GeekSays

Latest Technology News & Geeky Gadgets

  • All News
  • Apple
  • Jailbreak News
  • How To
  • Recommends
  • About GeekSays
    • About Us
    • Contact Us
    • Terms And Privacy
  • March 20, 2023
You are here: GeekSays Technology News » General » Geek’s Introduction To Proxy Servers

Geek’s Introduction To Proxy Servers

Last updated on June 9, 2016 By Lori Mkhize Leave a Comment

A proxy is a networking application which allows user to go anonymous on the web by residing on to a proxy IP which responds to the server requests in a transparent method. The enhancement of proxy usage has allowed several organizations to strengthen their security and at the same time drastically improve performance. The major applications of using proxy server are to improve performance, allow the extension of anonymity and enhance the security algorithms for any environment.

When it comes to using a specific proxy server for an anonymous use, we can distinguish it into three factors:-

1)     Content Filtering

Proxy can be used to filter contents which do not have an authorized access, if a company for instance needs to block some web page for the client computers, it can do so by using a proxy firewall called MIMO filtering and keyword filtering, which allows the main administrator to block out unauthorized access, hence enhancing the security principles of the organization. It is mostly used in schools, colleges to restrict pornography, gambling and social networking contents on the web. Additionally, a restriction can be placed on the server side as a whole to block out unnecessary keywords usages. Keyword filtering allows blocking specific keywords based on the administrator preferences; it also allows the restriction of those requests which can be layered out in multiple levels of access.

2)     Anonymity

The most wide usage of any proxy server is for its application of being anonymous, a user can reside to a proxy IP instead of their personal IP address – which usually contain their personal address, with the usage of proxy IP, the original request of server for address or location cannot be traced, and therefore the user is anonymous on the web. Although this feature is widely appreciated, it has lead to some major drawbacks on the security aspects as well. Many people who have a wide knowledge of using proxy server can automate their usage and hack databases without revealing their identity, and trace back of the main client sending the packet requests is impossible to find unless the real MAC address can be traced out. The general idea of any proxy application is being anonymous, and accessing that content which is usually done by blocking server request of specific IP address to the web.

3)     Security

Increased threat to personal databases and files has lead to a major and widespread appreciation of proxy servers and their usages. A web proxy can be established on both intranets as well as extranet. The subnet mask can be worked wholly for all the usable IPs to the sub network and the same proxy IP can be applied to them, leading to the application of content, MIMO or keyword filtering.

Additionally, CGI proxies has enabled the user has eased the access of proxy networking without extensive knowledge. Proxy network is implemented on the PHP side of the website, allowing general viewers to visit the website first and browser through a frame which leads to anonymity.

Security for organization has been strengthened and various applications of proxies has been applied to major units of deployment within and outside a certain firm. Intranet application of the firm uses content monitoring and filtering, while the external extranet can use anonymity web proxy to serve it’s usages in a more confidential manner.

4)     Increase Performance

While proxy serves anonymity to the general users, it can also be used to increase performance of web surfing. Cache proxy can be used to store cookies, plug-in and other data of a specific web page last visited, hence leading to a quick server request, by automatically sending those stored data to the server request. It dramatically improves the performance, as the smallest of CSS style sheets does not has to be reloaded again and again multiple times each time a user visits a webpage. This application of cache proxy surely has been a remarkable essence of improving user’s resource management principles. Cache memory is a temporary memory that resides either in the user’s browser or the client storage; it automatically stores the temporary data of the server request to the web page, and retrieves them whenever the same web page is accessed by the user.

Generally, proxy can be classified into five types:-

1)     Transparent Proxy

Not served for being anonymous on the web, but it is generally used to increase performance by caching web pages at the server. It leads to quick recall of the saved pages by sending request to the cached which were saved on previous occasion of surfing. It makes the original IP address available to different hyper text protocols for browsing the web.

2)     Anonymous Proxy

These proxies are served for being anonymous on the web, the server identified itself as a proxy server instead of sending the origin ail IP address to the http headers, it sends the proxy address to the server. Although, the usage of proxy can be easily identified, it does provide the application of anonymous browsing.

3)     Open Proxy

It hides the user’s IP address, and the server request is forwarded from and to anywhere on the Internet. Not residing from the user to server side, the request is often forwarded randomly on the Internet packets; it does provide a reasonable security by hiding the IP address of the user sending the request to the server.

4)     Distorting Proxy

Sending the incorrect or distorted IP address, it hides the original identity of the user and serves to be anonymous. It is often used to access those areas, where country restriction is applied. For e.g. – if a web page can only be accessed from USA, a distorting proxy of USA IP address can be applied to surf that specific web page.

 

5)     High anonymity proxy

Unlike anonymous proxy, this proxy does not serve itself as a proxy server and does not reveal the original IP address as well. It is often used for commercial purposes, and these kind of proxies are often expensive to acquire.

Filed Under: General

About Lori Mkhize

I am student blogger, tech savvy and like most women love shopping! I have got a bit of geek in me and this is where I explore it. I love online computer games and hate anything slow.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Updated

Become GeekSays exclusive subscriber and get all the spice directly in your mail.

Stay Connected

Editor’s Choice

iPhone 7 A1660/A1661 Qualcomm Modem vs A1778/A1784 Intel Modem

February 28, 2017 By Hamza Sheikh Leave a Comment

How to Watch Live TV on Your iPhone Using Channels Without Jailbreak

February 13, 2017 By Hamza Sheikh Leave a Comment

Best VPN Apps for iPhone/iPad to Unblock School Wifi Restrictions

February 9, 2017 By Hamza Sheikh 2 Comments

Apple iPhone 7 Plus A1661 SIM-Free Review

February 6, 2017 By Hamza Sheikh 1 Comment

Difference Between iPhone 7 Models: A1660, A1778, and A1779 (Detailed)

January 23, 2017 By Hamza Sheikh Leave a Comment

Technology News & Geeky Gadgets

GeekSays is a technology news and geeky gadgets blog / community, dedicated to the latest technology news and gadgets from all over the tech industry. GeekSays focuses on the upcoming latest technology scoops about iPhone, Apple, Samsung, Google, Android, Microsoft, Windows, BlackBerry, and the latest geeky tech gadgets. GeekSays plays an important role in breaking technology updates about upcoming events, tech devices, features, gadgets and verdicts from all the mainstream technology companies. It also covers tutorials on how to use the iphone, reviews of best android apps, iOS downloads,..

Copyright © 2023 Geek Says | All Rights Reserved