Entry
What is a Proxy?
May 8th, 2008 16:25
i can do it, Scott Mandarich, http://www.blogyoursite.com/ http://www.vmgo.com/ http://www.blogyoursite.com/2008/03/05/proxy-servers-you-either-love-them-or-loath-them/
It seems there are many different kinds of proxy servers.
Caching proxy server
A proxy server can service requests without contacting the specified
server, by retrieving content saved from a previous request, made by
the same client or even other clients. This is called caching.
Web proxy
A proxy that focuses on WWW traffic is called a “web proxy”. The most
common use of a web proxy is to serve as a web cache.
Content Filtering Web Proxy
A content filtering web proxy server like SafeSquid[1] or DansGuardian
helps distribute Internet access while providing control to the
administrators over the content delivered. It is usually used in
organizations or schools to ensure that Internet usage conforms to the
local acceptable use policy.
Anonymizing proxy server
An anonymous proxy server (sometimes called a web proxy) generally
attempts to anonymize web surfing. These can easily be overridden by
site administrators, and thus rendered useless in some cases. There
are different varieties of anonymizers.
Hostile proxy
Proxies can also be installed by online criminals, in order to
eavesdrop upon the dataflow between the client machine and the web.
All accessed pages, as well as all forms submitted, can be captured
and analyzed by the proxy operator.
Intercepting proxy server
An intercepting proxy (also known as a “transparent proxy”) combines a
proxy server with a gateway. Connections made by client browsers
through the gateway are redirected through the proxy without client-
side configuration (or often knowledge).
Intercepting proxies are commonly used in businesses to prevent
avoidance of acceptable use policy, and to ease administrative burden,
since no client browser configuration is required.
Transparent and non-transparent proxy server
The term “transparent proxy” is most often used incorrectly to
mean “intercepting proxy” (because the client does not need to
configure a proxy and cannot directly detect that its requests are
being proxied).
Forced proxy
The term “forced proxy” is ambiguous. It means both “intercepting
proxy” (because it filters all traffic on the only available gateway
to the Internet) and its exact opposite, “non-intercepting proxy”
(because the user is forced to configure a proxy in order to access
the Internet).
Open proxy server
Because proxies might be used for abuse, system administrators have
developed a number of ways to refuse service to open proxies. Many IRC
networks automatically test client systems for known types of open
proxy. Likewise, an email server may be configured to automatically
test e-mail senders for open proxies.
Split proxy server
A split proxy is a proxy implemented as two programs installed on two
different computers. Since they are effectively two parts of the same
program, they can communicate with each other in a more efficient way
than they can communicate with a more standard resource or tool such
as a website or browser. This is ideal for compressing data over a
slow link, such as a wireless or mobile data service, as well as for
reducing the issues regarding high latency links (such as satellite
internet) where establishing a TCP connection is time consuming.
Reverse proxy server
A reverse proxy is a proxy server that is installed in the
neighborhood of one or more web servers. All traffic coming from the
Internet and with a destination of one of the web servers goes through
the proxy server.
Circumventor
A circumventor is a method of defeating blocking policies implemented
using proxy servers. Ironically, most circumventors are also proxy
servers, of varying degrees of sophistication, which effectively
implement “bypass policies”.
A circumventor is a web-based page that takes a site that is blocked
and “circumvents” it through to an unblocked web site, allowing the
user to view blocked pages. A famous example is ‘elgooG’, which
allowed users in China to use Google after it had been blocked there.
elgooG differs from most circumventors in that it circumvents only one
block.
Students are able to access blocked sites (games, chatrooms,
messenger, social networking, etc.) through a circumventor. As fast as
the filtering software blocks circumventors, others spring up. It
should be noted, however, that in some cases the filter may still
intercept traffic to the circumventor, thus the person who manages the
filter can still see the sites that are being visited.
At schools and offices
Many work places and schools are cracking down on the web sites and
online services that are made available in their buildings. Since
circumventors are used to bypass censors in computers, web sites like
Orkut, MySpace, Bebo, Xanga, Silkroad Online, YouTube, Miniclip,
Facebook, Gaiaonline and other non-work or school related social web
sites have become targets of mass banning.
Managed ‘clean-pipe’ proxy servers
Used in an increasing number of work-places, especially those with
multiple Internet breakout points. Currently an emerging technology to
rival in-house, hardware solutions. Many consider this a branch of
Software as a Service or Security as a Service. Providers include AT&T
and ScanSafe.
Info provided by"
http://www.blogyoursite.com/
http://www.stupidarticles.com
http://www.halazona.com
http://www.shikapika.com
http://www.stakoza.com
http://www.uploadarticles.com
http://www.ganazat.com
http://www.damima.com
http://www.tarabiza.com
http://www.articlesxarticles.com
http://www.articlesfreedirectory.com