faqts : Computers

+ Search
Add Entry AlertManage Folder Edit Entry Add page to http://del.icio.us/
Did You Find This Entry Useful?

2 of 3 people (67%) answered Yes
Recently 2 of 3 people (67%) answered Yes

Entry

What is a Proxy?

May 8th, 2008 16:25
i can do it, Scott Mandarich, http://www.blogyoursite.com/ http://www.vmgo.com/ http://www.blogyoursite.com/2008/03/05/proxy-servers-you-either-love-them-or-loath-them/


It seems there are many different kinds of proxy servers.
Caching proxy server
A proxy server can service requests without contacting the specified 
server, by retrieving content saved from a previous request, made by 
the same client or even other clients. This is called caching.
Web proxy
A proxy that focuses on WWW traffic is called a “web proxy”. The most 
common use of a web proxy is to serve as a web cache.
Content Filtering Web Proxy
A content filtering web proxy server like SafeSquid[1] or DansGuardian 
helps distribute Internet access while providing control to the 
administrators over the content delivered. It is usually used in 
organizations or schools to ensure that Internet usage conforms to the 
local acceptable use policy.
Anonymizing proxy server
An anonymous proxy server (sometimes called a web proxy) generally 
attempts to anonymize web surfing. These can easily be overridden by 
site administrators, and thus rendered useless in some cases. There 
are different varieties of anonymizers.
Hostile proxy
Proxies can also be installed by online criminals, in order to 
eavesdrop upon the dataflow between the client machine and the web. 
All accessed pages, as well as all forms submitted, can be captured 
and analyzed by the proxy operator.
Intercepting proxy server
An intercepting proxy (also known as a “transparent proxy”) combines a 
proxy server with a gateway. Connections made by client browsers 
through the gateway are redirected through the proxy without client-
side configuration (or often knowledge).
Intercepting proxies are commonly used in businesses to prevent 
avoidance of acceptable use policy, and to ease administrative burden, 
since no client browser configuration is required.
Transparent and non-transparent proxy server
The term “transparent proxy” is most often used incorrectly to 
mean “intercepting proxy” (because the client does not need to 
configure a proxy and cannot directly detect that its requests are 
being proxied).
Forced proxy
The term “forced proxy” is ambiguous. It means both “intercepting 
proxy” (because it filters all traffic on the only available gateway 
to the Internet) and its exact opposite, “non-intercepting proxy” 
(because the user is forced to configure a proxy in order to access 
the Internet).
Open proxy server
Because proxies might be used for abuse, system administrators have 
developed a number of ways to refuse service to open proxies. Many IRC 
networks automatically test client systems for known types of open 
proxy. Likewise, an email server may be configured to automatically 
test e-mail senders for open proxies.
Split proxy server
A split proxy is a proxy implemented as two programs installed on two 
different computers. Since they are effectively two parts of the same 
program, they can communicate with each other in a more efficient way 
than they can communicate with a more standard resource or tool such 
as a website or browser. This is ideal for compressing data over a 
slow link, such as a wireless or mobile data service, as well as for 
reducing the issues regarding high latency links (such as satellite 
internet) where establishing a TCP connection is time consuming.
Reverse proxy server
A reverse proxy is a proxy server that is installed in the 
neighborhood of one or more web servers. All traffic coming from the 
Internet and with a destination of one of the web servers goes through 
the proxy server.
Circumventor
A circumventor is a method of defeating blocking policies implemented 
using proxy servers. Ironically, most circumventors are also proxy 
servers, of varying degrees of sophistication, which effectively 
implement “bypass policies”.
A circumventor is a web-based page that takes a site that is blocked 
and “circumvents” it through to an unblocked web site, allowing the 
user to view blocked pages. A famous example is ‘elgooG’, which 
allowed users in China to use Google after it had been blocked there. 
elgooG differs from most circumventors in that it circumvents only one 
block.
Students are able to access blocked sites (games, chatrooms, 
messenger, social networking, etc.) through a circumventor. As fast as 
the filtering software blocks circumventors, others spring up. It 
should be noted, however, that in some cases the filter may still 
intercept traffic to the circumventor, thus the person who manages the 
filter can still see the sites that are being visited.
At schools and offices
Many work places and schools are cracking down on the web sites and 
online services that are made available in their buildings. Since 
circumventors are used to bypass censors in computers, web sites like 
Orkut, MySpace, Bebo, Xanga, Silkroad Online, YouTube, Miniclip, 
Facebook, Gaiaonline and other non-work or school related social web 
sites have become targets of mass banning.
Managed ‘clean-pipe’ proxy servers
Used in an increasing number of work-places, especially those with 
multiple Internet breakout points. Currently an emerging technology to 
rival in-house, hardware solutions. Many consider this a branch of 
Software as a Service or Security as a Service. Providers include AT&T 
and ScanSafe.
Info provided by"
http://www.blogyoursite.com/
http://www.stupidarticles.com
http://www.halazona.com
http://www.shikapika.com
http://www.stakoza.com
http://www.uploadarticles.com
http://www.ganazat.com
http://www.damima.com
http://www.tarabiza.com
http://www.articlesxarticles.com
http://www.articlesfreedirectory.com