{"id":4,"date":"2008-02-20T11:37:37","date_gmt":"2008-02-20T15:37:37","guid":{"rendered":"http:\/\/blog.wavecrestcomputing.com\/?p=4"},"modified":"2011-06-21T09:54:11","modified_gmt":"2011-06-21T13:54:11","slug":"the-dangers-of-public-proxies","status":"publish","type":"post","link":"https:\/\/blog.wavecrest.net\/index.php\/the-dangers-of-public-proxies\/","title":{"rendered":"The Dangers of Public Proxies"},"content":{"rendered":"<p><strong>Introduction.<\/strong><br \/>\nPublic proxies are often used by employees or students who want to get around Web filters and\/or avoid being identified by Internet logging. In other words, public proxies allow individuals to surf the Web &#8220;anonymously.&#8221;<\/p>\n<p>The way public proxies work is by making the requested Web site appear to be going to a Web address other than the address of the site actually being requested. They act like a &#8220;middle man.&#8221; When a Web site is requested, the request is sent to the public proxy, which forwards the request to the original destination, and then returns the site that was requested.<\/p>\n<p><strong>Problems with Public Proxies.<\/strong><br \/>\nThe claim that a public proxy hides a user&#8217;s identity may sound safe, but the fact is that public proxies that are used to get around filters can be very dangerous to the user and his\/her company or school.<\/p>\n<p>Many public proxies promote spyware or malware activity. They are created to gather user information, or even worse, company information on an employee&#8217;s computer. They often log an individual&#8217;s online browsing, emails, and chat sessions to gather user names, passwords, credit card or banking information. Some of the information gained, e.g., email addresses, is often used to sell to other companies for marketing purposes.<\/p>\n<p><strong>Solutions.<\/strong><br \/>\nAn enormous and fast-growing number  of dangerous public proxy sites exist around the world with new ones popping up every day.  Many of them even change their IP addresses at frequent intervals. For these reasons, it is totally impossible to completely solve the problem with technical approaches alone.<\/p>\n<p>Instead, there are several steps you can take to prevent or identify the use of public proxies. The first is to make sure your company or school&#8217;s acceptable use policy and consequences of breaking that policy are clearly communicated.<\/p>\n<p>Secondly, back up your AUP by filtering and\/or monitoring employees and students&#8217; Web access. Many public proxies use IP addresses to avoid easy detection, so a spike in IP address visits could be an indication that an employee or student may be using one.  <a href=\"https:\/\/www.wavecrest.net\/products\/index.html\">Wavecrest Computing&#8217;s CyBlock and Cyfin<\/a> Internet filtering and monitoring software have categories for both public proxies and IP addresses.<\/p>\n<p>Finally, make sure that your employees or students are aware of the security dangers associated with public proxies. Many are not aware of the security risk associated with public proxies and may be less inclined to use one if they are educated on the dangers they pose to the user and his\/her company or school.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction. Public proxies are often used by employees or students who want to get around Web filters and\/or avoid being identified by Internet logging. In other words, public proxies allow individuals to surf the Web &#8220;anonymously.&#8221; The way public proxies work is by making the requested Web site appear to be going to a Web [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[51,11,12,9,60],"tags":[50,5,49,6,52,4,53,48],"class_list":["post-4","post","type-post","status-publish","format-standard","hentry","category-acceptable-use-policy","category-cyblock","category-cyfin","category-security-threats","category-wave-news","tag-filter-public-proxies","tag-internet-filtering","tag-internet-logging","tag-internet-monitoring","tag-monitoring-employees-web-access","tag-public-proxies","tag-students-web-access","tag-web-filters"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Dangers of Public Proxies - Wavecrest Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.wavecrest.net\/index.php\/the-dangers-of-public-proxies\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Dangers of Public Proxies - Wavecrest Blog\" \/>\n<meta property=\"og:description\" content=\"Introduction. Public proxies are often used by employees or students who want to get around Web filters and\/or avoid being identified by Internet logging. In other words, public proxies allow individuals to surf the Web &#8220;anonymously.&#8221; The way public proxies work is by making the requested Web site appear to be going to a Web [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.wavecrest.net\/index.php\/the-dangers-of-public-proxies\/\" \/>\n<meta property=\"og:site_name\" content=\"Wavecrest Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/WebFiltering\" \/>\n<meta property=\"article:published_time\" content=\"2008-02-20T15:37:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2011-06-21T13:54:11+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wavecrestnet\" \/>\n<meta name=\"twitter:site\" content=\"@wavecrestnet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/the-dangers-of-public-proxies\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/the-dangers-of-public-proxies\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/blog.wavecrest.net\/#\/schema\/person\/49694141f524c27bbdfca11c590820cc\"},\"headline\":\"The Dangers of Public Proxies\",\"datePublished\":\"2008-02-20T15:37:37+00:00\",\"dateModified\":\"2011-06-21T13:54:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/the-dangers-of-public-proxies\/\"},\"wordCount\":430,\"publisher\":{\"@id\":\"https:\/\/blog.wavecrest.net\/#organization\"},\"keywords\":[\"filter public proxies\",\"internet filtering\",\"internet logging\",\"internet monitoring\",\"monitoring employees' Web access\",\"Public Proxies\",\"students' web access\",\"web filters\"],\"articleSection\":[\"Acceptable Use Policy\",\"CyBlock\",\"Cyfin\",\"Security Threats\",\"Wave News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/the-dangers-of-public-proxies\/\",\"url\":\"https:\/\/blog.wavecrest.net\/index.php\/the-dangers-of-public-proxies\/\",\"name\":\"The Dangers of Public Proxies - Wavecrest Blog\",\"isPartOf\":{\"@id\":\"https:\/\/blog.wavecrest.net\/#website\"},\"datePublished\":\"2008-02-20T15:37:37+00:00\",\"dateModified\":\"2011-06-21T13:54:11+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/the-dangers-of-public-proxies\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.wavecrest.net\/index.php\/the-dangers-of-public-proxies\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/the-dangers-of-public-proxies\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.wavecrest.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Dangers of Public Proxies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.wavecrest.net\/#website\",\"url\":\"https:\/\/blog.wavecrest.net\/\",\"name\":\"Wavecrest Blog\",\"description\":\"The Latest news, tips and resources straight from the Wavecrest team.\",\"publisher\":{\"@id\":\"https:\/\/blog.wavecrest.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.wavecrest.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.wavecrest.net\/#organization\",\"name\":\"Wavecrest Blog\",\"url\":\"https:\/\/blog.wavecrest.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.wavecrest.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/08\/CF_Full_F.png\",\"contentUrl\":\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/08\/CF_Full_F.png\",\"width\":1210,\"height\":765,\"caption\":\"Wavecrest Blog\"},\"image\":{\"@id\":\"https:\/\/blog.wavecrest.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/WebFiltering\",\"https:\/\/x.com\/wavecrestnet\",\"https:\/\/www.linkedin.com\/company\/wavecrest-computing\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.wavecrest.net\/#\/schema\/person\/49694141f524c27bbdfca11c590820cc\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\/\/blog.wavecrest.net\/index.php\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Dangers of Public Proxies - Wavecrest Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.wavecrest.net\/index.php\/the-dangers-of-public-proxies\/","og_locale":"en_US","og_type":"article","og_title":"The Dangers of Public Proxies - Wavecrest Blog","og_description":"Introduction. Public proxies are often used by employees or students who want to get around Web filters and\/or avoid being identified by Internet logging. In other words, public proxies allow individuals to surf the Web &#8220;anonymously.&#8221; The way public proxies work is by making the requested Web site appear to be going to a Web [&hellip;]","og_url":"https:\/\/blog.wavecrest.net\/index.php\/the-dangers-of-public-proxies\/","og_site_name":"Wavecrest Blog","article_publisher":"https:\/\/www.facebook.com\/WebFiltering","article_published_time":"2008-02-20T15:37:37+00:00","article_modified_time":"2011-06-21T13:54:11+00:00","author":"admin","twitter_card":"summary_large_image","twitter_creator":"@wavecrestnet","twitter_site":"@wavecrestnet","twitter_misc":{"Written by":"admin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.wavecrest.net\/index.php\/the-dangers-of-public-proxies\/#article","isPartOf":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/the-dangers-of-public-proxies\/"},"author":{"name":"admin","@id":"https:\/\/blog.wavecrest.net\/#\/schema\/person\/49694141f524c27bbdfca11c590820cc"},"headline":"The Dangers of Public Proxies","datePublished":"2008-02-20T15:37:37+00:00","dateModified":"2011-06-21T13:54:11+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/the-dangers-of-public-proxies\/"},"wordCount":430,"publisher":{"@id":"https:\/\/blog.wavecrest.net\/#organization"},"keywords":["filter public proxies","internet filtering","internet logging","internet monitoring","monitoring employees' Web access","Public Proxies","students' web access","web filters"],"articleSection":["Acceptable Use Policy","CyBlock","Cyfin","Security Threats","Wave News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.wavecrest.net\/index.php\/the-dangers-of-public-proxies\/","url":"https:\/\/blog.wavecrest.net\/index.php\/the-dangers-of-public-proxies\/","name":"The Dangers of Public Proxies - Wavecrest Blog","isPartOf":{"@id":"https:\/\/blog.wavecrest.net\/#website"},"datePublished":"2008-02-20T15:37:37+00:00","dateModified":"2011-06-21T13:54:11+00:00","breadcrumb":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/the-dangers-of-public-proxies\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.wavecrest.net\/index.php\/the-dangers-of-public-proxies\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/blog.wavecrest.net\/index.php\/the-dangers-of-public-proxies\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.wavecrest.net\/"},{"@type":"ListItem","position":2,"name":"The Dangers of Public Proxies"}]},{"@type":"WebSite","@id":"https:\/\/blog.wavecrest.net\/#website","url":"https:\/\/blog.wavecrest.net\/","name":"Wavecrest Blog","description":"The Latest news, tips and resources straight from the Wavecrest team.","publisher":{"@id":"https:\/\/blog.wavecrest.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.wavecrest.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.wavecrest.net\/#organization","name":"Wavecrest Blog","url":"https:\/\/blog.wavecrest.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.wavecrest.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/08\/CF_Full_F.png","contentUrl":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/08\/CF_Full_F.png","width":1210,"height":765,"caption":"Wavecrest Blog"},"image":{"@id":"https:\/\/blog.wavecrest.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/WebFiltering","https:\/\/x.com\/wavecrestnet","https:\/\/www.linkedin.com\/company\/wavecrest-computing"]},{"@type":"Person","@id":"https:\/\/blog.wavecrest.net\/#\/schema\/person\/49694141f524c27bbdfca11c590820cc","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/blog.wavecrest.net\/index.php\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/posts\/4","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/comments?post=4"}],"version-history":[{"count":2,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/posts\/4\/revisions"}],"predecessor-version":[{"id":300,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/posts\/4\/revisions\/300"}],"wp:attachment":[{"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/media?parent=4"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/categories?post=4"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/tags?post=4"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}