What is the proxy server?
Proxy server is a computer that sits between the client and the server to capture the requirements. There are several use of proxy server, but the most common is to accelerate network traffic by storing to cache or files that are often required. In this way, the server can deliver the request quickly and only ask the server if necessary. In this way, it not only accelerates network traffic, but also relieves the server load. The main internet hubs and Internet service providers (ISP) use dozens of proxy servers.
filtering or censorship is another use for proxy server. A company that provides an Internet connection with its employees could configure such a server to block the requirements for a particular website. It can also filter content based on configurable criteria that help enforce acceptable use principles.
If the proxy server does not require a web browser to use proxy, it is called transparent proxy. In the OpeningThe web browser must point to the proxy to use it. The Companes favors the former because employees cannot bypass it by reducing their web browsers. These types of servers are also commonly used as firewalls. They can scan malware, viruses and other threats, protect the main server and network.
TheSecure Sockets Layer (SSL) servers used to create virtual private networks (VPN) sometimes use http proxy. These proxyes accelerate operation through secure channels and check viruses in tunneled communication. Proxy server http with can encrypt, decrypt and cache. Regular proxy servers cannot encrypt the cache data for security reasons and therefore do not serve any purpose in the VPN. There are differences in views whether http with proxy create potential safetyZika.
Another use for Proxy server is to provide anonymous surfing on the web. Many servicing provides proxy to the public to protect their online anonymity. Customer requirements move to the proxy website that reduces IP (IP) address (IP) and sends them to the journey. The information is routed back to the proxy, which then transmits the pages to the customer's browser. As for the Internet, the only IP address on the remote server is the Proxy IP address. Only proxy knows the customer's IP address. Companies that operate the proxy anonymous servers generally claim that they often delete server protocols to protect the customer's privacy.
Another model includes a network of Proxy volunteer servers. This model uses encryption to block the original IP address and the final route that the request will submit. Since the request goes through the Internet from one proxy server to the next, each server in the middle can only read adjacent steps in the string. Content, Origin and Final Goal of Bestare available.
Thetonnant server decrypts the content and delivers a request for a server without a simple text record of where the request was created. The page or file then returns in the same way through a series of encrypted steps. This system confuses traffic analysis and protects privacy while protecting Proxy servers themselves.