<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>proxy Archives - Linux Windows and android Tutorials</title>
	<atom:link href="https://www.osradar.com/tag/proxy/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.osradar.com</link>
	<description>tutorials and news and Seurity</description>
	<lastBuildDate>Fri, 01 Jul 2022 02:47:17 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.8.12</generator>
	<item>
		<title>What is Smart DNS and how does it improve navigation.</title>
		<link>https://www.osradar.com/what-is-smart-dns-and-how-does-it-improve-navigation/</link>
					<comments>https://www.osradar.com/what-is-smart-dns-and-how-does-it-improve-navigation/#respond</comments>
		
		<dc:creator><![CDATA[roger]]></dc:creator>
		<pubDate>Mon, 27 Jun 2022 21:18:00 +0000</pubDate>
				<category><![CDATA[Network]]></category>
		<category><![CDATA[dns]]></category>
		<category><![CDATA[proxy]]></category>
		<category><![CDATA[smart dns]]></category>
		<category><![CDATA[vpn]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=36208</guid>

					<description><![CDATA[<p>When surfing the Internet, there is a significant factor: privacy. We can use different tools to hide data such as IP or location. A clear example is the use of a VPN. However, there are other alternatives. In this post, we are going to talk about Smart DNS. Therefore, in this post, we will see [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/what-is-smart-dns-and-how-does-it-improve-navigation/">What is Smart DNS and how does it improve navigation.</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>When surfing the Internet, there is a significant factor: privacy. We can use different tools to hide data such as IP or location. A clear example is the use of a VPN. However, there are other alternatives. In this post,  we are going to talk about Smart DNS. Therefore, in this post, we will see what Smart DNS is and how it improves privacy when browsing the web.</p>



<h2>How Smart DNS works</h2>



<p><a href="https://www.osradar.com/how-to-choose-the-best-dns/" target="_blank" rel="noreferrer noopener">DNS</a> is used to link a domain name to an IP address. That is, if you enter osradar.com in your browser, your system automatically <em>translates</em> that information and returns the IP that corresponds to that page. You don&#8217;t need to remember meaningless numbers, but simply the domain name. Logically, when we send that DNS request, we are sending information. They are going to know certain information about our equipment. That&#8217;s where Smart DNS comes in. In effect, what it does is hide the DNS address of our device when we redirect queries through a remote server.</p>



<figure class="wp-block-image size-full"><img loading="lazy" width="1024" height="1024" src="https://www.osradar.com/wp-content/uploads/2022/06/dns.png" alt="" class="wp-image-36209" srcset="https://www.osradar.com/wp-content/uploads/2022/06/dns.png 1024w, https://www.osradar.com/wp-content/uploads/2022/06/dns-300x300.png 300w, https://www.osradar.com/wp-content/uploads/2022/06/dns-150x150.png 150w, https://www.osradar.com/wp-content/uploads/2022/06/dns-768x768.png 768w, https://www.osradar.com/wp-content/uploads/2022/06/dns-696x696.png 696w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>Normally, you will use the DNS of the Internet operator you have. It will come automatically configured this way, for example on Windows. But you can also use the DNS of services such as Google, Cloudflare or Quad9, among many others. However, when using Smart DNS, you are going to enter the Internet with their DNS. In effect, it hides your real ones, the ones you have configured on your computer. It will change the DNS you have configured locally to theirs remotely.</p>



<h2>More privacy does not necessarily mean more security</h2>



<p>However, you should know that it will not hide data such as your IP, for example. It is not something that protects your security. It allows you to access content that is geographically restricted. In fact, this is what has led to a considerable increase in the use of this type of service. This is not a novelty, as it has been around for 10 years, but it is in recent times that we have seen great growth.</p>



<figure class="wp-block-image size-full"><img loading="lazy" width="500" height="500" src="https://www.osradar.com/wp-content/uploads/2022/06/dns2.png" alt="" class="wp-image-36210" srcset="https://www.osradar.com/wp-content/uploads/2022/06/dns2.png 500w, https://www.osradar.com/wp-content/uploads/2022/06/dns2-300x300.png 300w, https://www.osradar.com/wp-content/uploads/2022/06/dns2-150x150.png 150w" sizes="(max-width: 500px) 100vw, 500px" /></figure>



<p>Think of a movie or series you want to watch from Netflix, but it is not available in the USA or in the country you are in. What Smart DNS does is to hide your DNS, to mask them, so you can access content that may be geographically blocked. In part, it will act as a VPN, but it is not the same.</p>



<h2>Differences with a VPN</h2>



<p>We can say that there are major differences between a VPN and Smart DNS. You should not confuse what each service does, as you could have security and privacy problems. A VPN will hide the IP address and encrypt the data. This is very useful if you browse over a public Wi-Fi network, as it will protect your security.</p>



<figure class="wp-block-image size-full"><img loading="lazy" width="512" height="512" src="https://www.osradar.com/wp-content/uploads/2022/06/dns3.png" alt="" class="wp-image-36211" srcset="https://www.osradar.com/wp-content/uploads/2022/06/dns3.png 512w, https://www.osradar.com/wp-content/uploads/2022/06/dns3-300x300.png 300w, https://www.osradar.com/wp-content/uploads/2022/06/dns3-150x150.png 150w" sizes="(max-width: 512px) 100vw, 512px" /></figure>



<p>However, Smart DNS does not do that. It does not hide the IP, nor does it encrypt the connection. In fact, they are not going to improve your security. Now, don&#8217;t VPNs also serve to avoid geo-blocking? Yes, it is true that they also have this function. However, there are differences that make many users opt for Smart DNS.</p>



<p>A clear difference between VPN and Smart DNS is speed. It is a fact that when browsing via VPN, the connection will be slower. You may even experience outages or have problems accessing certain services if you use a program that is not very reliable, such as the free ones.</p>



<p>Smart DNS does not encrypt the connection data. This has no impact on the connection speed. You will have no problems, for example, downloading from the cloud at good speed, streaming in high definition. Or play online and see that the game is constantly cut off.</p>



<p>On the other hand, you should bear in mind that some VPN services also offer Smart DNS. In other words, they will also change your computer&#8217;s DNS while encrypting the IP address and browsing data for greater security.</p>



<h2>Advantages of using Smart DNS</h2>



<p>Having seen how Smart DNS works and how it differs from a VPN, let&#8217;s take a look at the most important advantages of navigating through this type of service.</p>



<ul><li>The main advantage is that you will be able to enter websites that are blocked. This is very useful if you want to enter certain platforms that may be restricted in your country. For example, some movies or series on services like Netflix. As well as enter social networks or use certain applications that are banned in other countries.</li><li>Another crucial point is that it will not slow down the connection. Unlike what happens with a proxy or VPN, in this case you will not notice a drastic drop in Internet speed, both upload and download. You will be able to browse without those annoying limitations.</li><li>In addition, they are usually elementary to use and can be configured on multiple platforms. This allows you to browse through Smart DNS on your computer, cell phone, etc. You will have a wide range of options in this regard.</li></ul>



<p>There are both free and paid Smart DNS services. However, as in the case of VPNs, if you want an option that really works well, you will usually have to opt for a paid one. You will find services that offer Smart DNS, such as<a href="https://nordvpn.com/" target="_blank" rel="noreferrer noopener"> NordVPN, </a>SmartDNSProxy, Unlocator or Ironsocket. Each of these options has its peculiarities, but basically the end goal is the same.</p>



<h2>Conclusion</h2>



<p>In short, we can say that Smart DNS is a very intriguing alternative to the use of VPN or proxy. Especially when you only want to access restricted content. For example, watching a Netflix video that is not available in one place or using any blocked application. In addition, it is important when you need the Internet speed to be adequate and to avoid outages.</p>



<p>However, you should bear in mind that they will not encrypt the connection, nor hide the IP address, as a VPN service does. This must be considered, since in this case, the security when surfing the net will not be the same. If, for example, you are going to connect to a public network, your data could be at risk. Goodbye!</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/what-is-smart-dns-and-how-does-it-improve-navigation/">What is Smart DNS and how does it improve navigation.</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/what-is-smart-dns-and-how-does-it-improve-navigation/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Using Obfsproxy to encrypt the connection.</title>
		<link>https://www.osradar.com/using-obfsproxy-to-encrypt-the-connection/</link>
					<comments>https://www.osradar.com/using-obfsproxy-to-encrypt-the-connection/#respond</comments>
		
		<dc:creator><![CDATA[roger]]></dc:creator>
		<pubDate>Sat, 30 Apr 2022 21:09:00 +0000</pubDate>
				<category><![CDATA[Network]]></category>
		<category><![CDATA[Obfsproxy]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[proxy]]></category>
		<category><![CDATA[vpn]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=35816</guid>

					<description><![CDATA[<p>Hello! Maintaining privacy when surfing the Internet is a significant factor. To achieve this, we can make use of different services and applications. For example, VPN, a proxy, the Tor browser, etc. Consequently, in this post we are going to focus on Obfsproxy. In addition, we will learn how to use it to encrypt the [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/using-obfsproxy-to-encrypt-the-connection/">Using Obfsproxy to encrypt the connection.</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Hello! Maintaining privacy when surfing the Internet is a significant factor. To achieve this, we can make use of different services and applications. For example, VPN, a proxy, the Tor browser, etc. Consequently, in this post we are going to focus on Obfsproxy. In addition, we will learn how to use it to encrypt the connection and prevent our data from being leaked. Let&#8217;s talk about what it actually does and under what circumstances it can be useful.</p>



<h2>What is Obfsproxy</h2>



<p>When talking about Obfsproxy we refer to a subproject that belongs to Tor. It is used to hide web traffic when surfing the Internet. Basically, it is similar to surfing through a VPN or the Tor browser. In fact, the purpose is the same: to hide the IP address and encrypt the information we transfer when browsing. So, what is its raison d&#8217;être? The reason is that there are certain countries that use what is known as IPR. These tools are used to block VPN connections so that users cannot bypass geo-blocking, for example. There are even governments that can force operators to filter SSL traffic.</p>



<figure class="wp-block-image size-large"><img loading="lazy" width="945" height="1024" src="https://www.osradar.com/wp-content/uploads/2022/04/prox-945x1024.png" alt="" class="wp-image-35817" srcset="https://www.osradar.com/wp-content/uploads/2022/04/prox-945x1024.png 945w, https://www.osradar.com/wp-content/uploads/2022/04/prox-277x300.png 277w, https://www.osradar.com/wp-content/uploads/2022/04/prox-768x833.png 768w, https://www.osradar.com/wp-content/uploads/2022/04/prox-1417x1536.png 1417w, https://www.osradar.com/wp-content/uploads/2022/04/prox-696x755.png 696w, https://www.osradar.com/wp-content/uploads/2022/04/prox-1068x1158.png 1068w, https://www.osradar.com/wp-content/uploads/2022/04/prox.png 1771w" sizes="(max-width: 945px) 100vw, 945px" /></figure>



<p>The Obfsproxy project is used to bypass these blockages. In this way we can surf the Internet without information being leaked. Certainly, it was created for Tor. However, it has features that can be exploited by developers to design, implement and test traffic hiding layers that have nothing to do with Tor. In this way, it also began to be used to hide traffic through OpenVPN.</p>



<p>Therefore, Obfsproxy is a project devised from Tor to improve users&#8217; privacy. In other words, it is a way to avoid possible blocks that may exist for the use of a normal VPN or the <a href="https://www.osradar.com/tor2web-what-is-it-and-how-does-it-work/" target="_blank" rel="noreferrer noopener">Onion </a>browser itself. Let&#8217;s remember that both are very popular options for accessing the network. On the other hand, it was created mainly for use in countries such as China or Venezuela, where there may be problems to browse freely.</p>



<h2>What it is used for and how it works</h2>



<p>By now, you are probably wondering what <a href="https://2019.www.torproject.org/docs/pluggable-transports" target="_blank" rel="noreferrer noopener">Obfsproxy </a>is really for. Actually, the answer is clear. The purpose of this tool is to make browsing more private. It serves to prevent a government of a certain country from classifying Internet traffic by protocols. In fact, they know exactly what they are: (HTTPS, HTTP, SSL, VPN…). In this way, it could block the protocol it is interested in and cause users to have problems.</p>



<p>If, for example, a user uses OpenVPN, Obfsproxy will hide the traffic to make it look like normal and harmless HTTP traffic. This way, you will avoid blockages and problems to enter a certain web page or use an online service.</p>



<p>An interesting point of Obfsproxy compared to other encryption options is that its developers have managed to leave no trace. The linking protocol it uses has no recognizable patterns. This allows communication to be established without network monitors being able to detect anything strange. Obfsproxy can be used in both OpenVPN and Wireguard. To use it, it is necessary to have a working OpenVPN server. It can be one of our own or of a third party.</p>



<h2>Is it enough to maintain privacy?</h2>



<p>We have seen how tools such as VPN or proxy help to maintain privacy. However, this is often not enough. It is essential to take certain measures, beyond using Tor or the Obfsproxy project. For this reason, we are going to give you some tips to surf the Internet without problems and without compromising your personal data.</p>



<h3>Always use security software</h3>



<p>To surf the Internet safely and without privacy problems, it is essential to have a good antivirus and other programs that protect us. For example, Windows Defender is one of the most widely used. You can also try others such as Bitdefender or Avast.</p>



<figure class="wp-block-image size-full"><img loading="lazy" width="600" height="611" src="https://www.osradar.com/wp-content/uploads/2022/04/prox2.png" alt="" class="wp-image-35818" srcset="https://www.osradar.com/wp-content/uploads/2022/04/prox2.png 600w, https://www.osradar.com/wp-content/uploads/2022/04/prox2-295x300.png 295w" sizes="(max-width: 600px) 100vw, 600px" /></figure>



<p>However, there are tools such as a firewall that can block insecure connections. There are also browser add-ons that help improve privacy. Consequently, it avoids attacks that can compromise our personal data and affect us at any given moment.</p>



<h3>Avoid exposing data</h3>



<p>In this case, it is a common-sense advice. To maintain privacy on the network, it is necessary to avoid making our personal data public. For example, you should not make your e-mail address public when you post a comment on a web page or in an open forum.</p>



<figure class="wp-block-image size-full"><img loading="lazy" width="900" height="900" src="https://www.osradar.com/wp-content/uploads/2022/04/prox3.png" alt="" class="wp-image-35819" srcset="https://www.osradar.com/wp-content/uploads/2022/04/prox3.png 900w, https://www.osradar.com/wp-content/uploads/2022/04/prox3-300x300.png 300w, https://www.osradar.com/wp-content/uploads/2022/04/prox3-150x150.png 150w, https://www.osradar.com/wp-content/uploads/2022/04/prox3-768x768.png 768w, https://www.osradar.com/wp-content/uploads/2022/04/prox3-696x696.png 696w" sizes="(max-width: 900px) 100vw, 900px" /></figure>



<p>It is also advisable to take care of the data we expose through social networks. On this type of platform, there may be bots that collect personal information from users to subsequently trade with it and make a profit. Therefore, it is advisable to control what information we will be exposing publicly on the network and thus improve privacy.</p>



<h3>Install applications only from reliable sources</h3>



<p>Another tip is to install software only from safe and official sources. For example, websites of the application itself, official stores and warranty platforms. This way we will avoid installing software that can be dangerous and steal our personal data.</p>



<p>It is true that sometimes we can find unofficial applications that may have interesting features. However, we do not really know who may be behind that software. Perhaps it has been created maliciously with the sole purpose of stealing personal information.</p>



<h3>Try not to make mistakes</h3>



<p>Finally, another recommendation is to avoid making mistakes that could expose our personal data. For example, do not open an attachment that arrives by e-mail without really knowing where it comes from. We do not know if it could be a security threat.</p>



<p>Most cyber-attacks, threats that put privacy at risk, will require the victim&#8217;s interaction. They will need us to make a mistake, such as opening a file or installing a program. This also includes exposing our data in some way and thus stealing information.</p>



<p>In short, protecting privacy when surfing the Internet is essential. We can make use of tools such as a VPN, proxy or the Tor browser. In addition, to avoid possible blocking in certain countries, the Obfsproxy project has appeared. As we have seen, this is a great way to enhance our privacy when surfing the Internet. Bye!</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/using-obfsproxy-to-encrypt-the-connection/">Using Obfsproxy to encrypt the connection.</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/using-obfsproxy-to-encrypt-the-connection/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to bypass a firewall</title>
		<link>https://www.osradar.com/how-to-bypass-a-firewall/</link>
					<comments>https://www.osradar.com/how-to-bypass-a-firewall/#respond</comments>
		
		<dc:creator><![CDATA[roger]]></dc:creator>
		<pubDate>Tue, 19 Apr 2022 21:31:00 +0000</pubDate>
				<category><![CDATA[Network]]></category>
		<category><![CDATA[dns]]></category>
		<category><![CDATA[firewall]]></category>
		<category><![CDATA[proxy]]></category>
		<category><![CDATA[vpn]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=35375</guid>

					<description><![CDATA[<p>Hello, In most schools, universities and at work there is a firewall. Indeed, this tool in combination with others, limits Internet browsing and protect users against external threats. In many occasions, the restrictions at the firewall level are quite important. Consequently, if we want to access blocked websites we will have to make use of [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/how-to-bypass-a-firewall/">How to bypass a firewall</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Hello, In most schools, universities and at work there is a firewall. Indeed, this tool in combination with others, limits Internet browsing and protect users against external threats. In many occasions, the restrictions at the firewall level are quite important. Consequently, if we want to access blocked websites we will have to make use of different tools. It is probably not a good idea to bypass this firewall because it can have consequences. However, here we are going to offer some methods in case you are willing to take the risk. In this post we are going to talk about how to bypass the firewall.</p>



<h2>How to bypass the firewall</h2>



<p>A firewall is a software and/or hardware system that is responsible for controlling all incoming and outgoing connections between the local network and the Internet. It is also responsible for logically separating different subnets that we have in different VLANs. Its main function is to prevent and protect our private network from possible intrusions. With this in mind, it blocks access from the outside to the inside. A firewall can also be configured to limit traffic from the internal network to the external network. Therefore, we might encounter some kind of blocking implemented by the network administrator.</p>



<figure class="wp-block-image size-full"><img loading="lazy" width="800" height="800" src="https://www.osradar.com/wp-content/uploads/2022/03/fire.png" alt="" class="wp-image-35377" srcset="https://www.osradar.com/wp-content/uploads/2022/03/fire.png 800w, https://www.osradar.com/wp-content/uploads/2022/03/fire-300x300.png 300w, https://www.osradar.com/wp-content/uploads/2022/03/fire-150x150.png 150w, https://www.osradar.com/wp-content/uploads/2022/03/fire-768x768.png 768w, https://www.osradar.com/wp-content/uploads/2022/03/fire-696x696.png 696w" sizes="(max-width: 800px) 100vw, 800px" /></figure>



<p>In many occasions users want to access the Internet without any kind of limitation. Indeed, knowledge of how to access blocked websites in a school or university can be an asset among students. The same is true at work. It is possible to want to access a resource blocked by the firewall. Consequently, it may be necessary to attempt to bypass the organization&#8217;s firewall.</p>



<p>Here we are going to analyze how to bypass the school, university or work firewall. Accordingly, we will check methods to bypass the firewall. This depends on how that particular firewall works. Some work at the DNS level. That is to say, the firewall itself will be in charge of providing us with local DNS servers where the filtering is done, in addition, the possibility of using external DNS such as those of Google or Cloudflare is blocked. Another common method of blocking is to check the SNI field of HTTPS connections. As a result, we could allow or block access to certain web pages. Finally, they could do a deep traffic inspection (DPI) to block traffic that they have defined in the rules.</p>



<h2>Use a proxy server</h2>



<p><a href="https://www.osradar.com/how-to-configure-a-proxy-server-in-windows-10/" target="_blank" rel="noreferrer noopener">Proxies</a> are services that will act as intermediaries and handle requests for us. For example, if you want to view a game website, it is quite likely that you will look it up by typing the URL in the address bar and the firewall will block it. A proxy server avoids this because you are not visiting the game website directly. What we do is go to the proxy page, and you tell it to go to that page instead of us. It then shows you all the requested content, while the firewall only sees the proxy URL.</p>



<figure class="wp-block-image size-full"><img loading="lazy" width="830" height="495" src="https://www.osradar.com/wp-content/uploads/2022/03/fire2.png" alt="" class="wp-image-35378" srcset="https://www.osradar.com/wp-content/uploads/2022/03/fire2.png 830w, https://www.osradar.com/wp-content/uploads/2022/03/fire2-300x179.png 300w, https://www.osradar.com/wp-content/uploads/2022/03/fire2-768x458.png 768w, https://www.osradar.com/wp-content/uploads/2022/03/fire2-696x415.png 696w" sizes="(max-width: 830px) 100vw, 830px" /></figure>



<p>There are several types of Proxy, those based on HTTP and HTTPS. It is the latter that you should use. Indeed, if you use HTTP, all traffic will be unencrypted and could easily be blocked by the firewall. When using an HTTPS proxy, all communications between the user&#8217;s computer and the proxy server will be fully encrypted. Consequently, it is ideal for maintaining privacy and keeping the firewall <em>out of the way</em>.</p>



<p>When using a web proxy, you must consider that the browser you use must be correctly configured. Therefore, you must go to the network section and configure the IP address and port of the proxy, as well as the protocol it is using. Once configured, we will be able to surf the Internet through the Proxy. However, the traffic used by other programs such as Skype or Slack will go through the main Internet connection. In reality, there is no complete forwarding of traffic as with VPN services, only web traffic will move through the Proxy.</p>



<h2>Use a VPN to keep your traffic out of sight</h2>



<p>A <a href="https://www.osradar.com/the-best-free-vpns-for-2022/" target="_blank" rel="noreferrer noopener">VPN </a>is even more complete than a proxy and also makes it possible to bypass the firewall at work or school. In this case, it is as if our data travels hidden through a tunnel thanks to encryption. Consequently, it keeps us safe from prying eyes such as the school itself, the Internet provider and more. In this way of working, our computer sends this encrypted data to a VPN server, which decrypts our data. It then reads where we want to go and goes there. It then sends the traffic back encrypted and bypasses the firewall without any problems.</p>



<figure class="wp-block-image size-full"><img loading="lazy" width="512" height="512" src="https://www.osradar.com/wp-content/uploads/2022/04/fire3.png" alt="" class="wp-image-35670" srcset="https://www.osradar.com/wp-content/uploads/2022/04/fire3.png 512w, https://www.osradar.com/wp-content/uploads/2022/04/fire3-300x300.png 300w, https://www.osradar.com/wp-content/uploads/2022/04/fire3-150x150.png 150w" sizes="(max-width: 512px) 100vw, 512px" /></figure>



<p>A significant detail of VPNs is that all network traffic will go from your PC to the VPN server. In fact, it will not only be the web traffic, but also the Internet traffic of any program or process we are using.</p>



<h2>Google Translate</h2>



<p>Another method is to use Google Translate. Here we have to use the translation page function to use it. Then, when Google Translate translates that page, it loads the page on the server, translates it and sends us the result. This little trick is widely used to bypass firewalls when a website is blocked. In effect, we will use Google&#8217;s services to take us to the final website. However, this method has its limitations. Besides, it is quite annoying to have to use the hyperlinks inside the Google translator.</p>



<figure class="wp-block-image size-full"><img loading="lazy" width="535" height="535" src="https://www.osradar.com/wp-content/uploads/2022/03/fire4.png" alt="" class="wp-image-35380" srcset="https://www.osradar.com/wp-content/uploads/2022/03/fire4.png 535w, https://www.osradar.com/wp-content/uploads/2022/03/fire4-300x300.png 300w, https://www.osradar.com/wp-content/uploads/2022/03/fire4-150x150.png 150w" sizes="(max-width: 535px) 100vw, 535px" /></figure>



<p>The use of this trick is basic. Just go to the <a href="https://translate.google.com/" target="_blank" rel="noreferrer noopener">Google Translate </a>page. Once there, please upload the URL of the blocked web page. Allow the algorithm to detect the language automatically. Then, you have to translate the website to a different language than the original one. That&#8217;s it! As a result, you will have access to the website but in a different language than the original one. However, it is a way to access. Beyond the language limitation, it is likely that your organization will also block this domain from Google because it has been known to do this kind of thing. As a result, it may not work.</p>



<h2>Type the IP address of the website</h2>



<p>When surfing the Internet we use domain names because they are easier to remember. The reality is that those names are in charge of translating them to the DNS servers and then sending us to that IP address. If we put that public IP in the address bar of the browser we can bypass the firewall. Of course, as long as the firewall does not have a blacklist of IP addresses that cannot be accessed or does traffic inspection. A web page that we can use to find out that IP is <a href="https://whatismyipaddress.com/" target="_blank" rel="noreferrer noopener">WhatIsMyIPAddress.</a></p>



<p>This form of connection will only work in cases where the firewall blocks traffic at the DNS level. However, if the blocking is through DNS and IP, it will not work because it will also detect that we are connecting to unauthorized websites. If you cannot use Proxy and VPN to attempt to bypass firewalls, this trick might work well for you to connect without limitations. However, you will have to know in advance all the IP addresses of the websites you want to access, so it will be quite cumbersome.</p>



<h2>Uses DNS over HTTPS</h2>



<p>The <a href="https://www.osradar.com/how-to-enable-dns-over-https-in-windows-11/" target="_blank" rel="noreferrer noopener">DOH</a> protocol allows DNS requests and responses to be made through the HTTPS protocol in a fully encrypted manner. If your firewall is blocking access to the Internet through DNS, if you use DOH in the web browser, you will be able to bypass the firewall easily and simply. This is because blocking this protocol is really complicated. Indeed, you would have to block HTTPS accesses to all DNS servers that support this protocol, including Google, so as a general rule this is not blocked.</p>



<figure class="wp-block-image size-full"><img loading="lazy" width="500" height="500" src="https://www.osradar.com/wp-content/uploads/2022/03/fire5.png" alt="" class="wp-image-35382" srcset="https://www.osradar.com/wp-content/uploads/2022/03/fire5.png 500w, https://www.osradar.com/wp-content/uploads/2022/03/fire5-300x300.png 300w, https://www.osradar.com/wp-content/uploads/2022/03/fire5-150x150.png 150w" sizes="(max-width: 500px) 100vw, 500px" /></figure>



<p>This DOH protocol is already found in major web browsers such as Chrome or Firefox. It is even present in Microsoft systems. Consequently, it would be advisable to check your DNS settings over HTTPS if you can because this way you could bypass the DNS blocking. Okay, so we have seen how to bypass a firewall. We hope you will use this guide to avoid limitations in your work or school. See you soon.</p>



<p></p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/how-to-bypass-a-firewall/">How to bypass a firewall</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/how-to-bypass-a-firewall/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to route network traffic through TOR</title>
		<link>https://www.osradar.com/how-to-route-network-traffic-through-tor/</link>
					<comments>https://www.osradar.com/how-to-route-network-traffic-through-tor/#comments</comments>
		
		<dc:creator><![CDATA[roger]]></dc:creator>
		<pubDate>Thu, 14 Oct 2021 21:40:00 +0000</pubDate>
				<category><![CDATA[Network]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[onionfruit]]></category>
		<category><![CDATA[proxy]]></category>
		<category><![CDATA[vpn]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=32616</guid>

					<description><![CDATA[<p>Hello! Today, we will learn how to route the network traffic through TOR. However, we will do it without using TOR browser. For this, we will use a tool called OnionFruit. It works like a VPN. It allows the entire connection to pass through this software. As a result, we will be able to improve [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/how-to-route-network-traffic-through-tor/">How to route network traffic through TOR</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Hello! Today, we will learn how to route the network traffic through TOR. However, we will do it without using TOR browser. For this, we will use a tool called OnionFruit. It works like a VPN. It allows the entire connection to pass through this software. As a result, we will be able to improve privacy. Read on to explain how it works.</p>



<h2>How TOR routing works</h2>



<p>The TOR network is linked to privacy and security on the <a href="https://www.osradar.com/wp-admin/post.php?post=32599&amp;action=edit" target="_blank" rel="noreferrer noopener">Internet</a>. In fact, it has its browser. Which allows a more private navigation. Indeed,  everything passes through multiple layers like an onion. Moreover, this process is done from the beginning to the end. So by passing through many nodes, the presence of the navigation is blurred. For this to be possible, it is necessary for users to donate part of their bandwidth. Basically, they act as connection nodes. Therefore, we will gain anonymity. Consequently, we will be able to visit any page or even access the Deep Web. It is well known that our data can be tracked while browsing. Data such as IP address and location can be detected and shared. However, it is possible to avoid this through the TOR network.</p>



<figure class="wp-block-image size-full"><img loading="lazy" width="845" height="512" src="https://www.osradar.com/wp-content/uploads/2021/10/on.png" alt="" class="wp-image-32617" srcset="https://www.osradar.com/wp-content/uploads/2021/10/on.png 845w, https://www.osradar.com/wp-content/uploads/2021/10/on-300x182.png 300w, https://www.osradar.com/wp-content/uploads/2021/10/on-768x465.png 768w, https://www.osradar.com/wp-content/uploads/2021/10/on-696x422.png 696w" sizes="(max-width: 845px) 100vw, 845px" /></figure>



<h2>Using OnionFruit to route network traffic through TOR </h2>



<p>What OnionFruit does is to route all traffic through Tor. With this in mind, it makes use of the technology explained above. In this way, users improve their privacy. Consequently, they protect their personal information. OnionFruit is not a browser like TOR browser. In fact, it is a program to be installed on Windows. Moreover, its operation is elementary. It works as a bridge between our device and the target server. The tool has similarities to a VPN. In addition, it has more than 7,000 servers in almost 100 countries. So, it is possible to choose which one to connect to and determine which one works best.</p>



<h3>How to download and install OnionFruit</h3>



<p>The first thing you have to do is to go to the program page. Once there, just <a href="https://dragonfruit.network/onionfruit" target="_blank" rel="noreferrer noopener">download</a> it for free. Then, just run it like any other Windows program. The process is simple to do. Once completed, you will see the program running in the taskbar. By default, the program starts offline.</p>



<h3>Getting started with OnionFruit</h3>



<p>After running the program, look for the icon in the taskbar. As mentioned, the program initially runs offline. As a result, we will see a screen like the following. It shows the disconnected network and the country will be marked as Random.</p>



<figure class="wp-block-image size-full"><img loading="lazy" width="600" height="210" src="https://www.osradar.com/wp-content/uploads/2021/10/image-1.png" alt="" class="wp-image-32623" srcset="https://www.osradar.com/wp-content/uploads/2021/10/image-1.png 600w, https://www.osradar.com/wp-content/uploads/2021/10/image-1-300x105.png 300w" sizes="(max-width: 600px) 100vw, 600px" /></figure>



<p>To start using it, just click on the Connect button. Then, just wait until it turns green. This process should not take more than 1 minute. After it is successful, a window will appear in the browser confirming the connection.</p>



<figure class="wp-block-image size-large"><img loading="lazy" width="1024" height="489" src="https://www.osradar.com/wp-content/uploads/2021/10/on3-1024x489.png" alt="" class="wp-image-32624" srcset="https://www.osradar.com/wp-content/uploads/2021/10/on3-1024x489.png 1024w, https://www.osradar.com/wp-content/uploads/2021/10/on3-300x143.png 300w, https://www.osradar.com/wp-content/uploads/2021/10/on3-768x367.png 768w, https://www.osradar.com/wp-content/uploads/2021/10/on3-696x332.png 696w, https://www.osradar.com/wp-content/uploads/2021/10/on3-1068x510.png 1068w, https://www.osradar.com/wp-content/uploads/2021/10/on3.png 1280w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<h3>Application preferences</h3>



<p>Please note that to go to the preferences, you must be logged out. Again, just click on the button in the taskbar. Once there, we will be able to configure the incoming and outgoing country, use securDNS, set up a bridge, the home page, etc. As mentioned, the configuration is elementary. Moreover, the most important feature can be managed from the icon, without going to the settings. Indeed, the country of connection can be selected from here. You can also select that the program starts automatically with Windows or that it updates automatically.</p>



<figure class="wp-block-image size-full"><img loading="lazy" width="1000" height="550" src="https://www.osradar.com/wp-content/uploads/2021/10/image-2.png" alt="" class="wp-image-32625" srcset="https://www.osradar.com/wp-content/uploads/2021/10/image-2.png 1000w, https://www.osradar.com/wp-content/uploads/2021/10/image-2-300x165.png 300w, https://www.osradar.com/wp-content/uploads/2021/10/image-2-768x422.png 768w, https://www.osradar.com/wp-content/uploads/2021/10/image-2-696x383.png 696w" sizes="(max-width: 1000px) 100vw, 1000px" /></figure>



<p>Okay, so we have seen how to route network traffic through TOR. Moreover, without having to download the TOR browser. Note that the country you connect to is vital for a good connection. Indeed, you can check this by testing with different countries. Therefore, there are some that do not work very well. So, it is just a matter of testing until you get an optimal one. However, the most recommended option is to use the Random value. This way, the program makes sure to choose the most optimal server. Bye!</p>



<p></p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/how-to-route-network-traffic-through-tor/">How to route network traffic through TOR</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/how-to-route-network-traffic-through-tor/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>How to avoid Internet censorship</title>
		<link>https://www.osradar.com/how-to-avoid-internet-censorship/</link>
					<comments>https://www.osradar.com/how-to-avoid-internet-censorship/#respond</comments>
		
		<dc:creator><![CDATA[roger]]></dc:creator>
		<pubDate>Tue, 12 Oct 2021 21:39:00 +0000</pubDate>
				<category><![CDATA[Network]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[https]]></category>
		<category><![CDATA[internet censorship]]></category>
		<category><![CDATA[lantern]]></category>
		<category><![CDATA[proxy]]></category>
		<category><![CDATA[vpn]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=32588</guid>

					<description><![CDATA[<p>Hello! Sometimes when surfing the internet we get some restrictions. Indeed, we can&#8217;t access pages or some services. So, there may be geographical limitations. It is even possible that there is censorship. As a result, you can not properly view the content of a page. Or simply not to enter completely. But don&#8217;t worry, today [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/how-to-avoid-internet-censorship/">How to avoid Internet censorship</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Hello! Sometimes when surfing the internet we get some restrictions. Indeed, we can&#8217;t access pages or some services. So, there may be geographical limitations. It is even possible that there is censorship. As a result, you can not properly view the content of a page. Or simply not to enter completely. But don&#8217;t worry, today we will learn how to get around it. Read on to find out how to avoid <a href="https://www.osradar.com/how-to-improve-internet-connection-speed-by-clearing-dns-cache-memory/" target="_blank" rel="noreferrer noopener">Internet </a>censorship.</p>



<h2>How to use Lantern to avoid Internet censorship.</h2>



<p>This is a free, cross-platform application. It is available for Windows, Mac, ubuntu, android, and iOS. Its main function is to offer private, secure, fast, and stable navigation. In this way, it is possible to access potentially blocked content. This last aspect is what makes the tool so interesting. It allows access to content that is restricted. This happens because there are sites that work in certain geographical areas. Or it also happens when there is governmental censorship. For this, Lantern uses geographically optimized servers. As a result, browsing is faster and more stable. In addition, it uses various techniques to circumvent possible firewalls. If one of the techniques fails, it automatically switches to another correct server. In this way, it manages to connect successfully.</p>



<figure class="wp-block-image size-large"><img loading="lazy" width="1024" height="710" src="https://www.osradar.com/wp-content/uploads/2021/10/lan-1024x710.png" alt="" class="wp-image-32589" srcset="https://www.osradar.com/wp-content/uploads/2021/10/lan-1024x710.png 1024w, https://www.osradar.com/wp-content/uploads/2021/10/lan-300x208.png 300w, https://www.osradar.com/wp-content/uploads/2021/10/lan-768x533.png 768w, https://www.osradar.com/wp-content/uploads/2021/10/lan-1536x1065.png 1536w, https://www.osradar.com/wp-content/uploads/2021/10/lan-218x150.png 218w, https://www.osradar.com/wp-content/uploads/2021/10/lan-696x483.png 696w, https://www.osradar.com/wp-content/uploads/2021/10/lan-1068x741.png 1068w, https://www.osradar.com/wp-content/uploads/2021/10/lan.png 1612w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<h2>Configuring Lantern for private navigation</h2>



<p>This tool has a simple and easy-to-configure interface. Therefore, we only need a few steps to start enjoying it. The first thing you have to do is to <a href="https://getlantern.org/en_US/index.html" target="_blank" rel="noreferrer noopener">download </a>it from its official website. As already mentioned, it is also possible to use it on mobile devices. However, we will use the Windows version. So once downloaded just install it like any other Windows program. After the installation is finished, it will start running in the background. We will be able to check this with the tool icon in the taskbar. In addition, it will open a window of the browser that we are using. This window allows you to verify the connection. In addition, it invites us to switch to Pro mode. In addition, we will see the status of the connection and the connected server.</p>



<figure class="wp-block-image size-large"><img loading="lazy" width="1024" height="787" src="https://www.osradar.com/wp-content/uploads/2021/10/lan2-1024x787.png" alt="Lantern Configuration" class="wp-image-32593" srcset="https://www.osradar.com/wp-content/uploads/2021/10/lan2-1024x787.png 1024w, https://www.osradar.com/wp-content/uploads/2021/10/lan2-300x231.png 300w, https://www.osradar.com/wp-content/uploads/2021/10/lan2-768x590.png 768w, https://www.osradar.com/wp-content/uploads/2021/10/lan2-696x535.png 696w, https://www.osradar.com/wp-content/uploads/2021/10/lan2-1068x821.png 1068w, https://www.osradar.com/wp-content/uploads/2021/10/lan2.png 1280w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption>Lantern Configuration</figcaption></figure>



<h2>Lantern Settings Options</h2>



<p>Please note that the program does not require user creation. In fact, you only need to install it to start using it. However, the Pro option does require registration and a fee. This gives access to additional options. However, the free version is more than enough for home use.We have already mentioned that there is a program icon in the taskbar. From there it is possible to disconnect, close the program or open the configuration. It is also possible to go from the icon at the top right of the configuration screen. Then just click on <strong>Settings</strong>.</p>



<figure class="wp-block-image size-large"><img loading="lazy" width="1024" height="511" src="https://www.osradar.com/wp-content/uploads/2021/10/lan3-1024x511.png" alt="" class="wp-image-32594" srcset="https://www.osradar.com/wp-content/uploads/2021/10/lan3-1024x511.png 1024w, https://www.osradar.com/wp-content/uploads/2021/10/lan3-300x150.png 300w, https://www.osradar.com/wp-content/uploads/2021/10/lan3-768x383.png 768w, https://www.osradar.com/wp-content/uploads/2021/10/lan3-696x347.png 696w, https://www.osradar.com/wp-content/uploads/2021/10/lan3-1068x533.png 1068w, https://www.osradar.com/wp-content/uploads/2021/10/lan3.png 1164w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>Once there we will be able to manage several elements. For example, the language, the sending of statistics or the type of program startup. Additionally, there are other advanced settings. There you will find the browsing options related to the proxy.</p>



<figure class="wp-block-image size-large"><img loading="lazy" width="1024" height="787" src="https://www.osradar.com/wp-content/uploads/2021/10/lan4-1024x787.png" alt="Lantern Settings Options" class="wp-image-32595" srcset="https://www.osradar.com/wp-content/uploads/2021/10/lan4-1024x787.png 1024w, https://www.osradar.com/wp-content/uploads/2021/10/lan4-300x231.png 300w, https://www.osradar.com/wp-content/uploads/2021/10/lan4-768x590.png 768w, https://www.osradar.com/wp-content/uploads/2021/10/lan4-696x535.png 696w, https://www.osradar.com/wp-content/uploads/2021/10/lan4-1068x821.png 1068w, https://www.osradar.com/wp-content/uploads/2021/10/lan4.png 1280w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption>Lantern Settings Options</figcaption></figure>



<p>To switch off the program, simply turn it off from the startup screen. Just click on the connection button. You can also do it from the icon in the taskbar. In short, we have seen how to avoid censorship on the Internet. Certainly another option to escape from the regulations imposed from the power. See you soon!</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/how-to-avoid-internet-censorship/">How to avoid Internet censorship</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/how-to-avoid-internet-censorship/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>UltraSurf is a great proxy for Windows 10</title>
		<link>https://www.osradar.com/ultrasurf-is-a-great-proxy-for-windows-10/</link>
					<comments>https://www.osradar.com/ultrasurf-is-a-great-proxy-for-windows-10/#respond</comments>
		
		<dc:creator><![CDATA[roger]]></dc:creator>
		<pubDate>Sun, 23 May 2021 21:57:00 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[proxy]]></category>
		<category><![CDATA[ultrasurf]]></category>
		<category><![CDATA[windows proxy]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=30169</guid>

					<description><![CDATA[<p>Privacy is very important when surfing the Internet. Indeed, user data is in high demand on the Internet. Since they can be used by hackers, or to send Spam. Therefore there are tools to protect users. For example, VPN services. Also network proxies. These tools allow to hide the IP address, the location and even [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/ultrasurf-is-a-great-proxy-for-windows-10/">UltraSurf is a great proxy for Windows 10</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Privacy is very important when surfing the Internet. Indeed, user data is in high demand on the Internet. Since they can be used by hackers, or to send Spam. Therefore there are tools to protect users. For example, VPN services. Also network proxies. These tools allow to hide the IP address, the location and even encrypt the connection. This time, we will talk about UltraSurf, a great proxy for <a href="https://www.osradar.com/category/windows/" target="_blank" rel="noreferrer noopener">Windows 10.</a></p>



<h2>What is UltraSurf?.</h2>



<p>Network proxies are an interesting alternative to VPNs. Indeed, there are many alternatives, some paid and some free. UltraSurf is a free proxy that is easy to implement. You only need to run it to start enjoying its functions. Consequently, we will hide our IP address, and encrypt our connection. This allows access to certain restricted services. Since there are some applications or platforms that only work in a certain country. Additionally, if we are traveling we will be able to access content limited to certain geographic areas.</p>



<figure class="wp-block-image size-large"><img loading="lazy" width="945" height="1024" src="//1081754738.rsc.cdn77.org/wp-content/uploads/2021/05/ultra-945x1024.png" alt="" class="wp-image-30170" srcset="https://www.osradar.com/wp-content/uploads/2021/05/ultra-945x1024.png 945w, https://www.osradar.com/wp-content/uploads/2021/05/ultra-277x300.png 277w, https://www.osradar.com/wp-content/uploads/2021/05/ultra-768x833.png 768w, https://www.osradar.com/wp-content/uploads/2021/05/ultra-1417x1536.png 1417w, https://www.osradar.com/wp-content/uploads/2021/05/ultra-696x755.png 696w, https://www.osradar.com/wp-content/uploads/2021/05/ultra-1068x1158.png 1068w, https://www.osradar.com/wp-content/uploads/2021/05/ultra.png 1771w" sizes="(max-width: 945px) 100vw, 945px" /></figure>



<p>A network proxy acts as an intermediary between the device and the end server. Therefore, the information sent first passes through this intermediary. Therefore, for server purposes, the UltraSurf data is displayed. A great advantage to protect our data.</p>



<h2>How to use UltraSurf in Windows 10</h2>



<p>The first thing you have to do is to download the Windows application. With this in mind, just go to the official website of the project. The first thing you have to do is to download the Windows application. With this in mind, just go to the official <a href="https://ultrasurf.uptodown.com/windows/descargar" target="_blank" rel="noreferrer noopener">website </a>of the project. As we already told you, it is a free program. In addition, it is portable so it is not necessary to install it. When you run it, the default system browser will open. In my case Google Chrome, but also works with Mozilla Firefox. Additionally, a program window indicates that there are three servers to use. Furthermore, the wizard automatically selects one of them. However, you can use any of them. Just select one of them and test the different browsing speeds.</p>



<figure class="wp-block-image size-large"><img loading="lazy" width="365" height="294" src="//1081754738.rsc.cdn77.org/wp-content/uploads/2021/05/ultra2.png" alt="Main window of UltraSurf, a proxy for Windows 10." class="wp-image-30172" srcset="https://www.osradar.com/wp-content/uploads/2021/05/ultra2.png 365w, https://www.osradar.com/wp-content/uploads/2021/05/ultra2-300x242.png 300w" sizes="(max-width: 365px) 100vw, 365px" /><figcaption>Main window of UltraSurf, a proxy for Windows 10.</figcaption></figure>



<p>If you press the options button, you can see parameters to improve the connection. For example, automatically delete cookies and history when closing. It is also possible to delete them automatically by pressing a button. Just play with the options to check the connection status.</p>



<figure class="wp-block-image size-large"><img loading="lazy" width="325" height="362" src="//1081754738.rsc.cdn77.org/wp-content/uploads/2021/05/ultra3.png" alt="UltraSurf Options" class="wp-image-30173" srcset="https://www.osradar.com/wp-content/uploads/2021/05/ultra3.png 325w, https://www.osradar.com/wp-content/uploads/2021/05/ultra3-269x300.png 269w" sizes="(max-width: 325px) 100vw, 325px" /><figcaption>UltraSurf Options</figcaption></figure>



<p>To check the effectiveness of the proxy, we have checked our IP address. This is very important to maintain our privacy. In this case we see an IP address corresponding to the United States of America.</p>



<figure class="wp-block-image size-large"><img loading="lazy" width="879" height="787" src="//1081754738.rsc.cdn77.org/wp-content/uploads/2021/05/ultra4.png" alt="UltraSurf Proxy hiding IP address in Windows 10" class="wp-image-30175" srcset="https://www.osradar.com/wp-content/uploads/2021/05/ultra4.png 879w, https://www.osradar.com/wp-content/uploads/2021/05/ultra4-300x269.png 300w, https://www.osradar.com/wp-content/uploads/2021/05/ultra4-768x688.png 768w, https://www.osradar.com/wp-content/uploads/2021/05/ultra4-696x623.png 696w" sizes="(max-width: 879px) 100vw, 879px" /><figcaption>UltraSurf Proxy hiding IP address in Windows 10</figcaption></figure>



<p>In this way we analyze UltraSurf a great proxy for Windows 10. Which allows us to protect our privacy when surfing the Internet. However, please note that you will experience a drop in connection speed. So it is not recommended for certain tasks. See you later!</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/ultrasurf-is-a-great-proxy-for-windows-10/">UltraSurf is a great proxy for Windows 10</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/ultrasurf-is-a-great-proxy-for-windows-10/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to configure a proxy server in Windows 10</title>
		<link>https://www.osradar.com/how-to-configure-a-proxy-server-in-windows-10/</link>
					<comments>https://www.osradar.com/how-to-configure-a-proxy-server-in-windows-10/#respond</comments>
		
		<dc:creator><![CDATA[roger]]></dc:creator>
		<pubDate>Thu, 25 Feb 2021 22:12:00 +0000</pubDate>
				<category><![CDATA[Network]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[proxy]]></category>
		<category><![CDATA[proxy server]]></category>
		<category><![CDATA[vpn]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=28616</guid>

					<description><![CDATA[<p>There are many possible ways to connect to the Internet. In fact, there are different ways and devices. We can even surf from a cell phone, computer, or tablet. It is also possible to access the network through a VPN or a proxy server. Which can be very interesting to improve privacy or access geo-restricted [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/how-to-configure-a-proxy-server-in-windows-10/">How to configure a proxy server in Windows 10</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>There are many possible ways to connect to the Internet. In fact, there are different ways and devices. We can even surf from a cell phone, computer, or tablet. It is also possible to access the network through a VPN or a proxy server. Which can be very interesting to improve privacy or access geo-restricted content. In this post, we will see how to configure a proxy server in Windows 10.</p>



<h2>How to configure a proxy in Windows 10</h2>



<p>Windows 10 is the most widely used desktop operating system. Since it is present in most of the domestic users and at enterprise level as well. We can use different programs to configure Internet browsing. However, the system includes several tools related to network management. That is, it is not necessary to resort to third-party applications to modify certain aspects. For example, it is possible to enable and configure a proxy server to connect to the network. This implies that our network activity will pass through it first before going directly to the websites.</p>



<p>As we said before, configuring a proxy server in Windows 10 is very easy to do. The first thing you have to do is press the Win+I combination to enter the <strong>Windows Settings.</strong> Once there, log in to <strong>Network &amp; Internet.</strong></p>



<figure class="wp-block-image size-large"><img loading="lazy" width="1024" height="787" src="//1081754738.rsc.cdn77.org/wp-content/uploads/2021/02/proxy-1024x787.png" alt="" class="wp-image-28617" srcset="https://www.osradar.com/wp-content/uploads/2021/02/proxy-1024x787.png 1024w, https://www.osradar.com/wp-content/uploads/2021/02/proxy-300x231.png 300w, https://www.osradar.com/wp-content/uploads/2021/02/proxy-768x590.png 768w, https://www.osradar.com/wp-content/uploads/2021/02/proxy-696x535.png 696w, https://www.osradar.com/wp-content/uploads/2021/02/proxy-1068x821.png 1068w, https://www.osradar.com/wp-content/uploads/2021/02/proxy.png 1280w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>Then scroll down to <strong>Proxy</strong></p>



<figure class="wp-block-image size-large"><img loading="lazy" width="1024" height="787" src="//1081754738.rsc.cdn77.org/wp-content/uploads/2021/02/proxy2-1024x787.png" alt="Click on Proxy. " class="wp-image-28618" srcset="https://www.osradar.com/wp-content/uploads/2021/02/proxy2-1024x787.png 1024w, https://www.osradar.com/wp-content/uploads/2021/02/proxy2-300x231.png 300w, https://www.osradar.com/wp-content/uploads/2021/02/proxy2-768x590.png 768w, https://www.osradar.com/wp-content/uploads/2021/02/proxy2-696x535.png 696w, https://www.osradar.com/wp-content/uploads/2021/02/proxy2-1068x821.png 1068w, https://www.osradar.com/wp-content/uploads/2021/02/proxy2.png 1280w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption>Click on Proxy.</figcaption></figure>



<p>You will see that it is disabled by default. Consequently, you only have to activate the Manual Proxy Setup switch. Next, you just have to enter the parameters. That is the IP address of that proxy, as well as its port. Then, you just have to save the changes. From that moment on, the connection will go through the proxy server we have configured. You can see a list of free proxy servers <a href="https://hidemy.name/en/proxy-list/" target="_blank" rel="noreferrer noopener">here.</a></p>



<figure class="wp-block-image size-large"><img loading="lazy" width="893" height="553" src="//1081754738.rsc.cdn77.org/wp-content/uploads/2021/02/proxy3.png" alt="Proxy server configuration" class="wp-image-28621" srcset="https://www.osradar.com/wp-content/uploads/2021/02/proxy3.png 893w, https://www.osradar.com/wp-content/uploads/2021/02/proxy3-300x186.png 300w, https://www.osradar.com/wp-content/uploads/2021/02/proxy3-768x476.png 768w, https://www.osradar.com/wp-content/uploads/2021/02/proxy3-696x431.png 696w" sizes="(max-width: 893px) 100vw, 893px" /><figcaption>Proxy server configuration</figcaption></figure>



<h2>Using the proxy server with exceptions</h2>



<p>Windows gives the option to use the proxy server with exceptions. That is to say, it is probable that we want to access certain pages through our connection and not through the proxy server. For example, there are pages that are restricted to a geographic location. In such a case, we would have to use our usual connection. Therefore, it is sufficient to enter the address of the site in the corresponding box. In addition, we can put as many addresses as we want, separated all of them by &#8220;;&#8221;.</p>



<h2>Reasons to use a proxy server in Windows 10.</h2>



<p>Sometimes a proxy is confused with a VPN. This is logical, since their use is similar. In a broad sense, both help to maintain privacy on the network, improve security and also to access certain services. A proxy server acts as an intermediary between our computer (the client) and the site we visit (the server). Therefore, the destination site receives the IP address of the proxy and not ours.</p>



<h3>Maintaining privacy</h3>



<p>One advantage of using a proxy is to maintain anonymity on the network. As mentioned, by using this service, we hide our real IP. Certainly, privacy on the Internet is vital. Since there are many ways to access our data and the IP address is one of them.</p>



<figure class="wp-block-image size-large"><img loading="lazy" width="1024" height="682" src="//1081754738.rsc.cdn77.org/wp-content/uploads/2021/02/private-1647769_1920-1024x682.jpg" alt="" class="wp-image-28623" srcset="https://www.osradar.com/wp-content/uploads/2021/02/private-1647769_1920-1024x682.jpg 1024w, https://www.osradar.com/wp-content/uploads/2021/02/private-1647769_1920-300x200.jpg 300w, https://www.osradar.com/wp-content/uploads/2021/02/private-1647769_1920-768x512.jpg 768w, https://www.osradar.com/wp-content/uploads/2021/02/private-1647769_1920-1536x1023.jpg 1536w, https://www.osradar.com/wp-content/uploads/2021/02/private-1647769_1920-696x464.jpg 696w, https://www.osradar.com/wp-content/uploads/2021/02/private-1647769_1920-1068x711.jpg 1068w, https://www.osradar.com/wp-content/uploads/2021/02/private-1647769_1920.jpg 1920w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<h3>Content blocking.</h3>



<p>This tool can be used to block content. Even some proxy servers block unsafe pages. A great way to prevent malware from entering.</p>



<h3>Access geographically restricted content</h3>



<p>Another great advantage is being able to access geographically restricted content. Suppose you want to access a website that is banned in your country and only available to UK residents. In that case, you just have to set up a proxy server as if you were in the UK. On the other hand, if you travel abroad and want to access exclusive content for residents of your country. Then you only have to configure the proxy corresponding to your area.</p>



<figure class="wp-block-image size-large"><img loading="lazy" width="1024" height="576" src="//1081754738.rsc.cdn77.org/wp-content/uploads/2021/02/cyber-security-2296269_1280-1024x576.jpg" alt="" class="wp-image-28624" srcset="https://www.osradar.com/wp-content/uploads/2021/02/cyber-security-2296269_1280-1024x576.jpg 1024w, https://www.osradar.com/wp-content/uploads/2021/02/cyber-security-2296269_1280-300x169.jpg 300w, https://www.osradar.com/wp-content/uploads/2021/02/cyber-security-2296269_1280-768x432.jpg 768w, https://www.osradar.com/wp-content/uploads/2021/02/cyber-security-2296269_1280-696x392.jpg 696w, https://www.osradar.com/wp-content/uploads/2021/02/cyber-security-2296269_1280-1068x601.jpg 1068w, https://www.osradar.com/wp-content/uploads/2021/02/cyber-security-2296269_1280.jpg 1280w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<h3>Preventing attacks</h3>



<p>Obviously, this is a great measure to avoid attacks on our devices. Since we are hiding our identity and protecting our data.</p>



<figure class="wp-block-image size-large"><img loading="lazy" width="1024" height="682" src="//1081754738.rsc.cdn77.org/wp-content/uploads/2021/02/cyber-4610993_1280-1024x682.jpg" alt="" class="wp-image-28625" srcset="https://www.osradar.com/wp-content/uploads/2021/02/cyber-4610993_1280-1024x682.jpg 1024w, https://www.osradar.com/wp-content/uploads/2021/02/cyber-4610993_1280-300x200.jpg 300w, https://www.osradar.com/wp-content/uploads/2021/02/cyber-4610993_1280-768x512.jpg 768w, https://www.osradar.com/wp-content/uploads/2021/02/cyber-4610993_1280-696x464.jpg 696w, https://www.osradar.com/wp-content/uploads/2021/02/cyber-4610993_1280-1068x712.jpg 1068w, https://www.osradar.com/wp-content/uploads/2021/02/cyber-4610993_1280.jpg 1280w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<p>Anyway, we have seen how to configure a proxy server in <a href="https://www.osradar.com/category/windows/" target="_blank" rel="noreferrer noopener">Windows 10.</a> It is a simple process, but it increases security and privacy when connecting to the Internet. See you later!</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/how-to-configure-a-proxy-server-in-windows-10/">How to configure a proxy server in Windows 10</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/how-to-configure-a-proxy-server-in-windows-10/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Squid Proxy: How to install and configure it on Ubuntu 18.04 / 16.04.</title>
		<link>https://www.osradar.com/squid-proxy-install-and-configure-it/</link>
					<comments>https://www.osradar.com/squid-proxy-install-and-configure-it/#comments</comments>
		
		<dc:creator><![CDATA[angeloma]]></dc:creator>
		<pubDate>Fri, 14 Dec 2018 02:13:00 +0000</pubDate>
				<category><![CDATA[Featured]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Unix]]></category>
		<category><![CDATA[How to]]></category>
		<category><![CDATA[network]]></category>
		<category><![CDATA[proxy]]></category>
		<category><![CDATA[squid]]></category>
		<category><![CDATA[Tutorial]]></category>
		<guid isPermaLink="false">https://www.osradar.com/?p=8372</guid>

					<description><![CDATA[<p>If you&#8217;re a sysadmin I probably don&#8217;t have to explain much about what a proxy is. However, I&#8217;m aware that not everyone handles these concepts so easily. So, a proxy is a device in computer science that performs the role of intermediary. For example, Internet access is full of Proxys where through it is that [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/squid-proxy-install-and-configure-it/">Squid Proxy: How to install and configure it on Ubuntu 18.04 / 16.04.</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>If you&#8217;re a sysadmin I probably don&#8217;t have to explain much about what a proxy is. However, I&#8217;m aware that not everyone handles these concepts so easily. So, a proxy is a device in computer science that performs the role of intermediary. For example, Internet access is full of Proxys where through it is that requests are made. Fortunately, in Linux, we have the fabulous Squid Proxy.</p>
<p><a href="http://www.squid-cache.org/Intro/">Squid</a> Proxy is a veteran program that allows you to have a proxy server running on your system. It is one of the most popular applications in the entire Unix ecosystem. Obviously, it&#8217;s open source, which guarantees you won&#8217;t have license problems or anything similar. In addition, there is a large community of users willing to shield knowledge to this tool.</p>
<p>Some of its characteristics are:</p>
<ul>
<li>Open Source. Squid Proxy is distributed under the<a href="https://www.gnu.org/licenses/gpl.html" rel="noopener"> GPL license.</a> Vital to have no licensing problems and be used in virtually any project.</li>
<li>It specializes in Unix systems such as <strong>Linux</strong>.</li>
<li>Being a proxy cache supports<strong> HTTP, HTTPS, and FTP</strong>. Basic internet services.</li>
<li>SSL compatible to increase connection security.</li>
</ul>
<p>And many others that have given the role of being practically a standard for Linux.</p>
<h1>1. Install Squid Proxy</h1>
<p>In this tutorial, I will use a server with Ubuntu 18.04. But, Squid Proxy can be easily installed on many Linux distributions. So, in Ubuntu, the installation process is really simple.</p>
<pre class="">:~$ sudo apt install squid</pre>
<p>&nbsp;</p>
<p><figure id="attachment_8373" aria-describedby="caption-attachment-8373" style="width: 1366px" class="wp-caption alignnone"><img loading="lazy" class="size-full wp-image-8373" src="https://www.osradar.com/wp-content/uploads/2018/12/1-8.png" alt="1.- Install Squid Proxy" width="1366" height="768" srcset="https://www.osradar.com/wp-content/uploads/2018/12/1-8.png 1366w, https://www.osradar.com/wp-content/uploads/2018/12/1-8-300x169.png 300w, https://www.osradar.com/wp-content/uploads/2018/12/1-8-768x432.png 768w, https://www.osradar.com/wp-content/uploads/2018/12/1-8-1024x576.png 1024w, https://www.osradar.com/wp-content/uploads/2018/12/1-8-1068x600.png 1068w, https://www.osradar.com/wp-content/uploads/2018/12/1-8-747x420.png 747w" sizes="(max-width: 1366px) 100vw, 1366px" /><figcaption id="caption-attachment-8373" class="wp-caption-text">1.- Install Squid Proxy</figcaption></figure></p>
<p>Next, start, enable and check the service status.</p>
<p>&nbsp;</p>
<pre class="">:~$ sudo systemctl start squid
:~$ sudo systemctl enable squid
:~$ sudo systemctl status squid</pre>
<p><figure id="attachment_8374" aria-describedby="caption-attachment-8374" style="width: 1366px" class="wp-caption alignnone"><img loading="lazy" class="size-full wp-image-8374" src="https://www.osradar.com/wp-content/uploads/2018/12/2-8.png" alt="2.- Working with Squid service" width="1366" height="768" srcset="https://www.osradar.com/wp-content/uploads/2018/12/2-8.png 1366w, https://www.osradar.com/wp-content/uploads/2018/12/2-8-300x169.png 300w, https://www.osradar.com/wp-content/uploads/2018/12/2-8-768x432.png 768w, https://www.osradar.com/wp-content/uploads/2018/12/2-8-1024x576.png 1024w, https://www.osradar.com/wp-content/uploads/2018/12/2-8-1068x600.png 1068w, https://www.osradar.com/wp-content/uploads/2018/12/2-8-747x420.png 747w" sizes="(max-width: 1366px) 100vw, 1366px" /><figcaption id="caption-attachment-8374" class="wp-caption-text">2.- Working with Squid service</figcaption></figure></p>
<p>And that&#8217;s. So, let&#8217;s configure it.</p>
<h1>2.- Changing the Squid Proxy port</h1>
<p>By default, Squid uses port 3128. For security reasons it is recommended to change the port where it works. So if you can, do it.</p>
<p>To do it, edit the <code>/etc/squid/squid.conf</code> file and change the port.</p>
<pre class="">:~$ sudo nano /etc/squid/squid.conf</pre>
<p><figure id="attachment_8375" aria-describedby="caption-attachment-8375" style="width: 1366px" class="wp-caption alignnone"><img loading="lazy" class="size-full wp-image-8375" src="https://www.osradar.com/wp-content/uploads/2018/12/3-8.png" alt="3.- Changing the default port" width="1366" height="768" srcset="https://www.osradar.com/wp-content/uploads/2018/12/3-8.png 1366w, https://www.osradar.com/wp-content/uploads/2018/12/3-8-300x169.png 300w, https://www.osradar.com/wp-content/uploads/2018/12/3-8-768x432.png 768w, https://www.osradar.com/wp-content/uploads/2018/12/3-8-1024x576.png 1024w, https://www.osradar.com/wp-content/uploads/2018/12/3-8-1068x600.png 1068w, https://www.osradar.com/wp-content/uploads/2018/12/3-8-747x420.png 747w" sizes="(max-width: 1366px) 100vw, 1366px" /><figcaption id="caption-attachment-8375" class="wp-caption-text">3.- Changing the default port</figcaption></figure></p>
<p>Then, restart the service.</p>
<pre class="">:~$ sudo systemctl restart squid</pre>
<p><figure id="attachment_8376" aria-describedby="caption-attachment-8376" style="width: 862px" class="wp-caption alignnone"><img loading="lazy" class="size-full wp-image-8376" src="https://www.osradar.com/wp-content/uploads/2018/12/4-8.png" alt="4.- restarting the Squid service" width="862" height="228" srcset="https://www.osradar.com/wp-content/uploads/2018/12/4-8.png 862w, https://www.osradar.com/wp-content/uploads/2018/12/4-8-300x79.png 300w, https://www.osradar.com/wp-content/uploads/2018/12/4-8-768x203.png 768w" sizes="(max-width: 862px) 100vw, 862px" /><figcaption id="caption-attachment-8376" class="wp-caption-text">4.- restarting the Squid service</figcaption></figure></p>
<h1>3. Setting some configurations</h1>
<p>Now let&#8217;s do some basic configurations with Squid. Remember that its use is very wide and varies according to the server requirements.</p>
<p>First, I don&#8217;t think you want to, but you can allow or deny all HTTP traffic. This will remove Internet access from your entire network. So let&#8217;s go.</p>
<p>Edit the <code>/etc/squid/squid.conf</code> file. Remove the # at the beginning of the line to set the desired parameter.</p>
<pre class="">:~$ sudo nano /etc/quid/quid.conf</pre>
<p><figure id="attachment_8377" aria-describedby="caption-attachment-8377" style="width: 1366px" class="wp-caption alignnone"><img loading="lazy" class="size-full wp-image-8377" src="https://www.osradar.com/wp-content/uploads/2018/12/5-8.png" alt="5.- Deny or Allow access to the all hosts." width="1366" height="768" srcset="https://www.osradar.com/wp-content/uploads/2018/12/5-8.png 1366w, https://www.osradar.com/wp-content/uploads/2018/12/5-8-300x169.png 300w, https://www.osradar.com/wp-content/uploads/2018/12/5-8-768x432.png 768w, https://www.osradar.com/wp-content/uploads/2018/12/5-8-1024x576.png 1024w, https://www.osradar.com/wp-content/uploads/2018/12/5-8-1068x600.png 1068w, https://www.osradar.com/wp-content/uploads/2018/12/5-8-747x420.png 747w" sizes="(max-width: 1366px) 100vw, 1366px" /><figcaption id="caption-attachment-8377" class="wp-caption-text">5.- Deny or Allow access to all hosts.</figcaption></figure></p>
<p>You can also define which websites you want to remove access to. Very useful in organizations and at work.</p>
<p>In this case, I will use two websites. You can add what you want.</p>
<pre class="">acl blocksite1 dstdomain espn.com
acl blocksite2 dstdomain apple.com
http_access deny blocksite1
http_access deny blocksite2</pre>
<p><figure id="attachment_8378" aria-describedby="caption-attachment-8378" style="width: 898px" class="wp-caption alignnone"><img loading="lazy" class="size-full wp-image-8378" src="https://www.osradar.com/wp-content/uploads/2018/12/6-8.png" alt="6.- Blocking some sites" width="898" height="291" srcset="https://www.osradar.com/wp-content/uploads/2018/12/6-8.png 898w, https://www.osradar.com/wp-content/uploads/2018/12/6-8-300x97.png 300w, https://www.osradar.com/wp-content/uploads/2018/12/6-8-768x249.png 768w" sizes="(max-width: 898px) 100vw, 898px" /><figcaption id="caption-attachment-8378" class="wp-caption-text">6.- Blocking some sites</figcaption></figure></p>
<p>However, if you have a lot of places to block. Ideally, create a blacklist and add it to the configuration file. Create a file <code>/etc/squid/blocked.lst</code>.</p>
<pre class="">:~$ sudo nano /etc/squid/blocked.lst</pre>
<p><figure id="attachment_8379" aria-describedby="caption-attachment-8379" style="width: 845px" class="wp-caption alignnone"><img loading="lazy" class="size-full wp-image-8379" src="https://www.osradar.com/wp-content/uploads/2018/12/7-8.png" alt="7.- Showing a blocked sites list" width="845" height="246" srcset="https://www.osradar.com/wp-content/uploads/2018/12/7-8.png 845w, https://www.osradar.com/wp-content/uploads/2018/12/7-8-300x87.png 300w, https://www.osradar.com/wp-content/uploads/2018/12/7-8-768x224.png 768w" sizes="(max-width: 845px) 100vw, 845px" /><figcaption id="caption-attachment-8379" class="wp-caption-text">7.- Showing a blocked sites list</figcaption></figure></p>
<p>Now, edit the configuration file and add the list.</p>
<pre class="">acl blocksitelist dstdomain "/etc/squid/blocked.lst"
http_access deny blocksitelist</pre>
<p><figure id="attachment_8380" aria-describedby="caption-attachment-8380" style="width: 686px" class="wp-caption alignnone"><img loading="lazy" class="size-full wp-image-8380" src="https://www.osradar.com/wp-content/uploads/2018/12/8-8.png" alt="" width="686" height="140" srcset="https://www.osradar.com/wp-content/uploads/2018/12/8-8.png 686w, https://www.osradar.com/wp-content/uploads/2018/12/8-8-300x61.png 300w" sizes="(max-width: 686px) 100vw, 686px" /><figcaption id="caption-attachment-8380" class="wp-caption-text">8.- Adding a blocked list</figcaption></figure></p>
<p>Another way to block inappropriate sites in the organization is through keywords. Very useful if you don&#8217;t remember all the sites to restrict but you will block all those related to it.</p>
<pre class="">acl blockkeyword1 url_regex gmail
acl blockkeyword2 url_regex porn
http_access deny blockkeyword1
http_access deny blockkeyword2</pre>
<p><figure id="attachment_8381" aria-describedby="caption-attachment-8381" style="width: 728px" class="wp-caption alignnone"><img loading="lazy" class="size-full wp-image-8381" src="https://www.osradar.com/wp-content/uploads/2018/12/9-7.png" alt="9.- Blocking keywords" width="728" height="132" srcset="https://www.osradar.com/wp-content/uploads/2018/12/9-7.png 728w, https://www.osradar.com/wp-content/uploads/2018/12/9-7-300x54.png 300w" sizes="(max-width: 728px) 100vw, 728px" /><figcaption id="caption-attachment-8381" class="wp-caption-text">9.- Blocking keywords</figcaption></figure></p>
<p>Or if you have a pretty extensive list, you can create a file and place them there. Then you add it to the configuration file. Similar to how it was done with domains.</p>
<pre class="">:~$ sudo nano /etc/squid/blockedkw.lst</pre>
<pre class="">acl blockkeywordlist url_regex "/etc/squid/blockedkw.lst"
http_access deny blockkeywordlist</pre>
<p><figure id="attachment_8382" aria-describedby="caption-attachment-8382" style="width: 526px" class="wp-caption alignnone"><img loading="lazy" class="size-full wp-image-8382" src="https://www.osradar.com/wp-content/uploads/2018/12/10-7.png" alt="10.- Creating a file for the blocked keywords" width="526" height="288" srcset="https://www.osradar.com/wp-content/uploads/2018/12/10-7.png 526w, https://www.osradar.com/wp-content/uploads/2018/12/10-7-300x164.png 300w" sizes="(max-width: 526px) 100vw, 526px" /><figcaption id="caption-attachment-8382" class="wp-caption-text">10.- Creating a file for the blocked keywords</figcaption></figure></p>
<p>Now, go to the squid configuration file and add the list.</p>
<p><figure id="attachment_8383" aria-describedby="caption-attachment-8383" style="width: 638px" class="wp-caption alignnone"><img loading="lazy" class="size-full wp-image-8383" src="https://www.osradar.com/wp-content/uploads/2018/12/11-8.png" alt="11.- Adding a blocked keywords list" width="638" height="69" srcset="https://www.osradar.com/wp-content/uploads/2018/12/11-8.png 638w, https://www.osradar.com/wp-content/uploads/2018/12/11-8-300x32.png 300w" sizes="(max-width: 638px) 100vw, 638px" /><figcaption id="caption-attachment-8383" class="wp-caption-text">11.- Adding a blocked keywords list</figcaption></figure></p>
<p>For all these changes to take effect, it is necessary to restart the Squid service.</p>
<pre class="">:~$ sudo systemctl restart squid</pre>
<p>And that&#8217;s it.</p>
<h1>Conclusion</h1>
<p>It&#8217;s true that Squid Proxy offers a lot of possibilities. However, today I have presented some basic options but very useful at the time of configuring it. It only remains for you to continue using and enjoying this tool.</p>
<p>You can also read &#8220;<a href="https://www.osradar.com/how-to-install-and-use-pacaur-on-arch-linux/">How to Install and Use Pacaur on Arch Linux</a>&#8220;.</p>
<p>Please share this post with your friends.</p>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://www.osradar.com/squid-proxy-install-and-configure-it/">Squid Proxy: How to install and configure it on Ubuntu 18.04 / 16.04.</a> appeared first on <a rel="nofollow" href="https://www.osradar.com">Linux  Windows and android  Tutorials</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.osradar.com/squid-proxy-install-and-configure-it/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
	</channel>
</rss>
