Personally I would make an application with 2 sockets. you have one socket listening on port 125. you then set your browser settings to the IP address on which the proxy application is running. Then u make another socket which will read the HTTP headers... get the host... connect to them on port 80 and pass the information back to the browser through the first socket. so what ur doing essentially is getting the data from one socket storing it in a var and sending it off through the other socket. u'd have to store the data in bytes as opposed to a string because pictures and other mediawill contain byte information.
The main reason to choose an anonymous proxy is security. That is mostly applicable to companies hosting websites. For individual users, the primary concern is usually privacy.
A anonymous proxy is designed to fetch a page and display it without the Url going through your work or schools firewall. Any program that does this would be in function a proxy. The TOR network in Germany in theory is a proxy but has a different name. At the heart of web browsing almost all surfing goes through a proxy server. In Linux it is called Apache in Windows I think just proxy service. It basically is the way the net works.
The most common method to hide your IP address is to use a proxy server in one form or another. A proxy server is a computer that offers a computer network service to allow clients to make indirect network connections to other network services. A client connects to the proxy server and then requests a connection, file, or other resource available on a different server. The proxy provides the resource either by connecting to the specified server or by serving it from a cache. In some cases, the proxy may alter the client's request or the server's response for various purposes.There are several implementations of proxy servers that you can use to hide your IP address (in an attempt to remain anonymous on the internet):Website Based Proxy ServersA Website based proxy server is a website that provides a form for you to enter the URL of a website that you wish to anonymously visit. When you submit the form the website proxy server makes a request for the page that you want to visit. The machine usually does not identify itself as a proxy server and does not pass along your IP address in the request for the page. The features of these sites vary (ad blocking, javascript blocking, etc) as does their price. Some are free and some charge. Examples of website proxy services are: Proxify.comBrowser Configured Proxy ServersThere are also stand alone proxy servers that allow for you to configure your browser to route your browser traffic through that machine, which then makes a request for a page on your behalf, and then sends you the results. These are usually used at no cost to the user. Since they are accessible to the public these are often quite slow. Please see instructions for using a proxy server. There are a variety of types of these proxy servers:Transparent Proxy This type of proxy server identifies itself as a proxy server and also makes the original IP address available through the http headers. These are generally used for their ability to cache websites and do not effectively provide any anonymity to those who use them. However, the use of a transparent proxy will get you around simple IP bans. They are transparent in the terms that your IP address is exposed, not transparent in the terms that you do not know that you are using it (your system is not specifically configured to use it.) This type of proxy server does not hide your IP address.Anonymous Proxy This type of proxy server identifies itself as a proxy server, but does not make the original IP address available. This type of proxy server is detectable, but provides reasonable anonymity for most users. This type of proxy server will hide your IP address.Distorting Proxy This type of proxy server identifies itself as a proxy server, but make an incorrect original IP address available through the http headers. This type of proxy server will hide your IP address.High Anonymity Proxy This type of proxy server does not identify itself as a proxy server and does not make available the original IP address. This type of proxy server will hide your IP address.Installed Software Proxy ServersThere are a variety of companies and software packages available at either a onetime cost or at an annual subscription. These are usually faster and more reliable than the above proxy servers. Some of these services would include: Hide My IPAnonymizer.com's Anonymous SurfingGhostSurf 2007 PlatinumTOR (Read about TOR)VPN ServicesA virtual private network (VPN) protects your data and identity over public networks, like the Internet and wireless hotspots. Various protocols are used to create an encrypted tunnel that transports data securely. While a firewall may protect the data on your computer, a VPN will protect your data on the Internet. The goal of a VPN is to implement the same level of security provided by private networks at substantially lower costs. VPN services provide different gateway cities where the IP address assigned to your computer is located. This allows users to access websites only available to users from a certain country. This application is particularly important for travelers who need to access websites from their home country and for people living in regions rife with censorship, like China and Iran. VyprVPN
Proxy websites are used as a "backdoor" or a way to get around a proxy server. Proxy servers are used control access to other servers, and access is either granted or denied based on the server's settings. One might use a proxy website to do several things, such as hide the IP address of the computer they are using, or to bypass any internet blocks or restrictions that might be on a computer.
A proxy server may be used legally for many applications. One example would be a content filter on a intranet so that you can stop networked clients from accessing restricted sites on the internet.
It is an intermediate server that sits between your computer and the machine you try to connect to.For example, a business could use a proxy server to connect to the internet. If so, individual computers in the office would not connect to internet directly, but connect to the proxy server which would forward the request to the internet, receive the response and hand it back to the computer that asked for it.In such cases, the reasons to use a proxy include security, as the proxy server could filter out various attacks.Proxy servers are also used to cache content. For example, your ISP may have a proxy server that caches the most popular pages so it can serve those pages more quickly. When used to serve content like this, it is called a caching proxy.There are several other variants, what they all have in common is that the proxy acts as a middle man in the communication between two other computers.See also related Wikipedia link.
Web Proxy's work to make things anonymous, they also help keep service from one computer to the internet faster than it would be,they also can scan things for viruses and malware before you go into it.
First you would need the aid of a proxy server which enjoyed unrestricted direct access to the web site. Then you would configure your computer to make the request through the proxy server rather than directly to the blocked site.The key takeaway regarding proxy settings is that these are not useful unless you first have access to use a proxy server. The proxy server administrator will provide instructions to configure your computer to use the service which it provides.In addition there are two solutions to this problem,1- Proxy services: proxy services like hidemyass and fastfreesurf, can give you access to the blocked sites but you will be linked to these social networking sites through their IP addresses which leaves your USERNAMES, EMAILS & PASSWORD shared. Which is a risk, I don't think so anybody would take as all your social networking accounts contain private information, pictures and information. Which you obviously would not want to share.2- Virtual Private Network Services (VPN): This brings us to another solution, which is VPN Services. VPN services provide you with an anonymous IP addresses in different locations of the world where these services/social networking sites are not blocked. So that you can have an access to these sites. There are various VPN Reviews sites, where you can find VPN services. I recommend you http://www.bestvpnservice.com, which is a site I also use to find a VPN service in my country with respect to my requirements and purposes.Hope this answers your question!
It allows you to remain anonymous as some websites or computer systems will not allow you to access a select amount of websites, or if you would like all of your search history to remain anonymous in case of theft or hacking of files.
You have several solutions: 1. Setup a mirroring port in your switch, and connect the internet monitoring software computer to the mirroring port. For internet monitoring software, I would recommend "WFilter enterprise". 2. Setup a proxy server. And do monitoring in the proxy server. (eg: Squid web proxy)
If you want high anonymity, I would skip the server all together. Just use the TOR/ONION network. Even if you rent a server, it can be traced back you, because you'll pay with a credit card. With the TOR/ONION network it's pretty much completely anonymous. Unless the all the hops(computers you are connecting through) are working against you and logging the traffic, it's nearly impossible to tell where the transmission originated.
Proxy Server would be my best guess, and nice playing in school XD