DIR Return Create A Forum - Home
---------------------------------------------------------
Hack Community
HTML https://roshacks.createaforum.com
---------------------------------------------------------
*****************************************************
DIR Return to: Discussions about anonymity
*****************************************************
#Post#: 352--------------------------------------------------
What is proxy?
By: pipo1337 Date: April 30, 2018, 3:54 am
---------------------------------------------------------
[center]What is Proxy?[/center]
[center]A proxy server, also known as a "proxy" or
"application-level gateway", is a computer that acts as a
gateway between a local network (e.g., all the computers at one
company or in one building) and a larger-scale network such as
the Internet. Proxy servers provide increased performance and
security.
A proxy server works by intercepting connections between sender
and receiver. All incoming data enters through one port and is
forwarded to the rest of the network via another port. By
blocking direct access between two networks, proxy servers make
it much more difficult for hackers to get internal addresses and
details of a private network.Proxies may also cache web pages.
Each time an internal user requests a URL from outside, a
temporary copy is stored locally. The next time an internal user
requests the same URL, the proxy can serve the local copy
instead of retrieving the original across the network, improving
performance.
[img]
HTML https://qph.ec.quoracdn.net/main-qimg-fb01a178ff4b863eb852a162c5a4d057[/img]
More types of proxies
Transparent proxies are typically found near the exit of a
corporate network. These proxies centralize network traffic. On
corporate networks, a proxy server is associated with -- or is
part of -- a gateway server that separates the network from
external networks (typically the Internet) and a firewall that
protects the network from outside intrusion and allows data to
be scanned for security purposes before delivery to a client on
the network. These proxies help with monitoring and
administering network traffic as the computers in a corporate
network are usually safe devices that do not need anonymity for
typically mundane tasks.
Anonymous proxies hide the IP address of the client using them
allow to access materials that are blocked by firewalls or to
circumvent IP address bans. They may be used for enhanced
privacy and / or protection from attack.
Highly anonymous proxies hide even the fact that they are being
used by clients and present a non-proxy public IP address. So
not only do they hide the IP address of the client using them,
they also allow access to sites that might block proxy servers.
Examples of highly anonymous proxies include I2P and TOR.
Socks 4 and 5 proxies provide proxy service for UDP data and DNS
look up operations in addition to Web traffic. Some proxy
servers offer both Socks protocols.
DNS proxies forward domain name service (DNS) requests from LANs
to Internet DNS servers while caching for enhanced speed.
Proxy servers in many forms enhance security but like many
things in computing may be vulnerable themselves. To prevent DoS
attacks and network intrusion, administrators should keep
software up to date, use load balancing, enforce secure
authorization and authentication and block unsolicited traffic,
malicious and open proxies.
Source from:
HTML https://www.quora.com/What-is-proxy
Source from:
HTML https://whatis.techtarget.com/definition/proxy-server[/center]
*****************************************************