I did some more checking, and from my VPS in Amsterdam
hosted by SeedVPS, my Windows 2008 R2 Server, it does
NOT block the browser.
However, on my dedicated Centos Linux box hosted by
ServerPronto in Miami, FL using Firefox when I clear the
cookie cache,
https://dukascopy.com always presents a very
challinging Captcha like "click the ones with pictures of
cars..." and as soon as I pass that test, then I get access
to the site.
Clearly it uses a cookie, since...
If I clear the browser cookie cache; I get promped yet again. I made sure
the network settings were set to No Proxy in Firefox.
It seems Dukascopy is using Cloudflare to act as a DDOS or
similar front-end and is detecting what it thinks are suspect
spammers or some such thing.
I guess this is mostly likely not posted in the right place to
get an answer to this; but my issue is not with the Browser.
Instead, it is with connecting and launching the Standalone
JForex API using the Demo link. That's the one that rejects
and returns an HTTP 403 code.
I'm looking at upgrading my runtime jars to more recent code,
and maybe that will help.
Attached is part of the Captcha image, identifying Cloudflare...
hyperscalper