In any case, the proxy server first 'takes' to information you need from the site, and then enter data on your computer. By creating such a server, the provider usually mean it just for their subscribers, with access to foreign Web surfers to it is closed. However, there are exceptions, when a proxy server is configured so that they can take advantage of anyone, and completely free. It remains among these proxies to find and set up your anonymous web browser so that he 'walked' is selected through a proxy server. Lists work of anonymous proxy servers is easy to find on the Internet. But these proxies be sure to check for their anonymity. To do this you must first enter the address and port of the proxy in your browser settings, and then go to a special page test case that not all proxies are anonymous on the Internet and can transfer your site to ip field 'X-Forwarder-For:'.
Such proxies are called distorted. There are also proxy servers, the so-called high anonymity. They report the Web site of such a data set that node as a result do not even need to see that you are using proxy server. As sites, proxies, proxy servers do not provide full anonymity. Any proxy may keep logs of connections that display ip-address of users and sites they visit.
At very great need for these records might well get 'where you', so that particularly rely on the proxy server in terms of anonymity would be naive. You can really build up the so-called chain of several anonymous proxy servers, and then the 'calculate' you will be much harder. However, due to the technical complexity for the ordinary user, this method will likely not make much sense. For more information on the types of proxy servers can read here anonymizers Programs Another way to ensure anonymity when surfing the Web may be the use of special programs. Apparently, this is quite a profitable niche market for developers software because these programs there are so many, and most of them – are paid. In their work they used the same anonymous proxy servers, the only difference is that such programs independently and automatically perform a search, checking and connecting to proxy instead of an anonymous user. The method is very convenient, but again does not provide absolute security. For example, the program immediately after installation HideIp on my computer tried to connect with your site. Perhaps for that version to check triality, and maybe even why, who knows .. And finally, few suspected that the attempt to use anonymous proxy servers may in fact including being a proxy for the corporate LAN, but it's like they say, is a separate issue, which I hope to 'survey' in the near future.