A user is connected to the Internet by a proxy server that impersonates
the user. Websites are accessed by sending an HTTP request to the proxy
server. The HTTP request is encoded with characters that are understood
by the proxy as requiring that the HTTP request be intercepted and either
an identified script be executed or data within the request be extracted.
The impersonating proxy automatically carries out the steps that would
otherwise be carried out by the user when performing a transaction at a
website. In one example, a user checks a bank website for a balance
inquiry. A first HTTP request includes a script identifier. The proxy
retrieves and executes the identified script, which in turn causes a an
HTTP response to be sent to the user's browser for personal information
(e.g., user name and password). That personal information is extracted
from a second HTTP request returned to the proxy, and the proxy accesses
the bank website, enters the personal information, retrieves the account
balance, and provides it to the user.