• How to mine proxy logs

    I am wondering how easy it is to mine proxy logs. For example, if a team were to mine 1.8 millions lines of data from a proxy log, how long would that take?

    ITKE352,430 pointsBadges:
  • How can we use the proxy application?

    The proxifier is the app. We want to use this. How would I use it?

    kamalraaj5 pointsBadges:
  • How are LAN proxies set?

    Can you tell me how LAN proxies are set and how it differs from dial-up proxies?

    LH20 pointsBadges:
  • Can Cisco ASA firewalls restrict Internet access to branch offices?

    I have a PPP network between our three office locations. In the master location I have a DSL line connected to my Layer 2 (L2) switch via a Cisco ASA 5505 Firewall. My server (ADC/DHCP/Proxy) is connected to the L2 switch. My branch office locations obtain IP through this server. I am using a Squid...

    NetworkingATE1,545 pointsBadges:
  • Configuring CYGWIN to use Windows Proxy infomation

    Hello, I'm using Internet Explorer and I need to figure out how to use CYGWIN for several quick scripting tasks. How would I go about configuring it to my Windows Proxy info? I have several things trying to make direct connections (pings, ruby gems, etc.) How can I get them to respect the proxy...

    ITKE352,430 pointsBadges:
  • how can i configurate my nokia 620 to be accessible to network

    nokia620

    japheth5 pointsBadges:
  • Security differences: Proxy vs. Firewall

    I've been doing some security research for one of my coworkers and I figured out that putting a 'proxy' refers to that "man in the middle" by allowing/denying access to certain resources.In terms of security, does proxy add added security (compared to a firewall)?

    ITKE352,430 pointsBadges:
  • what is mean by proxy and proxy exception???

    any one can help this

    thiyagu1905 pointsBadges:
  • Workgroup Proxy options

    What kind of options are available for a workgroup environment? We have a Windows 7 PC “acting” as a file share server and other things but not being in a domain environment what would be the options for monitoring activity accross the workgroup, blocking access to websites and reporting?  Is...

    ConFlicker210 pointsBadges:
  • proxy dodging?

    anyone got any suggeestions on software to install to stop users from proxy dodging? i work in a multi hundred co. and we have no proxy dodging s/w installed

    Zinton60 pointsBadges:
  • Juniper Networks

    Hi, I have work issued laptop. I work from a remote site ( customer). on that I have Juniper networks.  in order to access all my work data i'm enabling the VPN. Does the remote site proxy "sees" my data - the websites i go to?

    Guynu785 pointsBadges:
  • Varnish Reverse Proxy

    I'm working with the open source reverse proxy Varnish. I've been able to get it working using port 80, but when I try to start it using port 8080 for a web service, it doesn't work. Does anybody know what changes need to be made so it can function as a reverse proxy for a web service not on port...

    mshen27,385 pointsBadges:
  • Ensuring all Windows clients have updated antivirus

    Is there a way to make sure that all windows clients have up to date antivirus (mcafee 8.7.1) and if not make sure they can not access the Internet at all. It can set their proxy to a fake server if need be.

    ITKE352,430 pointsBadges:
  • blocking messenger in isa 2004 using transparent proxy

    I have configured ISA 2004 using transparent as well using GFI Webmonitor. Block Messenger in ISA using signature headers and also in GFI block MSN Messenger but unable to succeed in my goal. Anybody let me tell that whats the possible solution for the above mentioned.

    MSISAServer5 pointsBadges:
  • WiFi access point pointing to proxy server

    hi all I am looking for a solution... I am wanting to set up wireless points at over 200 libraries in New Zealand, and am currently rolling out broadband/desktop PC's and free internet access into these libraries. So getting wireless access to these libarries is very straight forward. BUT...the...

    Glennz5 pointsBadges:
  • How to configure reverse proxy in ESS portal?

    A single URL is defined. We wish to have employees access travel thru EP. Reverse proxy and Webdipatcher configuration have some problem which leads to Java applet of travel not being displayed on ESS. All other ESS functions are working.

    Manirvs5 pointsBadges:
  • Use Unix IRC shell as socks proxy

    How can I use an Irc shell account to create a socks proxy to tunnel http traffic through? And how can I use all Vhosts provided by a shell host as being a socks proxy? Does this require additional background processes? Thanks

    Chubbyhubby5 pointsBadges:
  • Linux Routing Solution – with Proxy ARP/HTTP management

    Hi Guys, Does anyone know of a good Linux routing solution I need to do the following: network 1 ----> Linux router ---Network 2 ---> ISP switch However, I cannot add a route on the ISP switch due to restrictions. Im hoping proxy arp with be the solution however, I dont know much about it and...

    IronHedge360 pointsBadges:
  • Kix Script

    Does anyone know the script to set the ie proxy via a logon script written in kix?

    Lyntons5 pointsBadges:
  • how to assign users to a group

    Hi, does somebody know if it is possible to assign users to a specific group for a cache_peer so that the following proxy can decide which domains are accessible for a particular user based on his group? i know this can be easily done with one proxy but here the scenario requires two proxies (the...

    JeremyNorton15 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following