![]() |
![]() |
![]() |
||||
Welcome to the GoFuckYourself.com - Adult Webmaster Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. By joining our free community you will have access to post topics, communicate privately with other members (PM), respond to polls, upload content and access many other special features. Registration is fast, simple and absolutely free so please, join our community today! If you have any problems with the registration process or your account login, please contact us. |
![]() ![]() |
|
Discuss what's fucking going on, and which programs are best and worst. One-time "program" announcements from "established" webmasters are allowed. |
|
Thread Tools |
![]() |
#1 |
Confirmed User
Join Date: Mar 2003
Location: Toronto, Ontario
Posts: 4,402
|
Can Use of a Proxy Server be Detected?
The password sharing sites recommend use of a specified proxy server to avoid detection by ip logging.
Can it be done? Or is there an database of proxy servers that can be obtained and maintained? Thanks
__________________
![]() Paul |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#2 |
Confirmed User
Join Date: Nov 2004
Location: Scottsdale, AZ
Posts: 5,167
|
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#3 | |
Confirmed User
Join Date: Mar 2003
Location: Toronto, Ontario
Posts: 4,402
|
Quote:
I want to control access to a pay site by ip or ip range. I want to reject anything coming through a proxy (or an onion) because it is a hole an entire country could come through. I know I have to consider people travelling, but that is another issue. Cheers
__________________
![]() Paul |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#4 | |
Confirmed User
Join Date: Nov 2004
Location: Scottsdale, AZ
Posts: 5,167
|
Quote:
|
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#5 | |
Confirmed User
Join Date: Nov 2004
Location: Scottsdale, AZ
Posts: 5,167
|
Quote:
|
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#6 |
Confirmed User
Join Date: Nov 2004
Location: Scottsdale, AZ
Posts: 5,167
|
Instead, spend your resources on protecting your member area better... there are no ways around it.
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#7 |
Confirmed User
Join Date: Jun 2005
Location: ♠ ♣ ♥
Posts: 2,341
|
you could have a script that attempted a client proxy connection on the surfer's IP using well known proxy ports (8000, 8080, etc)... this would weed out most of the proxy traffic, but not something like the Tor network.
__________________
![]() |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#8 | |
Confirmed User
Join Date: Mar 2003
Location: Toronto, Ontario
Posts: 4,402
|
Quote:
__________________
![]() Paul |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#9 | |
Confirmed User
Join Date: Nov 2004
Location: Scottsdale, AZ
Posts: 5,167
|
Quote:
![]() |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#10 | |
Confirmed User
Join Date: Jun 2005
Location: ♠ ♣ ♥
Posts: 2,341
|
Quote:
__________________
![]() |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#11 | |
Confirmed User
Join Date: Apr 2002
Location: Houston
Posts: 5,651
|
Quote:
|
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#12 | |
Confirmed User
Join Date: Nov 2004
Location: Scottsdale, AZ
Posts: 5,167
|
Quote:
1. User signs up, password must be 8 chars or longer with at least 1 digit 2. Spend some $$ on a real programmer and come up with a simple, yet very useful, pattern recognition utility that will monitor user activity and detect irregular IP changes, browsers, cookie data. It's not hard. 3. Once the software detects unusual activity, disable the freakin account and send further instructions on re-activating it to the user's email. 4. Get rid of freakin Basic Authentication.. 5. Have your login be form-based and implement a Turing test. 6. Ask yourself why it took you 10 years to figure this out lol |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#13 | |
Confirmed User
Join Date: Apr 2002
Location: Houston
Posts: 5,651
|
Quote:
|
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#14 | |
Confirmed User
Join Date: Nov 2004
Location: Scottsdale, AZ
Posts: 5,167
|
Quote:
|
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#15 | |
Confirmed User
Join Date: Jun 2005
Location: ♠ ♣ ♥
Posts: 2,341
|
Quote:
__________________
![]() |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#16 |
Confirmed User
Join Date: Nov 2004
Location: Scottsdale, AZ
Posts: 5,167
|
Proxies will always be here in one form or another.. especially when the EFF themselves push anonymity technologies
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#17 |
Confirmed User
Join Date: Nov 2004
Location: Scottsdale, AZ
Posts: 5,167
|
I just set up my 5th box on the Tor network
![]() |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#18 | |
Confirmed User
Join Date: Mar 2003
Location: Toronto, Ontario
Posts: 4,402
|
Quote:
![]()
__________________
![]() Paul |
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#19 |
Confirmed User
Industry Role:
Join Date: Dec 2001
Posts: 7,952
|
I think getting strongbox will save you a lot of time and headache.
|
![]() |
![]() ![]() ![]() ![]() ![]() |