The basic operating principle of a proxy server is simple enough: it is a server mandated by an application to query the Internet instead. Thus, when a user connects to the Internet using a client application configured to use a proxy server, it will connect first to the proxy server and give him his request. The proxy server will then connect to the server that the client application tries to join and submit the application. The server will then give its response to the proxy, which will in turn forward it to the client application. Now, with the use of TCP / IP within the LAN , the relay role proxy server is provided directly by gateways and routers. However, servers proxy are still valid with a number of other features.
A proxy is therefore an agent, Intermediate. On the Internet, there are different types of proxies. The most common are HTTP proxies. They support the HTTP and FTP. A large number of sites including FreeProxyserver offer the possibility of exceeding the censure simply by entering the address of the site. Unfortunately two major drawbacks to doubt the value of these sites. The speed often daunting and it is generally difficult to see the sites to work properly multimedia content.
The most effective and most efficient to divert censorship is obviously to create its own proxy server on a machine hosted in another country. Certainly, this last option a few key insiders who surely did not expect that I give them the idea, however, when looking around one can find solutions very simple to implement. The script PHProxy example, allows you to create a proxy web server in 2 seconds without any knowledge of Admin. Network. The primary principle is, simply copy the files to a PHP web server, then access the home page and you have your own web proxy server.
Anonymous surfing through a proxy server is a good way to hide their tracks surf the web. Is connected in such an anonymous proxy server between your computer and you visit a website, can the operator of the website or service, only the IP address of the proxies are found but not your own. And vice versa can only be comprehended by the way your PC to the proxy server, but not the ultimate goal. How anonymous proxies, as you must set your browser to use, and where to find lists of anonymous proxy servers that you read on this page.
Proxy can serve multiple purposes.
- The proxy can protect yourself: it may allow you to connect to the outside and prevent Internet computers come to connect to yours. This protection function is often included in proxy firewalls (fire walls), computers programmed to filter communications between networks (e.g. between the corporate network and internet).
- The proxy can hide information about your computer: For when you surf, Web sites can all know what site you came from, what browser you use, what is your operating system, your IP address. Some proxy conceal this information. These are known as proxy tools.
- The proxy can store the wanted pages. So if you ask several times http://www.tecahrena.com/index.html page, the proxy you will immediately without seeking to www.techarena.com. If you are close to the proxy, it can speed things up. It is then called proxy-cache.
In normal traffic when you surf so unprotected in the Internet, type in a URL and retrieve data from hence. Your request will be sent directly from your computer to the target computer (server), then received and converted. In general, once you receive this target server on which, for example, is a particular website, returned the requested data to your computer. This tells the other computer where the desired data to back, you automatically forward your request your 'address'. Say, your own IP address. This is stored on the target computer. The operator of the target computer can read in the logs (log files) stored data - and identify where appropriate.
It is at this point is an (anonymous) proxy into the game. A proxy is a kind of filter that is connected to the data traffic between your computer and the target computer. The proxy will indeed pass your data request, however, is not your IP address. Instead, the target server, only the IP address of the proxy sent by which your identity there is no longer detectable. Prerequisite for successful concealment of your identity is, of course, that the anonymous proxy is really anonymous. If there also logs (log files) are stored, can possibly be closed to your IP and data queries.
One thing must be mentioned at this point again: Usage must rely on the fact that these proxies are actually anonymous. It is better to check before using it again. In addition, there is no guarantee that the listed proxies are in fact always available and ensure a reasonable speed. Try using a balance with your actual IP address
Some Benefits of Proxy
The cache function : Most proxies and provide a cache function i.e. the ability to remember (in cache) the pages most often visited by LAN users so they can be provided as quickly as possible. Indeed, computer science, the term cache refers to a space temporary storage of data (the term "buffer" is also sometimes used).
A proxy server with the ability to hide information is generally called proxy-cache. This feature is implemented in some proxy servers allows one hand to reduce the use of bandwidth to the Internet as well as reduce the access time to documents for users. However, to carry out this mission, it is necessary that the proxy regularly compares the data it stores in memory cache with the remote data to ensure that cached data are still valid.
Filtering : On the other hand, by using a proxy, it is possible to monitor the connections through the incorporation of activity logs (logs) in the systematic recording of user requests when their connection requests to the Internet. It is possible to filter connections to the Internet by analyzing a client requests from the other server responses. When the filtering is done by comparing the client request to a list of requests allowed, it is called white list, where it is a list of banned sites talking about blacklist. Finally the analysis of server responses according to a list of criteria (keywords) is called content filtering.
Authentication : Insofar as the proxy is the indispensable intermediary of internal network users to access external resources, it is sometimes possible to use it to authenticate users, that is to say, ask them to identify using a user name and password for example. It is so easy to give access to external resources only to those authorized to do and can save files in the access logs identified. This type of mechanism when implemented, obviously raises many issues relating to personal freedoms and rights of people.
Bookmarks