Skip to content

Commit 5042187

Browse files
author
marci
committed
Add articles on proxy servers and Windows PowerShell installation
- Created a German article titled "Was ist ein Proxy Server?" explaining the concept, functionality, types, and usage of proxy servers for anonymous internet surfing. - Created an English article titled "What is a proxy server?" covering the same topics as the German version. - Added a comprehensive guide in German on installing Windows PowerShell, detailing its features, differences from CMD, and installation steps for Windows, Linux, and macOS. - Added an English version of the Windows PowerShell installation guide, mirroring the content of the German article.
1 parent 02addce commit 5042187

11 files changed

Lines changed: 711 additions & 2 deletions

File tree

.frontmatter/database/mediaDb.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
{"assets":{"images":{"posts":{"windows":{"eingabeaufforderung_logo.jpg":{"title":"","caption":"","alt":"Eingabeaufforderung_logo"},"ipconfig_all.png":{"title":"ipconfig_all","caption":"ipconfig_all","alt":"ipconfig_all"},"ipconfig_displaydns.png":{"title":"ipconfig_displaydns","caption":"ipconfig_displaydns","alt":"ipconfig_displaydns"},"ipconfig_flushdns.png":{"title":"ipconfig_flushdns","caption":"ipconfig_flushdns","alt":"ipconfig_flushdns"},"ipconfig_help.png":{"title":"ipconfig_help","caption":"ipconfig_help","alt":"ipconfig_help"},"ipconfig_release.png":{"title":"ipconfig_release","caption":"ipconfig_release","alt":"ipconfig_release"},"ipconfig_renew.png":{"title":"ipconfig_renew","caption":"ipconfig_renew","alt":"ipconfig_renew"},"windows product key.jpg":{"title":"Windows Product Key","author":"","alt":"Windows Product Key"},"cmd_aufrufen.jpg":{"title":"cmd_aufrufen","author":"","alt":"cmd_aufrufen"},"befehl_aktivierung.jpg":{"title":"Windows Product Key aktivieren","author":"","alt":"Windows Product Key aktivieren"},"befehl_key_aendern.jpg":{"title":"windows product key aendern","author":"","alt":"windows product key aendern"},"passwort-aendern-windows-10-bild-1.jpg":{"title":"Passwort-aendern-Windows-Bild-1","author":"","alt":"Passwort-aendern-Windows-Bild-1"},"passwort-aendern-windows-10-bild-2.jpg":{"title":"Passwort-aendern-Windows-Bild-2","author":"","alt":"Passwort-aendern-Windows-Bild-2"},"passwort-aendern-windows-10-bild-3.jpg":{"title":"Passwort-aendern-Windows-Bild-3","author":"","alt":"Passwort-aendern-Windows-Bild-3"},"passwort-aendern-windows-10-bild-4.jpg":{"title":"Passwort-aendern-Windows-Bild-4","author":"","alt":"Passwort-aendern-Windows-Bild-4"},"passwort-aendern-windows-10.jpg":{"title":"passwort-aendern-windows","author":"","alt":"passwort-aendern-windows"}},"adguard":{"adguard-fritzbox-dns-server.png":{"title":"","caption":"","alt":"AdGuard-FritzBox-DNS-Server"},"installation-adguard.png":{"title":"","caption":"","alt":"Installation-AdGuard"},"installationssetup-adguard-bild-2.png":{"title":"","caption":"Installationssetup-AdGuard-Bild-2","alt":"Installationssetup-AdGuard-Bild-2"},"installationssetup-adguard-bild-3.png":{"title":"","caption":"Installationssetup-AdGuard-Bild-3","alt":"Installationssetup-AdGuard-Bild-3"},"installationssetup-adguard-bild-4.png":{"title":"","caption":"Installationssetup-AdGuard-Bild-4","alt":"Installationssetup-AdGuard-Bild-4"},"installationssetup-adguard-bild-5.png":{"title":"","caption":"Installationssetup-AdGuard-Bild-5","alt":"Installationssetup-AdGuard-Bild-5"},"installationssetup-adguard.png":{"title":"","caption":"Installationssetup-AdGuard","alt":"Installationssetup-AdGuard"},"raspberry-pi-ip-adresse.png":{"title":"","caption":"Raspberry-Pi-IP-Adresse","alt":"Raspberry-Pi-IP-Adresse"},"ssh-anmeldung-raspberry-pi.png":{"title":"","caption":"SSH-Anmeldung-Raspberry-Pi","alt":"SSH-Anmeldung-Raspberry-Pi"},"thumbnail-adguard-home-update.png":{"title":"","caption":"","alt":"Thumbnail-AdGuard-Home-Update"},"thumbnail.png":{"title":"","caption":"","alt":"AdGuard Home basic setup"},"update-raspberry-pi-os.png":{"title":"","caption":"","alt":"Update-Raspberry-Pi-OS"},"video-adguard-raspberry-pi-installation.png":{"title":"","caption":"","alt":"Video-AdGuard-Raspberry-Pi-Installation"},"video-thumbnail.png":{"title":"","caption":"","alt":"Video AdGuard Home on Raspberry Pi"},"firefox_fozptqwh3x-1.gif":{"title":"","caption":"","alt":"Download AdGuard Home on Raspberry OS"},"rpi-imager_0hhavk9e8r.gif":{"title":"","caption":"rpi-imager","alt":"rpi-imager"},"rpi-imager_vhfgbf8sge.png":{"title":"","caption":"rpi-imager","alt":"rpi-imager"}},"it-security":{"utm-diagramm.png":{"title":"UTM-Diagramm","author":"","alt":"UTM-Diagramm"},"yarn-phone-2091195_640.png":{"title":"Network-Sniffing","author":"Bild von naobim auf Pixabay","alt":"Network-Sniffing"},"unbenanntes-diagramm.jpg":{"title":"MAC-Address Diagram","author":"","alt":"MAC-Address Diagram"},"mac_adressen.jpg":{"title":"Was ist eine mac adresse","author":"","alt":"Was ist eine mac adresse"}}}}},"content":{"posts":{"windows":{}}},"static":{"files":{}}}
1+
{"assets":{"images":{"posts":{"windows":{"eingabeaufforderung_logo.jpg":{"title":"","caption":"","alt":"Eingabeaufforderung_logo"},"ipconfig_all.png":{"title":"ipconfig_all","caption":"ipconfig_all","alt":"ipconfig_all"},"ipconfig_displaydns.png":{"title":"ipconfig_displaydns","caption":"ipconfig_displaydns","alt":"ipconfig_displaydns"},"ipconfig_flushdns.png":{"title":"ipconfig_flushdns","caption":"ipconfig_flushdns","alt":"ipconfig_flushdns"},"ipconfig_help.png":{"title":"ipconfig_help","caption":"ipconfig_help","alt":"ipconfig_help"},"ipconfig_release.png":{"title":"ipconfig_release","caption":"ipconfig_release","alt":"ipconfig_release"},"ipconfig_renew.png":{"title":"ipconfig_renew","caption":"ipconfig_renew","alt":"ipconfig_renew"},"windows product key.jpg":{"title":"Windows Product Key","author":"","alt":"Windows Product Key"},"cmd_aufrufen.jpg":{"title":"cmd_aufrufen","author":"","alt":"cmd_aufrufen"},"befehl_aktivierung.jpg":{"title":"Windows Product Key aktivieren","author":"","alt":"Windows Product Key aktivieren"},"befehl_key_aendern.jpg":{"title":"windows product key aendern","author":"","alt":"windows product key aendern"},"passwort-aendern-windows-10-bild-1.jpg":{"title":"Passwort-aendern-Windows-Bild-1","author":"","alt":"Passwort-aendern-Windows-Bild-1"},"passwort-aendern-windows-10-bild-2.jpg":{"title":"Passwort-aendern-Windows-Bild-2","author":"","alt":"Passwort-aendern-Windows-Bild-2"},"passwort-aendern-windows-10-bild-3.jpg":{"title":"Passwort-aendern-Windows-Bild-3","author":"","alt":"Passwort-aendern-Windows-Bild-3"},"passwort-aendern-windows-10-bild-4.jpg":{"title":"Passwort-aendern-Windows-Bild-4","author":"","alt":"Passwort-aendern-Windows-Bild-4"},"passwort-aendern-windows-10.jpg":{"title":"passwort-aendern-windows","author":"","alt":"passwort-aendern-windows"},"windows-powershell-batch.jpg":{"title":"Windows-PowerShell-","author":"","alt":"Windows-PowerShell-"},"cmd-batch.jpg":{"title":"CMD-Batch","author":"","alt":"CMD-Batch"},"windows-powershell-ise.jpg":{"title":"Windows-PowerShell-ISE","author":"","alt":"Windows-PowerShell-ISE"}},"adguard":{"adguard-fritzbox-dns-server.png":{"title":"","caption":"","alt":"AdGuard-FritzBox-DNS-Server"},"installation-adguard.png":{"title":"","caption":"","alt":"Installation-AdGuard"},"installationssetup-adguard-bild-2.png":{"title":"","caption":"Installationssetup-AdGuard-Bild-2","alt":"Installationssetup-AdGuard-Bild-2"},"installationssetup-adguard-bild-3.png":{"title":"","caption":"Installationssetup-AdGuard-Bild-3","alt":"Installationssetup-AdGuard-Bild-3"},"installationssetup-adguard-bild-4.png":{"title":"","caption":"Installationssetup-AdGuard-Bild-4","alt":"Installationssetup-AdGuard-Bild-4"},"installationssetup-adguard-bild-5.png":{"title":"","caption":"Installationssetup-AdGuard-Bild-5","alt":"Installationssetup-AdGuard-Bild-5"},"installationssetup-adguard.png":{"title":"","caption":"Installationssetup-AdGuard","alt":"Installationssetup-AdGuard"},"raspberry-pi-ip-adresse.png":{"title":"","caption":"Raspberry-Pi-IP-Adresse","alt":"Raspberry-Pi-IP-Adresse"},"ssh-anmeldung-raspberry-pi.png":{"title":"","caption":"SSH-Anmeldung-Raspberry-Pi","alt":"SSH-Anmeldung-Raspberry-Pi"},"thumbnail-adguard-home-update.png":{"title":"","caption":"","alt":"Thumbnail-AdGuard-Home-Update"},"thumbnail.png":{"title":"","caption":"","alt":"AdGuard Home basic setup"},"update-raspberry-pi-os.png":{"title":"","caption":"","alt":"Update-Raspberry-Pi-OS"},"video-adguard-raspberry-pi-installation.png":{"title":"","caption":"","alt":"Video-AdGuard-Raspberry-Pi-Installation"},"video-thumbnail.png":{"title":"","caption":"","alt":"Video AdGuard Home on Raspberry Pi"},"firefox_fozptqwh3x-1.gif":{"title":"","caption":"","alt":"Download AdGuard Home on Raspberry OS"},"rpi-imager_0hhavk9e8r.gif":{"title":"","caption":"rpi-imager","alt":"rpi-imager"},"rpi-imager_vhfgbf8sge.png":{"title":"","caption":"rpi-imager","alt":"rpi-imager"}},"it-security":{"utm-diagramm.png":{"title":"UTM-Diagramm","author":"","alt":"UTM-Diagramm"},"yarn-phone-2091195_640.png":{"title":"Network-Sniffing","author":"Bild von naobim auf Pixabay","alt":"Network-Sniffing"},"unbenanntes-diagramm.jpg":{"title":"MAC-Address Diagram","author":"","alt":"MAC-Address Diagram"},"mac_adressen.jpg":{"title":"Was ist eine mac adresse","author":"","alt":"Was ist eine mac adresse"}}}}},"content":{"posts":{"windows":{}}},"static":{"files":{}}}
88.3 KB
Loading
20.6 KB
Loading
7.55 KB
Loading
11 KB
Loading
154 KB
Loading

content/posts/security/mac-adresse.en.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,6 @@ The **MAC address** is used to identify a network-enabled device (host) in a net
2828
## Structure
2929
This address consists of a 48-bit address and should be unique worldwide. This address is assigned to layer 2 (data link layer) in the OSI model to ensure addressing in the network.
3030

31-
The address is usually represented in hexadecimal notation (see image “Structure of a MAC address”) and is represented in bytes separated by a colon or hyphen. This notation/representation is called the _canonical format_ and is usually also used for representation.
3231

3332
![MAC address structure](images/posts/it-security/Unbenanntes-Diagramm.jpg)
3433

Lines changed: 83 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,83 @@
1+
---
2+
title: Was ist ein Proxy Server?
3+
date: 2019-03-07
4+
categories:
5+
- Netzwerk
6+
- Security
7+
tags:
8+
- netzwerk
9+
- security
10+
- tutorials
11+
description: Was ist ein Proxy-Server und wofür wird dieser verwendet?
12+
preview: ../../../assets/images/posts/it-security/proxy-server.jpg
13+
hero: /images/posts/it-security/proxy-server.jpg
14+
menu:
15+
sidebar:
16+
name: Was ist ein Proxy-Server und wofür wird dieser verwendet?
17+
identifier: proxy
18+
parent: security
19+
lastmode: 2025-07-28T14:32:35.743Z
20+
keywords:
21+
- proxy-server
22+
---
23+
24+
## Anonym im Internet surfen
25+
26+
In diesem Beitrag versuche ich euch in hoffentlich verständlichen Worten die Frage "Was ist ein Proxy Server?" zu beantworten.
27+
28+
Um anonym im Internet surfen zu können, ist unteranderem der Einsatz eines Proxy Server unumgänglich. In diesem Beitrag erfahrt ihr auf welche Besonderheiten ihr bei der Auswahl eines Proxy Servers achten müsst und woher ihr diesen beziehen könnt.
29+
30+
## Funktionsweise
31+
32+
Ein Proxy Server kann man als Vermittler oder Zwischenhändler im Netzwerk betrachten. Dieser empfängt die Anfragen eines Proxy-Client (z.B. Desktop) und gibt diese in seinem Namen an den Ziel-Webserver weiter, der vom Proxy-Client angefragt wurde. 
33+
34+
![Proxy-Listen.de](/images/posts/it-security/proxy_listen_de.jpg)
35+
36+
Um diesen Verlauf mal vereinfacht darzustellen, bedienen ich mich dem folgenden Szenario: 
37+
38+
### Der Proxy-Server
39+
40+
**Stellt euch vor ihr leitet ein Team. Jeder Mitarbeiter in deinem Team möchte Verbesserung vorschlagen, wie sich die Arbeit noch effizienter erledigen lässt. Natürlich soll jetzt nicht jeder von deinen Mitarbeitern zum Chef rennen und ihm mit seiner Super-Idee nerven. Also pflichtbewusst wie du bist, sammelst du alle Vorschläge, fasst diese in deinen Worten zusammen und trägst dann alles zusammen deinem Chef vor.** 
41+
42+
**In diesem vorgestellten Szenario bist du der Proxy-Server, die Mitarbeiter sind die Proxy-Clients und dein Chef ist der Web-Server.** 
43+
44+
### Arten von Proxy Server für die Anonymisierung von Datenverkehr im Internet
45+
46+
Es gibt drei verschiedene Arten von Proxy Server die **bei einer Anonymisierung** als Vermittlerstelle fungieren können, wobei eigentlich nur zwei für diese Art der Netzwerk-Kommunikation von nutzen sind. Diese drei Arten von Server unterteilen sich folgendermaßen: 
47+
48+
- **Level 1 - Elite Proxies**
49+
- Bei einem Level 1-Proxy Server werden weder eure IP-Adresse noch die Verwendung eines Proxy-Server dem Webserver mitgeteilt (keine der unten genannten Variablen werden im Header mitgesendet). Dieser Level 1 Server ist daher den anderen Level-Servern im Bezug der Anonymität unbedingt vorzuziehen!
50+
- **Level 2 - Anonymous Proxies**
51+
- Bei dieser Art von Proxy-Server werden dem Gegenüber mitgeteilt, dass die Anfrage über einen Proxy-Server gestellt wird. Die IP-Adresse wird dabei aber nicht übermittelt und man bleibt hierbei in gewisserweise dem angefragten Server gegenüber anonym.
52+
- **Level 3 - Transparent Proxies**
53+
- Transparent Proxies werden meist und sollten auch nur in Verwendung einer Server-Kette (wenn mehrere Server hintereinander geschaltet werden) verwendet werden. Dier Server-Typ übermittelt die angefragende IP-Adresse sowie auch seinen Status als Proxy-Server seinem Gegenüber.
54+
55+
### Die Header-Variablen
56+
57+
Um hier eine Differenzierung der einzelnen Level vornehmen zu können, muss man sich die Header-Variablen die in den Traffic-Paketen eingefügt werden, genauer anschauen. Diese Variablen werden vom Proxy-Server dem Gegenüber unter Umständen mitgeteilt und sind somit ausschlaggebend für die Einstufung als Anonymisierungs-Server. 
58+
59+
#### Die wichtigsten Variablen im Überblick
60+
61+
```sh
62+
HTTP_CLIENT_IP
63+
X_FORWARDED_FOR
64+
X_HTTP_FORWARDED_FOR
65+
FORWARDED_FOR
66+
HTTP_X_FORWARDED_FOR
67+
```
68+
69+
Solltet ihr einer der oberen Variablen im Header finden, dann weiß der angefragte Webserver eure IP-Adresse!
70+
71+
```sh
72+
HTTP_VIA
73+
HTTP_FORWARDED
74+
HTTP_PROXY_CONNECTION
75+
```
76+
77+
Die oberen drei Variablen zeigen dem angefragten Webserver, dass die Anfrage über einen Proxy-Server erfolgt und kann daher dazu führen, dass der Webserver die Anfrage ablehnt. Dies ist zum Beispiel der Fall, wenn ihr durch die Nutzung eines Proxy-Servers versucht die Länderbeschränkung zu umgehen um auf ein Videoportal zuzugreifen zu können, welches in Deutschland nicht verfügbar ist.
78+
79+
## Übersicht verfügbarer kostenloser Proxy-Server
80+
81+
Um nun anonym im Internet surfen zu können braucht ihr natürlich am besten auch einen kostenlosen Proxy-Server. Eine gute Auflistung mit entsprechender erweiteter Suche (z.B. nach Level, Verfügbarkeit, usw.) findet ihr auf der Seite [proxy-listen.de](https://www.proxy-listen.de/Proxy/Proxyliste.html).
82+
83+
Lines changed: 67 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,67 @@
1+
---
2+
title: What is a proxy server?
3+
date: 2019-03-07
4+
categories:
5+
- Network
6+
- Security
7+
tags:
8+
- network
9+
- security
10+
- tutorials
11+
description: What is a proxy server and what is it used for?
12+
preview: ../../../assets/images/posts/it-security/proxy-server.jpg
13+
hero: /images/posts/it-security/proxy-server.jpg
14+
menu:
15+
sidebar:
16+
name: What is a proxy server and what is it used for?
17+
identifier: proxy
18+
parent: security
19+
lastmode: 2025-07-28T14:32:35.743Z
20+
keywords:
21+
- proxy server
22+
---
23+
## Surfing anonymously on the Internet
24+
In this article, I will try to answer the question “What is a proxy server?” in hopefully understandable terms.
25+
In order to surf anonymously on the Internet, the use of a proxy server is essential. In this article, you will learn what special features you need to look for when choosing a proxy server and where you can get one.
26+
## How it works
27+
A proxy server can be viewed as an intermediary or middleman in a network. It receives requests from a proxy client (e.g., desktop) and forwards them on its behalf to the target web server requested by the proxy client.
28+
29+
30+
![Proxy-Listen.de](/images/posts/it-security/proxy_listen_de.jpg)
31+
32+
33+
To simplify this process, I will use the following scenario:
34+
35+
36+
### The proxy server
37+
**Imagine you are managing a team. Every employee in your team wants to suggest improvements on how to make their work more efficient. Of course, you don't want all your employees running to the boss with their great ideas. So, being the conscientious person you are, you collect all the suggestions, summarize them in your own words, and then present everything to your boss.**
38+
**In this scenario, you are the proxy server, the employees are the proxy clients, and your boss is the web server.**
39+
40+
### Types of proxy servers for anonymizing Internet traffic
41+
There are three different types of proxy servers that can act as intermediaries **for anonymization**, although only two are actually useful for this type of network communication. These three types of servers are divided as follows:
42+
- **Level 1 - Elite Proxies**
43+
- With a Level 1 proxy server, neither your IP address nor the use of a proxy server is disclosed to the web server (none of the variables listed below are sent in the header). This Level 1 server is therefore definitely preferable to the other level servers in terms of anonymity!
44+
- Level 2 - Anonymous Proxies
45+
- With this type of proxy server, the other party is informed that the request is being made via a proxy server. However, the IP address is not transmitted and you remain anonymous to the requested server to a certain extent.
46+
- Level 3 - Transparent proxies
47+
- Transparent proxies are mostly used and should only be used in a server chain (when several servers are connected in series). This server type transmits the requesting IP address and its status as a proxy server to the other party.
48+
### The header variables
49+
In order to differentiate between the individual levels, you need to take a closer look at the header variables that are inserted into the traffic packets. These variables may be communicated by the proxy server to the other party and are therefore decisive for classification as an anonymization server.
50+
#### The most important variables at a glance
51+
```sh
52+
HTTP_CLIENT_IP
53+
X_FORWARDED_FOR
54+
X_HTTP_FORWARDED_FOR
55+
FORWARDED_FOR
56+
HTTP_X_FORWARDED_FOR
57+
```
58+
If you find one of the above variables in the header, the requested web server knows your IP address!
59+
```sh
60+
HTTP_VIA
61+
HTTP_FORWARDED
62+
HTTP_PROXY_CONNECTION
63+
```
64+
The top three variables show the requested web server that the request is being made via a proxy server and may therefore cause the web server to reject the request. This is the case, for example, if you are using a proxy server to try to bypass country restrictions in order to access a video portal that is not available in Germany.
65+
## Overview of available free proxy servers
66+
To surf the Internet anonymously, you will of course need a free proxy server. A good list with an advanced search function (e.g. by level, availability, etc.) can be found at [proxy-listen.de](https://www.proxy-listen.de/Proxy/Proxyliste.html).
67+

0 commit comments

Comments
 (0)