open Source
*Open Source Images
*Open Source Midi
*Open Source Victor
*Open Source Excel
*Open Source Movement
*Palm Open Source
*IBM Open Source
*Open Source Databases
*Open Source dreamweaver
*Open Source ISO
*Open Source MMORPG
*MIT Open Source
*Open Source DRM
*Open Source DVD Ripper
*Open Source Encryption
*Open Source JavaScript
*Open Source JMS
*Open Source Version control
*Open Source Web Page
*Open Source Download Manager
*Open Source IRC
*Open Source MP3 player
*Open Source Testing
*Open Source PVR
*MySql Open Source
*Developer open Source Library
*open Source Installer
*open Source Institute
*open source project management
*open source Accounting
*open source Antivirus
*open source Application Server
*open source Business Model
*open source Workflow engines in java
*Open Source JVM
*Open Source Billing Software
*Open Source for Business

Struts Resources
*Struts Books
*Struts Articles
*Struts Frameworks
*Struts IDE
*Struts Links
*Struts Presentations
*Struts Projects
*Struts Software
*Other Struts Tutorial
Visit Forum! Post Questions!
Jobs At RoseIndia.net!

Have tutorials?
Add your tutorial to our Java Resource and get tons of hits.

We offer free hosting for your tutorials. and exposure for thousands of readers. drop a mail

Join For Newsletter

Powered by groups.yahoo.com
Visit Group! Post Questions!

Open Source proxy

  1. Open-source HTTP proxies
    A HTTP proxy is a piece of software that acts as an intermediary between HTTP client software (i.e. browser) and HTTP server software. The proxy receives all requests from the browser, and relays them (possibly modified) onto the server. Likewise, it receives all responses from the server, and relays them (possibly modified) to the client. HTTP Proxies can be used for a wide variety of tasks, including filtering, logging, caching, etc, etc, etc. At some stage, most web programmers will make use of some form of proxy. The difficulty sometimes arises that it's not easy to find a proxy which implements exactly the function which is required. There may be one or more proxies that implement something close, but not exactly. In these cases, it is often necessary to take an existing proxy that is as close as possible, and modify its source code to meet requirements.
  2. Squid Web Proxy Cache
    The DEVEL releases are meant for Squid users who are already familiar with Squid. You should expect to find numerous bugs and problems with the DEVEL releases. We do not recommend running a DEVEL release on your production cache. Squid supports...
    * proxying and caching of HTTP, FTP, and other URLs * proxying for SSL * cache hierarchies * ICP, HTCP, CARP, Cache Digests
    * transparent caching * WCCP (Squid v2.3 and above) * extensive access controls * HTTP server acceleration * SNMP * caching of DNS lookups .
  3. RabbIT is the First Open Source Proxy
    Robert Olofsson, author of the RabbIT proxy, announced that his software has successfully passed all 668 HTTP/1.1 (Hypertext Transfer Protocol) compliance tests offered by the Co-Advisor suite. The tests covered applicable "must"-level requirements for HTTP proxies. Co-Advisor is a protocol compliance and robustness test suite developed by The Measurement Factory and is the first and only HTTP/1.1 compliance suite in general availability. RabbIT is a web proxy designed to speed up slow network connections, like those going over modems or mobile phones. RabbIT can compress data, transform images into low quality versions, and remove unwanted contents like advertising and background images. One of the goals for RabbIT has always been to follow HTTP standard so that it works nicely with all the major web browsers and web servers. The tests offered by Co-Advisor allowed Robert's team to improve RabbIT performance and reliability.
  4. Open Source JDBC Proxy Drivers
    JDBC drivers that are act as proxies for other JDBC drivers is quite an interesting design pattern (i.e. Decorator). It has many elements of an AOP interception based strategy albeit against a ubiquitious and standardized interface. Here's a list of open source projects that have exploited this design pattern. It'll be an interesting exercise to re-implement many of this into reusable aspects.P6Spy is an open source framework for applications to intercept and optionally modify database statements. The P6Spy distribution includes P6Log, which intercepts and logs the database statements of any application that uses JDBC. This application is particularly useful for developers to monitor the SQL statements produced by EJB servers, enabling the developer to write code that achieves maximum efficiency on the server. P6Spy is designed to be installed in minutes and requires no code changes.
  5. Open Source Proxy Checker
    To get you involved with PHP3. To give you yet another tool to implement whatever you want, as long as it's web related and doesn't spreng the inherent limits of PHP3. 
    * Perhaps to write a proxy checker myself, knowing that there are no hidden logging features, lurking from underneath to catch yet another new proxy.
    * Another reason is to spread the word about the power that lies in PHP3, the scripting language used for this implementation. Of course, anybody can rewrite this stuff in Perl, that's just a matter of personal choice.
    * And the third, and in my eyes most important reason, is to show how easy it is to learn and to implement an idea in PHP3.
  6. Proxy, Open Source Telephony
    Ibrahim Haddad started the week with Connecting to the IPv6 Internet, a followup to his earlier article about enabling IPv6 support on your Linux box. This week, Ibrahim demonstrates how to connect to the 6bone (and why you'd want to) by tunnelling IPv6 over IPv4. Hopefully, as more ISPs support IPv6, tunneling will be less necessary. For now, it's probably your best option. If you're looking for something a little more practical, Nitesh Dhanjani has contributed Web App Security Testing with a Custom Proxy Server. That's a mouthful. The idea, however, is very simple. For people to use your web application, they have to download HTML, including forms. At that point, they can do anything they like - changing values, adding parameters, and bypassing any client-side security you thought you might have had. Nitesh demonstrates how to create and run your own proxy, which will allow you to change these parameters at will, to ensure that your software can handle it gracefully.

  7. Open Proxy Servers
    Most of the spam sent to UO users comes from one of five sources:
    1. So-called "bulletproof" email servers (run by dedicated spam houses and connected by ISPs who fail to enforce any acceptable use policy on their customers)
    2. Throw-away free email accounts which get used until they're cancelled, at which point spammers create and abuse new throw-away email accounts
    3. Open SMTP relays, e.g., hosts that are willing to accept and resend email for virtually anyone, including random spammers
    4. Abusable form-mail cgi-bins. These are web pages that are intended to be used just to send comments to a particular address, but which can be "hijacked" to send email to random addresses of a spammer's choice
    5. Open proxy servers (systems that will accept connections from any network address, acting as a blind intermediary to virtually any other network addresses).
  8. Open Source HTTP Proxy for Firewall
    Nmap ("Network Mapper") is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers and both console and graphical versions are available. Nmap is free and open source (license). Supports dozens of advanced techniques for mapping out networks filled with IP filters, firewalls, routers, and other obstacles. This includes many port scanning mechanisms (both TCP & UDP), OS detection, version detection, ping sweeps, and more.
  9. HoTTProxy-the Open Source HTTP Proxy
    Welcome to the home of HoTTProxy - the open source HTTP proxy targeted specifically toward serving the needs of wireless Internet devices. If you're new to HoTTProxy, please, before downloading HoTTProxy, read the appropriate Installation Guide for your platform, and also read the rest of this page. This ensures that you know what HoTTProxy will and won't do for you, how to set it up, and finally, how to  go about getting help if you have problems. With most Internet capable wireless devices, proxy Internet access is available from the carrier for a modest monthly fee. When you obtain your proxy access from your carrier, you are limited by the features of that carrier's proxy server, as well as any other limits the carrier decides to place upon you. If you're the paranoid type, you might also wonder what sort information about your web surfing your carrier is recording, and exactly what they do with that information. The "limited features" part is the part that drove me the most.
  10. Using Open Source Software to Proxy
    In today's corporate environment employee access to Internet resources is, for many, a daily job function. Fundamentally, the web is utilized for simple day-to-day operations including virus updates, software patches and hardware drivers and other network administrator duties. Other divisions of an organization may require the World Wide Web for resources such as market updates, company news, and general research on products or competitor's products. In today's business environment, access to the World Wide Web is no longer an option for many companies, but instead a requirement. Such global World Wide Web access offered to employees raises issues and concerns over user web habits and issues with users utilizing the World Wide Web for business use during business hours.
Ask programming questions?



Add This Tutorial To:
  Del.icio.us   Digg   Google   Spurl   Blink   Furl   Simpy   Y! MyWeb 

Current Comments

2 comments so far (post your own) View All Comments Latest 10 Comments:

please my dears if possible sent proxy to my email



Posted by nfic on Tuesday, 10.26.10 @ 20:14pm | #100496

The DEVEL releases are meant for Squid users who are already familiar with Squid. You should expect to find numerous bugs and problems with the DEVEL releases. We do not recommend running a DEVEL release on your production cache. Squid supports...
* proxying and caching of HTTP, FTP, and other URLs * proxying for SSL * cache hierarchies * ICP, HTCP, CARP, Cache Digests
* transparent caching * WCCP (Squid v2.3 and above) * extensiv

Posted by pun on Monday, 08.6.07 @ 16:34pm | #22763

  JDO Tutorials
  EAI Articles
  Struts Tutorials
  Java Tutorials
  Java Certification

Tell A Friend
Your Friend Name


Browse all Java Tutorials
Java JSP Struts Servlets Hibernate XML
Ajax JDBC EJB MySQL JavaScript JSF
Maven2 Tutorial JEE5 Tutorial Java Threading Tutorial Photoshop Tutorials Linux Technology
Technology Revolutions Eclipse Spring Tutorial Bioinformatics Tutorials Tools SQL

Home | JSP | EJB | JDBC | Java Servlets | WAP  | Free JSP Hosting  | Search Engine | News Archive | Jboss 3.0 tutorial | Free Linux CD's | Forum | Blogs

About Us | Advertising On RoseIndia.net  | Site Map

India News

Send your comments, Suggestions or Queries regarding this site at roseindia_net@yahoo.com.

Copyright 2007. All rights reserved.

[an error occurred while processing this directive]