Skip to content

Commit 3695dad

Browse files
committed
Update README.md
1 parent 173ef9a commit 3695dad

1 file changed

Lines changed: 2 additions & 2 deletions

File tree

README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,12 +6,12 @@ HTTP as a protocol has very well-defined semantics for dealing with proxies, and
66

77
Proxying is very useful when conducting intensive web crawling/scrapping or when you just want to hide your identity (anomization).
88

9-
In this project I am using public proxies to randomise over a number of IP addresses and a variety of known user agents to generate requests that look to be produced by different applications and operating systems.
9+
In this project I am using public proxies to randomise http requests over a number of IP addresses and using a variety of known user agent headers these requests look to have been produced by different applications and operating systems.
1010

1111

1212
## Proxies
1313

14-
Proxies are a way to tell server P (the middleman) to contact server A and then route the response back to you. In more nefarious circles, it's a prime way to make your presence unknown and pose as many clients to a website instead of just one client.
14+
Proxies provide a way to use server P (the middleman) to contact server A and then route the response back to you. In more nefarious circles, it's a prime way to make your presence unknown and pose as many clients to a website instead of just one client.
1515
Often times websites will block IPs that make too many requests, and proxies is a way to get around this. But even for simulating an attack, you should know how it's done.
1616

1717

0 commit comments

Comments
 (0)