Proxy request chart
this is basic chat among user to proxy and its reverse. You can see clearly now.
Direct raw package and inject package
some companies allow user to use directly either from its proxy server or directed by program to send raw package to the proxy, so that they can go out.
you can see on this video
before you send raw package direct to proxy, you should check the proxy first, as i mentioned before on this [about how proxy works ]. Sending data to proxy by raw format make your connection better, why ?, you find the answer on this section.
pimp the url
they also can bypass the proxy by encode their url before send it to proxy, so the proxy identify this package as common request. As you know that proxy have ACL to filter some request by their URL.
Using multiple protocol
when you use multiple protocol, they usually just consider the first only. The common method is embedding HTTP protocol into Mail protocol.
Going to another proxy
by going to other proxy, they will detect that you are not in their authority to filter because you are not in their scope.
Tunneling
by some tunneling methods that was mentioned before about how to bypass proxy
..show all:.
.
Proxy request chart
this is basic chat among user to proxy and its reverse. You can see clearly now.
Direct raw package and inject package
some companies allow user to use directly either from its proxy server or directed by program to send raw package to the proxy, so that they can go out.
you can see on this video
before you send raw package direct to proxy, you should check the proxy first, as i mentioned before on this [about how proxy works ]. Sending data to proxy by raw format make your connection better, why ?, you find the answer on this section.
pimp the url
they also can bypass the proxy by encode their url before send it to proxy, so the proxy identify this package as common request. As you know that proxy have ACL to filter some request by their URL.
Using multiple protocol
when you use multiple protocol, they usually just consider the first only. The common method is embedding HTTP protocol into Mail protocol.
Going to another proxy
by going to other proxy, they will detect that you are not in their authority to filter because you are not in their scope.
Tunneling
by some tunneling methods that was mentioned before about how to bypass proxy
Pretty good post. I just stumbled upon your blog and wanted to say that I have really enjoyed reading your blog posts. Any way I'll be subscribing to your feed and I hope you post again soon. Big thanks for the useful info. debestevpn
ReplyDelete