<?xml version="1.0" encoding="UTF-8"?>        <rss version="2.0"
             xmlns:atom="http://www.w3.org/2005/Atom"
             xmlns:dc="http://purl.org/dc/elements/1.1/"
             xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
             xmlns:admin="http://webns.net/mvcb/"
             xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
             xmlns:content="http://purl.org/rss/1.0/modules/content/">
        <channel>
            <title>
									What is proxy chain - Web Security				            </title>
            <link>https://www.hackercombat.com/forum/web-security/what-is-proxy-chain/</link>
            <description>Join Hacker combat Community to get aware of cyber security related Issues, Hacking News, and Hot general Topics. Get help from security support experts.</description>
            <language>en-US</language>
            <lastBuildDate>Fri, 13 Mar 2026 20:46:19 +0000</lastBuildDate>
            <generator>wpForo</generator>
            <ttl>60</ttl>
							                    <item>
                        <title>RE: What is proxy chain</title>
                        <link>https://www.hackercombat.com/forum/web-security/what-is-proxy-chain/#post-2287</link>
                        <pubDate>Tue, 26 Mar 2019 09:38:11 +0000</pubDate>
                        <description><![CDATA[Proxy chain is used to being anonymously access Internet and get information that is not accessible in your region. It wont make you fully anonymous but still helps to protect your identity....]]></description>
                        <content:encoded><![CDATA[<p>Proxy chain is used to being anonymously access Internet and get information that is not accessible in your region. It wont make you fully anonymous but still helps to protect your identity. Proxy chain works based on ip address of different machines in different regions which passes your request and get the relevant content for you.</p>]]></content:encoded>
						                            <category domain="https://www.hackercombat.com/forum/web-security/">Web Security</category>                        <dc:creator>susan wu</dc:creator>
                        <guid isPermaLink="true">https://www.hackercombat.com/forum/web-security/what-is-proxy-chain/#post-2287</guid>
                    </item>
				                    <item>
                        <title>What is proxy chain</title>
                        <link>https://www.hackercombat.com/forum/web-security/what-is-proxy-chain/#post-2261</link>
                        <pubDate>Wed, 13 Mar 2019 13:06:46 +0000</pubDate>
                        <description><![CDATA[Use of proxy chain and how its work?]]></description>
                        <content:encoded><![CDATA[<p>Use of proxy chain and how its work?</p>]]></content:encoded>
						                            <category domain="https://www.hackercombat.com/forum/web-security/">Web Security</category>                        <dc:creator>Katie k</dc:creator>
                        <guid isPermaLink="true">https://www.hackercombat.com/forum/web-security/what-is-proxy-chain/#post-2261</guid>
                    </item>
							        </channel>
        </rss>
		