Intended for a computer immoral, the ideal proxy will surpass zero information about the actual host, and will successfully create it look as although the proxy is the right attack source. Testing this is effortless; there are a number of sites that will prove you the whole headers of your HTTP request. Some even make the mystery of the proxy for us.