Skip to main content

Is really Proxy free for use?

Hello Friends, 
Last week Govt. of India have banned few websites for downloading, music and other content. Now may be you or our script kidding (so called hackers) will believe that they will use some free proxy sites to visit or use all those blocked website. 

Are you one of them who is using free proxy from the open internet..?Many people use free proxy servers to access sites/content not available in their countries, or in order to “anonymously” browse the internet. When searching for a suitable proxy, you have surely noticed the relatively large number of free proxies. You try one, and although it’s a little slow, it works. You can now watch The Interview on YouTube even if it is blocked.

Did you ever think about why it’s free?

A proxy works as a traffic relay point. When using a proxy, all your traffic goes through that particular proxy server. This means, that someone, somewhere has to pay for a server and for a good internet connection, so that hundreds, thousands, or even tens of thousands of people could access the internet through it. In life, we already know, there is no such thing as free lunch.
Some of the free proxies pay for the internet and hardware by injecting ads into the websites you are visiting. This may help pay for the costs of operating a proxy server, but there is a much more profitable approach (from the perspective of a hacker or a cyber crook).
A free-to-use proxy server is essentially a “Man in the Middle” which spells trouble. Your traffic can be intercepted and modified. All the information you send or receive over a proxy can be read by the proxy provider, including:

  • Logins and passwords
  • Credit card numbers
  • Banking information


Besides having access to information sent over their server, they can also modify the data that travels to you. This means, they can inject malicious code directly to your computer – without having to look for vulnerabilities at all – you gave them full access, after all. They can easily infect your computer with various types of malware and a free proxy can turn into a nightmare.
Although it is true that paid proxy and VPN providers could do the same. The involvement of money tends to create sort of a bond, a commitment. These providers are already making money. They are usually not in business to steal identities and credit card numbers (at least most of them).
In conclusion, if you are located in most of the world and wish to watch movies or series or play any online game, it is a better idea to pay some minor amount to a trusted provider, than to “save” by using a “free” proxy.

Comments

Popular posts from this blog

CIA Triad for- Base of Information security

The essential security principles of confidentiality, integrity, and availability are often  referred to as the  CIA Triad. All security controls must address these principles. These three  security principles serve as common threads throughout the CISSP CBK. Each domain  addresses these principles in unique ways, so it is important to understand them both in  general terms and within each specific domain: Confidentiality is the principle that objects are not disclosed to unauthorized subjects. Integrity is the principle that objects retain their veracity and are intentionally modified by  authorized subjects only. Availability is the principle that authorized subjects are granted timely access to objects  with sufficient bandwidth to perform the desired interaction. Different security mechanisms address these three principles in different ways and offer varying  degrees of support or application of these principles. Objects must be properly classified

List of Company Slogans

·          3M : "Innovation" ·          Agere Systems : "How Communication Happens" ·          Agilent : "Dreams Made Real" ·          Airbus : "Setting the Standards" ·          Amazon.com : "…and You're Done" ·          AMX : "It's Your World. Take Control" ·          Anritsu : "Discover What's Possible ·          AT&T : "Your World. Delivered" ·          ATG Design Services : "Circuit Design for the RF Impaired" ·          ATI Technologies : "Get In the Game" ·          BAE Systems : "Innovating for a Safer World" ·          Ball Corporation : "The Leader in Small Space and Rocket Systems" ·          BellSouth : "Listening, Answering" ·          Blackhawk : "Powering DSP Development" ·          Boeing : "Forever New Frontiers" ·          Bose Corporation : "Better Sound Through Research" ·          Bowers & Wil

My Article :- હેકર બનવું છે? કઈ રીતે?

મારી ૨ વર્ષ ની કારકિર્દી માં મને કેટલાય  લોકોએ, ખાસ કરીને કોલેજ ના વિદ્યાર્થીઓએ ઘણી વાર પૂછ્યું છે કે "મારે હેકર બનવું છે. તો હું શું કરું? " અને મારા બ્લોગ્સ માં પણ પૂછવામાં આવે છે કે એક સારો હેકર કઈ રીતે બની શકાય? એવું હું શું કરું અથવા તો મારા માં કઈ લાયકત હોવી જોઈએ એક હેકર બનવા માટે? આ પ્રશ્ન નો સંતોષકારક જવાબ આપવા માટે મેં internet પર શોધખોળ કર્યા પછી મને જે કઈ માહિતી મળી તેને હું આજે અહી રજુ કરું છું. મિત્રો, સૌપ્રથમ હેકર કઈ રીતે બનવું એ જાણવા પહેલા એ જાણવું જરૂરી છે કે ખરેખર હેકિંગ શું છે ? અને હેકર કોને કહેવાય. હેકિંગ ની સીધી અને સરળ વ્યાખ્યા નીચે મુજબ છે.  "તમારા કમ્પ્યુટર,નેટવર્ક(ઈન્ટરનેટ કે LAN દ્વારા) કે કોઈ ડીવાઈસ માં (ફોન, ટેબ્લેટ) માં કરવામાં આવતા ગેરકાયદેસર પ્રવેશ અને ઉપયોગ એ હેકિંગ કહેવાય છે."અને હેકિંગ કરતા લોકોને હેકર કહેવાય છે. હવે તમને થશે કે આવું શું કામ કરવું જોઈએ? આ તો ક્રાઈમ છે. તો તમને જણાવી દઉં કે હેકર મુખ્યત્વે ૨ પ્રકારના હોય છે.    વાઈટ હેટ હેકર્સ (એથીકલ હેકર્સ) : ધારો કે તમે તમારો ફેસબુક નો પાસવર્ડ ભૂલી ગયા(ખરેખર ના ભૂલતા ક્યારેય..)કે ત