Talk:Proxy server

From Wikipedia, the free encyclopedia
Jump to: navigation, search
          This article is of interest to the following WikiProjects:
WikiProject Computer Security / Computing  (Rated C-class, High-importance)
WikiProject icon This article is within the scope of WikiProject Computer Security, a collaborative effort to improve the coverage of computer security on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
C-Class article C  This article has been rated as C-Class on the project's quality scale.
 High  This article has been rated as High-importance on the project's importance scale.
Taskforce icon
This article is supported by WikiProject Computing (marked as Mid-importance).
WikiProject Computing / Networking (Rated C-class, Mid-importance)
WikiProject icon This article is within the scope of WikiProject Computing, a collaborative effort to improve the coverage of computers, computing, and information technology on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
C-Class article C  This article has been rated as C-Class on the project's quality scale.
 Mid  This article has been rated as Mid-importance on the project's importance scale.
Taskforce icon
This article is supported by Networking task force (marked as High-importance).
WikiProject Internet (Rated C-class, High-importance)
WikiProject icon This article is within the scope of WikiProject Internet, a collaborative effort to improve the coverage of the Internet on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
C-Class article C  This article has been rated as C-Class on the project's quality scale.
 High  This article has been rated as High-importance on the project's importance scale.

Headline text[edit]

a;so it can be in EA Games like,SIMS2 and 3 games

Windows Network and Linux Network Proxies[edit]

I think proxy server is not needed for Windows LAN for sharing internet. I was able to enable sharing to dial up connections in Windows Networks even with out using proxy. I also tested Linux servers and they required proxy. Linux clients can be also connected to Windows servers even if the Windows server doesn't have proxy. But Linux server needs proxy even for sharing internet connection to Windows clients. Can any one enlighten more information about it?

Kumarsarma (talk) 23:51, 28 December 2008 (UTC)

Transperent proxy = Intercepting or not?![edit]

"The term "transparent proxy" is most often used incorrectly to mean "intercepting proxy... " taken from the "Transparent and non-transparent proxy server". "An intercepting proxy (also known as a "transparent proxy") combines... " taken from "Intercepting proxy server". So what is right? could someone fix this or explain it better inside the article! - AssetBurned (talk) 13:56, 17 June 2008 (UTC)

Removed the disambiguities concerning naming in the article. Hope that it is better now. Sae1962 (talk) 14:22, 5 November 2010 (UTC)

Yuk - Proxy Servers are a generic concept[edit]

Not just for proxying web proxies. Proxies for other application protocols exist, and almost certainly predate the web (e.g. xforward, for forwarding X11 traffic). JimGettys (talk) 23:47, 5 June 2008 (UTC)

Better Definition of Proxy Server[edit]

Taken from the article:

In computer networks, a proxy server is a server (a computer system or an application program) which services the requests of its clients by making requests to other servers.

This definition seems like it can be improved. As noted in the subtopic on Web Proxies, a proxy does not need to make a request to another server to enforce a policy against a client URL request. The request can be cut off before it can reach a public network, such as the Internet. In other words, the request is cut off behind an intranet's firewall. Any default-deny ruleset will disallow URL requests that are not on the whitelist. The current definition corresponds closely to proxies that analyze data streams and filter based on the content of the stream as well as proxies that serve as edge server caches. In both of these proxy models, requests must be made to other servers in order for an action to take place. The current definition makes it seem like every request has an automatic fetch action. A better definition could also help make this page match more closely with the Proxy pattern article. Any ideas? JohnZabroski

Country Check[edit]

The info added by on CountryCheck seems useful, but does it strike anyone else as a little bit too much like a spamvertisement? Will investigate further if I find the time... --Chinasaur 02:04, 22 Jun 2004 (UTC)

It is precisely wikispam. It is false (there are a number of ways to detect an open proxy access aside from the use of this product) and promotes a product using Wikipedia's good name. Reverted. --FOo 02:15, 22 Jun 2004 (UTC)
Beyond reverting, I've also added a discussion and links on the subject of proxy testing. The spammers appears to be ripping off perfectly good open-source ideas and lying about them, claiming that his rip-off product is the only way to do what others have long been doing. --FOo 02:30, 22 Jun 2004 (UTC)


More Formal Talk Needed[edit]

In the Open proxies, use, abuse, and detection section, the writing must be fixed to look more "encyclopedic". Cheesycow5 00:31, 10 May 2005 (UTC)

Removed bad advice[edit]

I just removed the following bad advice from the article:

We can assume that the fact that the proxy owner has setup proxy server and made it technically possible for everybody without restricting access to that service, it indicates that that is what he wanted in the first place. The reasons behind it may be very different, and in many cases there are no long-term plans behind a public proxy.
The situation is very similar with any websites! You don't need to ask permission for yahoo to connect. If the proxy doesn't ask you for a password, it means it is public or open and can be used. When proxy servers start asking for passwords, stop using them because it is not public anymore. Using password protected proxies is against the law. ( Sources: )

This is not only erroneous material, but very dangerous to our readers, since it falsely suggests that any open proxy they may find on the Internet represents an invitation from the legitimate owner of that computer to use it. The fact of the matter is that the majority of open proxies on the Internet today are installed by worms (network-borne viruses) for the purpose of enabling criminals to send spam e-mail. They are not installed with the owner's permission, and using them is no more legal that going into a house after a burglar has broken the door lock and picking up any valuables that burglar failed to loot.

Wikipedia is not here to give advice -- but it is especially not here to give wrong and dangerous advice that will lead our readers to believe that criminal acts are safe and legal. --FOo 23:51, 18 May 2005 (UTC)

I'm not sure which advice is bad!? fdff

It is very dangerous and fallacious Your conclusion FOo that majority of open proxies are installed only for the purpose of enabling criminals to send spam e-mail. You try to say with other words that many legitimate sites and legitimate commercial proxy managing programs who give their users open proxy for free are in fact company who supported criminals (Your conclusion is that anything about proxy, especially sites or programs who give it open proxy for for free are in your eyes supporters of criminal because you conclude:

it is especially not here to give wrong and dangerous advice that will
lead our readers to believe that criminal acts are safe and legal

It is very dangerous and miserable your conclusion FOo and can lead any reader of this discussion that all proxy site and proxy programs are supporters of criminal. I hope that this is not official Wikipedia stand but only from one editor who obviously have lack of knowledge about proxy server. and[edit]

When I checked on these sites, which appear to be the same site with two different URLs, it claimed to provide unblockable addresses, which is not possible. This is either a lie or it's evidence of incompetence. Either way, it means that the site is not worthy of being linked to. -- Jeronim 10:09, 18 July 2005 (UTC)

But Thats the Point...The reason there are 2 different addresses is becasue certain Iran, Saudi Arabia, UAE, China block these addresses. One address is blocked while the other isnt. Hence then use of the word unblockable. This page has been a great resource for people from these countries to be able to get access to cgi proxies as all the rest are blocked. -- Rayyad

So one isn't currently blocked, therefore it's not possible to block it and calling it "unblockable" is not a lie, right? I'll remove the links again until an adequate explanation is offered. -- Jeronim 17:16, 24 July 2005 (UTC)
I agree. "Unblocked in some countries" is neither the same as, nor similar to, "unblockable". (Thebigbradwolf (talk) 21:09, 20 December 2007 (UTC))e
Are these sites legit? If they are, can they circumvent sites with content blocked in some countries, such as mtv and Please let me know --Crackthewhip775 (talk) 23:58, 18 August 2008 (UTC)

Forward Proxies[edit]

Can someone say something about Forward Proxies, with some useful example? --Popski 21:47, 22 August 2005 (UTC)

Open proxies, abuse, and detection[edit]

Vernon Schryver - expert! a bit more info required here I think. Who he??

is there any that do not require a download like Https://

isa server proxy configuration[edit]

Merge from Circumventor[edit]

Circumventor describes website-based proxy servers. Jobarts-Talk 23:41, 18 February 2006 (UTC)

Well, I just ran into the entry *because* I was looking for references on cicumventors. While, indeed, they are proxy-servers, they have a rather specific application and use. Conceptually you may be right, but the separate entry enhances useabilty, imho. If the entry is merged, I would suggest at least keeping the entry with a pointer to proxy server. billo

I'm opposed[edit]

I don't think they should be merged, it is a type but it has many differences. I think proxy should link to it not merge with it.

Merge from Circumventor[edit]

I think the merge for the circumventor is good. I found the information related and useful when trying to learn about proxy servers.Erik Stone 15:15, 10 March 2006 (UTC)Erik Stone

Merge and redirect. It's certainly a short article as-is, and it refers to a specific kind of proxy. authraw 20:40, 11 May 2006 (UTC)
Done Cwolfsheep 14:45, 9 July 2006 (UTC)


It may just be me, but 'families' are not organisations

I think that could really do with rewording!

Reedy Boy 08:25, 1 April 2006 (UTC)


See [1] It is almost exactly the same as this article. Either Wikipedia copied from them, or they copied form us.

It seems highly unlikely that most of the Wikipedia article would be plagiarism of text on an internet marketing company website. You can easily go back in time and watch how the Wikipedia article evolves. If Wikipedia copied the article, it would have to have be done in bits and pieces in a coordinated, distributed effort over several years. For example, the opening sentence changed to what it is today only in February. It looks awefully much like this marketing company uses the Wikipedia article without permission, since they don't state that the license is GFDL. Would anyone care to email them and get the situation fixed? --Haakon 18:31, 24 September 2006 (UTC)

picture is wrong[edit]

the picture at the top of the page is not really appropriate. It shows a client on the internet connecting back into a corporate network through a proxy server.

The picture really should be showing a client on a corporate or private network connecting out to the internet through a proxy server, as this is what proxies are mostly used for.

removed incorrect info[edit]

The claim 'A proxy server can also serve as a Firewall' is not correct. A firewall is a different kind of program with functions different from a proxy server. Though some proxies may have bundled firewall software, it is not correct to claim that as a general case.

The verb "proxify"[edit]

"Ssh Secure Shell can be configured to proxify a connection, by setting up a SOCKS proxy on the client, and tunneling the traffic through the SSH connection."

Lmao at "proxify". 16:34, 1 January 2007 (UTC)

"SSL Proxies"[edit]

What about those so-called SSL proxies like [2], that claim to be able to snoop on SSL traffic? It seems that this kind of intercepting proxy needs to have its root certificate installed on all the clients' browsers. It then generates a spoofed certificate on the fly for every secure website visited, and basically performs a man-in-the-middle attack on the SSL session. The vendors claim that this improves security. I don't know what to think of this, but maybe it's a good idea to click on that little lock icon and take a look at that certificate's chain of trust.

Anyways, I feel something about SSL intercepting proxies should go in the article, but I might not be the best one to do it. 07:10, 21 January 2007 (UTC)

On the other hand, maybe I will add this information to the article, when I get around to collecting the appropriate sources to cite. Like anything else, this needs to have appropriate sources cited if it is to go in the article. 21:14, 30 January 2007 (UTC)

I agree. There must be more emphasis on the plain fact that any TLS Proxy is by definition a man-in-the-middle attack and typically not known by the end-user. TLS proxies provide a false sense of security to end-users. -jim 11:16, 27 December 2015 (UTC) — Preceding unsigned comment added by Jwilleke (talkcontribs)

Web proxies + stuff[edit]

Proxies that attempt to block offensive web content are implemented as web proxies. Other web proxies reformat web pages for a specific purpose or audience

The paragraph under the "Web" heading starts with these two sentences. It's completely devoid of the "regular" web proxy, ie one that does *not* affect the content, but usually only caches it. You know, the optional kind that many ISPs provide. IMO, the heading could be renamed "Filtering proxies."

Some other stuff:

  • The second paragraph under the same heading about CGI proxies could be moved down under the "Circumventor" header.
  • "Popular proxy software" should be split into meaningful categories. Some of them seem like advertisements.
  • The article lacks a link to the relevant RFC for HTTP proxies

-- 21:12, 4 March 2007 (UTC)

I agree...the term 'web proxy' is generally referring to a browser based simple httpd proxy. NOT a filtering proxy used by most corporate / education institutions. I edited the section to reflect this. Ratacat (talk) 20:16, 11 October 2011 (UTC)

ℳ== Open Proxies == Listing open proxies under 'types' seem wrong, as any type of proxy (almost) can be open, and you wouldn't decide 'Oh, I need an open proxy' in the same way as 'Oh, I need a caching web proxy'. I'd suggest moving it to a separate 'security implications' section, or the like.

Putting a link to 'web cache' in the 'web proxy' section also seems sensible, as would emphasising this more common use of web proxies as per previous comment.

Pjc51 11:14, 30 March 2007 (UTC)

Layman's explanation[edit]

This section needs to be either rewritten or just removed entirely. The tone isn't remotely encylopaedic. Thoughts? WombatDeath 12:58, 14 April 2007 (UTC)

Removed entirely. Seemed unnecessary, given that the introductory paragraph summarizes the topic much more accurately and succinctly than this "layman's explanation" did. In particular, this section assumed that all proxies were filtering proxies. Zetawoof(ζ) 01:18, 16 April 2007 (UTC)
Agree. But let's give the wikipedian credit for making a good effort. --LegitimateAndEvenCompelling 06:31, 16 April 2007 (UTC)

Bad description on revert[edit]

The description should be: WP:COI. StayMay (talk · contribs · deleted contribs · logs · edit filter log · block user · block log) started PrivacyView, even on that advertorial it doesn't claim to be a proxy server that masks your IP address while surfing on the Internet. As an attempt for an excuse: I use to preview my changes, the English wikepedia whines that I didn't give a description (even when most of the times I did give it) after reviewing, but it seems happy to accept my changes if I do not preview them. Erik Warmelink 07:56, 25 May 2007 (UTC)


There is a reference to anonymizer as a generic term, but it links to a page on a particular company/service. -- 16:52, 2 July 2007 (UTC) Also check on, gives you a list of available free and paid anonymous search and proxy server services. —Preceding unsigned comment added by (talk) 02:22, 2 September 2009 (UTC)

The word Proxy[edit]

I came on the wiki looking for the origin of "Proxy". Only technical info is described here.

Does anybody know more on the 'Historical' of proxy? Who came up with that, why is it named proxy...

--Slamcool 14:41, 22 August 2007 (UTC)

As far as I know, proxy originally meant an authorization for someone to act on behalf of the proxy giver. If I must, I would guess the word is related to Latin proximus (closest, nearest-by).
[somewhat later] See also proxy marriage and other meanings on proxy. Erik Warmelink 15:45, 25 August 2007 (UTC)

Article on Anonymizing Technologies[edit]

I wrote an article to help others understand the various anonymizing technologies available on the market today -- it is not an advertisement. It does not recommend or point to any product. It was linked to this page until someone deleted it as spam but it clearly does not violate Wikipedia's policy regarding this matter. If you have a problem with the article please let me know, but don't dismiss it as advertising as it is clearly not.

Entropy71 (talk) 19:50, 21 January 2008 (UTC)

TLS link?[edit]

under hostile servers, shouldn't there be a link to TLS? Is there even a page for it? —Preceding unsigned comment added by (talk) 14:17, 3 October 2008 (UTC)

Merge content filtering sections[edit]

The "Content-filtering web proxy" and "Content filter" sections should probably be merged. I don't have time at present. Nurg (talk) 23:27, 9 October 2008 (UTC)

Proxy servers[edit]

Towards the bottom of the page, do we really need that gigantic list of "popular proxies"? Prottos007 (talk) 02:36, 5 February 2009 (UTC)

-I agree with Prottos007. Most of these "popular" proxies have likely already been blocked and therefore make the whole list useless. Unless someone doesn't mind updating it...? (talk) 04:57, 14 March 2009 (UTC)

How are proxy servers related to Internet service providers? As stated, one can use an open proxy to gain access to a filtered site. But in this case, will internet service providers be able to track the filtered sites they have accessed?

Sniffing Proxy Can Sniff HTTPS data?? Can it?[edit]

I don't dispute that it's possible to for a proxy server to intercept data, but over HTTPS? "It has been demonstrated"... has it? Theoretically with a week to do it, or actually? I'm not convinced, and there's no source given for that claim.

I'm removing it for now. Put it back when the reliable source is found.

Ddawkins73 (talk) 20:26, 12 February 2009 (UTC)

How to use a transparent proxy server?[edit]

How exactly do you use a transparent proxy server?

For example, if you look at this page:

or pick a recent date (say, this one):

You'll see a list of IP addresses and port numbers and the country they're located in.

How exactly would you use one of those entries?

Say, this entry:


Proxies list[edit]

My question is : What are differences between anonymous and highly anonymous proxy servers ? —Preceding unsigned comment added by Neoillumination (talkcontribs) 19:57, 23 May 2009 (UTC)

Purposes wrong/incomplete[edit]

The article says that a proxy server is used "to keep machines behind it anonymous" or "to speed up access to a resource." While these are some reasons, this clearly doesn't cover even a majority of the purposes for a proxy. These include:

  * Serving as a gateway to connect computers to a resource they wouldn't be able to see otherwise (e.g., the proxy could be dual-homed)
  * Load balancing (especially in a reverse proxy)
  * Making several resources appear to come from a single resource (a reverse proxy can have different matching rules that points to multiple servers)
  * Authentication, authorization
  * Logging
  * Protocol translation (e.g., going to an FTP or gopher server via HTTP, or changing terminal commands)
  * Filtering, blocking
  * Hacking, man-in-the-middle

And while most of this is seen on an HTTP proxy server, a proxy server could be implemented for any protocol. (talk) 05:43, 11 June 2009 (UTC)

Vandalism as on 03/07/09 IST - Please reverse[edit]

"In computer networks, a proxy serveraghrdhgry is a server"


I think that this whole page could be cleaned up by sorting it into more defined and specific areas. At the moment it reads a lot more like a collection of peoples ideas. I am surprised that this page does not discuss or provide links to transport layer proxies, often known as PEPs (Performance Enhancing Proxies)[3].

I think that the whole article could be better arranged by organising the information on this page into three distinct sections: Anonymizing web proxies, Packet Caching/Content filtering web proxies and, PEPs (Performance Enhancing Proxies)

Roy muzz (talk) 00:29, 29 August 2009 (UTC)

What Does A Proxy Do? Here You Write The Answer Down. —Preceding unsigned comment added by Ansariibrahim (talkcontribs) 04:37, 29 October 2009 (UTC)

Technical information[edit]

I'd like to add a section that explains some technical information about connecting to proxies. Most namely, how to use the CONNECT method of HTTP. Reference RFC 2817.

Plagiarism claim not correct[edit]

In this edit, it was claimed that the lead in the current article is plagiarized from here. However, that page is dated March 30, 2009 and the history shows that similar text has been in the lead of the Wikipedia article long before that date. In other words, it is extremely likely that the other website took the text from here. For example, here are some old versions of this article: December 31, 2008 and February 26, 2009. Johnuniq (talk) 10:19, 12 August 2010 (UTC)

Proxy Help[edit]

Okay, I didn't exactly get my answer when reading this. Say that you're IP Address-banned from a website. Can you use a proxy to use the site again? (talk) 07:25, 17 November 2010 (UTC)

Yes --h2g2bob (talk) 02:33, 28 December 2010 (UTC)

Made some large edits[edit]

I've been making some big changes, mostly moving sections about. I've tried to split it into "what's it used for" and "how does it work". For reference, this is the article before I started editing it. --h2g2bob (talk) 02:41, 28 December 2010 (UTC)

Percentages don't add up[edit]

"Most web filtering companies use an internet-wide crawling robot that assesses the likelihood that a content is a certain type (e.g. "This content is 70% chance of porn, 40% chance of sports, and 30% chance of news" could be the outcome for one web page)" this makes 140%. Tyzoid (talk) 12:43, 9 March 2011 (UTC)

I guess the extra 40% is from news relating to sexy sports stars :) There's no reference on that section, and it could do with some tlc, so re-write (or remove) stuff which doesn't make sense. --h2g2bob (talk) 23:31, 6 September 2011 (UTC)

Unwilling/unknowing Proxies the Result of Malware/Infection?[edit]

From reading around on the internet, I get the general idea that one purpose of the distribution of infection/malware is to create a " 'botnet". I wonder if it is correct to describe the elements within the 'botnet as "proxies", and if so shouldn't they be mentioned here? Also the general connection (if any) between malware and proxies. At this point, the article seems to deal with proxies as if the proxy were a knowing and willing participant, and it is my sense that many are not.Jonny Quick (talk) 01:47, 13 October 2011 (UTC)Jonny Quick

I don't think botnets are strictly used as a proxy: they do more than just forward requests (like denial of service). When distributing malware, I guess they would work by store-and-forward rather than proxying requests to a canonical server as you could trace the canonical server by watching traffic sent through any computer in the botnet. When they attack other machines, it's mostly automated (afaik).
The botnet owner could use botnet machines as a proxy: this would hide his real ip address (for example, if he wanted to attack a particular server by hand).
You're right that not all proxies are willing participants. This would also include legitimate proxies which have been mis-configured. --h2g2bob (talk) 15:10, 20 November 2011 (UTC)

Edit request on 5 January 2012[edit]

"In 2009 security a flaw..." should be "In 2009 a security flaw..." Mario I Rossi (talk) 04:46, 5 January 2012 (UTC)

Yep, now Fixed. Thanks! Adrian J. Hunter(talkcontribs) 10:13, 5 January 2012 (UTC)

Very little description of legalities of proxy servers[edit]

Users will understand how it works with a simple diagram. More focus is needed on the legalities of proxy server. e.g: where it is legal and where it is not legal. Do this and your article can easily become a B class article.--WOLfan112 (talk) 18:31, 13 March 2012 (UTC) {{Request edit|add more description on the legalities of proxy servers}}

That's probably a good idea, but the request edit template is for use when you have a conflict of interest and have text ready to add. I have therefore deactivated it. SmartSE (talk) 17:32, 19 March 2012 (UTC)
The following discussion is closed. Please do not modify it. Subsequent comments should be made on the appropriate discussion page. No further edits should be made to this discussion.

Merge Reverse proxy into this article?[edit]

Closing this discussion - no consensus for merge. Deb (talk) 09:08, 23 November 2012 (UTC)

The Reverse proxy article is very short and appears to have been mainly used as a vehicle for promotion of commercial software (and, perhaps, some open-source packages). I think a merge/redirect would allow better explanation of the subject material and better use of editors' time. — UncleBubba T @ C ) 03:15, 9 June 2012 (UTC)

Merge Sephiroth storm (talk) 02:43, 20 July 2012 (UTC)
Do not merge: It is a special type of a proxy and deserves a separate article. A merger would also alongate the already long article of proxies. --Sae1962 (talk) 07:56, 19 October 2012 (UTC)

The discussion above is closed. Please do not modify it. Subsequent comments should be made on the appropriate discussion page. No further edits should be made to this discussion.

Copyright restrictions[edit]

This article does not mention the use of proxy servers to bypass copyright restrictions imposed by Google books and similar venues. That is, it would appear that if you live in Japan, Gooogle books imposes Japanese copyright restrictions to all items in their library, regardless of the country of origin of the item. Similarly, British copyright restrictions, or German, which may not match US restrictions on the exact same items. So US viewers can see items that Italian viewers cannot, and perhaps vice versa for all I know. Could someone with a greater knowledge of this, add this to this article.Wjhonson (talk) 17:49, 11 July 2012 (UTC)

Name and history[edit]

Does anybody knows where the name "proxy" comes from? And its history? It would be nice to add it to the article. — Preceding unsigned comment added by (talk) 16:55, 20 July 2012 (UTC)

Shared IP address[edit]

I searched wikipedia for Shared IP address and found it was redirecting here to Proxy server. However, because this page says nothing about shared addresses I changed the redirect to IP address#IP address translation. Could an informed editor expand that section to better explain what a shared address is and how they are used? Is there any connection with proxy servers? I came across the term when looking at web hosting offers. -84user (talk) 12:53, 25 March 2013 (UTC)

I don't think "shared IP address" has any special meaning beyond the meaning of the words that make it up, that is an IP address that is in some way shared. The meaning of the term "shared" will depend on the context. In the context of a hosting service it would mean an IP address that is shared between multiple domains (see [[4]]). In the context of clients it would mean an IP address that is shared by multiple client systems (though either proxies or NAT). Plugwash (talk) 14:54, 25 March 2013 (UTC)

Proxy server translating computer language[edit]

I tried to find information about use of proxy server to translate from one computer language to another (it should be a better way to explain this...). For instance, see Apigee's API proxy server, which acts as a proxy for requests: a user/application connects to the server translating from SOAP API to a RESTful API. Would it be correct to include this as a type of proxy server in the article, or is this not considered a proxy server (what else then)? Hyperkobling (talk) 23:43, 21 June 2014 (UTC)