Logged In: NO

Perhaps the way to approach this is to create a master list
of proxies, and then have the program test them for
user-defined criteria. (ie. ping, anonymity) Then have a
separate list of "good" proxies which is used for the chain...