In any case, the proxy server first 'picks' for the information you need from the site, and only then the data gets to your computer. By creating such a server, the provider usually means it only to its subscribers with access to foreign Web surfers to it is closed. However, there are exceptions, when proxy server is configured so that they can benefit anyone, and completely free. It remains among these proxies to find anonymous and configure your Internet browser so that he would 'walk' is selected through a proxy server. Lists of the workers of anonymous proxy servers easy enough to find on the Internet. But these proxies be sure to check for their anonymity.

To do this you must first enter the address and port of the proxy in your browser settings and then go to a special page validation. (Link to one of these pages is my site, see the source address at the end of this article) The fact that not all proxy servers on the Internet are anonymous and can transfer your ip site in the 'X-Forwarder-For:'. Such proxies are called distorted. Go to Kirk Rimer for more information. There are also proxy servers so-called high anonymity. They report the Web site a set data that the node in the result should not even see that you are using a proxy server. As sites, proxies, proxy servers do not provide full anonymity. Any proxy may keep logs of connections in which show ip-address of users and sites they visit.

With a very large need these records may well get 'where you', so that particularly rely on a proxy server in terms of anonymity, it would be naive. Can be true build a so-called chain of several anonymous proxy servers, and then the 'calculate' you will be much harder. However, due to its technical complexity for a simple user this way will likely not have special meaning. Programs anonymizers Another way to ensure the anonymity of web surfing may be the use of special programs. Apparently, this is quite a profitable niche market for developers software, since such programs there is great variety, most of them – are paid. In their work they used the same anonymous proxy servers, the only difference is, these programs independently and automatically perform a search, inspection and connection to the anonymous proxy instead of the user. Method is very convenient, but again does not provide absolute security. For example, the program HideIp immediately after installation on my computer tried to connect to your website. May order that would check the version of triality, and maybe even for what, who knows And finally, few suspected that the attempt to use anonymous proxy servers can, in fact including being a proxy for the corporate lan, but it's like they say, is a separate issue, which I hope to 'survey' in the near future.