chiburashka has asked for the wisdom of the Perl Monks concerning the following question:

This node falls below the community's minimum standard of quality and will not be displayed.

Replies are listed 'Best First'.
Re: what will this proxy hide ?
by talexb (Chancellor) on Oct 07, 2004 at 14:17 UTC

    I don't downvote nodes very often, but this is a clear example of a Complete Waste Of Time. You've posted some Perl code, then asked us whether it does a specific task.

    That's not what I understand to be the purpose of this site. It's a community where people help people with Perl questions and problems. A poster is supposed to arrive with a piece of broken code, or code that they don't understand, and get assistance. They are expected to have tried a bunch of things.

    You haven't done this .. so please, go away and try a few things, then come back to us and present your problem, what you've tried, what you hoped the result to be, and why you think it isn't working.

    Alex / talexb / Toronto

    "Groklaw is the open-source mentality applied to legal research" ~ Linus Torvalds

Re: what will this proxy hide ?
by Grygonos (Chaplain) on Oct 07, 2004 at 13:56 UTC

    Have you tried testing it locally? What's the purpose of the Proxy? What software or website are you trying to fool? If you're not slick enough to defraud someone on your own (which I don't condone) then asking for help about it only makes you look worse for 2 reasons

    1. You haven't put forth effort
    2. you're basically telling us this code is for shifty purposes

Re: what will this proxy hide ?
by perrin (Chancellor) on Oct 07, 2004 at 16:10 UTC
    You'll have to try it to be sure. I hear that .mil sites are good for testing, especially when you use known IIS attacks. Try it! Please!
Re: what will this proxy hide ?
by Fletch (Bishop) on Oct 07, 2004 at 13:56 UTC

      Now, admittedly use of an anonymous proxy does kind of lead to some questions such as "what do you have to hide?" but in a lot of cases the person in question may simply be worried about their privacy in this particuarly web-paranoid age.

      With more and more in the media about people's details being stolen or spied on online it's no wonder that a lot of people turn to anonymous proxies in an attempt to protect themselves and not because what they wish to do is neferious.

      Proxies per-say certainly aren't a reason to set alarm bells ringing as I myself had to configure LWP to use one the other day - not because I wanted to do anything "dodgy" but purely because the company I work at uses one and no HTTP traffic will route without it (writing a simple app to check some of my pop3 and webmail accounts without the trauma of having to log into each in turn everytime I want to know if I have mail).

      I'd agree that, in cases like this, it would be preferable to get a more complete explanation of both what is to be achieved and why. For a start, if it is completely innocent / legal then there may be better / simpler ways of acheiving the same ends, but it's a little difficult to advise when you don't know the full picture.

      The monks here are by nature cautious so if you can explain and justify your motives then I'm sure everyone will be happy to help :)

      --- Jay

      All code is untested unless otherwise stated.

        You need to reread what I linked to, especially merlyn's update and Re: "freak" and recent threads detailing the timing of the creation of the OP's account. This user has admitted that they were interested in trying to defraud someone by automating clicks on popups. They've laid low for a few months with some somewhat more legitimate questions, but appear to have reverted back to form. I'm just trying to be institutional memory and inform people of what's happened before.

        Then again, Re: Hide real IP is one of my highest rated nodes so I might should just hush up and make sarcastic comments. Now where did I leave that guide to unobtanium futures trading . . .

Re: what will this proxy hide ?
by Golo (Friar) on Oct 07, 2004 at 14:30 UTC
    If I see this right, you should first try to get some basic understanding of how TCP/IP networking works and what a proxy is good for.

    But I think you have been told that before...

    UPDATE: just in case, JAP is a good start to read about the problems with real anonymizing.