A HTTP proxy is a piece of software that acts as an intermediary between HTTP client software (i.e. browser) and HTTP server software.
Open Source proxy
Open-source HTTP proxies A HTTP proxy is a piece of software that acts as an intermediary between HTTP client software (i.e. browser) and HTTP server software. The proxy receives all requests from the browser, and relays them (possibly modified) onto the server. Likewise, it receives all responses from the server, and relays them (possibly modified) to the client. HTTP Proxies can be used for a wide variety of tasks, including filtering, logging, caching, etc, etc, etc. At some stage, most web programmers will make use of some form of
proxy. The difficulty sometimes arises that it's not easy to find a proxy which implements exactly the function which is required. There may be one or more proxies that implement something close, but not exactly. In these cases, it is often necessary to take an existing proxy that is as close as possible, and modify its source code to meet requirements.
Squid Web Proxy Cache
The DEVEL releases are meant for Squid users who are already familiar with Squid. You should expect to find numerous bugs and problems with the DEVEL releases. We do not recommend running a DEVEL release on your production cache.
* proxying and caching of HTTP, FTP, and other URLs * proxying for SSL * cache hierarchies
* ICP, HTCP, CARP, Cache Digests
* transparent caching * WCCP (Squid v2.3 and above) * extensive access controls
* HTTP server acceleration * SNMP * caching of DNS lookups .
RabbIT is the First Open Source Proxy
Robert Olofsson, author of the RabbIT proxy, announced that his software has successfully passed all 668 HTTP/1.1 (Hypertext Transfer Protocol) compliance tests offered by the Co-Advisor suite.
The tests covered applicable "must"-level requirements for HTTP proxies. Co-Advisor is a protocol compliance and robustness test suite developed by The Measurement Factory and is the first and only HTTP/1.1 compliance suite in general availability.
RabbIT is a web proxy designed to speed up slow network connections, like those going over modems or mobile phones. RabbIT can compress data, transform images into low quality versions, and remove unwanted contents like advertising and background images. One of the goals for RabbIT has always been to follow HTTP standard so that it works nicely with all the major web browsers and web servers. The tests offered by Co-Advisor allowed Robert's team to improve RabbIT performance and reliability.
Open Source JDBC Proxy Drivers JDBC drivers that are act as proxies for other JDBC drivers is quite an interesting design pattern (i.e. Decorator). It has many elements of an AOP interception based strategy albeit against a ubiquitious and standardized interface. Here's a list of open source projects that have exploited this design pattern. It'll be an interesting exercise to re-implement many of this into reusable aspects.P6Spy is an open source framework for applications to intercept and optionally modify database statements. The P6Spy distribution includes P6Log, which intercepts and logs the database statements of any application that uses JDBC. This application is particularly useful for developers to monitor the SQL statements produced by EJB servers, enabling the developer to write code that achieves maximum efficiency on the server. P6Spy is designed to be installed in minutes and requires no code changes.
Open Source Proxy Checker
To get you involved with PHP3. To give you yet another tool to implement whatever you want, as long as it's web related and doesn't spreng the inherent limits of PHP3.
* Perhaps to write a proxy checker myself, knowing that there are no hidden logging features, lurking from underneath to catch yet another new proxy.
* Another reason is to spread the word about the power that lies in PHP3, the scripting language used for this implementation. Of course, anybody can rewrite this stuff in Perl, that's just a matter of personal choice.
* And the third, and in my eyes most important reason, is to show how easy it is to learn and to implement an idea in PHP3.
Proxy, Open Source Telephony Ibrahim Haddad started the week with Connecting to the IPv6 Internet, a followup to his earlier article about enabling IPv6 support on your Linux box. This week, Ibrahim demonstrates how to connect to the 6bone (and why you'd want to) by tunnelling IPv6 over IPv4. Hopefully, as more ISPs support IPv6, tunneling will be less necessary. For now, it's probably your best option.
If you're looking for something a little more practical, Nitesh Dhanjani has contributed Web App Security Testing with a Custom Proxy Server. That's a mouthful. The idea, however, is very simple. For people to use your web application, they have to download HTML, including forms. At that point, they can do anything they like
- changing values, adding parameters, and bypassing any client-side security you thought you might have had. Nitesh demonstrates how to create and run your own proxy, which will allow you to change these parameters at will, to ensure that your software can handle it gracefully.
Open Proxy Servers
Most of the spam sent to UO users comes from one of five sources:
1. So-called "bulletproof" email servers (run by dedicated spam houses and connected by ISPs who fail to enforce any acceptable use policy on their customers)
2. Throw-away free email accounts which get used until they're cancelled, at which point spammers create and abuse new throw-away email accounts
3. Open SMTP relays, e.g., hosts that are willing to accept and resend email for virtually anyone, including random spammers
4. Abusable form-mail cgi-bins. These are web pages that are intended to be used just to send comments to a particular address, but which can be "hijacked" to send email to random addresses of a spammer's choice
5. Open proxy servers (systems that will accept connections from any network address, acting as a blind intermediary to virtually any other network addresses).
Open Source HTTP Proxy for Firewall
Nmap ("Network Mapper") is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers and both console and graphical versions are available. Nmap is free and open source
(license). Supports dozens of advanced techniques for mapping out networks filled with IP filters, firewalls, routers, and other obstacles. This includes many port scanning mechanisms (both TCP & UDP), OS detection, version detection, ping sweeps, and more.
HoTTProxy-the Open Source HTTP Proxy Welcome to the home of HoTTProxy - the open source HTTP proxy targeted specifically toward serving the needs of wireless Internet
devices. If you're new to HoTTProxy, please, before downloading HoTTProxy, read the appropriate Installation Guide for your platform, and also read the rest of this page. This ensures that you know what HoTTProxy will and won't do for you, how to set it up, and finally, how to
go about getting help if you have problems. With most Internet capable wireless devices, proxy Internet access is available from the carrier for a modest monthly fee. When you obtain your proxy access from your carrier, you are limited by the features of that carrier's proxy server, as well as any other limits the carrier decides to place upon you. If you're the paranoid type, you might also wonder what sort information about your web surfing your carrier is recording, and exactly what they do with that information. The "limited features" part is the part that drove me the most.
Open Source Software to Proxy
In today's corporate environment employee access to Internet resources is, for many, a daily job function. Fundamentally, the web is utilized for simple day-to-day operations including virus updates, software patches and hardware drivers and other network administrator duties. Other divisions of an organization may require the World Wide Web for resources such as market updates, company news, and general research on products or competitor's products. In today's business environment, access to the World Wide Web is no longer an option for many companies, but instead a requirement. Such global World Wide Web access offered to employees raises issues and concerns over user web habits and issues with users utilizing the World Wide Web for business use during business hours.