Monday, October 3, 2011

All About the Proxy Technologies

There are lots of misinformation surrounding internet proxies and it isn't surprising when one or the other type of proxies crop up when users are told to select the best. One of the worrying aspects of this is that proxies have become synonymous with security.
Though proxies make an individual secure, they also help achieve the opposite. They are always an intermediary which sits Proxy is always an intermediary. It is a server which sits between the sites the user visits and the user. This is wonderful if you want to bypass some restriction or surf anonymously. However, you are trusting and sending all data to the proxy server owner.

Features
If you are using proxy server - either web based, or surfing from school or work - each request from web page first goes to the proxy. The server then examines the packet content and header, checking with its internal rules.
For instance, anonymous proxy servers reconstruct data packet with a varying IP address. Thereafter, the proxy server sends request to target web server, receiving the reply later. Thereafter, it is forwarded back to the initial client.
The reasons for using proxies are many. However, the fact that all data is directed through them mustn't be forgotten. Proxy server is usually enforced in work or school for ensuring that nobody breaks the policy of internet usage and prevent people from inappropriate content access.

Overview
Few people set up storing proxy servers, available purely for speed to save web sites accessed frequently. Transparent proxies don't modify any such requests, and therefore, don't hide the IP address. Hostile proxies steal passwords and information.

Though these are some of them, the uses are varied. Remember - whichever proxy you use - whether it is the one page internet web proxy surrounded by ads, or sophisticated proxy caching at work - the proxy administrator has full control of the data. Hence, it is important to take care.
The best proxy is the one which is securely run by someone trustworthy who deletes and secures the data.

0 comments:

Post a Comment

 
Technology n Computer Copyright © DannyMills Software Computer 2011 Gadget