Thursday, October 30, 2008

Challenge and VPN

At present, many units are faced with this challenge: branch offices, distributors, partners, customers and business trip called at any time after the company's public access network resources, which include: the company's internal information office OA, ERP systems, CRM Systems, project management systems. Now many companies through the use of IPSec VPN to ensure the company headquarters and branch offices and mobile workers a secure connection between.
IPSec VPN for many users, IPSec VPN solution for the high cost and complexity of the structure is a headache. The existence of the following facts: in the deployment and use of hardware and software client, a large number of needs assessment, deployment, training, upgrades and support for users, whether they are economically and technically is a very big burden, long-range Solutions and expensive in-house application integration, IT professionals are no serious challenges. As a result of IPSec VPN over the limit, a large number of enterprises that are IPSec VPN is a high cost, complexity, or even impossible to implement a program. In order to maintain competitiveness, the elimination of internal islands of information, many companies and enterprises related to the needs of different organizations and individuals between the transmission of information, so many companies in need of a simple implementation without the need to change the existing structure of the network, operating costs Low solution.
HLINK VPN features
1.USB (KEY) Plug and Play
2. To support the multi-binding
3. Own address resolution
4. Efficiency, security, stability
5. Expansion of flexible, free
6. Improve the competence of management
7.'s Low-cost solution for VPN
8.'s Maintenance-free VPN solution

Tuesday, October 28, 2008

What Are VPN Stand For?

VPN is the use of public networks to build private networks, which is specially designed hardware and software directly through the sharing of the IP network established to complete the tunnel. We usually WAN as a VPN solution, but it can also be used simply LAN. VPN similar to the dial-up connection or a direct point-to-point leased line connections, even though it is based on switching and routing of the way.

It can be said that, VPN is the Intranet (internal network) in an extension of the public network, which can provide the same private network security, manageability and transmission performance, and the construction, operation and maintenance of the network from internal IT sector stripped out by the operators to be responsible for.

VPN is based on the actual network (physical or network) on the basis of a functional network. It uses the network of public enterprises as the backbone of low-cost advantages of public networks at the same time overcome the lack of confidentiality of the weaknesses in the VPN network, the public network at both ends of the network in the public network to transmit information, information on its safety are dealt with , To ensure data integrity, authenticity and the private nature.

VPN is the network share to establish private network technology. The reason is called a virtual network as a whole mainly due to the VPN network between any two nodes do not have to connect the traditional network of professionals required for the construction of the physical point-to-point link, but in the framework of public network services provided by the ISP business The network platform of the logic of the network. User data through the ISP in the public network (Internet) to establish the logic of the tunnel (Tunnel), that is a virtual point-to-point line for the transmission. Through the encryption and authentication technologies to ensure user data in the internal network of public safety on-line transmission network in order to realize the proprietary nature.

VPN is a network of business on the Internet and other public network, an extension of it in the public network to create a secure private connection, so let's remote users, branch offices, business partners and so on with the company's corporate network linking a The expansion of the enterprise network.

Saturday, October 25, 2008

What is VPN and Why should use VPN?

VPN stands for Virtual Private Network, and is an increasingly popular form of proxy for security and to stay anonymous on net. VPN Hosting is about creating private network or tunnel over the public network "internet". Each VPN tunnel is totally anonymous on the public internet and it helps to keep your activities anonymous and safe. VPN hosting is an attractive option for people concerned about their security and privacy.

VPN Provides You:

* Provides a layer of security and anonymity.
* Prevents local ISP from regulating your connection.
* Prevents harassment from people tracking you by your IP address.
* Safe/encrypted connection between your computer and the Internet.
* Access blocked sites and bypass proxy and content filters.
* Internet Service Provider won't know you are using it.
* Your office or school won't know you are using it either!
* Bypass Skype/MSN blocks.
* Skype sound quality may improve with a VPN connection.
* Visit all blocked/censored websites.
* Prevent your ISP from bandwidth throttling for torrent and other P2P networks
* Unblock All Ports

Friday, October 24, 2008

Why should use a firewall? part 2

To prevent internal leakage of information:

By using a firewall on the internal network division, can focus on the internal network segment isolation, limiting the focus of local or network security issues sensitive to the impact of the global network. In addition, privacy is very concerned about the internal network, an internal network, not the details of the profile may contain a clue about security caused by external attacker interest, even while the storm omitted some of the internal network security holes . Use a firewall can be hidden within those disclose details such as Finger, DNS, and other services. Finger show hosts of all the registered user name, real name, the last time to log on and use the type of shell, and so on. Finger but very easy to show that the information was informed by the attacker. An attacker could use the system to know the frequency of the system if there is to connect Internet users, whether or not the system in the attack to draw attention, and so on. Similarly, the firewall can block related to the internal network of DNS information, so a host of domain names and IP addresses will not be understood by the outside world.
In addition to security, the firewall also has the support of Internet service characteristics of the enterprise network technology system VPN (virtual private network).
English firewall called "FireWall", it is one of the most important network of protective equipment. From a professional perspective, the firewall is located in two (or more) network, network access control between the set pieces Yi Zuzu.
In the network firewall is often shown in the chart below are two icons appear. The very image of the icon on the left, like a wall, like real. And the icon on the right side from the firewall to filter mechanism to visualize, there are icons in the icon of a diode. Diodes and we know that it is conducting a one-way, this is vividly illustrated with a single firewall wizard transparency. It now appears that some mechanism for filtering firewall conflicts, but it fully reflects the firewall in the early design idea, as well as a large extent reflects the current firewall filtering mechanisms. Fire because the initial design idea is always the internal network of trust, and the external network is not always trusted, so the firewall is only the first external filter incoming communications, and internal communications issued by the users not to limit . Of course, the current firewall filtering mechanism in the changes, not only for external communications issued by the network to connect to filter internal users to connect to issue some of the requests and needs of the same packet filtering firewall, but still only in line with the security strategy Communication through, it can be said to have "unilateral connecting" sexual.
Firewall refers to the original meaning of the ancient wooden structure of the building and use of housing, in order to prevent the occurrence and spread of fire, it will be solid and a pile of stones in the surrounding housing as a barrier, the protective structures to be known as the "firewall." In fact, the firewall and work together with the "door." If there are no doors, the people room how communication, the Room of these people, how can it get? When the fire broke out, those who fled the scene, how do? This is equivalent to the door on us by talking about the firewall "security strategy", so here we are talking about a firewall is not the actual wall solid walls, but with some small holes in the wall. These small hole is left to those used to allow communication in these small holes in the installation of a filtering mechanism, which is described above, "one of the universal guide."

Thursday, October 23, 2008

Why should use a firewall?

The firewall is the network security barrier:   A firewall (as chokepoint, control point) can enhance an internal network enormously the security, and through filters the unsafe service to reduce the risk. Because only then undergoes the careful choice the application agreement to be able through the firewall, therefore the network environment becomes safer. If the firewall may forbid such as the well known unsafe NFS agreement to pass in and out is protected the network, like the exterior aggressor is impossible to use these frail agreements to attack the internal network. At the same time the firewall may protect the network to be exempt from based on route's attack, like in IP option source route attack and ICMP heavy direction detection heavy directional way. The firewall should be possible to reject all above type attack the text and informs the firewall manager.   The firewall may strengthen the cyber security policy:   Through take the firewall as the central safety program disposition, can possess the security software (for example password, encryption, status authentication, audit and so on) to dispose on the firewall. With disperses the network security problem to each main engine on compares, firewall's centralism safety control is more economical. For example when network visit, a dense password system and other status authentication system definitely may not need to disperse on each main engine, but concentrates on a firewall body.   Carry on the monitoring audit visit to the network access and:     If under all visits after the firewall, that the firewall can record these to visit and to make the diary record, simultaneously can also provide the network service condition the statistical data. When has the suspicious movement, the firewall can carry on the suitable warning, and provides the network whether to receive the monitor and the attack detailed information. Moreover, collects a network the use and misuses the situation is also very important. The first reason is may the clear firewall whether can resist aggressor's survey and the attack, and clear firewall's control to be whether sufficient. But the network use statistics and so on speaking of the network demand analysis and the threat analysis are also very important.

Wednesday, October 22, 2008

Firewall ABC 2

Has a very good firewall protection. Intruder must first pass through the firewall security line of defense in order to access the target computer. You can configure the firewall into a number of different levels of protection. A high level of protection may be to prohibit certain services, such as video streaming, and so on, but at least it is to protect your own choice.
There are different types of firewall. A hardware firewall can be a part of their own, you can connect to the Internet and the computer to insert all of them. A firewall can also run on separate machines, the machines behind it as a network of agents and all the computer firewall. Finally, even direct the machine on the Internet can use personal firewall.
Of course, since the intention to understand the easy-to-digest, it is necessary to take a look at the concept of a firewall. Firewall is a car in the name of the parts. In the car, use a firewall to separate passengers and the engine, so that once the fire engine, the firewall will not only protect the safety of passengers, while at the same time so that drivers can continue to control the engine. Another computer terminology, of course not be interpreted that way, we can come to understand the analog network, the so-called "firewall" refers to an internal network and the public access network (such as the Internet) separate ways, it is actually A separation technology. Firewall is a network of communications in both the implementation of an access control measure, it allows you to "consent" and the data you enter the network at the same time you will "not agree" and the data out to the maximum Network to prevent hackers access to your network. In other words, if not through the firewall, the company's in-house who will not be able to access Internet, Internet on people and companies can not carry out internal communications.

Tuesday, October 21, 2008

Firewall ABC

The definition of a firewall
Referring to the so-called firewall is a software and hardware combination, intranet and extranet, private network and public network interface between the structure of barrier protection. Is a method of acquiring the image of security, It is a kind of computer hardware and software, so that the Internet and Intranet set up a secure gateway between the (Security Gateway), so as to protect the internal network from unauthorized users of the intrusion, firewall services from the main access rules, verification tools, including Gateway filtering and application of 4 parts, a firewall is located in the computer and connect its network between the hardware or software (which uses less hardware firewall, such as the Department of Defense, as well as large rooms and other places before, because it Expensive). The inflow and outflow of all the computer network were to go through the firewall.

The firewall function
It flows through the firewall on the network to scan, which can filter out some of the attacks, so that they will be executed on the target computer. Turn off the firewall can not use the port. But it can also prohibit the outflow of port-specific communications, blockade Trojan horse. Finally, it can be prohibited from special visit to the site in order to prevent intruders from unknown to all communications.

Monday, October 20, 2008

Privoxy

Privoxy is a model of belt filtration function agent server, in view of HTTP, HTTPS agreement, frequently with Tor combination use. Through Privoxy super filtration function, user, thus may protect the privacy, carry on the filtration to the homepage content, to manage cookies, as well as detains each kind of advertisement and so on. Privoxy may serve as the single plane, may also apply the multiuser network.   

Privoxy based on Internet Junkbuster, carries on the issue according to GNU General Public License. May in Linux, Windows, Mac OS X, AmigaOS, BeOS, as well as on each kind of Unix moves.   

The newest stable version 3.0.8 issued in January 19, 2008.

Sunday, October 19, 2008

Default Gateway

For a TCP / IP protocol configuration, is a direct arrival of the IP router's IP address. Default gateway can be configured in the IP routing table to create a default path.
IP address of the router to give the name of the local network and connect the machines must be out of traffic to this address in order to pass beyond the local network, so that the address be outside the local subnet IP address of the "gateways." Also Recently, the gateway is used when the host or network routing table heading input does not exist in the local routing table when they host the packet is sent to there.
Gateway (Gateway) is a network connection to another network's "gateway."
In accordance with different standards, there are many gateways. TCP / IP protocol, the gateway is the most commonly used, here we are
Said the "gateway" refer to TCP / IP protocol under the Gateway.
Gateway then in the end what is it? Gateway is essentially a network to other network IP address. A network such as network and B, Network A range of IP addresses "192.168.1.1 ~ 192. 168.1.254", for the subnet mask 255.255.255.0; Network B of the IP address of the range "192.168.2.1 ~ 192.168. 2.254 ", as a subnet mask of 255.255.255.0. In the absence of routers, the two networks can not be carried out between the TCP / IP communications, even if the two network connections on the same switch (or hub) on, TCP / IP protocol will be based on subnet Mask (255.255.255.0) to determine the two networks in a host of different network. In order to achieve these two communications networks, through Gateway. A network if the host was found in the packet is not the purpose of hosting the local network, put forward the packet to its own gateway, and then forwarded by the gateway to the network gateway B, B network gateway and then sent to the network B of a host (such as shown in the attached map). Network B to A network packet forwarding process. Therefore, only set up the gateway IP address, TCP / IP protocol can be achieved between the different networks to communicate with each other. Then the IP address of the machine, which is the IP address? Gateway is the IP address of the routing of the IP address of the device, with the routing equipment router, routing protocol enabled server (essentially the equivalent of a router), the proxy server (also The equivalent of a router).
What is the default gateway
If you understand what is the gateway, the default gateway is also a good understanding. Just like that there will be a room door,
A host to a number of gateways. The default gateway is the meaning of a host can not be used if the gateway, put the packet sent to default gateway specified by the gateway to deal with the packet. Gateway is now used by the host, in general refers to the default gateway.
How to set the default gateway
A computer's default gateway is not designated by the casual, must be properly designated, or a computer will
Gateway is not a packet sent to the computer, which can not compete with other computer communications network. Gateway's default settings are automatic and manual settings set in two ways.
1. Settings manually
Manual settings apply to the relatively small number of computers, TCP / IP parameters remain basically unchanged, for example, only a few dozen to Taiwan
Computer. Because this would require each of the networks linked to a computer set up on the "default gateway" very hard, because once the migration and other factors led to the need to modify the default gateway IP address to the network will bring big trouble So is not recommended to use.
In Windows 9x, set the default gateway is in the "Network Places" on the right-click in the pop-up menu, click
"Properties" on the network Properties dialog box, select the "TCP / IP protocol," click on "Properties" and "default gateway" to fill in a new tab in the default gateway IP address it.
Need to pay special attention to is this: By default gateway must be a computer's own network segment of IP addresses, and can not fill in the other
Segment of IP addresses.
2. Automatically set
Is automatically set to use DHCP server automatically to the computer network, the distribution of IP address, subnet mask and default gateway
. The benefit is that once the network's default gateway has changed, as long as a DHCP server to change the default setting of the gateway, then all the computer networks are a new default gateway IP address. This method is suitable for large-scale network, TCP / IP parameters may change in the network.
Another automatic access to the gateway through a proxy server to install software (such as MS Proxy) of client
To automatic, its principles and methods are similar and DHCP. Due to limited space, no longer on the details.
If you look at the beginning of routing knowledge, they would easily understand,
Into the command-line mode:
C: \> route print
There will be a route:
0.0.0.0 0.0.0.0 default IP Gateway Interface (machine IP) hop
For example, my machine:
0.0.0.0 0.0.0.0 192.168.100.254 192.168.100.233 1
Means: the needs of all packets transmitted, are the default gateway IP (Interface) sent out, of course, is to return from there after

Saturday, October 18, 2008

IPsec

The IP level is in the TCP/IP network most essential one, IP takes the network level agreement, its safety mechanism may provide the transparent cover type safekeeping of security to its upper formation each kind using the service. Therefore, the IP security is the entire TCP/IP security foundation, is the network security core. IPSec is the present only one kind can provide the safety control for any form Internet correspondence the agreement. The IPSec permission provides the security which one by one data stream or connects one by one, can therefore realize the very careful safety control. Regarding the user, then may regarding different need to define the different rank safekeeping of security (i.e. different protection intensity IPSec channel). IPSec was the network data transmission provides the data confidentiality, the data integrity, the data origin authentication, anti-to rebroadcast and so on safe service, caused the data when through the public network transmission, did not need the worry to monitor, to tamper with and fabricates.   IPSec is through uses each kind of encryption algorithm, the confirmation algorithm, the seal agreement and some special safekeeping of security mechanism realizes these goals, but these algorithms and the parameter are the preservation in carry on IPSec correspondence both sides SA (Security Association, security alliance), when in both sides SA establishment match, the both sides might carry on IPSec to correspond.   Has mainly used the IPSec technology in hypothesized private network (VPN).

Friday, October 17, 2008

Virtual Data Networks

The telecommunication domain is promoting many organizations to need to use between the long-distance place establishing the virtual data network the technology, these technologies mainly use in the campus environment, the urban region, the macrozonality, or the global region. The virtual data network all place all systems carried on the entire interconnection for the organization to provide compared to having rented the owner-use circuit and the establishment private network expense low many ways. Its goal is provides local area network's speed on WAN.   The packet switching service, for example the frame relay and the exchange type many megabit digital data services (SMDS, is providing the virtual data networking capability and to owner-use circuit's replacement demand. These services provide have the microsecond exchange capacity band width. The customer only need use for them serves carries on the payment. These services by long-distance telecommunication bureau, for example AT& T, MCI, and USSprint, as well as value-added network (VAC), for example CompuServe, Infonet and Tymenet and so on provide. Circuit switching service, for example exchange - 56, exchange - 384K (AT& T), exchanges T1 and exchanges T3, now with these telecommunication services equally also very popular use few expenses, now some very small place may also include in a very big business data network.   Moreover, individual demand is not now high, this is because these telecommunication services have processed the exchange element. Through the packet switching service, sole “the data pipeline” transmits the data from the customer place to the telecommunication bureau, then transmits again from this telecommunication bureau to other places. However, the network management personnel considered when entrusts with many network managements a public telecommunication bureau produces loses the control the question, although these telecommunication bureaus can also provide about these service suitable management information.

Thursday, October 16, 2008

What is VPN

VPN's full name in English is the "Virtual Private Network", is translated through the "virtual private network." As the name suggests, virtual private network, we can understand it as a virtual enterprise out of line. It can be a special encrypted communication protocols in the Internet connection in different places at two or more enterprises to establish a network between the proprietary communication lines, is set up like a line, but it does not The real need to lay fiber optic cable like the physical line. It can be compared to apply for telephone line, but not for the cost of laying lines, there was no need to buy routers and other hardware equipment. VPN router technology used to be one of the important technologies currently in the switch, firewall software, such as equipment or WINDOWS2000 also features VPN support, saying, VPN is the core of the use of public networks in the establishment of virtual private network.
Virtual Private Network (VPN) is defined as through a public network (usually the Internet) to establish a temporary and safe connection is through a confusing network of public security, stability of the tunnel. Virtual Private Network is the expansion of the Intranet. Virtual Private Network can help remote users, branch companies, business partners and suppliers with the company's internal network to connect the establishment of credible security and guarantee the security of data transmission. Virtual private networks can be used for the growing global mobile users Internet access in order to achieve a secure connection; corporate Web site can be used to achieve secure communications between virtual private leased circuits, for cost-effective to connect to business partners and customers secure Extranet Virtual Private Network. We combine the following site related to Cisco and Microsoft VPN on the articles you for this information, more and a wealth of relevant aspects of our content will be added for days after.
For different user requirements, VPN There are three solutions: remote access virtual network (Access VPN), virtual enterprise network (Intranet VPN) and the expansion of enterprise virtual network (Extranet VPN), the three types of VPN with traditional long-distance Access network, enterprise and corporate Intranet network partners and corporate networks posed by the Extranet (external expansion) corresponds to.

Tuesday, October 14, 2008

Basic Knowledge of Proxy

English name: Proxy Server,
Function: Deputy users access to network information. The image that it is a transit point for the network information.
Under normal circumstances, we use the Web browser to connect directly to other Internet sites to obtain information network, is directly connected to the purpose of the site server, and then by the purpose of the site server to send back information. Proxy server is in the range of browsers and Web servers between another server, it has been following the browser rather than directly to the Web server to get back to the page, but issued a request for a proxy server, the signal will be sent to the proxy server, By the proxy server to get the browser and the information they need to send to your browser.
Www.51an.com in the URL box you want to visit the Web site address, click agent will open a new browser window to link a proxy server, you can wait a few seconds, if the link can not appear at this time, and other server error, please above Try to choose the other server, proxy server because of the large consumption of resources, and there are time-sensitive, so sometimes can not open, we must try several times a proxy server. Automatic Updates can be used day-to-date server.
Most of the proxy server has a buffer function, just like a big Cache, it has a lot of storage space, it will continue to get new data stockpile to its local memory, the browser if the requested data in it Machines already exist on memory and up-to-date, it will not re-check the data from the Web server, and the memory directly on the data to the user's browser, which can significantly increase the speed and efficiency of the browser.
More importantly: the proxy server is the Internet gateway provided by the link level is an important safety feature, which is mainly in the open systems interconnect (OSI) layer model of dialogue in order to play the role of the firewall.
For these reasons, most of the proxy server is used to connect INTERNET (Internet) and INTRANET (LAN). At the national level, the so-called China Public Multimedia Information Network and Education Network is an independent state-level large-scale local area network, and is isolated from the Internet. For a variety of needs, some groups or individuals in the network between the two set up a proxy server, if we know the address of the proxy server, you can use it to reach Web site abroad.

Monday, October 13, 2008

Why has to open the proxy server?

1st, connects Internet and Intranet acts as firewall (firewall): Because all intranet user through agent server visit outside time, the mapping is only a IP address, therefore the outside cannot visit the intranet directly; Simultaneously may establish the IP address filtration, the limit intranet to the exterior access authority; Moreover, two interconnection intranet, may also carry on the interconnection through the third party agent server to exchange the information.   

2nd, saves the IP expenses: If front says, all users only take IP outward, therefore does not need to rent the excessively many IP addresses, reduces the network the maintenance cost. Thus, in the confined bureau has not been possible to connect outside the net with the outside net connected numerous machine through in net's agent server, reduces the expense greatly. Certainly also has its disadvantageous one side, if many network hackers hide their real IP address through this method, but escapes the surveillance.   

3rd, enhancement access speed: The itself band width is small, through band width big proxy and goal main engine connection. Moreover the usual agent server establishes a big hard disk buffer (possibly to reach as high as several GB or bigger), when has the outside information through, simultaneously also preserves it in the buffer, when other users visit the same information again, then takes out the information directly by the buffer, passes to the user, thus achieves the enhancement access speed the goal. Uses the agent server to have these advantage?   In our country, the surfer divides into 163 and 1692 kinds. 169 users divide into three kinds (throughout the land classification caliber possibly different), a kind of user has outside the net the power, may enjoy internet's all services directly; Another kind is the registration user, the use registration account number surfer, the third order is called the GUEST user, uses account number surfer which male uses, adopts the calling to record spends the system. Does not have outside the net the power user's moderate cost, but can only with the Chinese multimedia information networks in (the IP address by 10 openings) website connection. So-called \ " Has a good swim network world \ " But is the sentence empty talk! You have experienced whether also such pain: Because the bill limits, every day can only pace back and forth on 169, raises is looking at 163 pile of internet information, the resources and the free western-style food, the saliva cocurrent ......Ya!   Now has been good, had the agent server, we may go abroad willfully, obtained 163 services with 169 inexpensive prices! Just like front talks about, if we knew that these agent server's address, may use it to arrive at outside the net the net, from 169 arrives 163. What Arab League Z searches and provides is the completely free agent server address, does not have any limit completely, cannot pay any extra cost! On INTERNET free email, main page space, ICQ, FTP, each kind of information resource ......Opens entirely is coming! You still only need pay 169 inexpensive surfer expenses! Moreover, because the goal server can only find out agent server's IP which you use, therefore also has some self-evident advantage, for example was not easy in the chatroom to kick out easily by the human! The use proxy's surfer speed is what kind of?   The agent server in fact is in a network high speed buffer, after it accepts the terminal application, to the network server proposed first requests document which and accepts transmits, then transmits the terminal again. When information first process this kind of stopover station, the speed possible more or less to have given a discount.   But the agent server is in itself equal to a high speed buffer, if you must glance over the homepage some time ago some people had glanced over, moreover on the agent server preserves time newest record, the agent server does not need to arrive at on the main engine to apply for the data again, but is directly the homepage transmission for you, like the speed in the quite straight union the goal server quick many! Specially the agent server itself has the high speed export, but the server scale the very high words, the influence nearly may neglect to the speed do not record! After the test, the good proxy from sends out applies to receive the document the time less than 10 milliseconds, generally also only then 0.5-1 second, moreover the speed may achieve 5-6K. From the actual operation, cannot distinguish the use proxy nearly and directly with 163 differences, certain areas will also present 169+ agent server to quickly in 163 phenomena!   Certainly, if the agent server incorrect words, possible on and so on a several minutes page not to have been able to demonstrate completely, you can not but switch off the browser multimedia and other functions, facing an arid network world! What the home station goal is as far as possible is you provides quickly the better agent server, has a look, to guarantee that frequently you have the harvest greatly!

Sunday, October 12, 2008

Uses of Proxy Servers

In the day-to-day network, there are many uses, here we are familiar with some of the role of the summary and analysis, classification:
First, sharing network
The most common is to use a proxy server may be shared online, many people unconsciously in, for example, through sygate, wingate, isa, ccproxy, NT systems bring their own network sharing, and so on, can provide enterprise-class file ease Survival, reproduction and address filtering, and other services, to make full use of the limited export of local area network bandwidth to speed up the network within the user's access speed, can be solved only with a line of a IP, IP resources, with a lot of local area network for Internet access function, as well as A firewall, network and outside the quarantine network, and they provide a network to monitor and record the information transmission function to enhance the local area network security, and easy to manage users on the Internet.
Second, the visit to Deputy
Visit the Web site to speed up the pace in the emergence of network congestion or failure, through a proxy server website purpose of the visit. For example, A visit to site C, but A to C network problems can bypass the assumption that B is a proxy server, A through B, and then from B to C. You will recall that a few months ago, the network time is not normal, basic access to foreign sites can not, such as GOOGLE, YAHOO, and even the CCF are unable to visit, was very anxious. The results through a proxy server, can be found in the visit, good speed, in such circumstances, the proxy server will be able to play a big role. There is also a type of proxy server to back up a considerable number of cache files that if we visit by the current data in the proxy server's cache file can be read directly without having to re-connect to a remote Web server. In this way, to accelerate the pace of the visit.
Third, to prevent attacks
To hide their true address information, but also to hide their own IP, to prevent attacks by hackers. By analyzing the designated IP address, users can query to the current location. For example, we see that in a number of forums, the forum clearly marked the location of the current users to post, which is in accordance with the Forum members log on at the time of the IP address resolution. Weekdays, we have the most commonly used version of IP significantly QQ, "sending messages" window, you can view each other and resolve the IP location. When we use the proxy server corresponding agreement, will be able to reach their current location of the hidden purpose of the address.
Fourth, limit break
Proxy server can also break through the network restrictions. For example, Internet users on the LAN port, the purpose of the site, the agreement, games, instant messaging software, and other restrictions, can break through these constraints, I can see this message, how to break through local area network for Internet users will not repeat some of the restrictions. For example: GOOGLE We all like to use, in fact, to GOOGLE a function somewhat similar to the proxy server functionality, is a snapshot of the page, the site is frequent changes in address or Web site clearance, site of the server broke down, or has been updated But we still have to check before very useful information on the web page snapshot of the use Paishang, Google with its complex and fully automated search methods ruled out any man-made factors on the search results, to ensure that the page rank of an objective and fair , Google can easily, honest and objective to help you find valuable information online. GOOGLE has a massive database, if can not find server, Google's page snapshot storage may also help in an emergency. Although the page snapshot of the information may not be up-to-date, but a snapshot of the page to find information than in the actual pages much faster, at this time can be encrypted proxy access Google, and then visit its website snapshots to help in an emergency.
Fifth, to hide the identity of
Proxy server is hacking basic knowledge, the hacker's activities, many through a proxy server, such as scanning, spying on the local area network within the machine to carry out infiltration, hacker attacks in general are a lot of transit-class springboard to attack the target machine. To hide the identity and ensure their safety.
Sixth, speed
Increase the download speed to break through the download limit. For instance, some Web site to download the resources to do a thread-IP restrictions, which can be used when the conveyor belt audio-visual, multi-threaded set for each agent to set up a thread. IP restrictions for a breakthrough in the situation very well, as long as a different proxy server, you can download at the same time a number of resources to apply from the WEB and FTP download. But if there is a forum of resources, each user an account and a restricted account a IP, proxy server could not break through on. As an example, here we are, telecommunications users on the movie Web site can not be Unicom, China Unicom users of telecommunications can not be on the film site, as long as the situation of the telecommunications Unicom to find an agent, IP address Unicom is on the line. Unicom, a telecommunications agent to find. Will be able to download movies to their film. Education Network through a proxy server can leave the country without authority or permission to visit a section of the IP-related computer resources.

Saturday, October 11, 2008

Proxy Types

Deputy 1.HTTP: Deputy to the HTTP client visits, mainly Agent browser to visit web pages
Deputy 2.FTP: Deputy to the FTP client software access FTP server
Deputy 3.RTSP: Deputy client Realplayer visit to Real's streaming media server
Deputy 4.POP3: Acting on the e-mail client software to use POP3 way to send and receive e-mail
5.SOCKS Agent: SOCKS proxy and other types of agents, it simply pass packets, and does not care what kind of application protocol, HTTP request either, so SOCKS proxy server other than the type of proxy server to speed Much faster. SOCKS proxy divided into SOCKS4 and SOCKS5, the two are different only in support of SOCKS4 proxy TCP protocol (that is, Transmission Control Protocol), and it will be good for SOCKS5 proxy support to support the UDP and TCP protocol agreement (that is, user data packets agreement), also supports the Types of authentication mechanisms, such as the DNS server. SOCK4 can do SOCKS5 can be, but SOCKS5 can do is SOCKS may not be able to do, such as we used to chat on QQ tool to use when asked by Acting Deputy SOCKS5, as it requires the use of UDP protocol to transfer data .
Deputy 4.VPN: refers to the establishment of a network to share private network technology. The reason is called a virtual network as a whole mainly due to the VPN network between any two nodes do not have to connect the traditional network of professionals required for the construction of the physical point-to-point link, but in the framework of public network services provided by the ISP business The network platform of the logic of the network. User data through the ISP in the public network (Internet) to establish the logic of the tunnel (Tunnel), that is a virtual point-to-point line for the transmission. Through the encryption and authentication technologies to ensure user data in the internal network of public safety on-line transmission network in order to realize the proprietary nature.

Thursday, October 9, 2008

How to Add a Proxy Server in IE6

After the last step in the search, you must have to search a number of "Free" attribute of the Proxy, right? Congratulations ~
How can then use the Proxy do? In fact, very simple, most of the software have some of the attributes of software options, such as "Setting" and the "Preferences" and so on. And how many of these options are usually inside the "Proxy" this option, you only need to "Proxy" option to fill in the inside of your search by Proxy of the IP port, it can be used by the Proxy. If the software is Chinese, then there would be more simple, as long as the "proxy server settings" on the inside to fill in the ok.
Browser to IE6, for example:
1, open the "Tools" inside "Internet Options."
2, click the "connect" box.
3, if you use dial-up, then select "Set." If you are using the local area network, then select the "LAN Settings."
4, in which there is "proxy server" setting. First click on the "Use a proxy server" and then "address" to fill in the Proxy of IP, the "port" to fill in the port, a good! Done!

Wednesday, October 8, 2008

How to Use Proxyhunter?

How to search proxies using Proxyhunter?
When you fill increasingly mission, to return to the main interface, according to the blue start button, so ProxyHunter will begin a search agent. Now you need to do is stare at the results of the search field and wait patiently.
Server Address: here is your search to the proxy server's IP.
Port: This port is used to it.
Type: This is the type of Proxy.
To verify the status: The most important thing, it's a state of several hours, listed on the chart is one of several, often successful if the search to the proxy, it will appear as "FREE", then you can use the proxy ; If to show "Password", basically you can delete the proxy, unless you have the ability to let its password cracking ...; show that if the "connection time-out" or "connection failure" and other words of the state , Then you may have is in a busy network, is also possible that this proxy for the time being shut down, you can then verification first time.
Characteristics of the time: This value affects the speed of the proxy, it shows that your machine to connect to the proxy, if you have more than one proxy for your choice, then the election on a relatively small value of a bar, connect time On behalf of the smaller the sooner the porxy.

Tuesday, October 7, 2008

Free Proxy Scanning Tools

I. Proxy Hunter
This is the big brother of the Proxy search software, since the launch of 1.0, much to friends who love the country, the current version is 3.0, the Proxy Hunter What are the characteristics of it? Search speed, is the first of its kind software, at the same time with a forecast Time to complete the search function, in addition to education network, the IP address does not limit the scope of the search, while support for the HTTP and SOCKS category Proxy search and verification, have been on a search of the Proxy address to manage, use, automatic scheduling, re-verification Advanced features. When there is a lot of Proxy, by which I do not know better, then you need to schedule automatic features, the network will be set up software-based Proxy machine IP (127.0.0.1), port 8080, and then Proxy Hunter in the search results list will want to use Proxy by the right mouse button to "use" (Enable), so Proxy Hunter will be based on at the time the speed of Proxy, to choose one or more of use, it easily.
II. Proxy NOW series
This is the Web site by the automatic software update Update NOW developed by the authors, by the HTTP Proxy NOW, SOCKS Proxy NOW, FTP Proxy NOW consists of three parts, as the name implies, is a function of each of these three types of search by Proxy, if it can be in-One In one of the software, like, Proxy NOW series has the advantage of not limit the search scope of the IP, but did not register when they enter will be delayed, but only a few seconds, did not cause illness, can also search speed, is quite satisfactory, the shortcomings Is a function of a single dispersion can be set up small items, less perfect verification.
III. SOCKS Cat
This is a specialized search SOCKS Proxy, the same IP address does not limit the scope of the search, the faster the speed, according to the author, said the only speed slower than the Proxy Hunter, but in the SOCKS Proxy authentication should do a good job, at the same time support the SOCKS4, SOCKS5 Proxy of the search and verification, support for authentication settings page, set the maximum number of connections, and so on, through the use of actual, well, if they can join the search for the HTTP Proxy authentication function and may even be better.
Sum up: three to Proxy Hunter for the better, but it can not hang a tree should be a specific case-by-case analysis, an appropriate choice to use.

Monday, October 6, 2008

Tips of Using Proxy Servers

In the search for a proxy server, enter the IP range is very important, in general, the proxy server settings are more of the local economy is some of the more developed areas, you can find the IP address of the provinces and cities nationwide, and targeted search.
New proxy server application guide
First, let me say we are here to talk about acting, is a proxy server, called the English Proxy Server. In general, those of us ordinary people it is the role of the three (Leaving aside the usefulness of some of the profound, because we may not be used):
First, it passed, we can often denied access to the site can not go. Do not believe you can immediately open your browser and enter "www.geocities.com" on the site. How? Do not have to look at the browser idle here, is not slow your network, is not this Web site, but you can not access it (the network there are many of these types of sites oh). Why not visit? The question why there are many ...... say, is that most of the domestic network by limiting access, so some can not go to the Web site. As to how to be able to access these sites? After reading this article you know!
Second, through which we view certain Web site to speed up the pace. Sometimes we visit a number of foreign countries or Hong Kong and Taiwan Web site, as slow as a snail. However, if you choose the correct proxy server, the speed can be improved to enhance the speed of these times, but it is clear Oh!
The third is to act as Intranet and Internet connection firewall (Firewall): Because of all internal network users to visit the outside world through a proxy server, only one IP address for the map, so outsiders can not directly access the internal network; at the same time can be set up IP address filtering to restrict the in-house On the external network access; In addition, the two have not connected the internal network, through third-party proxy servers to the Internet to exchange information.
If you visit in the past, there have been over the course of the case, then it seems you need to try to use the proxy server.

Sunday, October 5, 2008

The proxy server search and verification (2)

It can be said that the proxy server is not very stable, and some perfectly good use of yesterday, today, can not be used, or to a password in order to find out whether the agent or the Free, it is necessary to use "proxy hunter" test function. Deputy hunter the lower right corner of the 8 button, the first "test", and the second is the "full test", we can all 〔〕 test to verify the list of all the agents can use it, you can select from the list One or more proxy address, click 〔〕 test, only to verify whether these agents can be used. After the verification, click on the title of the list "to verify the status," can be used to the proxy server in order to concentrate in front of the list, looking for convenience.
Fourth, how to export and import the results of
If you find a lot of proxy servers, like a friend, you can click on the results of 〔〕 Export button, the selected or all of the agents stored in an address extension. Txt text file (using a proxy hunter 3.0 The attention should be paid, at least when the export should be "setting the contents" under the "type" is also selected, together with export) and then the document to your friends on the trip. Your friends get this document, the result can be used to import 〔〕 button, which will be introduced to address his "hunter agent" list (the use of proxy hunter must pay attention to the 3.0 version, using the results of the introduction, when the pop-up Choose File dialog box at the bottom when it is necessary to "avoid duplication of import items" selected, we will be able to make the list appear to repeat the address).
If you find the Web address of the agent released by the users, how to import these addresses, "Deputy hunter" in it? Here's how:
1, open a text editor (such as built-in Windows Notepad).
2, this format, "Address: @ port type" enter an address, the exclusive address of each party. Note: The ":" and "@" is the punctuation in English, Chinese can not use punctuation. @ HTTP is the type of omission can be as "address: port" without having to write back @ HTTP. Such as:
210.77.125.90:1080 @ SOCKS5
210.62.225.8:3128
200.77.125.146:21 @ FTP
61.173.65.126:3128
211.78.26.35:80
132.162.17.194:21 @ FTP
202.104.141.130:80
218.63.120.31:8080
61.78.60.10:1080 @ SOCKS5
3, to take any of this document preservation, such as proxy.txt.
4, to start deputy hunter, and select "Import results", to find just the proxy.txt edit documents, you can import (Remember to select "Import to avoid duplication of items").
5, just select the Import results, click 〔〕 test, can not be used to be able to clear.

Saturday, October 4, 2008

The proxy server search and verification

First, the server used port
On the Internet in every host (Hosts) are the only one address (IP), but the same may be host at the same time provide more than one service, such as FTP service, WWW service, and so on, each of the services To take up a host of the port (PORT).
Proxy server port used are:
Deputy HTTP: 80/8080/3128/8081/9080
SOCKS proxy: 1080
FTP proxy: 21
Deputy Telnet: 23
Second, how to search for a proxy server
From the above we already know the contents to find the proxy server is a matter of fact to find out the server's IP address, type of service and used by the port, we can use the "proxy hunter Proxy Hunter" software to search.
A brief account of the use of proxy hunter:
1, to start deputy hunter in the upper left corner of "IP address range," enter the starting and ending addresses, for example, you have to find 210.62.0.0 -> 210.63.0.0 the IP section of the proxy server, enter in the left column: 210.62.0.0, In the importation of the right-hand column: 10.63.0.0. And then click Add Key address〕 button, then the address of the paragraph will join the search mission.
2, select the port area. Acting in support of search hunter HTTP proxy and SOCKS proxy, you can be listed above the two agents used to join the port. Adding: "port area," the first blank field, type "8080", also enter the second column "8080", choose the type of "HTTP", and then click Add Port 〔〕 button, you will find the list of ports " 8080

Friday, October 3, 2008

The main functions of a proxy server

(1) to set user authentication and billing functions, the user can account for unregistered users the right to Internet access through a proxy server network. And the user's visit, the place to visit, the flow of information to compile the statistics.
(2) user management at different levels, different set of users access to internal or external Internet address filtering, a different set of access rights.
(3) increase in the buffer (Cache), to increase the speed of access, often visit the address to create a buffer zone to greatly improve the efficiency of the popular sites to visit. The proxy server settings are usually a larger hard disk buffer (possibly up to several GB or greater), when the outside world through information, but also to preserve its buffer zone, and then when other users access the same information , Directly in the buffer zone out information to users in order to improve access speed.
(4) Internet connection with the Internet, to act as a firewall (Firewall): since all internal network users to visit the outside world through a proxy server, only one IP address for the map, so outsiders can not directly access the internal network; at the same time can be set up IP address filtering, Restrictions on the internal network to external access.
(5) cost-saving IP: the proxy server to allow the use of a large number of IP address pseudo-saving on-line resources, that is, to use a proxy server to the IP address can reduce the demand for the use of local area network access methods Internet, as if the local area network (LAN) for each A user to apply for an IP address, the cost can be imagined. However, the use of proxy servers, proxy servers can have a legitimate IP address, LAN users can use the other 10 .*.*.* such a private IP address, this can save a lot of IP, to reduce network maintenance costs.
What is HTTP proxy: www for each of the Internet are the familiar, www is used to connect the http request, so we browse the Web, download data (ftp may also have an agreement) that is used http proxy. It is usually bound in a proxy server, and other ports on the 80,3128,8080.
What is a socks proxy: the use of socks agreement is SOCKS proxy server, is a common proxy server. Socks is the bottom of the circuit-level gateway, is DavidKoblas in 1990 developed since then has been on the Internet RFC standards as open standards. Socks are not required to follow specific application of the operating system platform, Socks proxy and application-level proxy, HTTP layer of different agents, Socks proxy simply pass packets without having to be concerned about what kind of application protocol (such as FTP, HTTP and NNTP request) . So, Socks proxy other than the application layer proxy much faster. It is usually binding on the proxy server on port 1080. If you are an enterprise campus network or the Internet, through a firewall or through a proxy server on the Internet access may need to use SOCKS. Under normal circumstances, for dial-up users do not need to use it. Note that the website often used a proxy server is usually devoted to the http proxy, SOCKS, and it is different. As a result, you can visit the website does not mean you can SOCKS visit Internet. Popular firewall or proxy software support SOCKS, but the administrator to open the function. If you are not sure whether you need to SOCKS or whether SOCKS available, contact your network administrator. In order to use the socks, you need to know:
① SOCKS server's IP address
② SOCKS port's services
③ SOCKS the need for user authentication services? If you would like your network administrator to apply for a password and user
Know that the above information, you can fill in this information, "the network configuration", or fill in registration for the first time, you can use a proxy socks.
In practice, can be used as a SOCKS proxy: e-mail and newsgroup software, paging network ICQ, and MIRC chat network uses a proxy server to play the game Lianzhong, and so on a variety of applications among the game.

Tuesday, July 29, 2008

Can IP Reveal My Home Address?

In computer networking, an IP address (internet protocol address) is a unique number that devices use in order to identify and communicate with each other on a network utilizing the Internet Protocol standard. Sometimes this address is shortened to just "IP" as in "My IP is A.B.C.D". Any participating device (including routers, computers, time-servers, printers, internet fax machines, and some telephones) must have its own globally unique communicable address.

It's true that your IP address is no secret. It's a basic part of internet communication protocols to send your IP address whenever you connect to another site, request a web page, chat, play an online game, etc. Without your IP address, the computer on the other end wouldn't know where to send the reply.

There are many my IP websites which will tell you your public IP address. Some of them also have tools to lookup IP addresses and provide generalized location information based on IP to location databases. In some cases they can estimate the location of an IP address within a few miles. When you visit this site http://www.ipandmap.com, you can find your IP address and your local city map.

But that doesn't mean that evildoers can find your house if they know your IP address. Each time you go online (if you have dialup) or each time you start your computer (if you have cable or DSL connection) you will be assigned an IP address, randomly selected from a pool of IP's assigned to your Internet service provider (ISP).

So a person might be able to get a general idea of your geographic location, based on your IP address, by doing a lookup on the WHOIS database, but that will only tell them the physical location of your ISP -- not your home address. With enough resources and effort you may be able to be identified. So don't say or do anything that you don't want tracked back to you.

Monday, March 31, 2008

Herbal Smoke Products and Legal Buds Online

Herbalsmokes.info is a site selling herbal smokes and legal buds online.

Herbal smoke is inhaled through pipes or chillums. Native Indians just roll the mixture in a betel leaf. Some people use cigarette paper for rolling the mixture.

The general perception is that herbal smoking is not as harmful as tobacco-smoking. Herbal cigarettes do not contain tobacco, and hence no nicotine. Some manufacturers even claim that these herbal blends do not affect children in any adverse manner. However, health experts have a different point of view. Burning leaves release tar, which clogs the lungs over a period of time. Herbal mixtures may not be as addictive as tobacco, but they do create a craving and a desire to smoke them repeatedly. The only proven effect of herbal smoke is its numbing effect of the nervous system, but health activists still hold herbal smoke in contempt.

More info? Please goto Herbalsmokes.info.

Monday, March 17, 2008

Top Keywords for Proxy Webmaster

If you're running a proxy site, these keywords will be very useful for you.

proxy 18,381
myspace proxy 6,645
proxies 5,284
unblock myspace 5,162
proxy sites 4,402
free proxy list 3,436
myspace proxies 3,245
proxy servers 2,854
proxys 2,541
proxy server 2,503
free proxy server 1,929
anonymous proxy 1,877
bypass proxy 1,778
proxy websites 1,550
free proxy 1,545
free proxies 1,446
free web proxy 1,272
web proxy 1,268
facebook proxy 1,254
proxy list 1,000
http proxy 885
cgi proxy 829
proxy site 827
myspace proxys 700
web proxies 677
bebo proxy 663
free proxy clicker download 647
proxy lists 647
proxy avoidance 644
free proxy sites 494
school proxy 474
anonymous proxies 448
start using cgi proxy 443
new proxies 432
youtube proxy 432
proxy bypass 409
proxy for myspace 402
internet proxy 395
ergo proxy 376
proxy browser 337
free proxy servers 328
proxy myspace 305
sure proxy 305
proxies for myspace 303
free myspace proxy 277
public proxy 259
school proxies 254
facebook proxies 250
new proxy sites 250
unblock proxy 247
working proxies 233
school bypass proxy 226
free web proxies 217
free proxys 213
new proxy 212
proxy website 210
ph proxy 199
free proxy surfing 192
munchausen by proxy 192
unblocked proxy 185
proxy server list 183
ninja proxy 182
web proxys 178
myspace proxy sites 176
proxy servers list 176
bypass proxy server 175
k proxy 175
anonymous proxy server 164
free anonymous proxy server 162
php proxy 160
unblocked proxies 159
ebuddy proxy 155
new myspace proxies 155
online proxy 150
free online proxy 148
internet proxies 148
website proxy 148
dave proxy 146
free anonymous proxy sites 139
list of proxies 127
new myspace proxy 127
myspace proxy server 122
proxy web sites 122
siol tv http proxy 122
anonymous proxy list 120
my space proxy 116
american proxy 115
proxy avoidence 115
bebo proxies 113
website proxies 113
hidden proxies 111
web based proxy 111
free proxy server list 109
proxy blocker 109
proxy script 108
cgi proxy urls 104
open proxy list 104
free proxy site 102
proxy unblocker 102
zelune proxy list 102
zelune proxy templates 101

Friday, March 7, 2008

Using Tubekeep.com to Download Videos from Youtube

Why you should download videos from youtube:
Everyday, there are plenty of videos uploaded to Youtube. You found an interesting video from youtube and you want to save/download it to your computer and later share it with your friend or keep it as a collection. Unfortunely, by default Youtube doesn't allow users to save/download the videos. It only allow user to send a hyperlink to the friends and invite them to go to youtube website to view the videos.

Why not download the video before it's too late?
Some videos may be deleted by the youtube team. When you come back youtube later to watch your favorite videos, you may find some of the videos were gone.

Steps to download videos from youtube (For both IE7 and Firefox users):
1) Click your favorite video clip on youtube.com, you can see the URL in your browser becomes something like this: http://www.youtube.com/watch?v=ymLWW-VTK10
2) Highlight the URL and copy the URL.
3) Open a new browser tab and visit www.tubekeep.com.
4) At tubekeep.com, paste the video URL into the input box and click “Submit”.
5) When the download link shows, click the download image and save the video file to your local computer. You can rename the video file to a .flv file before of after the downloading.
6) You can use a free FLV player to watch the downloaded video file from your hard disk. Free FLV player download URL can be found at http://www.tubekeep.com/flv_player.php.

Convert the video to other formats:
There are many free FLV converters available. Some free FLV converters can convert FLV files to AVI/WMV/MPEG/3GP files. Search on google and download a free FLV converter. You can select the output video format and convert the downloaded video file to your format.

Disclaimer: All video clips are copyrighted by respective authors.

Wednesday, March 5, 2008

Popular MySpace Proxies

A MySpace proxy is any public Internet proxy server promoted by its owners as providing access to MySpace, bypassing an organization's network filters.

Some well-known proxies for MySpace that are more likely to be stable include:
Aplusproxy.com
Assban.com
Afastway.com
In addition, sites like btwproxy.com track new MySpace proxy servers as they become available, which can be helpful in maintaining your proxy lists.

Wednesday, February 27, 2008

Youtube Video Download Tool at BtwProxy.com

It's really easy to download your favorite videos from youtube - just using your Internet browser. No software and browser plugin is required.

1. Visit http://www.btwproxy.com/youtube.php
2. Enter the YouTube video URL in the text input box. e.g. http://www.youtube.com/watch?v=EBM854BTGL0
3. Click "Submit" and a download link will appear - click and save the video to your PC.
4. Once you have the file downloaded you need to rename it to a .flv file. e.g. from get_video to myvideo.flv.
5. Use a FREE FLV Player to watch the video.

Monday, February 18, 2008

Make your first movie from your pictures

This ia a basic tutorial of Windows Movie Maker. The video is made by Aplusproxy.com.

Movie Maker is Window's free video editing software, which comes installed on new PCs. It is installed on your computer as part of XP SP2. You can install it from Windows XP SP2 CD if it isn't installed by default.

To make a movie with Movie Maker 2.0, these are the basic steps:

1. Import your pics, videos, audios to Movie Maker.
2. Drag pics to video channel of the timeline, and audio files to the audio channel of timeline.
3. Preview your movie and save it on your computer.
4. Save your project. You can add effects to your clips after you know how to use windows movie maker.

Saturday, February 9, 2008

Tuesday, February 5, 2008

Btwproxy.com - another fresh proxy list site

http://www.btwproxy.com is a web proxy list site. Their proxy list is daily updated. If you're looking for a proxy to unblock myspace, facebook and bebo, try http://www.btwproxy.com.

Tuesday, January 8, 2008

Open your drugstore with Bponlinepharmacy affiliate program

Do you want to open your own drugstore online and make a good income?

Bponlinepharmacy affiliate program is the most flexible pharmacy program on the Internet offering you the flexibility you need to compete. Bponlinepharmacy offer you the ability to create coupons, set your own Rx prices, change the shipping charges and manage your own complex Affiliate (MLM) program.

They provide the infrastructure including credit card processing, the pharmacies & doctors, a dynamic order platform, 24x7 customer support with on call Affiliate Managers to help you sell.

Their basic model is simple, they give you the meds and shipping at wholesale, you mark them up, and make a sale, you keep 60% of the profit, they keep 40%.

Affiliate Commissions :

Tier 1 : 60% of the profits
Tier 2 : 5%
Tier 3 : 1%

Affiliates get weekly payouts by:
Epassporte
Bank Wire

You can link to their website or download a website template to open your online drugstore.

Join Bponlinepharmacy Now!