free public proxy servers list


Database statistics
Fri Jul 22 20:30:05 2016 GMT
quick proxy search
time condition:
reverse sort order:
*LOGIN HERE to access new data
recently checked proxy
filter sort by
misc. database query examples
ports to test:
To check your proxy speed and Add this proxy to public list enter here your proxy port(s) (divided by comma) and press Check button. Only your current IP address ( will be checked for those ports.
ports to test:
To request your proxy removal from this public list enter here your proxy port(s) (divided by comma) and press Remove button. Only your current IP address ( will be requested for removal.
Sat Jul 23 07:00, 2016 GMT
It was at the early hours of Friday that a journalist sent a note to her colleagues. “We are told by the management that our publication is discontinued with immediate effect,” she said. “We are told to pack our belongings and leave the office. You can’t imagine how sad I am.” The weekly news magazine […] The post Yavuz Baydar: Escalation in the clampdown on Turkey’s media and academia appeared first on Index on Censorship .
Yavuz Baydar: Escalation in the clampdown on Turkey’s media and academia
Fri Jul 22 16:50, 2016 GMT
It seems like every summer there’s another horror story about shark sightings and attacks at local beaches. JAWS taught us all that sharks are scary and should be avoided in the open ocean. That’s pretty solid advice and I can’t argue with it. But you know what else is good advice for enjoying the perfect beach day? Knowing how to swim, wearing sunscreen, staying under an umbrella, drinking plenty of water, avoiding rip currents, and steering clear of slippery jetties. Sure, the possibility of being eaten by a shark is real, but a painful sunburn because you forgot to reapply is far more likely. The same logic follows for cyber-attack and prevention. Some types of exploits are far more common than others and usually much easier to prevent as well. The best way to protect applications from potential data breach is to code them securely from the start. Take for example injection flaws, which allow attackers to input code that can trick the app into executing a malicious call to the database. These types of flaws can dump passwords or allow a hacker to access and modify sensitive data among other fishy stuff. OWASP (the open web application security project) has been putting injection flaws on its Top 10 for nearly 15 years. In his SQL Injection Prevention Cheat Sheet author Dave Wichers says, “It’s somewhat shameful that there are so many successful SQL Injection attacks occurring, because it is EXTREMELY simple to avoid SQL Injection vulnerabilities in your code.” Preventing SQL injection flaws from showing up in your applications is like smearing on some SPF 50 and plopping yourself under a safely anchored umbrella. Doing the preventive work on the front end will save you a lot of trouble and it’s not all that hard to do either. Even the specific programming language chosen for an application can impact its overall security posture. Veracode’s recent supplement to the State of Software Security Vol. 6 found that applications written in web scripting languages, like PHP, have far higher rates of vulnerabilities like SQL Injection and cross-site scripting than applications written in say, C or C++. Veracode CTO, Chris Wysopal, notes, “When organizations are starting new development projects and selecting languages and methodologies, the security team has an opportunity to anticipate the types of vulnerabilities that are likely to arise and how best to test for them”. Picking the right language to maximize your app’s functionality and coding with security in mind is like knowing how to swim before diving in. There are a number of real world threats that any information security professional must be aware of and defend against. Some are easier to prevent than others and can dramatically lower your company’s overall risk. There’s sometimes a culture of fear around rare and complex exploits, like advanced persistent threats (shark attacks). But most bad actors follow the path of least resistance. Taking little preemptive steps, will make for a happy beach day and a safer application portfolio.
Why Focusing on “Shark Attack” Exploits is the Wrong Strategy

Flirt = amindumeti, koketi.
Flirt = koketulino.
Flirtation = koketeco.
Some well-known public proxy

Sat Jul 23 12:41:27 2016 GMT full dump

RSS more, more, howto
port vs. protocol legend:
plus (+) sign, port 1080 SOCKS
minus (-) signCONNECT
no signHTTP

Sat Jul 23 12:42:26 2016 GMT raw dump

RSS more
Type URL for anonymous surf via random CGI proxy
increase anonymity by chaining CGI proxy:

E-mail Facebook VKontakte Google Digg BlinkList NewsVine Reddit YahooMyWeb LiveJournal Blogmarks TwitThis Live
[Privacy Policy]