Writing Squid authenticators
An authenticator that you can use in Squid is pretty simple. So if you find you need to use an
Read moreAn authenticator that you can use in Squid is pretty simple. So if you find you need to use an
Read moreI once needed a way to make sure our Squid proxy cluster operates correctly. So I wrote a rather simple
Read moreReading Squid’s log files can be hard for us humans. This Perl script will help you decipher them. Note that
Read moreThis article is meant to help set up LDAP authentication with a Squid proxy. Often administrators are using Squid as
Read moreMany administrators do not seem to recognize the true purpose of a proxy. That is to make sure nothing but
Read moreHow to keep your users from bypassing your proxy Many administrators do not seem to recognize the true purpose of
Read moreFor less experienced Squid administrators the concept of ACLs can be confusing at first. But they offer a great way
Read more