<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/">
	<channel>
		<title><![CDATA[The Un-Official Proxomitron Forum - General Security]]></title>
		<link>https://www.prxbx.com/forums/</link>
		<description><![CDATA[The Un-Official Proxomitron Forum - https://www.prxbx.com/forums]]></description>
		<pubDate>Sat, 18 Apr 2026 02:37:04 +0000</pubDate>
		<generator>MyBB</generator>
		<item>
			<title><![CDATA[Root certificate expiring - anything to be done?]]></title>
			<link>https://www.prxbx.com/forums/showthread.php?tid=3145&amp;pid=21083#pid21083</link>
			<pubDate>Sat, 01 Feb 2025 22:21:38 -0500</pubDate>
			<dc:creator><![CDATA[zoltan]]></dc:creator>
			<guid isPermaLink="false">https://www.prxbx.com/forums/showthread.php?tid=3145&amp;pid=21083#pid21083</guid>
			<description><![CDATA[It's not working for me on Win 7.  I'll move discussion of that to the Reborn thread.]]></description>
			<content:encoded><![CDATA[It's not working for me on Win 7.  I'll move discussion of that to the Reborn thread.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Root certificate expiring - anything to be done?]]></title>
			<link>https://www.prxbx.com/forums/showthread.php?tid=3145&amp;pid=21082#pid21082</link>
			<pubDate>Fri, 31 Jan 2025 22:29:56 -0500</pubDate>
			<dc:creator><![CDATA[amy]]></dc:creator>
			<guid isPermaLink="false">https://www.prxbx.com/forums/showthread.php?tid=3145&amp;pid=21082#pid21082</guid>
			<description><![CDATA[I can say that Firefox 115 works fine with Proxomitron Reborn (v4.7 20240421) on XP - depending on what errors you're getting, you may need to regenerate its certificate to use more secure algorithms/longer key lengths.]]></description>
			<content:encoded><![CDATA[I can say that Firefox 115 works fine with Proxomitron Reborn (v4.7 20240421) on XP - depending on what errors you're getting, you may need to regenerate its certificate to use more secure algorithms/longer key lengths.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Root certificate expiring - anything to be done?]]></title>
			<link>https://www.prxbx.com/forums/showthread.php?tid=3145&amp;pid=21081#pid21081</link>
			<pubDate>Fri, 31 Jan 2025 01:42:30 -0500</pubDate>
			<dc:creator><![CDATA[zoltan]]></dc:creator>
			<guid isPermaLink="false">https://www.prxbx.com/forums/showthread.php?tid=3145&amp;pid=21081#pid21081</guid>
			<description><![CDATA[I'm not sure what specific "root" cert they were talking about.  This warning read: "<span style="font-style: italic;">Your version of Firefox will start to have provlems on January 14.  A root certificate will expire, causing some preferences and other features to stop working.  On March 14, 2025, add-ons and more features will also break.</span>"<br />
<br />
On Jan 14 nothing really happened. Everything continued to work as usual.  I should explain that I've been running Firefox 100 for a long time because every time I had tried to go past version 100, Firefox would not work at all with Proxomitron, either ProxHTTPSProxy or Reborn.  Every single site would refuse to load with "Warning: potential security risk ahead."  All versions below 100 would load most sites, but everything above would be unusable with SSL errors. <br />
<br />
These recent FF warnings finally motivated me to do some research and experimentation.  Some claimed that Firefox would use the Windows OS certs if its own failed and  "security.enterprise_roots.enabled" was set to true.  I hoped that maybe updating the Windows 7 root certificates would solve the problems, so I used the OS cert updater here:  <a href="https://github.com/asheroto/Root-Certificate-Updater" target="_blank">https://github.com/asheroto/Root-Certificate-Updater</a>.<br />
<br />
It didn't help with later editions of FF, so I kept looking and found a newer cert updater here: <a href="https://msfn.org/board/topic/183352-proxhttpsproxy-and-httpsproxy-in-windows-xp-for-future-use/" target="_blank">https://msfn.org/board/topic/183352-prox...uture-use/</a><br />
<br />
After applying that, versions of FF after 100 were still not working and my current version 100 was clearly worse, with youtube almost becoming unusable due to video stoppage.  I of course also updated certs.pem and cacert.pem from <a href="https://curl.haxx.se/docs/caextract.html" target="_blank">https://curl.haxx.se/docs/caextract.html</a>  but that has never seemed to solve anything. <br />
<br />
I then noticed in the above thread at msfn for XP users that there were newer versions of ProxHTTPSProxy than I have.  After trying version 1.5  it actually worked with Firefox 115esr!  At first I was elated to finally get that breakthrough, but there are still problems with some sites just like I was having before.   There are newer versions of ProxHTTPSProxy available there (20230813), but they fail on my Win 7 with "procedure entry point GetCPFileNameFromRegistry could not be located in the dynamic link library Kernel32.dll"<br />
<br />
Obviously I don't know what I'm doing in many ways, but would really like to get things working with no SSL errors if at all possible since I'm very tired of (even with FF 100) having to turn off the proxy for certain sites and having to deal with broken css and other site functionality because of cert failures for other domains the site uses.  Ideally I love a way to force/trick the browser to ignore all cert errors and load all sites automatically.]]></description>
			<content:encoded><![CDATA[I'm not sure what specific "root" cert they were talking about.  This warning read: "<span style="font-style: italic;">Your version of Firefox will start to have provlems on January 14.  A root certificate will expire, causing some preferences and other features to stop working.  On March 14, 2025, add-ons and more features will also break.</span>"<br />
<br />
On Jan 14 nothing really happened. Everything continued to work as usual.  I should explain that I've been running Firefox 100 for a long time because every time I had tried to go past version 100, Firefox would not work at all with Proxomitron, either ProxHTTPSProxy or Reborn.  Every single site would refuse to load with "Warning: potential security risk ahead."  All versions below 100 would load most sites, but everything above would be unusable with SSL errors. <br />
<br />
These recent FF warnings finally motivated me to do some research and experimentation.  Some claimed that Firefox would use the Windows OS certs if its own failed and  "security.enterprise_roots.enabled" was set to true.  I hoped that maybe updating the Windows 7 root certificates would solve the problems, so I used the OS cert updater here:  <a href="https://github.com/asheroto/Root-Certificate-Updater" target="_blank">https://github.com/asheroto/Root-Certificate-Updater</a>.<br />
<br />
It didn't help with later editions of FF, so I kept looking and found a newer cert updater here: <a href="https://msfn.org/board/topic/183352-proxhttpsproxy-and-httpsproxy-in-windows-xp-for-future-use/" target="_blank">https://msfn.org/board/topic/183352-prox...uture-use/</a><br />
<br />
After applying that, versions of FF after 100 were still not working and my current version 100 was clearly worse, with youtube almost becoming unusable due to video stoppage.  I of course also updated certs.pem and cacert.pem from <a href="https://curl.haxx.se/docs/caextract.html" target="_blank">https://curl.haxx.se/docs/caextract.html</a>  but that has never seemed to solve anything. <br />
<br />
I then noticed in the above thread at msfn for XP users that there were newer versions of ProxHTTPSProxy than I have.  After trying version 1.5  it actually worked with Firefox 115esr!  At first I was elated to finally get that breakthrough, but there are still problems with some sites just like I was having before.   There are newer versions of ProxHTTPSProxy available there (20230813), but they fail on my Win 7 with "procedure entry point GetCPFileNameFromRegistry could not be located in the dynamic link library Kernel32.dll"<br />
<br />
Obviously I don't know what I'm doing in many ways, but would really like to get things working with no SSL errors if at all possible since I'm very tired of (even with FF 100) having to turn off the proxy for certain sites and having to deal with broken css and other site functionality because of cert failures for other domains the site uses.  Ideally I love a way to force/trick the browser to ignore all cert errors and load all sites automatically.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Root certificate expiring - anything to be done?]]></title>
			<link>https://www.prxbx.com/forums/showthread.php?tid=3145&amp;pid=21080#pid21080</link>
			<pubDate>Sun, 26 Jan 2025 03:56:54 -0500</pubDate>
			<dc:creator><![CDATA[amy]]></dc:creator>
			<guid isPermaLink="false">https://www.prxbx.com/forums/showthread.php?tid=3145&amp;pid=21080#pid21080</guid>
			<description><![CDATA[Which certificate is expiring? You can always download and install new certificates if you know which one is expiring.]]></description>
			<content:encoded><![CDATA[Which certificate is expiring? You can always download and install new certificates if you know which one is expiring.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Root certificate expiring - anything to be done?]]></title>
			<link>https://www.prxbx.com/forums/showthread.php?tid=3145&amp;pid=21079#pid21079</link>
			<pubDate>Mon, 13 Jan 2025 11:24:51 -0500</pubDate>
			<dc:creator><![CDATA[zoltan]]></dc:creator>
			<guid isPermaLink="false">https://www.prxbx.com/forums/showthread.php?tid=3145&amp;pid=21079#pid21079</guid>
			<description><![CDATA[Not sure if this is the right place to put this but Firefox has been opening with stark warnings about root certificates expiring on old older versions on Jan 14 and claiming that it will cause "some preferences and other features to stop working" and that some websites and add-ons will break.  I've used older versions of FF for years without any problems, but now suddenly this?  Is it really different this time?  If so, is there anything I can do about it if I want to keep running an older version?<br />
<br />
On this PC I'm still running Win 7 flawlessly, but you can't go past FF version 115 with that OS anyway.]]></description>
			<content:encoded><![CDATA[Not sure if this is the right place to put this but Firefox has been opening with stark warnings about root certificates expiring on old older versions on Jan 14 and claiming that it will cause "some preferences and other features to stop working" and that some websites and add-ons will break.  I've used older versions of FF for years without any problems, but now suddenly this?  Is it really different this time?  If so, is there anything I can do about it if I want to keep running an older version?<br />
<br />
On this PC I'm still running Win 7 flawlessly, but you can't go past FF version 115 with that OS anyway.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[End-to-end encryption is coming....]]></title>
			<link>https://www.prxbx.com/forums/showthread.php?tid=2182&amp;pid=17820#pid17820</link>
			<pubDate>Wed, 19 Nov 2014 15:17:54 -0500</pubDate>
			<dc:creator><![CDATA[Kye-U]]></dc:creator>
			<guid isPermaLink="false">https://www.prxbx.com/forums/showthread.php?tid=2182&amp;pid=17820#pid17820</guid>
			<description><![CDATA[Thank you for this! I hope you're doing well my friend <img src="images/smilies/smile.gif" style="vertical-align: middle;" border="0" alt="Smile!" title="Smile!" /><br />
<br />
I too like to follow security/privacy topics, and this was another story that I found very intersting: <a href="http://www.theguardian.com/technology/2014/nov/19/whatsapp-messaging-encryption-android-ios" target="_blank">http://www.theguardian.com/technology/20...ndroid-ios</a>]]></description>
			<content:encoded><![CDATA[Thank you for this! I hope you're doing well my friend <img src="images/smilies/smile.gif" style="vertical-align: middle;" border="0" alt="Smile!" title="Smile!" /><br />
<br />
I too like to follow security/privacy topics, and this was another story that I found very intersting: <a href="http://www.theguardian.com/technology/2014/nov/19/whatsapp-messaging-encryption-android-ios" target="_blank">http://www.theguardian.com/technology/20...ndroid-ios</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[End-to-end encryption is coming....]]></title>
			<link>https://www.prxbx.com/forums/showthread.php?tid=2182&amp;pid=17817#pid17817</link>
			<pubDate>Tue, 18 Nov 2014 20:20:58 -0500</pubDate>
			<dc:creator><![CDATA[Oddysey]]></dc:creator>
			<guid isPermaLink="false">https://www.prxbx.com/forums/showthread.php?tid=2182&amp;pid=17817#pid17817</guid>
			<description><![CDATA[I like to keep up with security issues, and read many different sites during the day.  One such is Techdirt, a site that actually covers many aspects of technology, not just security.  But today, there's a piece on a new push for e2e encryption.  Read it here:<br />
<br />
<a href="https://www.techdirt.com/articles/20141118/12135229182/eff-others-launch-new-free-security-certificate-authority-to-dramatically-increase-encrypted-internet-traffic.shtml" target="_blank">https://www.techdirt.com/articles/201411...ffic.shtml</a><br />
<br />
There's a link therein to a YouTube video, and if you want to just jump straight to the good stuff, this is it:<br />
<br />
<a href="https://www.youtube.com/watch?v=Gas_sSB-5SU" target="_blank">https://www.youtube.com/watch?v=Gas_sSB-5SU</a><br />
<br />
<br />
I won't make any predictions, especially about how soon this might come about, but I'm pretty certain that the government's "War on Citizens" is about to ratchet up a notch....<br />
<br />
Later,<br />
<br />
<br />
<br />
<br />
Oddysey]]></description>
			<content:encoded><![CDATA[I like to keep up with security issues, and read many different sites during the day.  One such is Techdirt, a site that actually covers many aspects of technology, not just security.  But today, there's a piece on a new push for e2e encryption.  Read it here:<br />
<br />
<a href="https://www.techdirt.com/articles/20141118/12135229182/eff-others-launch-new-free-security-certificate-authority-to-dramatically-increase-encrypted-internet-traffic.shtml" target="_blank">https://www.techdirt.com/articles/201411...ffic.shtml</a><br />
<br />
There's a link therein to a YouTube video, and if you want to just jump straight to the good stuff, this is it:<br />
<br />
<a href="https://www.youtube.com/watch?v=Gas_sSB-5SU" target="_blank">https://www.youtube.com/watch?v=Gas_sSB-5SU</a><br />
<br />
<br />
I won't make any predictions, especially about how soon this might come about, but I'm pretty certain that the government's "War on Citizens" is about to ratchet up a notch....<br />
<br />
Later,<br />
<br />
<br />
<br />
<br />
Oddysey]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Facebook and MySpace security: backdoor wide open, millions of accounts exploitable]]></title>
			<link>https://www.prxbx.com/forums/showthread.php?tid=1521&amp;pid=17437#pid17437</link>
			<pubDate>Tue, 04 Feb 2014 00:39:32 -0500</pubDate>
			<dc:creator><![CDATA[aeda]]></dc:creator>
			<guid isPermaLink="false">https://www.prxbx.com/forums/showthread.php?tid=1521&amp;pid=17437#pid17437</guid>
			<description><![CDATA[I thought it would be nice to have our own secure proxy which we can surf anonymously and not have to be bombarded with popups or ads throughout the proxied pages while you surf, as you will often see when using many of the other available online web proxies.<br />
As with No-Trax, I've not used this my own self, but I found it at Shell Extension City. They're claiming to build upon the work of HiJackThis by Merijn, which outta be worth something.]]></description>
			<content:encoded><![CDATA[I thought it would be nice to have our own secure proxy which we can surf anonymously and not have to be bombarded with popups or ads throughout the proxied pages while you surf, as you will often see when using many of the other available online web proxies.<br />
As with No-Trax, I've not used this my own self, but I found it at Shell Extension City. They're claiming to build upon the work of HiJackThis by Merijn, which outta be worth something.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[anti-adblock javascript, weak?]]></title>
			<link>https://www.prxbx.com/forums/showthread.php?tid=2055&amp;pid=16797#pid16797</link>
			<pubDate>Sun, 14 Oct 2012 13:19:22 -0400</pubDate>
			<dc:creator><![CDATA[sbk]]></dc:creator>
			<guid isPermaLink="false">https://www.prxbx.com/forums/showthread.php?tid=2055&amp;pid=16797#pid16797</guid>
			<description><![CDATA[I don't know javascript so don't know if this actually works, but maybe this is interesting. <a href="http://hidden-technology.blogspot.com/search/label/AdBlock" target="_blank">Multiple posts dealing with counter-acting Adblock hidden-technology.blogspot</a>. Notice they are dated 2008.<br />
<br />
Using javascript ("client side", user's PC) seems vulnerable to client-side counter-counter-defense. But in the end, the client can always block something... <br />
<br />
This <a href="http://hidden-technology.blogspot.com/2009/08/detect-highlighted-text-or-selected.html" target="_blank">looks sneaky. It has a timer, so I guess it sniffs and records user's text selections. Spying on behavior</a>.<br />
<br />
Years ago, when many on the internet cheered AJAX, I already wondered how to block AJAX. I assume ECMAScript references list certain AJAX functions?<br />
<br />
Also, quick Wikipedia: [ul=https://en.wikipedia.org/wiki/JSON#Use_in_Ajax]AJAX is part of JSON[/url]]]></description>
			<content:encoded><![CDATA[I don't know javascript so don't know if this actually works, but maybe this is interesting. <a href="http://hidden-technology.blogspot.com/search/label/AdBlock" target="_blank">Multiple posts dealing with counter-acting Adblock hidden-technology.blogspot</a>. Notice they are dated 2008.<br />
<br />
Using javascript ("client side", user's PC) seems vulnerable to client-side counter-counter-defense. But in the end, the client can always block something... <br />
<br />
This <a href="http://hidden-technology.blogspot.com/2009/08/detect-highlighted-text-or-selected.html" target="_blank">looks sneaky. It has a timer, so I guess it sniffs and records user's text selections. Spying on behavior</a>.<br />
<br />
Years ago, when many on the internet cheered AJAX, I already wondered how to block AJAX. I assume ECMAScript references list certain AJAX functions?<br />
<br />
Also, quick Wikipedia: [ul=https://en.wikipedia.org/wiki/JSON#Use_in_Ajax]AJAX is part of JSON[/url]]]></content:encoded>
		</item>
		<item>
			<title><![CDATA['HOSTS' file for use by paying remote sites....]]></title>
			<link>https://www.prxbx.com/forums/showthread.php?tid=1798&amp;pid=15593#pid15593</link>
			<pubDate>Sun, 10 Jul 2011 00:44:17 -0400</pubDate>
			<dc:creator><![CDATA[Oddysey]]></dc:creator>
			<guid isPermaLink="false">https://www.prxbx.com/forums/showthread.php?tid=1798&amp;pid=15593#pid15593</guid>
			<description><![CDATA[Dave;<br />
<br />
proxy.org is back up for me now, too.  Thanks just the same, it's always nice to get a confirmation from another source (and not just another computer on my home network).<br />
<br />
<br />
<br />
JJoe;<br />
<br />
Thanks.  I hadn't dug into it that far, interesting stuff when you read between the lines.  I admit to being curious about why a site collecting and distributing proxy addresses would be so concerned about someone  viewing their materials from a proxified connection.  I guess it's best to chalk it up to "it takes all kinds", eh? <img src="images/smilies/wink.gif" style="vertical-align: middle;" border="0" alt="Wink" title="Wink" /><br />
<br />
Take care one and all,<br />
<br />
<br />
<br />
Oddysey]]></description>
			<content:encoded><![CDATA[Dave;<br />
<br />
proxy.org is back up for me now, too.  Thanks just the same, it's always nice to get a confirmation from another source (and not just another computer on my home network).<br />
<br />
<br />
<br />
JJoe;<br />
<br />
Thanks.  I hadn't dug into it that far, interesting stuff when you read between the lines.  I admit to being curious about why a site collecting and distributing proxy addresses would be so concerned about someone  viewing their materials from a proxified connection.  I guess it's best to chalk it up to "it takes all kinds", eh? <img src="images/smilies/wink.gif" style="vertical-align: middle;" border="0" alt="Wink" title="Wink" /><br />
<br />
Take care one and all,<br />
<br />
<br />
<br />
Oddysey]]></content:encoded>
		</item>
		<item>
			<title><![CDATA['HOSTS' file for use by paying remote sites....]]></title>
			<link>https://www.prxbx.com/forums/showthread.php?tid=1798&amp;pid=15583#pid15583</link>
			<pubDate>Fri, 08 Jul 2011 17:13:34 -0400</pubDate>
			<dc:creator><![CDATA[JJoe]]></dc:creator>
			<guid isPermaLink="false">https://www.prxbx.com/forums/showthread.php?tid=1798&amp;pid=15583#pid15583</guid>
			<description><![CDATA[<span style="color: #000000;">http://upsideout.com/</span><br />
<br />
<blockquote><cite>Quote:</cite>UpsideOut, Inc. is a New York based website development firm specializing in innovative privacy and security solutions for individuals and businesses worldwide. UpsideOut websites provide a rich experience of information and technology through straightforward, functional design.<br />
<br />
We are best known for Proxify.com (the premier web-based anonymous proxy service), Socksify.com (an anonymous HTTP proxy service), and Proxy.org (a comprehensive proxy directory and discussion forum for proxy users). Here are some of the websites in our portfolio:</blockquote>
<br />
<blockquote><cite>Quote:</cite>Proxy.org is the most trusted resource for information about anonymous web surfing and proxies. Proxy.org provides a directory which lists tens of thousands of web-based proxies as well as a discussion forum for proxy webmasters and users. Proxy.org also maintains mailings lists that reach hundreds of thousands of users.</blockquote>
<br />
<blockquote><cite>Quote:</cite>BlockScript is security software which protects websites and empowers webmasters to stop unwanted traffic. BlockScript detects and blocks requests from all types of proxy servers and anonymity networks (such as web-based proxies, open proxies, Tor, VPN servers, etc.), hosting networks, undesirable robots and spiders, and even entire countries.</blockquote>
]]></description>
			<content:encoded><![CDATA[<span style="color: #000000;">http://upsideout.com/</span><br />
<br />
<blockquote><cite>Quote:</cite>UpsideOut, Inc. is a New York based website development firm specializing in innovative privacy and security solutions for individuals and businesses worldwide. UpsideOut websites provide a rich experience of information and technology through straightforward, functional design.<br />
<br />
We are best known for Proxify.com (the premier web-based anonymous proxy service), Socksify.com (an anonymous HTTP proxy service), and Proxy.org (a comprehensive proxy directory and discussion forum for proxy users). Here are some of the websites in our portfolio:</blockquote>
<br />
<blockquote><cite>Quote:</cite>Proxy.org is the most trusted resource for information about anonymous web surfing and proxies. Proxy.org provides a directory which lists tens of thousands of web-based proxies as well as a discussion forum for proxy webmasters and users. Proxy.org also maintains mailings lists that reach hundreds of thousands of users.</blockquote>
<br />
<blockquote><cite>Quote:</cite>BlockScript is security software which protects websites and empowers webmasters to stop unwanted traffic. BlockScript detects and blocks requests from all types of proxy servers and anonymity networks (such as web-based proxies, open proxies, Tor, VPN servers, etc.), hosting networks, undesirable robots and spiders, and even entire countries.</blockquote>
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA['HOSTS' file for use by paying remote sites....]]></title>
			<link>https://www.prxbx.com/forums/showthread.php?tid=1798&amp;pid=15582#pid15582</link>
			<pubDate>Fri, 08 Jul 2011 16:21:57 -0400</pubDate>
			<dc:creator><![CDATA[dave]]></dc:creator>
			<guid isPermaLink="false">https://www.prxbx.com/forums/showthread.php?tid=1798&amp;pid=15582#pid15582</guid>
			<description><![CDATA[When proxy.org came back up I was able to confirm that it is using blockscripts.  I could not access the site thru a tor proxy.  I got a page saying that blockscripts was blocking me.  As to getting around the block goes, I am clueless.  Sorry. <img src="images/smilies/aiwebs_003.gif" style="vertical-align: middle;" border="0" alt="Sad" title="Sad" />]]></description>
			<content:encoded><![CDATA[When proxy.org came back up I was able to confirm that it is using blockscripts.  I could not access the site thru a tor proxy.  I got a page saying that blockscripts was blocking me.  As to getting around the block goes, I am clueless.  Sorry. <img src="images/smilies/aiwebs_003.gif" style="vertical-align: middle;" border="0" alt="Sad" title="Sad" />]]></content:encoded>
		</item>
		<item>
			<title><![CDATA['HOSTS' file for use by paying remote sites....]]></title>
			<link>https://www.prxbx.com/forums/showthread.php?tid=1798&amp;pid=15580#pid15580</link>
			<pubDate>Fri, 08 Jul 2011 16:03:39 -0400</pubDate>
			<dc:creator><![CDATA[Oddysey]]></dc:creator>
			<guid isPermaLink="false">https://www.prxbx.com/forums/showthread.php?tid=1798&amp;pid=15580#pid15580</guid>
			<description><![CDATA[Dave;<br />
<br />
Both of those sites were/are informative, I wasn't aware of either of them - thanks!<br />
<br />
But....<br />
<br />
The part about BlockScript is not made up.  If you peruse BlockScript's site, you can find examples of various error messages they project to attempted connectors - the one found on proxy.org is shown there.  Sort of confirms that BlockScript does have a hand in the mess.... <br />
<br />
Whether somebody got over-zealous and went too far, blocking all and sundry, or it's just a "natural Act of Gawd", it doesn't matter. I've used proxy.org off and on for years, and I've never seen this happen before.  The site's been down for more than a month now, and you'd think that someone was awake at the switch, so to speak.  Makes me wonder if it's all run robotically....<img src="images/smilies/aiwebs_003.gif" style="vertical-align: middle;" border="0" alt="Sad" title="Sad" /><br />
<br />
Or to give them some courtesy, maybe they do know, and are desparately trying to get out from under BlockScript's evil-doings... one can't really know at this point.<br />
<br />
Again, thanks for the tip.<br />
<br />
<br />
<br />
Oddysey]]></description>
			<content:encoded><![CDATA[Dave;<br />
<br />
Both of those sites were/are informative, I wasn't aware of either of them - thanks!<br />
<br />
But....<br />
<br />
The part about BlockScript is not made up.  If you peruse BlockScript's site, you can find examples of various error messages they project to attempted connectors - the one found on proxy.org is shown there.  Sort of confirms that BlockScript does have a hand in the mess.... <br />
<br />
Whether somebody got over-zealous and went too far, blocking all and sundry, or it's just a "natural Act of Gawd", it doesn't matter. I've used proxy.org off and on for years, and I've never seen this happen before.  The site's been down for more than a month now, and you'd think that someone was awake at the switch, so to speak.  Makes me wonder if it's all run robotically....<img src="images/smilies/aiwebs_003.gif" style="vertical-align: middle;" border="0" alt="Sad" title="Sad" /><br />
<br />
Or to give them some courtesy, maybe they do know, and are desparately trying to get out from under BlockScript's evil-doings... one can't really know at this point.<br />
<br />
Again, thanks for the tip.<br />
<br />
<br />
<br />
Oddysey]]></content:encoded>
		</item>
		<item>
			<title><![CDATA['HOSTS' file for use by paying remote sites....]]></title>
			<link>https://www.prxbx.com/forums/showthread.php?tid=1798&amp;pid=15577#pid15577</link>
			<pubDate>Wed, 06 Jul 2011 14:16:26 -0400</pubDate>
			<dc:creator><![CDATA[dave]]></dc:creator>
			<guid isPermaLink="false">https://www.prxbx.com/forums/showthread.php?tid=1798&amp;pid=15577#pid15577</guid>
			<description><![CDATA[I believe that proxy.org is down for everyone.  See:<br />
<br />
<a href="http://www.downforeveryoneorjustme.com/proxy.org" target="_blank">Down for Everyone</a><br />
<br />
<a href="http://centralops.net/co/DomainDossier.aspx?addr=proxy.org&amp;svc_scan=true" target="_blank">CentralOps</a><br />
<br />
I have noticed that this site was down before and came back up after a bit.<br />
<br />
HTH. <img src="images/smilies/smile.gif" style="vertical-align: middle;" border="0" alt="Smile!" title="Smile!" />]]></description>
			<content:encoded><![CDATA[I believe that proxy.org is down for everyone.  See:<br />
<br />
<a href="http://www.downforeveryoneorjustme.com/proxy.org" target="_blank">Down for Everyone</a><br />
<br />
<a href="http://centralops.net/co/DomainDossier.aspx?addr=proxy.org&amp;svc_scan=true" target="_blank">CentralOps</a><br />
<br />
I have noticed that this site was down before and came back up after a bit.<br />
<br />
HTH. <img src="images/smilies/smile.gif" style="vertical-align: middle;" border="0" alt="Smile!" title="Smile!" />]]></content:encoded>
		</item>
		<item>
			<title><![CDATA['HOSTS' file for use by paying remote sites....]]></title>
			<link>https://www.prxbx.com/forums/showthread.php?tid=1798&amp;pid=15569#pid15569</link>
			<pubDate>Tue, 05 Jul 2011 18:15:48 -0400</pubDate>
			<dc:creator><![CDATA[Oddysey]]></dc:creator>
			<guid isPermaLink="false">https://www.prxbx.com/forums/showthread.php?tid=1798&amp;pid=15569#pid15569</guid>
			<description><![CDATA[I think I've got a goodie here that's got me stumped.<br />
<br />
What it is:<br />
A certain site uses BlockScript to prevent unwanted visitors.  The "error" message tells you that you're a dummy for even trying to visit them.  Fortunately there is a link to the main <a href="http://www.blockscript.com" target="_blank">BlockScript</a> site, so I went there....<br />
<br />
It looks suspiciously to me like a giant HOSTS file that they are allowing other sites to access remotely.  A site can use a 'free' version, or various levels of paid 'features'.  What gripes me most is that they <span style="font-style: italic;">brag</span> about how they are blocking nearly 30 MILLION hosting providers, and other stuff.  My guess is that my ISP/hosting provider is probably on that list.  Why, I dunno, and it doesn't matter at this point.<br />
<br />
What else do they block? For starters, TOR exit nodes, and known proxy sites.  That last is the ultimate irony - why am I scribbling this diatribe?  Because the site I wanna visit is <a href="http://proxy.org" target="_blank">http://proxy.org</a> in order to get a list of, you guessed it, proxies.<br />
<br />
I dunno whether to laugh or cry.......<img src="images/smilies/eusa_doh.gif" style="vertical-align: middle;" border="0" alt="D'oh!" title="D'oh!" /><br />
<br />
I do know that it's all done with PHP, meaning that it's server-side, so I have my doubts about Proxo giving me any help here. What I wanna know is, does anyone else have any experience with this?  Chances are pretty good that some of you testing that URL will get through, and others won't.  Also, Google (Big B<span style="color: red;">r</span>other in ProxRocks-speak) doesn't cache anything from them, so I'm outta luck on that score.<br />
<br />
Ideas?<br />
<br />
<br />
<br />
<br />
<br />
<br />
Oddysey]]></description>
			<content:encoded><![CDATA[I think I've got a goodie here that's got me stumped.<br />
<br />
What it is:<br />
A certain site uses BlockScript to prevent unwanted visitors.  The "error" message tells you that you're a dummy for even trying to visit them.  Fortunately there is a link to the main <a href="http://www.blockscript.com" target="_blank">BlockScript</a> site, so I went there....<br />
<br />
It looks suspiciously to me like a giant HOSTS file that they are allowing other sites to access remotely.  A site can use a 'free' version, or various levels of paid 'features'.  What gripes me most is that they <span style="font-style: italic;">brag</span> about how they are blocking nearly 30 MILLION hosting providers, and other stuff.  My guess is that my ISP/hosting provider is probably on that list.  Why, I dunno, and it doesn't matter at this point.<br />
<br />
What else do they block? For starters, TOR exit nodes, and known proxy sites.  That last is the ultimate irony - why am I scribbling this diatribe?  Because the site I wanna visit is <a href="http://proxy.org" target="_blank">http://proxy.org</a> in order to get a list of, you guessed it, proxies.<br />
<br />
I dunno whether to laugh or cry.......<img src="images/smilies/eusa_doh.gif" style="vertical-align: middle;" border="0" alt="D'oh!" title="D'oh!" /><br />
<br />
I do know that it's all done with PHP, meaning that it's server-side, so I have my doubts about Proxo giving me any help here. What I wanna know is, does anyone else have any experience with this?  Chances are pretty good that some of you testing that URL will get through, and others won't.  Also, Google (Big B<span style="color: red;">r</span>other in ProxRocks-speak) doesn't cache anything from them, so I'm outta luck on that score.<br />
<br />
Ideas?<br />
<br />
<br />
<br />
<br />
<br />
<br />
Oddysey]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Port 8080]]></title>
			<link>https://www.prxbx.com/forums/showthread.php?tid=1683&amp;pid=14950#pid14950</link>
			<pubDate>Fri, 22 Oct 2010 13:59:53 -0400</pubDate>
			<dc:creator><![CDATA[JJoe]]></dc:creator>
			<guid isPermaLink="false">https://www.prxbx.com/forums/showthread.php?tid=1683&amp;pid=14950#pid14950</guid>
			<description><![CDATA[<blockquote><cite><span> (Oct. 21, 2010 10:55 PM)</span>turtle Wrote: <a href="https://www.prxbx.com/forums/showthread.php?pid=14943#pid14943" class="quick_jump">&nbsp;</a></cite>Is their any reason not to use some other port besides 8080..maybe 80. For some reason 80 seems to load quicker.</blockquote>
<br />
I don't have a good reason to not use what works but I usually see a higher number. I think lower numbers are often randomly assigned. It may be that setting a lower number might cause problems. But I don't know.<br />
<br />
<br />
Configuring the browser to use a local proxy on the local port 80 should not interfere with the remote port 80.]]></description>
			<content:encoded><![CDATA[<blockquote><cite><span> (Oct. 21, 2010 10:55 PM)</span>turtle Wrote: <a href="https://www.prxbx.com/forums/showthread.php?pid=14943#pid14943" class="quick_jump">&nbsp;</a></cite>Is their any reason not to use some other port besides 8080..maybe 80. For some reason 80 seems to load quicker.</blockquote>
<br />
I don't have a good reason to not use what works but I usually see a higher number. I think lower numbers are often randomly assigned. It may be that setting a lower number might cause problems. But I don't know.<br />
<br />
<br />
Configuring the browser to use a local proxy on the local port 80 should not interfere with the remote port 80.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Port 8080]]></title>
			<link>https://www.prxbx.com/forums/showthread.php?tid=1683&amp;pid=14946#pid14946</link>
			<pubDate>Fri, 22 Oct 2010 02:01:16 -0400</pubDate>
			<dc:creator><![CDATA[Siamesecat]]></dc:creator>
			<guid isPermaLink="false">https://www.prxbx.com/forums/showthread.php?tid=1683&amp;pid=14946#pid14946</guid>
			<description><![CDATA[Port 80 is the regular HTTP port.  One needs to use another port for the proxy.  You could set it to use a different port such as 8000, but not 80.]]></description>
			<content:encoded><![CDATA[Port 80 is the regular HTTP port.  One needs to use another port for the proxy.  You could set it to use a different port such as 8000, but not 80.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Port 8080]]></title>
			<link>https://www.prxbx.com/forums/showthread.php?tid=1683&amp;pid=14943#pid14943</link>
			<pubDate>Thu, 21 Oct 2010 18:55:30 -0400</pubDate>
			<dc:creator><![CDATA[turtle]]></dc:creator>
			<guid isPermaLink="false">https://www.prxbx.com/forums/showthread.php?tid=1683&amp;pid=14943#pid14943</guid>
			<description><![CDATA[Is their any reason not to use some other port besides 8080..maybe 80. For some reason 80 seems to load quicker.]]></description>
			<content:encoded><![CDATA[Is their any reason not to use some other port besides 8080..maybe 80. For some reason 80 seems to load quicker.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Firefox Add-on: HTTPS Everywhere]]></title>
			<link>https://www.prxbx.com/forums/showthread.php?tid=1629&amp;pid=14457#pid14457</link>
			<pubDate>Mon, 28 Jun 2010 02:28:19 -0400</pubDate>
			<dc:creator><![CDATA[Kye-U]]></dc:creator>
			<guid isPermaLink="false">https://www.prxbx.com/forums/showthread.php?tid=1629&amp;pid=14457#pid14457</guid>
			<description><![CDATA[<a href="https://www.eff.org/https-everywhere" target="_blank">https://www.eff.org/https-everywhere</a><br />
<br />
<blockquote><cite>Quote:</cite>HTTPS Everywhere is a Firefox extension produced as a collaboration between The Tor Project and the Electronic Frontier Foundation. It encrypts your communications with a number of major websites.<br />
<br />
Many sites on the web offer some limited support for encryption over HTTPS, but make it difficult to use. For instance, they may default to unencrypted HTTP, or fill encrypted pages with links that go back to the unencrypted site.<br />
<br />
The HTTPS Everywhere extension fixes these problems by rewriting all requests to these sites to HTTPS.</blockquote>
]]></description>
			<content:encoded><![CDATA[<a href="https://www.eff.org/https-everywhere" target="_blank">https://www.eff.org/https-everywhere</a><br />
<br />
<blockquote><cite>Quote:</cite>HTTPS Everywhere is a Firefox extension produced as a collaboration between The Tor Project and the Electronic Frontier Foundation. It encrypts your communications with a number of major websites.<br />
<br />
Many sites on the web offer some limited support for encryption over HTTPS, but make it difficult to use. For instance, they may default to unencrypted HTTP, or fill encrypted pages with links that go back to the unencrypted site.<br />
<br />
The HTTPS Everywhere extension fixes these problems by rewriting all requests to these sites to HTTPS.</blockquote>
]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Critical security issues Adobe Reader and Acrobat]]></title>
			<link>https://www.prxbx.com/forums/showthread.php?tid=1566&amp;pid=13918#pid13918</link>
			<pubDate>Thu, 14 Jan 2010 15:08:06 -0500</pubDate>
			<dc:creator><![CDATA[bugger]]></dc:creator>
			<guid isPermaLink="false">https://www.prxbx.com/forums/showthread.php?tid=1566&amp;pid=13918#pid13918</guid>
			<description><![CDATA[@defconnect<br />
<br />
My mentor used to say "if networking is not suck f up, we won't have a job anymore", i guess they just have to screw up their software to get keep their job eh?]]></description>
			<content:encoded><![CDATA[@defconnect<br />
<br />
My mentor used to say "if networking is not suck f up, we won't have a job anymore", i guess they just have to screw up their software to get keep their job eh?]]></content:encoded>
		</item>
	</channel>
</rss>