URI:
   DIR Return Create A Forum - Home
       ---------------------------------------------------------
       Hack Community
  HTML https://roshacks.createaforum.com
       ---------------------------------------------------------
       *****************************************************
   DIR Return to: Discussions about anonymity
       *****************************************************
       #Post#: 352--------------------------------------------------
       What is proxy?
       By: pipo1337 Date: April 30, 2018, 3:54 am
       ---------------------------------------------------------
       [center]What is Proxy?[/center]
       [center]A proxy server, also known as a "proxy" or
       "application-level gateway", is a computer that acts as a
       gateway between a local network (e.g., all the computers at one
       company or in one building) and a larger-scale network such as
       the Internet. Proxy servers provide increased performance and
       security.
       A proxy server works by intercepting connections between sender
       and receiver. All incoming data enters through one port and is
       forwarded to the rest of the network via another port. By
       blocking direct access between two networks, proxy servers make
       it much more difficult for hackers to get internal addresses and
       details of a private network.Proxies may also cache web pages.
       Each time an internal user requests a URL from outside, a
       temporary copy is stored locally. The next time an internal user
       requests the same URL, the proxy can serve the local copy
       instead of retrieving the original across the network, improving
       performance.
       [img]
  HTML https://qph.ec.quoracdn.net/main-qimg-fb01a178ff4b863eb852a162c5a4d057[/img]
       More types of proxies
       Transparent proxies are typically found near the exit of a
       corporate network. These proxies centralize network traffic. On
       corporate networks, a proxy server is associated with -- or is
       part of -- a gateway server that separates the network from
       external networks (typically the Internet) and a firewall that
       protects the network from outside intrusion and allows data to
       be scanned for security purposes before delivery to a client on
       the network. These proxies help with monitoring and
       administering network traffic as the computers in a corporate
       network are usually safe devices that do not need anonymity for
       typically mundane tasks.
       Anonymous proxies hide the IP address of the client using them
       allow to access materials that are blocked by firewalls or to
       circumvent IP address bans. They may be used for enhanced
       privacy and / or protection from attack.
       Highly anonymous proxies hide even the fact that they are being
       used by clients and present a non-proxy public IP address. So
       not only do they hide the IP address of the client using them,
       they also allow access to sites that might block proxy servers.
       Examples of highly anonymous proxies include I2P and TOR.
       Socks 4 and 5 proxies provide proxy service for UDP data and DNS
       look up operations in addition to Web traffic. Some proxy
       servers offer both Socks protocols.
       DNS proxies forward domain name service (DNS) requests from LANs
       to Internet DNS servers while caching for enhanced speed.
       Proxy servers in many forms enhance security but like many
       things in computing may be vulnerable themselves. To prevent DoS
       attacks and network intrusion, administrators should keep
       software up to date, use load balancing, enforce secure
       authorization and authentication and block unsolicited traffic,
       malicious and open proxies.
       Source from:
  HTML https://www.quora.com/What-is-proxy
       Source from:
  HTML https://whatis.techtarget.com/definition/proxy-server[/center]
       *****************************************************