title
Using Web Proxy Servers

description

detail
{'title': 'Using Web Proxy Servers', 'heatmap': [{'end': 895.509, 'start': 867.628, 'weight': 0.919}, {'end': 1406.269, 'start': 1351.564, 'weight': 0.86}, {'end': 1525.574, 'start': 1474.899, 'weight': 1}, {'end': 1599.702, 'start': 1548.418, 'weight': 0.721}, {'end': 1869.648, 'start': 1839.005, 'weight': 0.926}], 'summary': "Covers the use of web proxy servers for hacking and evading law enforcement, bouncing web traffic to prevent tracking, maintaining anonymity using various ip addresses and web-based options, and the associated risks and limitations, cautioning against their usage due to potential security concerns and law enforcement's ability to trace individuals if motivated enough.", 'chapters': [{'end': 44.927, 'segs': [{'end': 44.927, 'src': 'embed', 'start': 5.606, 'weight': 0, 'content': [{'end': 10.59, 'text': "Hello again, as you know, I'm Eli the Computer Guy over here for EliTheComputerGuy.com and EverymanIT.com.", 'start': 5.606, 'duration': 4.984}, {'end': 13.632, 'text': "Today's class is Web Proxy Servers for Hacking.", 'start': 10.63, 'duration': 3.002}, {'end': 20.677, 'text': "So if you've seen any movies that involve hackers or any TV shows that involve hackers over the past 20 or 30 years,", 'start': 14.092, 'duration': 6.585}, {'end': 28.861, 'text': "they will almost always have some sequence where they're bouncing signals between different servers all over the world,", 'start': 20.677, 'duration': 8.184}, {'end': 31.502, 'text': 'trying to hide their tracks from law enforcement.', 'start': 28.861, 'duration': 2.641}, {'end': 34.963, 'text': "So you know, they're sitting in their house in like New York,", 'start': 31.522, 'duration': 3.441}, {'end': 41.826, 'text': 'and then they bounce a signal to Ukraine and then bounce that signal to Shanghai and then bounce that signal down to Johannesburg,', 'start': 34.963, 'duration': 6.863}, {'end': 42.906, 'text': 'and then they attack.', 'start': 41.826, 'duration': 1.08}, {'end': 44.927, 'text': "you know, whatever it is, they're trying to attack.", 'start': 42.906, 'duration': 2.021}], 'summary': 'Eli the computer guy discusses using web proxy servers for hacking to hide tracks and launch attacks worldwide.', 'duration': 39.321, 'max_score': 5.606, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/-0nl5eEbNk8/pics/-0nl5eEbNk85606.jpg'}], 'start': 5.606, 'title': 'Web proxy servers for hacking', 'summary': 'Discusses the use of web proxy servers for hacking, showcasing the technique of bouncing signals between servers globally to evade law enforcement, as depicted in movies and tv shows.', 'chapters': [{'end': 44.927, 'start': 5.606, 'title': 'Web proxy servers for hacking', 'summary': 'Discusses the use of web proxy servers for hacking, showcasing the technique of bouncing signals between servers globally to evade law enforcement, as depicted in movies and tv shows.', 'duration': 39.321, 'highlights': ['The use of web proxy servers for bouncing signals globally is highlighted, as it is a common technique in movies and TV shows depicting hackers evading law enforcement.', 'The scenario of bouncing signals between servers in New York, Ukraine, Shanghai, and Johannesburg is discussed, showcasing the global reach of this technique.']}], 'duration': 39.321, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/-0nl5eEbNk8/pics/-0nl5eEbNk85606.jpg', 'highlights': ['The scenario of bouncing signals between servers in New York, Ukraine, Shanghai, and Johannesburg is discussed, showcasing the global reach of this technique.', 'The use of web proxy servers for bouncing signals globally is highlighted, as it is a common technique in movies and TV shows depicting hackers evading law enforcement.']}, {'end': 375.8, 'segs': [{'end': 100.677, 'src': 'embed', 'start': 45.767, 'weight': 0, 'content': [{'end': 52.11, 'text': 'bouncing signals or bouncing doing that type of thing can be done in numerous different ways.', 'start': 45.767, 'duration': 6.343}, {'end': 56.332, 'text': 'one way that you can do that is by using proxy servers.', 'start': 52.11, 'duration': 4.222}, {'end': 63.275, 'text': 'so proxy servers allow you to bounce your web traffic between different servers.', 'start': 56.332, 'duration': 6.943}, {'end': 66.137, 'text': "so if you're trying to go out onto the internet,", 'start': 63.275, 'duration': 2.862}, {'end': 73.302, 'text': 'basically you can route your web traffic from your computer through another server and out to the internet.', 'start': 66.137, 'duration': 7.165}, {'end': 83.05, 'text': 'If somebody tries to track back and figure out where an attack is coming from they will hit that proxy server and they may not be able to get to you.', 'start': 73.722, 'duration': 9.328}, {'end': 88.314, 'text': 'So this class today is going to be talking about these proxy servers.', 'start': 83.45, 'duration': 4.864}, {'end': 94.136, 'text': "Now, when you're dealing with hacking, you can use web proxies for two reasons.", 'start': 88.354, 'duration': 5.782}, {'end': 96.516, 'text': 'one is just your general hacking.', 'start': 94.136, 'duration': 2.38}, {'end': 100.677, 'text': "so let's say you're trying to do like spam marketing.", 'start': 96.516, 'duration': 4.161}], 'summary': 'Using proxy servers to bounce web traffic, useful for hacking and spam marketing.', 'duration': 54.91, 'max_score': 45.767, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/-0nl5eEbNk8/pics/-0nl5eEbNk845767.jpg'}, {'end': 145.41, 'src': 'embed', 'start': 122.262, 'weight': 1, 'content': [{'end': 131.946, 'text': 'So the first reason you can use hacking and web proxies is basically to attack different computers or different systems from different parts of the world.', 'start': 122.262, 'duration': 9.684}, {'end': 145.41, 'text': "The other reason you can use web proxies is to bypass the security on your local area network if you're trying to get to websites that are blocked by your local administrator.", 'start': 132.586, 'duration': 12.824}], 'summary': 'Hacking and web proxies can be used to attack systems worldwide and bypass local network security.', 'duration': 23.148, 'max_score': 122.262, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/-0nl5eEbNk8/pics/-0nl5eEbNk8122262.jpg'}, {'end': 262.323, 'src': 'embed', 'start': 232.417, 'weight': 5, 'content': [{'end': 239.445, 'text': 'That proxy server would dial out to AOL or to MindSpring or to whatever internet service provider there was at the time.', 'start': 232.417, 'duration': 7.028}, {'end': 245.312, 'text': 'And that is a way that you could share your internet connection back in the day.', 'start': 239.866, 'duration': 5.446}, {'end': 248.894, 'text': 'So these did have a very useful purpose.', 'start': 245.372, 'duration': 3.522}, {'end': 252.636, 'text': 'Even now, you may hear of the SQUID proxy server.', 'start': 249.214, 'duration': 3.422}, {'end': 262.323, 'text': 'If you know what you are doing and once you get to a little bit more of an advanced level, proxy servers can be very, very useful for, like I say,', 'start': 253.137, 'duration': 9.186}], 'summary': 'Proxy servers allowed sharing internet connections, still useful today.', 'duration': 29.906, 'max_score': 232.417, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/-0nl5eEbNk8/pics/-0nl5eEbNk8232417.jpg'}, {'end': 352.113, 'src': 'embed', 'start': 325.572, 'weight': 4, 'content': [{'end': 329.236, 'text': "So today I'm going to be talking to you about web proxy servers.", 'start': 325.572, 'duration': 3.664}, {'end': 335.682, 'text': 'Web proxy servers are used to attack or to interact with websites.', 'start': 329.316, 'duration': 6.366}, {'end': 341.906, 'text': "So, if you're trying to leave spam comments, if you're trying to use anything that involves the World Wide Web,", 'start': 336.042, 'duration': 5.864}, {'end': 345.248, 'text': 'you would use proxy servers to bounce your signal.', 'start': 341.906, 'duration': 3.342}, {'end': 352.113, 'text': "If you're trying to do some different type of attack, you would use other systems and other methods.", 'start': 346.349, 'duration': 5.764}], 'summary': 'Web proxy servers are used for interacting with websites and performing malicious activities such as leaving spam comments. they are utilized to bounce signals and carry out various types of attacks.', 'duration': 26.541, 'max_score': 325.572, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/-0nl5eEbNk8/pics/-0nl5eEbNk8325572.jpg'}], 'start': 45.767, 'title': 'Proxy servers and web traffic', 'summary': 'Covers the use of proxy servers for bouncing web traffic to prevent tracking and conduct activities like spam marketing from multiple locations, as well as the role of web proxy servers in hacking, including bypassing local network security and attacking different systems, and their decline in usage among the general population.', 'chapters': [{'end': 121.921, 'start': 45.767, 'title': 'Proxy servers for bouncing web traffic', 'summary': 'Discusses using proxy servers to bounce web traffic, enabling routing through different servers to prevent tracking and to conduct activities like spam marketing from multiple locations.', 'duration': 76.154, 'highlights': ['Proxy servers allow routing web traffic through different servers, preventing tracking and enabling activities like spam marketing from multiple locations.', 'Using proxy servers can help in preventing tracking of attacks and can allow attacking the same website from numerous different computers all over the world.', 'Proxy servers are used in hacking for general purposes and for conducting activities like spam marketing and leaving comments on blogs.']}, {'end': 375.8, 'start': 122.262, 'title': 'Web proxy servers for hacking', 'summary': 'Discusses the reasons for using web proxies, including bypassing local network security and attacking different systems, and explains the role of web proxy servers in hacking and their decline in usage among the general population.', 'duration': 253.538, 'highlights': ['The role of web proxy servers in bypassing local network security and attacking different systems from different parts of the world, as well as their decline in usage among the general population.', 'The historical purpose of proxy servers in sharing internet connections in the days of Windows 95 and Windows 98 dial-up connections, and their current utility for higher level system admins.', 'The use of web proxy servers for bouncing internet signals through multiple computers to mask location and for interacting with websites and web applications in different types of attacks.']}], 'duration': 330.033, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/-0nl5eEbNk8/pics/-0nl5eEbNk845767.jpg', 'highlights': ['Proxy servers allow routing web traffic through different servers, preventing tracking and enabling activities like spam marketing from multiple locations.', 'The role of web proxy servers in bypassing local network security and attacking different systems from different parts of the world, as well as their decline in usage among the general population.', 'Using proxy servers can help in preventing tracking of attacks and can allow attacking the same website from numerous different computers all over the world.', 'The use of web proxy servers for bouncing internet signals through multiple computers to mask location and for interacting with websites and web applications in different types of attacks.', 'Proxy servers are used in hacking for general purposes and for conducting activities like spam marketing and leaving comments on blogs.', 'The historical purpose of proxy servers in sharing internet connections in the days of Windows 95 and Windows 98 dial-up connections, and their current utility for higher level system admins.']}, {'end': 989.079, 'segs': [{'end': 427.919, 'src': 'embed', 'start': 375.8, 'weight': 0, 'content': [{'end': 382.567, 'text': 'well, what you do is, in the world there are numerous proxy servers, so these are all over the world.', 'start': 375.8, 'duration': 6.767}, {'end': 384.129, 'text': "so this, let's say, this is the country.", 'start': 382.567, 'duration': 1.562}, {'end': 387.569, 'text': "I'm a horrible drawer.", 'start': 386.647, 'duration': 0.922}, {'end': 389.111, 'text': "But let's say this is the United States.", 'start': 387.669, 'duration': 1.442}, {'end': 392.457, 'text': 'So this is a proxy server up in New York.', 'start': 390.313, 'duration': 2.144}, {'end': 394.34, 'text': 'This is a proxy server in Chicago.', 'start': 392.537, 'duration': 1.803}, {'end': 401.369, 'text': "in Mexico City, let's say.", 'start': 399.406, 'duration': 1.963}, {'end': 403.031, 'text': 'So these are different proxy servers.', 'start': 401.389, 'duration': 1.642}, {'end': 410.4, 'text': "These proxy servers have different IP addresses, and as I'll show you in the demonstration, they use different port numbers.", 'start': 403.612, 'duration': 6.788}, {'end': 416.561, 'text': "So this proxy server up in New York, let's say it's 233.155.", 'start': 410.921, 'duration': 5.64}, {'end': 419.698, 'text': '66.4 is 105.78.', 'start': 416.561, 'duration': 3.137}, {'end': 421.568, 'text': '96.4 The one in Dallas is 186.34.', 'start': 419.698, 'duration': 1.87}, {'end': 423.999, 'text': "33.1 And the one in Mexico City is, I don't know, 92.78.", 'start': 421.568, 'duration': 2.431}, {'end': 427.919, 'text': '64.2 So these are the IP addresses of these individual proxy servers.', 'start': 423.999, 'duration': 3.92}], 'summary': 'Explanation of various proxy servers with different ip addresses and port numbers.', 'duration': 52.119, 'max_score': 375.8, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/-0nl5eEbNk8/pics/-0nl5eEbNk8375800.jpg'}, {'end': 617.198, 'src': 'embed', 'start': 568.458, 'weight': 2, 'content': [{'end': 571.939, 'text': 'But remember, we are talking about the computerized world.', 'start': 568.458, 'duration': 3.481}, {'end': 584.495, 'text': 'I saw one service that you could pay like $50 a month for that literally every second it would automatically change the proxy server in your computer.', 'start': 572.583, 'duration': 11.912}, {'end': 593.643, 'text': "So if you're out there doing a lot of weird spammy stuff, literally every second, it was changing the proxy server IP address.", 'start': 584.515, 'duration': 9.128}, {'end': 599.912, 'text': 'You bounce from here to here to here to here to somewhere else to somewhere else to somewhere else to somewhere else to somewhere else, et cetera.', 'start': 593.763, 'duration': 6.149}, {'end': 603.217, 'text': 'So this is what the proxy servers do.', 'start': 600.333, 'duration': 2.884}, {'end': 610.413, 'text': "Again, as I'll show you in the demonstration, people over, at whatever website or whatever web property you're attacking,", 'start': 603.718, 'duration': 6.695}, {'end': 617.198, 'text': 'when they look at the log files, they will see the proxy IP address and not yours.', 'start': 610.413, 'duration': 6.785}], 'summary': "Proxy service changes ip every second, masking user's activity for $50/month.", 'duration': 48.74, 'max_score': 568.458, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/-0nl5eEbNk8/pics/-0nl5eEbNk8568458.jpg'}, {'end': 673.818, 'src': 'embed', 'start': 644.457, 'weight': 5, 'content': [{'end': 645.759, 'text': 'You go to Proxify.com.', 'start': 644.457, 'duration': 1.302}, {'end': 649.741, 'text': 'you can then put in a website that you want to go to.', 'start': 646.277, 'duration': 3.464}, {'end': 658.571, 'text': 'When you go to that website, that website will then see the IP address information for Proxify.com and not for you.', 'start': 649.921, 'duration': 8.65}, {'end': 663.016, 'text': 'Again, this is a good way to do things anonymously.', 'start': 659.011, 'duration': 4.005}, {'end': 667.297, 'text': 'And also if you use a website like Proxify.com,', 'start': 663.736, 'duration': 3.561}, {'end': 673.818, 'text': 'that will then bypass a lot of the security that your local area network systems administrator has set up.', 'start': 667.297, 'duration': 6.521}], 'summary': 'Proxify.com allows anonymous browsing and bypasses local network security measures.', 'duration': 29.361, 'max_score': 644.457, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/-0nl5eEbNk8/pics/-0nl5eEbNk8644457.jpg'}, {'end': 766.966, 'src': 'embed', 'start': 744.527, 'weight': 7, 'content': [{'end': 755.292, 'text': 'if you decide to use proxy servers of any type is to remember your speed is going to slow down tremendously when you go to surf the web.', 'start': 744.527, 'duration': 10.765}, {'end': 761.674, 'text': 'The reason being is when you decide to go to a website now, normally when you decide to go to a website,', 'start': 755.832, 'duration': 5.842}, {'end': 766.966, 'text': 'your computer connects to the website and the information gets relayed back to you.', 'start': 761.674, 'duration': 5.292}], 'summary': 'Using proxy servers can significantly slow down web surfing speed.', 'duration': 22.439, 'max_score': 744.527, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/-0nl5eEbNk8/pics/-0nl5eEbNk8744527.jpg'}, {'end': 895.509, 'src': 'heatmap', 'start': 867.628, 'weight': 0.919, 'content': [{'end': 876.875, 'text': 'to figure out have to figure out what, what you would use it for.', 'start': 867.628, 'duration': 9.247}, {'end': 884.781, 'text': "so I've shown you this whole mess of an example the theory behind how web proxy servers work.", 'start': 876.875, 'duration': 7.906}, {'end': 895.509, 'text': "basically, all you're doing is you're bouncing your internet traffic through a different server on the internet to get to whatever website or web application.", 'start': 884.781, 'duration': 10.728}], 'summary': 'Explaining the theory of web proxy servers and their function in internet traffic, using a practical example.', 'duration': 27.881, 'max_score': 867.628, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/-0nl5eEbNk8/pics/-0nl5eEbNk8867628.jpg'}, {'end': 976.116, 'src': 'embed', 'start': 949.108, 'weight': 6, 'content': [{'end': 953.976, 'text': "I'm going to be showing you this today on Internet Explorer just because it is easier.", 'start': 949.108, 'duration': 4.868}, {'end': 963.128, 'text': 'The main thing to remember is whatever default settings you put into Internet Explorer will affect all of the other web browsers that are on your computer.', 'start': 954.502, 'duration': 8.626}, {'end': 971.513, 'text': 'So when you put in the proxy settings for Internet Explorer, that will affect Google Chrome, Firefox, Safari, etc.', 'start': 963.368, 'duration': 8.145}, {'end': 976.116, 'text': 'So when you put configurations into Internet Explorer, it affects everything else.', 'start': 971.553, 'duration': 4.563}], 'summary': 'Default settings in internet explorer affect all other web browsers on the computer.', 'duration': 27.008, 'max_score': 949.108, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/-0nl5eEbNk8/pics/-0nl5eEbNk8949108.jpg'}], 'start': 375.8, 'title': 'Proxy servers and anonymity', 'summary': 'Discusses the concept of proxy servers and their ip addresses, including examples like 233.155.66.4 and 105.78.96.4. it also explains using proxy servers for anonymity, covering configurations, web-based options like proxify.com, and the impact on internet speed, with reference to a $50/month service that changes ip addresses every second.', 'chapters': [{'end': 427.919, 'start': 375.8, 'title': 'Proxy servers and ip addresses', 'summary': 'Discusses the concept of proxy servers located worldwide with different ip addresses and port numbers, including examples of ip addresses such as 233.155.66.4 and 105.78.96.4.', 'duration': 52.119, 'highlights': ['Proxy servers are distributed globally with various IP addresses and port numbers.', 'Examples of IP addresses include 233.155.66.4 and 105.78.96.4.', 'The concept of proxy servers and their IP addresses is explained using a visual demonstration.', 'The narrator mentions proxy servers in New York, Chicago, and Mexico City.']}, {'end': 989.079, 'start': 427.959, 'title': 'Using proxy servers for anonymity', 'summary': 'Explains how to use proxy servers for anonymity, including changing proxy server configurations, using web-based proxy servers like proxify.com, and the impacts on internet speed, with an example of $50/month service that changes proxy server ip address every second.', 'duration': 561.12, 'highlights': ['The impact of using proxy servers on internet speed Using proxy servers can significantly slow down internet speed, as the communication goes through the proxy server to the website and back, potentially reducing the connection speed to about 56K.', 'Demonstration of changing proxy server configurations in Internet Explorer The chapter demonstrates changing proxy server configurations in Internet Explorer and explains that these settings will affect all web browsers on the computer.', 'Using web-based proxy servers like Proxify.com for anonymity Web-based proxy servers like Proxify.com can be used for anonymous browsing and bypassing security set up by the local area network systems administrator.', 'Example of a $50/month service that changes proxy server IP address every second An example of a service that costs $50 a month and changes the proxy server IP address every second, allowing for rapid switching between different proxy servers for anonymity.']}], 'duration': 613.279, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/-0nl5eEbNk8/pics/-0nl5eEbNk8375800.jpg', 'highlights': ['Proxy servers are distributed globally with various IP addresses and port numbers.', 'Examples of IP addresses include 233.155.66.4 and 105.78.96.4.', 'The concept of proxy servers and their IP addresses is explained using a visual demonstration.', 'The narrator mentions proxy servers in New York, Chicago, and Mexico City.', 'Example of a $50/month service that changes proxy server IP address every second', 'Using web-based proxy servers like Proxify.com for anonymity', 'Demonstration of changing proxy server configurations in Internet Explorer', 'The impact of using proxy servers on internet speed Using proxy servers can significantly slow down internet speed, as the communication goes through the proxy server to the website and back, potentially reducing the connection speed to about 56K.']}, {'end': 1736.429, 'segs': [{'end': 1046.192, 'src': 'embed', 'start': 989.259, 'weight': 1, 'content': [{'end': 993.882, 'text': "The first website that I'm going to go to is whatismyip.com.", 'start': 989.259, 'duration': 4.623}, {'end': 1003.589, 'text': 'Now whatismyip.com shows you your external IP address.', 'start': 998.666, 'duration': 4.923}, {'end': 1010.946, 'text': 'So this is the IP address of your cable or DSL modem, or your T1 line.', 'start': 1003.729, 'duration': 7.217}, {'end': 1014.548, 'text': 'This is the IP address to the outside world.', 'start': 1011.186, 'duration': 3.362}, {'end': 1018.63, 'text': 'So you may have a lot of computers on your internal network, your LAN.', 'start': 1014.888, 'duration': 3.742}, {'end': 1021.371, 'text': 'They will have whatever IP addresses they have.', 'start': 1018.83, 'duration': 2.541}, {'end': 1026.594, 'text': 'The only IP address that the outside world cares about, though, is this external IP address.', 'start': 1021.831, 'duration': 4.763}, {'end': 1028.885, 'text': 'So this shows you that my IP address currently is 98.233.', 'start': 1026.614, 'duration': 2.271}, {'end': 1031.175, 'text': '107.155 This is the IP address that the external world sees.', 'start': 1028.885, 'duration': 2.29}, {'end': 1046.192, 'text': "So if you're trying to do spammy stuff, where you're trying to leave, like spam comments, or if you get blocked on a website,", 'start': 1036.71, 'duration': 9.482}], 'summary': 'Visiting whatismyip.com reveals external ip address: 98.233.107.155.', 'duration': 56.933, 'max_score': 989.259, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/-0nl5eEbNk8/pics/-0nl5eEbNk8989259.jpg'}, {'end': 1097.402, 'src': 'embed', 'start': 1069.062, 'weight': 0, 'content': [{'end': 1080.768, 'text': 'what you should realize is that if the law enforcement gets this external IP address, they know what internet companies own particular IP addresses.', 'start': 1069.062, 'duration': 11.706}, {'end': 1083.62, 'text': 'So 98.233.', 'start': 1080.908, 'duration': 2.712}, {'end': 1084.911, 'text': '107.155 is owned by Comcast.', 'start': 1083.62, 'duration': 1.291}, {'end': 1088.233, 'text': 'So what they will do is they will get a search warrant.', 'start': 1085.411, 'duration': 2.822}, {'end': 1094.88, 'text': 'They will go to Comcast and they will say what address does this IP address belong to??', 'start': 1088.353, 'duration': 6.527}, {'end': 1097.402, 'text': "So they'll say we have this IP address.", 'start': 1094.94, 'duration': 2.462}], 'summary': 'Law enforcement can identify the owner of an ip address, such as 98.233.107.155, owned by comcast, by obtaining a search warrant to access the corresponding address.', 'duration': 28.34, 'max_score': 1069.062, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/-0nl5eEbNk8/pics/-0nl5eEbNk81069062.jpg'}, {'end': 1137.727, 'src': 'embed', 'start': 1113.496, 'weight': 3, 'content': [{'end': 1122.018, 'text': 'First, They have to get the IP address, then they go to the internet service provider, and then they bring in the cop cars and guns and dogs, etc.', 'start': 1113.496, 'duration': 8.522}, {'end': 1128.662, 'text': 'So if you can change this external IP address, it might make your life a little bit easier.', 'start': 1122.198, 'duration': 6.464}, {'end': 1131.504, 'text': 'It puts up a little bit of a smokescreen.', 'start': 1128.682, 'duration': 2.822}, {'end': 1137.727, 'text': 'Now the first thing that you can do to change this IP address is you can use a website called Proxify.com.', 'start': 1131.964, 'duration': 5.763}], 'summary': 'Changing the ip address using proxify.com can provide a smokescreen and make life easier.', 'duration': 24.231, 'max_score': 1113.496, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/-0nl5eEbNk8/pics/-0nl5eEbNk81113496.jpg'}, {'end': 1229.418, 'src': 'embed', 'start': 1196.623, 'weight': 5, 'content': [{'end': 1199.385, 'text': "So if somebody tries to come back and figure out what's happening,", 'start': 1196.623, 'duration': 2.762}, {'end': 1205.979, 'text': "that's something you can do to try to put up a smoke screen so they can't figure out what is going on.", 'start': 1200.771, 'duration': 5.208}, {'end': 1219.87, 'text': 'The other nice thing with Proxify.com is if your business or if your school blocks certain websites, you can get to those websites using Proxify.', 'start': 1206.58, 'duration': 13.29}, {'end': 1229.418, 'text': "So I've been paid to set up for companies to block access to Facebook and back when it was popular, Myspace.", 'start': 1220.751, 'duration': 8.667}], 'summary': 'Proxify.com enables bypassing website blocks, including for facebook and myspace.', 'duration': 32.795, 'max_score': 1196.623, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/-0nl5eEbNk8/pics/-0nl5eEbNk81196623.jpg'}, {'end': 1326.209, 'src': 'embed', 'start': 1299.591, 'weight': 4, 'content': [{'end': 1305.234, 'text': 'one of the nice parts with proxify is it has certain extra features you can use.', 'start': 1299.591, 'duration': 5.643}, {'end': 1311.316, 'text': 'so you can do no cookies, you can do no scripts, you can do no ads, no refer text only, etc.', 'start': 1305.234, 'duration': 6.082}, {'end': 1314.297, 'text': 'so if you want to block some information, you can use that.', 'start': 1311.316, 'duration': 2.981}, {'end': 1320.547, 'text': 'the other thing is, you can actually tell Proxify where you want to be seen as coming from.', 'start': 1314.297, 'duration': 6.25}, {'end': 1326.209, 'text': 'So Royal Oak, Michigan or Pinellas Park, Florida.', 'start': 1321.027, 'duration': 5.182}], 'summary': 'Proxify has extra features like no cookies, scripts, ads, and location customization.', 'duration': 26.618, 'max_score': 1299.591, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/-0nl5eEbNk8/pics/-0nl5eEbNk81299591.jpg'}, {'end': 1406.269, 'src': 'heatmap', 'start': 1351.564, 'weight': 0.86, 'content': [{'end': 1356.665, 'text': 'So this website right here is called IPLocationAddress.org.', 'start': 1351.564, 'duration': 5.101}, {'end': 1363.827, 'text': "So when you go to a website, there's a bunch of information that that website can pull from you to find out things about you.", 'start': 1356.946, 'duration': 6.881}, {'end': 1365.128, 'text': 'So IPLocationAddress.org.', 'start': 1364.247, 'duration': 0.881}, {'end': 1374.223, 'text': 'If we go down here, we can see that it says what my external IP address is, 98.233.', 'start': 1367.332, 'duration': 6.891}, {'end': 1378.474, 'text': '107.155 But also, if I scroll all the way down, it will give me a lot of other information.', 'start': 1374.223, 'duration': 4.251}, {'end': 1380.775, 'text': 'This is my external IP address again.', 'start': 1379.154, 'duration': 1.621}, {'end': 1382.935, 'text': 'This is my internal IP address again.', 'start': 1381.095, 'duration': 1.84}, {'end': 1384.856, 'text': 'This is my host name.', 'start': 1383.635, 'duration': 1.221}, {'end': 1387.636, 'text': "So it says that I'm with Comcast.net.", 'start': 1385.016, 'duration': 2.62}, {'end': 1389.897, 'text': "It says that I'm from the United States.", 'start': 1388.276, 'duration': 1.621}, {'end': 1391.577, 'text': "It says that I'm from Owings Mills.", 'start': 1389.977, 'duration': 1.6}, {'end': 1394.425, 'text': 'It says my language is English.', 'start': 1392.784, 'duration': 1.641}, {'end': 1397.786, 'text': 'It says I use Windows 7, and it says I use Internet Explorer.', 'start': 1394.505, 'duration': 3.281}, {'end': 1402.348, 'text': 'So look at all this information that is simply given out.', 'start': 1398.166, 'duration': 4.182}, {'end': 1406.269, 'text': 'Whenever you go to any website, all this information is just given out for free.', 'start': 1402.388, 'duration': 3.881}], 'summary': "Iplocationaddress.org reveals user's ip, location, language, and device details.", 'duration': 54.705, 'max_score': 1351.564, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/-0nl5eEbNk8/pics/-0nl5eEbNk81351564.jpg'}, {'end': 1525.574, 'src': 'heatmap', 'start': 1474.899, 'weight': 1, 'content': [{'end': 1479.546, 'text': 'So basically you go to proxify.com and then you open up whatever website you want to go to.', 'start': 1474.899, 'duration': 4.647}, {'end': 1488.099, 'text': 'Now, if you want your web browser and your system to default to use a different proxy setting,', 'start': 1480.627, 'duration': 7.472}, {'end': 1492.102, 'text': 'you can actually set that so it automatically uses the proxy server.', 'start': 1488.099, 'duration': 4.003}, {'end': 1498.248, 'text': 'So if you go to a site like this site, st-proxyswitcher.com,', 'start': 1492.322, 'duration': 5.926}, {'end': 1504.753, 'text': 'you can get a list of proxy servers that are out in the world that you can use most of the time for free.', 'start': 1498.248, 'duration': 6.505}, {'end': 1514.806, 'text': "So it will give you the IP address of the proxy server, the port that you need to use, the type, the country it's located in, the speed, etc.", 'start': 1505.334, 'duration': 9.472}, {'end': 1518.208, 'text': 'So all this information is out there for you for free.', 'start': 1514.846, 'duration': 3.362}, {'end': 1525.574, 'text': 'Now why do people allow you to use your proxy servers for free? Probably not for good reasons.', 'start': 1519.089, 'duration': 6.485}], 'summary': 'Use proxify.com to access websites and st-proxyswitcher.com for free proxy servers with ip, port, type, country, and speed details.', 'duration': 50.675, 'max_score': 1474.899, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/-0nl5eEbNk8/pics/-0nl5eEbNk81474899.jpg'}, {'end': 1578.699, 'src': 'embed', 'start': 1548.418, 'weight': 6, 'content': [{'end': 1551.739, 'text': "The tools that you're using are most likely created by hackers.", 'start': 1548.418, 'duration': 3.321}, {'end': 1555.16, 'text': "Hackers don't have any problem with hacking other hackers.", 'start': 1552.559, 'duration': 2.601}, {'end': 1556.66, 'text': 'See how this works?', 'start': 1556.02, 'duration': 0.64}, {'end': 1563.394, 'text': "So if you're going to be using these proxy servers, remember Any information that you're sending could in fact be logged in,", 'start': 1556.78, 'duration': 6.614}, {'end': 1564.875, 'text': 'you know could be used against you.', 'start': 1563.394, 'duration': 1.481}, {'end': 1570.817, 'text': 'So what we can do is we can go down and we can figure out what proxy server here we want to use.', 'start': 1565.415, 'duration': 5.402}, {'end': 1578.699, 'text': "Once we've decided what proxy server we want to use, we then go up to Tools, Internet Options.", 'start': 1571.277, 'duration': 7.422}], 'summary': 'Using proxy servers created by hackers may expose you to potential risks and logging of your data.', 'duration': 30.281, 'max_score': 1548.418, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/-0nl5eEbNk8/pics/-0nl5eEbNk81548418.jpg'}, {'end': 1599.702, 'src': 'heatmap', 'start': 1548.418, 'weight': 0.721, 'content': [{'end': 1551.739, 'text': "The tools that you're using are most likely created by hackers.", 'start': 1548.418, 'duration': 3.321}, {'end': 1555.16, 'text': "Hackers don't have any problem with hacking other hackers.", 'start': 1552.559, 'duration': 2.601}, {'end': 1556.66, 'text': 'See how this works?', 'start': 1556.02, 'duration': 0.64}, {'end': 1563.394, 'text': "So if you're going to be using these proxy servers, remember Any information that you're sending could in fact be logged in,", 'start': 1556.78, 'duration': 6.614}, {'end': 1564.875, 'text': 'you know could be used against you.', 'start': 1563.394, 'duration': 1.481}, {'end': 1570.817, 'text': 'So what we can do is we can go down and we can figure out what proxy server here we want to use.', 'start': 1565.415, 'duration': 5.402}, {'end': 1578.699, 'text': "Once we've decided what proxy server we want to use, we then go up to Tools, Internet Options.", 'start': 1571.277, 'duration': 7.422}, {'end': 1583.541, 'text': 'We then go to Connections, and then we go down to LAN Settings.', 'start': 1579.74, 'duration': 3.801}, {'end': 1586.842, 'text': 'This is where you find your proxy server information.', 'start': 1583.721, 'duration': 3.121}, {'end': 1589.579, 'text': 'Now in this box here, you see proxy server.', 'start': 1587.438, 'duration': 2.141}, {'end': 1594.42, 'text': "So I'll check the box and it says use a proxy server for your LAN.", 'start': 1589.959, 'duration': 4.461}, {'end': 1599.702, 'text': 'So in here, I plugged in the proxy server IP address that I want to use.', 'start': 1595.321, 'duration': 4.381}], 'summary': 'Using proxy servers created by hackers poses security risks. information sent can be logged and used against you.', 'duration': 51.284, 'max_score': 1548.418, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/-0nl5eEbNk8/pics/-0nl5eEbNk81548418.jpg'}], 'start': 989.259, 'title': 'External ip address and proxify.com', 'summary': 'Explains the significance of external ip addresses in identifying individuals, with an example of 98.233.107.155, and discusses using proxify.com as a web-based proxy server to change ip addresses, bypass website blocks, and the potential risks and limitations of using proxy servers.', 'chapters': [{'end': 1113.095, 'start': 989.259, 'title': 'Understanding external ip address', 'summary': 'Explains the significance of an external ip address, highlighting its use in identifying individuals engaging in spam or illegal activities, and how law enforcement can track down individuals based on their external ip address, with an example of 98.233.107.155 owned by comcast.', 'duration': 123.836, 'highlights': ['The external IP address, such as 98.233.107.155, is the key identifier used by the external world and law enforcement to track individuals engaging in spam or illegal activities.', 'Law enforcement can obtain the address and subscriber details from the internet company, such as Comcast, when provided with a search warrant, enabling them to track down individuals based on their external IP address.', 'The external IP address is the IP address of the cable or DSL modem, or T1 line, and is crucial in determining the source of any spam or illegal activities.']}, {'end': 1736.429, 'start': 1113.496, 'title': 'Using proxify.com for changing ip address', 'summary': 'Discusses using proxify.com as a web-based proxy server to change ip addresses, providing a smokescreen to hide real ip addresses, bypassing website blocks, and the potential risks and limitations of using proxy servers.', 'duration': 622.933, 'highlights': ["Proxify.com can change external IP address to provide a smokescreen Proxify.com allows changing the external IP address, providing a smokescreen to hide real IP addresses, potentially making it difficult for someone to track the user's activities.", 'Proxify.com can bypass website blocks Proxify.com enables users to bypass website blocks set up by businesses or schools, allowing access to blocked websites such as social networking sites like Facebook and MySpace.', 'Proxify.com provides additional features like no cookies, no scripts, and changing location Proxify.com offers features like blocking cookies and scripts, allowing users to change the location from which they appear to be browsing, potentially enhancing anonymity and privacy.', 'Using free proxy servers poses risks of being set up by hackers Using free proxy servers may pose risks as they could be set up by hackers, potentially leading to the logging of sensitive information and being used against the user.', 'Changing IP address using proxy server can affect internet traffic speed Changing the IP address using a proxy server can impact internet traffic speed as the request goes through the proxy server to the internet, then returns to the user, potentially causing delays.']}], 'duration': 747.17, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/-0nl5eEbNk8/pics/-0nl5eEbNk8989259.jpg', 'highlights': ['Law enforcement can obtain the address and subscriber details from the internet company, such as Comcast, when provided with a search warrant, enabling them to track down individuals based on their external IP address.', 'The external IP address, such as 98.233.107.155, is the key identifier used by the external world and law enforcement to track individuals engaging in spam or illegal activities.', 'The external IP address is the IP address of the cable or DSL modem, or T1 line, and is crucial in determining the source of any spam or illegal activities.', "Proxify.com can change external IP address to provide a smokescreen Proxify.com allows changing the external IP address, providing a smokescreen to hide real IP addresses, potentially making it difficult for someone to track the user's activities.", 'Proxify.com provides additional features like no cookies, no scripts, and changing location Proxify.com offers features like blocking cookies and scripts, allowing users to change the location from which they appear to be browsing, potentially enhancing anonymity and privacy.', 'Proxify.com can bypass website blocks Proxify.com enables users to bypass website blocks set up by businesses or schools, allowing access to blocked websites such as social networking sites like Facebook and MySpace.', 'Using free proxy servers poses risks of being set up by hackers Using free proxy servers may pose risks as they could be set up by hackers, potentially leading to the logging of sensitive information and being used against the user.', 'Changing IP address using proxy server can affect internet traffic speed Changing the IP address using a proxy server can impact internet traffic speed as the request goes through the proxy server to the internet, then returns to the user, potentially causing delays.']}, {'end': 2065.655, 'segs': [{'end': 1905.593, 'src': 'heatmap', 'start': 1839.005, 'weight': 0, 'content': [{'end': 1842.287, 'text': 'Hackers will steal information from anybody, including other hackers.', 'start': 1839.005, 'duration': 3.282}, {'end': 1844.288, 'text': 'So just be careful when using this.', 'start': 1842.327, 'duration': 1.961}, {'end': 1848.73, 'text': 'But this is really all there is to using these web proxies.', 'start': 1844.328, 'duration': 4.402}, {'end': 1852.212, 'text': "So with that, let's go back out to the real world and have some final thoughts.", 'start': 1848.77, 'duration': 3.442}, {'end': 1862.8, 'text': "So that's all there is for web proxy servers for hacking.", 'start': 1858.615, 'duration': 4.185}, {'end': 1869.648, 'text': "Essentially, all you're using these web proxy servers for is to disguise who you are.", 'start': 1863.281, 'duration': 6.367}, {'end': 1871.59, 'text': "So you're sitting in your house,", 'start': 1870.069, 'duration': 1.521}, {'end': 1878.758, 'text': "you're sitting wherever you are And then you can connect to these different websites through different servers on the internet.", 'start': 1871.59, 'duration': 7.168}, {'end': 1885.94, 'text': "The end website then thinks you're coming from that server you've connected to and not from your house.", 'start': 1879.138, 'duration': 6.802}, {'end': 1893.342, 'text': "Now there's some very serious things I'm going to say, I'm going to warn you about when you do this.", 'start': 1886.38, 'duration': 6.962}, {'end': 1905.593, 'text': "Now, the first thing that you have to remember whenever it comes to hacking and whenever it comes to security is if The person you're attacking has unlimited resources.", 'start': 1893.542, 'duration': 12.051}], 'summary': 'Using web proxies for hacking disguises your identity, but be cautious of risks and resources.', 'duration': 79.929, 'max_score': 1839.005, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/-0nl5eEbNk8/pics/-0nl5eEbNk81839005.jpg'}, {'end': 1978.158, 'src': 'embed', 'start': 1953.7, 'weight': 3, 'content': [{'end': 1960.125, 'text': "Well, if you're going against law enforcement, then remember law enforcement has things like warrants,", 'start': 1953.7, 'duration': 6.425}, {'end': 1964.928, 'text': 'so they can go to companies and force them to give them information.', 'start': 1960.125, 'duration': 4.803}, {'end': 1970.833, 'text': "So let's say you're coming through this proxy server right here and this is being run by a semi-legitimate company.", 'start': 1965.449, 'duration': 5.384}, {'end': 1975.857, 'text': "Well, CNET knows they've been hacked and they know the attack came from this proxy server.", 'start': 1971.493, 'duration': 4.364}, {'end': 1978.158, 'text': 'They can go to the police.', 'start': 1976.597, 'duration': 1.561}], 'summary': 'Law enforcement can obtain information from companies with warrants, even from semi-legitimate entities such as proxy servers.', 'duration': 24.458, 'max_score': 1953.7, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/-0nl5eEbNk8/pics/-0nl5eEbNk81953700.jpg'}, {'end': 2022.852, 'src': 'embed', 'start': 1999.321, 'weight': 4, 'content': [{'end': 2009.829, 'text': 'Now, if you really really get all black hat and stuff, you can bounce these signals through all kinds of botnets and God knows what,', 'start': 1999.321, 'duration': 10.508}, {'end': 2011.831, 'text': "and then the police won't be able to find you.", 'start': 2009.829, 'duration': 2.002}, {'end': 2022.852, 'text': 'But if you really irritate the NSA or the CIA or the cyber ninjas, they can still track you down because the information is still out there.', 'start': 2012.827, 'duration': 10.025}], 'summary': 'Bouncing signals through botnets can evade police, but nsa, cia, and cyber ninjas can still track you.', 'duration': 23.531, 'max_score': 1999.321, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/-0nl5eEbNk8/pics/-0nl5eEbNk81999321.jpg'}], 'start': 1736.469, 'title': 'Risks of web proxy servers', 'summary': "Explains the functionality of web proxy servers, including how they can disguise a user's location and the potential security risks associated with their usage, cautioning against using web proxies due to potential security concerns raised by hackers. it also discusses the process of anonymizing internet traffic, the associated security risks, and the limitations of cyber anonymity, highlighting the potential for tracking and the ability of law enforcement to trace individuals using proxy servers if motivated enough.", 'chapters': [{'end': 1878.758, 'start': 1736.469, 'title': 'Understanding web proxy servers', 'summary': "Explains the functionality of web proxy servers, including how they can disguise a user's location by bouncing through multiple servers, and the potential risks associated with their usage, cautioning against using web proxies due to security concerns raised by hackers.", 'duration': 142.289, 'highlights': ["Web proxy servers can disguise a user's location by bouncing through multiple servers, making it appear as if the user is accessing the internet from a different location. The chapter emphasizes how web proxy servers can manipulate a user's perceived location, providing the example of appearing to access the internet from the Philippines when actually located elsewhere.", 'The potential risks associated with using web proxies are highlighted, cautioning users against utilizing them due to security concerns raised by hackers. The transcript warns users about the security risks posed by web proxies, advising caution due to the likelihood of systems being set up by hackers to steal information.', 'Explanation of web-based proxies, highlighting that users essentially visit a website and enter the desired web address, bypassing local area network security measures. The chapter explains the functionality of web-based proxies, detailing how users can bypass local area network security measures by entering the desired web address on a website, thus accessing it within a frame.']}, {'end': 1952.323, 'start': 1879.138, 'title': 'Anonymizing internet traffic and security risks', 'summary': 'Discusses the process of anonymizing internet traffic and the associated security risks, highlighting the potential for tracking and the cost involved in going through internet logs.', 'duration': 73.185, 'highlights': ['Anonymizing internet traffic involves connecting to a server that makes the end website think the user is coming from that server and not their actual location.', 'When attempting to hack or attack a website, it is crucial to consider the resources available to the target, as unlimited resources can lead to tracking and identification of the attacker.', 'All activities on the internet are logged, making it expensive to go through the logs to identify specific events or actions.', 'Websites can obtain basic information such as IP address, location, and hostname when a user connects to them, and this information is typically logged and stored, requiring financial resources to manage.']}, {'end': 2065.655, 'start': 1953.7, 'title': 'Risks of cyber anonymity', 'summary': 'Discusses the limitations of cyber anonymity, including the ability of law enforcement to track down individuals using proxy servers and the consequences of provoking organizations like the nsa and cia, highlighting that while it is possible to hide using sophisticated methods, authorities can still trace individuals if motivated enough.', 'duration': 111.955, 'highlights': ['Law enforcement can use warrants to force companies to provide information, enabling them to physically seize and dissect proxy servers to track down individuals.', 'Sophisticated methods like bouncing signals through botnets can make it difficult for police to track individuals, but organizations like the NSA and CIA can still trace them if motivated enough.', "Provoking organizations like the NSA and CIA can lead to consequences, as seen with the arrest of individuals associated with the group 'Anonymous', highlighting the potential repercussions of antagonizing powerful entities."]}], 'duration': 329.186, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/-0nl5eEbNk8/pics/-0nl5eEbNk81736469.jpg', 'highlights': ["Web proxy servers can disguise a user's location by bouncing through multiple servers, making it appear as if the user is accessing the internet from a different location.", 'The potential risks associated with using web proxies are highlighted, cautioning users against utilizing them due to security concerns raised by hackers.', 'Anonymizing internet traffic involves connecting to a server that makes the end website think the user is coming from that server and not their actual location.', 'Law enforcement can use warrants to force companies to provide information, enabling them to physically seize and dissect proxy servers to track down individuals.', 'Sophisticated methods like bouncing signals through botnets can make it difficult for police to track individuals, but organizations like the NSA and CIA can still trace them if motivated enough.']}, {'end': 2413.219, 'segs': [{'end': 2095.851, 'src': 'embed', 'start': 2066.034, 'weight': 0, 'content': [{'end': 2071.597, 'text': "So normal people, normal website administrators, they'll get stumped on these proxy servers and they'll stop.", 'start': 2066.034, 'duration': 5.563}, {'end': 2079.06, 'text': "If you go after real law enforcement or real law enforcement really gets involved, they'll always be able to come back to the origin.", 'start': 2072.317, 'duration': 6.743}, {'end': 2081.521, 'text': "They'll be able to figure out where you were attacking from.", 'start': 2079.1, 'duration': 2.421}, {'end': 2095.851, 'text': "use all these proxy settings and all that and then go to their local cafe or, more importantly or more aptly, they'll go to the local cafe.", 'start': 2085.149, 'duration': 10.702}], 'summary': 'Proxy servers can stump normal users, but law enforcement can trace attacks back to the origin.', 'duration': 29.817, 'max_score': 2066.034, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/-0nl5eEbNk8/pics/-0nl5eEbNk82066034.jpg'}, {'end': 2178.935, 'src': 'embed', 'start': 2106.714, 'weight': 1, 'content': [{'end': 2115.187, 'text': "the reason is is because if they're in this cafe and If their house is here, they drive to the cafe in the cafe.", 'start': 2106.714, 'duration': 8.473}, {'end': 2117.13, 'text': 'they then use a proxy server to attack.', 'start': 2115.187, 'duration': 1.943}, {'end': 2123.76, 'text': 'Well, then they go back to the proxy server, then they can figure out that it happened at the cafe.', 'start': 2117.691, 'duration': 6.069}, {'end': 2125.903, 'text': "but then you don't live at the cafe.", 'start': 2123.76, 'duration': 2.143}, {'end': 2126.765, 'text': 'you drove to the cafe.', 'start': 2125.903, 'duration': 0.862}, {'end': 2132.285, 'text': "And since you paid with cash because cash can't be tracked, well then you leave the cafe and go home,", 'start': 2127.403, 'duration': 4.882}, {'end': 2135.226, 'text': "and it's less likely that somebody will be able to track you down.", 'start': 2132.285, 'duration': 2.941}, {'end': 2140.009, 'text': 'But the big thing with this is remember, at the end of the day,', 'start': 2135.607, 'duration': 4.402}, {'end': 2147.372, 'text': 'somebody these little cyber ninjas out there will be able to track back to where the attack began from.', 'start': 2140.009, 'duration': 7.363}, {'end': 2152.154, 'text': 'The other thing I will warn you is this whole theory of honor among thieves.', 'start': 2147.932, 'duration': 4.222}, {'end': 2159.607, 'text': "Yeah, hackers don't really have that.", 'start': 2157.586, 'duration': 2.021}, {'end': 2163.028, 'text': 'Hackers are a very Darwinian lot.', 'start': 2160.487, 'duration': 2.541}, {'end': 2165.889, 'text': 'Like it or leave it.', 'start': 2165.029, 'duration': 0.86}, {'end': 2170.251, 'text': "Basically, if you're weak, you should get hacked type of thing.", 'start': 2166.85, 'duration': 3.401}, {'end': 2178.935, 'text': 'So if you decide to use these proxy servers, remember, these proxy servers may be set up and run by hackers.', 'start': 2170.691, 'duration': 8.244}], 'summary': 'Using proxy servers and cash payment can make it harder to track cyber attacks, but hackers may exploit these methods.', 'duration': 72.221, 'max_score': 2106.714, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/-0nl5eEbNk8/pics/-0nl5eEbNk82106714.jpg'}, {'end': 2249.258, 'src': 'embed', 'start': 2218.754, 'weight': 5, 'content': [{'end': 2221.517, 'text': "So be very careful when you're using these proxy servers.", 'start': 2218.754, 'duration': 2.763}, {'end': 2223.7, 'text': 'A lot of these proxy servers are set up by hackers.', 'start': 2221.537, 'duration': 2.163}, {'end': 2232.788, 'text': 'and and like it or not, if you end up sending valuable information over the internet connection, well,', 'start': 2224.618, 'duration': 8.17}, {'end': 2235.791, 'text': 'you just may get beat by other bit very big stick.', 'start': 2232.788, 'duration': 3.003}, {'end': 2243.52, 'text': 'the other thing that i will warn you with these proxy servers is again remember, i come from a bit of the security military blah, blah, blah world.', 'start': 2235.791, 'duration': 7.729}, {'end': 2249.258, 'text': 'Now I know if it was me, and I know right now, in 2012,,', 'start': 2244.113, 'duration': 5.145}], 'summary': 'Warning against using proxy servers set up by hackers for sending valuable information over the internet.', 'duration': 30.504, 'max_score': 2218.754, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/-0nl5eEbNk8/pics/-0nl5eEbNk82218754.jpg'}, {'end': 2358.19, 'src': 'embed', 'start': 2331.287, 'weight': 3, 'content': [{'end': 2334.528, 'text': 'Remember, hackers are Darwinian critters.', 'start': 2331.287, 'duration': 3.241}, {'end': 2344.011, 'text': 'So if you connect to one of these proxy servers remember any communication through that proxy server can be logged most likely is logged,', 'start': 2334.908, 'duration': 9.103}, {'end': 2348.292, 'text': "whether it's being logged by hackers or it's being logged by law enforcement.", 'start': 2344.011, 'duration': 4.281}, {'end': 2354.934, 'text': 'Who knows? But be very, very careful with that.', 'start': 2349.472, 'duration': 5.462}, {'end': 2358.19, 'text': 'So this is Web Proxy Servers for Hacking.', 'start': 2355.327, 'duration': 2.863}], 'summary': 'Connecting to proxy servers can result in logged communication, posing potential risks.', 'duration': 26.903, 'max_score': 2331.287, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/-0nl5eEbNk8/pics/-0nl5eEbNk82331287.jpg'}], 'start': 2066.034, 'title': 'Risks and tracking of proxy server attacks', 'summary': "Delves into the risks of proxy server usage, highlighting the potential for cyber attacks and law enforcement's ability to track attackers, while also cautioning about the lack of security and the hypothetical scenario of mass arrests using proxy servers.", 'chapters': [{'end': 2147.372, 'start': 2066.034, 'title': 'Proxy server attack and law enforcement tracking', 'summary': 'Discusses how proxy servers can be used to launch cyber attacks, but law enforcement can still track the origin of the attack, even if the attacker uses proxy settings and pays with cash in a remote location.', 'duration': 81.338, 'highlights': ["Law enforcement can trace the origin of cyber attacks even if proxy servers are used, potentially leading to the attacker's location (Relevance: 5)", 'Using a proxy server from a remote location like a cafe two states away can still be traceable to the physical location of the attacker (Relevance: 4)', 'Paying with cash at a remote location can make it less likely for someone to be tracked down, but the attack origin can still be traced (Relevance: 3)']}, {'end': 2413.219, 'start': 2147.932, 'title': 'Proxy server security warning', 'summary': 'Warns about the risks of using proxy servers, emphasizing the lack of honor among hackers and the potential for logging sensitive information, along with a hypothetical scenario of law enforcement using proxy servers to arrest thousands of individuals.', 'duration': 265.287, 'highlights': ['Hackers lack honor and are willing to exploit weaknesses, leading to potential hacking of sensitive information (e.g., Gmail accounts) through proxy servers.', 'The warning includes a hypothetical scenario of law enforcement using high-speed proxy servers to log communications and arrest individuals, highlighting the potential risks of using proxy servers.', 'Emphasizes the need for caution when using proxy servers, as they may be controlled by hackers or law enforcement and can log communications, making users vulnerable to hacking or surveillance.', "Advises users to be wary of using proxy servers, as any communication through them can be logged, whether by hackers or law enforcement, posing a significant risk to users' security and privacy.", 'The chapter stresses the real-world risks of using proxy servers, cautioning users about the potential dangers of routing their traffic through other systems and the implications of being vulnerable to exploitation.']}], 'duration': 347.185, 'thumbnail': 'https://coursnap.oss-ap-southeast-1.aliyuncs.com/video-capture/-0nl5eEbNk8/pics/-0nl5eEbNk82066034.jpg', 'highlights': ["Law enforcement can trace the origin of cyber attacks even if proxy servers are used, potentially leading to the attacker's location (Relevance: 5)", 'Using a proxy server from a remote location like a cafe two states away can still be traceable to the physical location of the attacker (Relevance: 4)', 'Paying with cash at a remote location can make it less likely for someone to be tracked down, but the attack origin can still be traced (Relevance: 3)', 'The warning includes a hypothetical scenario of law enforcement using high-speed proxy servers to log communications and arrest individuals, highlighting the potential risks of using proxy servers.', "Advises users to be wary of using proxy servers, as any communication through them can be logged, whether by hackers or law enforcement, posing a significant risk to users' security and privacy.", 'The chapter stresses the real-world risks of using proxy servers, cautioning users about the potential dangers of routing their traffic through other systems and the implications of being vulnerable to exploitation.', 'Hackers lack honor and are willing to exploit weaknesses, leading to potential hacking of sensitive information (e.g., Gmail accounts) through proxy servers.', 'Emphasizes the need for caution when using proxy servers, as they may be controlled by hackers or law enforcement and can log communications, making users vulnerable to hacking or surveillance.']}], 'highlights': ["Law enforcement can trace the origin of cyber attacks even if proxy servers are used, potentially leading to the attacker's location (Relevance: 5)", 'Using a proxy server from a remote location like a cafe two states away can still be traceable to the physical location of the attacker (Relevance: 4)', 'Paying with cash at a remote location can make it less likely for someone to be tracked down, but the attack origin can still be traced (Relevance: 3)', 'The scenario of bouncing signals between servers in New York, Ukraine, Shanghai, and Johannesburg is discussed, showcasing the global reach of this technique.', 'Proxy servers allow routing web traffic through different servers, preventing tracking and enabling activities like spam marketing from multiple locations.', "Web proxy servers can disguise a user's location by bouncing through multiple servers, making it appear as if the user is accessing the internet from a different location.", 'The use of web proxy servers for bouncing signals globally is highlighted, as it is a common technique in movies and TV shows depicting hackers evading law enforcement.', 'Anonymizing internet traffic involves connecting to a server that makes the end website think the user is coming from that server and not their actual location.', 'The potential risks associated with using web proxies are highlighted, cautioning users against utilizing them due to security concerns raised by hackers.']}