<s>
A	O
proxy	B-Application
list	I-Application
is	O
a	O
list	O
of	O
open	B-Protocol
HTTP/HTTPS/SOCKS	O
proxy	O
servers	B-Application
all	O
on	O
one	O
website	O
.	O
</s>
<s>
Proxies	O
allow	O
users	O
to	O
make	O
indirect	O
network	O
connections	O
to	O
other	O
computer	B-Architecture
network	I-Architecture
services	O
.	O
</s>
<s>
Proxy	B-Application
lists	I-Application
include	O
the	O
IP	B-Protocol
addresses	I-Protocol
of	O
computers	O
hosting	O
open	B-Protocol
proxy	I-Protocol
servers	I-Protocol
,	O
meaning	O
that	O
these	O
proxy	B-Application
servers	I-Application
are	O
available	O
to	O
anyone	O
on	O
the	O
internet	O
.	O
</s>
<s>
Proxy	B-Application
lists	I-Application
are	O
often	O
organized	O
by	O
the	O
various	O
proxy	O
protocols	O
the	O
servers	B-Application
use	O
.	O
</s>
<s>
Many	O
proxy	B-Application
lists	I-Application
index	O
Web	O
proxies	O
,	O
which	O
can	O
be	O
used	O
without	O
changing	O
browser	O
settings	O
.	O
</s>
<s>
Elite	O
proxies	O
-	O
Such	O
proxies	O
do	O
not	O
change	O
request	O
fields	O
and	O
look	O
like	O
a	O
real	O
browser	O
,	O
and	O
your	O
real	O
IP	B-Protocol
address	I-Protocol
is	O
hidden	O
.	O
</s>
<s>
Anonymous	O
proxies	O
-	O
These	O
proxies	O
do	O
not	O
show	O
a	O
real	O
IP	B-Protocol
address	I-Protocol
,	O
however	O
,	O
they	O
do	O
change	O
the	O
request	O
fields	O
,	O
therefore	O
it	O
is	O
very	O
easy	O
to	O
detect	O
that	O
a	O
proxy	O
is	O
being	O
used	O
by	O
log	O
analysis	O
.	O
</s>
<s>
Transparent	O
proxies	O
-	O
(	O
not	O
anonymous	O
,	O
simply	O
HTTP	B-Protocol
)	O
-	O
These	O
change	O
the	O
request	O
fields	O
and	O
they	O
transfer	O
the	O
real	O
IP	O
.	O
</s>
<s>
SOCKS	B-Application
is	O
a	O
protocol	O
that	O
relays	O
TCP	O
sessions	O
through	O
a	O
firewall	O
host	O
to	O
allow	O
application	O
users	O
transparent	O
access	O
across	O
the	O
firewall	O
.	O
</s>
<s>
Since	O
SOCKS	B-Application
never	O
has	O
to	O
know	O
anything	O
about	O
the	O
application	O
protocol	O
,	O
it	O
should	O
also	O
be	O
easy	O
for	O
it	O
to	O
accommodate	O
applications	O
that	O
use	O
encryption	O
to	O
protect	O
their	O
traffic	O
from	O
nosy	O
snoopers	O
.	O
</s>
<s>
No	O
information	O
about	O
the	O
client	O
is	O
sent	O
to	O
the	O
server	O
–	O
thus	O
there	O
is	O
no	O
need	O
to	O
test	O
the	O
anonymity	O
level	O
of	O
the	O
SOCKS	B-Application
proxies	I-Application
.	O
</s>
