|
these can be used for many purposes hitbots,chatbots,seo tools,surfing and yes even mailing.. and with your method tek it would take forever to scan what port is open and then your ip has to be in an authentication file to even use the proxy in the first place unless its an unprotected proxy. anyway if you need them you know where to get them..
__________________
cat cash* | tr -d '\r' | tr -s '/n' > money
|