How To Pick A Proxy

21 Jan

A proxy server is a mainframe that sits in the middle of a client and a server to intercept requests. There are many practices of a proxy server, but the best used is to hurry network traffic by caching pages or files that are requested often. By doing this, the server can deliver the request rapidly, only polling the server when needed. In this way, it not only speeds up network traffic, but also lessens server load. Major Internet hubs and Internet Service Providers (ISPs) employ dozens of proxy servers.

Filtering or censorship is another use for a proxy server. A company that offers Internet connectivity to its workers may set such a server to block requests for certain websites. It can similarly filter content based on configurable criteria to help enforce suitable use policies.

If a proxy server does not need a Web browser to be configured to use the proxy, it’s called a transparent proxy. Then the Web browser must point to the proxy in order to use it. Businesses prefer the former, as workers can’t avoid it by readjusting their Web browsers. These sort of servers are also regularly used as firewalls. They can scan for malware, viruses, and other threats, maintaining the main server and network.

Secure Sockets Layer (SSL) servers used to build Virtual Private Networks (VPNs) occasionally use https proxies. These website proxy proxies speed traffic over safe channels and check for viruses in tunnelled communications. The https proxy server can encrypt, decrypt, and cache encrypted data. Regular proxy servers cannot cache encrypted data for protection reasons, and therefore serve no purpose in a VPN. There are differences of view as to whether https proxies make possible security risks.

Yet an additional use for a proxy server is to deliver anonymous Web surfing. Many services provide proxies for the public to use to keep their online anonymity. The customer’s requests go to the website’s proxy server, which removes the customer’s Internet protocol (IP) address and sends them on their way. The data gets sent back to the proxy, which then sends the pages to the surfer’s browser. As far as the Internet is concerned, the only IP address on the remote server is the proxy’s IP address. Only the proxy knows the customer’s IP address. Businesses that run anonymous proxy servers normally claim to wipe server logs often to protect customer privacy.

Another use includes a network of volunteer proxy servers. This model utilise encryption to obfuscate the original IP address and final route a request takes. As the request goes way through the Internet from one proxy server to the next, each server in between can only read the adjacent steps in the chain. Contents, origin, and ultimate destination are all unavailable.

The final server decrypts the contents and delivers the request to the server without a plain text record of where the request began. The page or file then returns the same way, through a series of encrypted steps. This links system foils traffic analysis and secures discretion while defending the proxy servers themselves.


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: