SlideShare a Scribd company logo
1 of 14
UsesUses
To keep machines behind it anonymous, mainly for security.

To speed up access to resources. Web proxies are commonly used to
cache web pages from a web server.

To prevent downloading the same content multiple times.

To log / audit usage, e.g. to provide company employee Internet
usage reporting.

To scan transmitted content for malware before delivery.

To scan outbound content, e.g., for data loss prevention.

To bypass website restrictions at work.

Access enhancement/restriction
How do I use a Proxy Server?How do I use a Proxy Server?
Please be aware that the use of proxy servers
without the express permission from the
owner of the proxy server may be illegal in
some states and/or countries. Use at your
own risk.Use your favorite search engine
and search for 'proxy server list'. You'll find
many sites with lists of proxy servers, their
IP address, the port they listen on, and
usually what country they are in. Write down
a few of them.
Proxy TypesProxy Types
Transparent ProxyTransparent Proxy
This type of proxy server identifies itself as a
proxy server and also makes the original IP
address available through the http headers.
These are generally used for their ability to
cache websites and do not effectively
provide any anonymity to those who use
them. However, the use of a transparent
proxy will get you around simple IP bans.
They are transparent in the terms that your
IP address is exposed, not transparent in
the terms that you do not know that you are
using it
Anonymous ProxyAnonymous Proxy
This type of proxy server indentifies itself as a
proxy server, but does not make the original
IP address available. This type of proxy
server is detectable, but provides
reasonable anonymity for most users.
Distorting ProxyDistorting Proxy
This type of proxy server identifies itself as a
proxy server, but make an incorrect original
IP address available through the http
headers.
High Anonymity ProxyHigh Anonymity Proxy
This type of proxy server does not identify
itself as a proxy server and does not make
available the original IP address.
Web proxiesWeb proxies
A common proxy application is a caching Web
proxy. This provides a nearby cache of Web
pages and files available on remote Web
servers, allowing local network clients to
access them more quickly or reliably.
When it receives a request for a Web
resource (specified by a URL), a caching
proxy looks for the resulting URL in its local
cache. If found, it returns the document
immediately. Otherwise it fetches it from the
remote server, returns it to the requester
and saves a copy in the cache. The cache
usually uses an expiry algorithm to remove
documents from the cache, according to
their age, size, and access history. Two
simple cache algorithms are Least Recently
Used (LRU) and Least Frequently Used
Web proxies can also filter the content of Web
pages served. Some censorware
applications - which attempt to block
offensive Web content - are implemented as
Web proxies. Other web proxies reformat
web pages for a specific purpose or
audience; for example, Skweezer reformats
web pages for cell phones and PDAs.
Network operators can also deploy proxies
to intercept computer viruses and other
hostile content served from remote Web
pages.
Thanking you...Thanking you...
Presented by Proxiesforrent..
Located at Mumbai....

More Related Content

What's hot

Securing Single Page Applications with Token Based Authentication
Securing Single Page Applications with Token Based AuthenticationSecuring Single Page Applications with Token Based Authentication
Securing Single Page Applications with Token Based Authentication
Stefan Achtsnit
 
Mohanraj - Securing Your Web Api With OAuth
Mohanraj - Securing Your Web Api With OAuthMohanraj - Securing Your Web Api With OAuth
Mohanraj - Securing Your Web Api With OAuth
fossmy
 
Secure Web Services
Secure Web ServicesSecure Web Services
Secure Web Services
Rob Daigneau
 

What's hot (17)

REST-Api Design & Develop
REST-Api Design & DevelopREST-Api Design & Develop
REST-Api Design & Develop
 
Website hacking and prevention (All Tools,Topics & Technique )
Website hacking and prevention (All Tools,Topics & Technique )Website hacking and prevention (All Tools,Topics & Technique )
Website hacking and prevention (All Tools,Topics & Technique )
 
Securing Single Page Applications with Token Based Authentication
Securing Single Page Applications with Token Based AuthenticationSecuring Single Page Applications with Token Based Authentication
Securing Single Page Applications with Token Based Authentication
 
Mohanraj - Securing Your Web Api With OAuth
Mohanraj - Securing Your Web Api With OAuthMohanraj - Securing Your Web Api With OAuth
Mohanraj - Securing Your Web Api With OAuth
 
Api security-testing
Api security-testingApi security-testing
Api security-testing
 
Web Cache Poisoning
Web Cache PoisoningWeb Cache Poisoning
Web Cache Poisoning
 
Cache poisoning
Cache poisoningCache poisoning
Cache poisoning
 
Blind xss
Blind xssBlind xss
Blind xss
 
Secure Web Services
Secure Web ServicesSecure Web Services
Secure Web Services
 
A8 cross site request forgery (csrf) it 6873 presentation
A8 cross site request forgery (csrf)   it 6873 presentationA8 cross site request forgery (csrf)   it 6873 presentation
A8 cross site request forgery (csrf) it 6873 presentation
 
HTTPS at Sydney Alt.Net User Group
HTTPS at Sydney Alt.Net User GroupHTTPS at Sydney Alt.Net User Group
HTTPS at Sydney Alt.Net User Group
 
Building an API Security Ecosystem
Building an API Security EcosystemBuilding an API Security Ecosystem
Building an API Security Ecosystem
 
Php security
Php securityPhp security
Php security
 
Beyond API Authorization
Beyond API AuthorizationBeyond API Authorization
Beyond API Authorization
 
Introduction to Web security
Introduction to Web securityIntroduction to Web security
Introduction to Web security
 
Unicode
UnicodeUnicode
Unicode
 
Secure Code Warrior - NoSQL injection
Secure Code Warrior - NoSQL injectionSecure Code Warrior - NoSQL injection
Secure Code Warrior - NoSQL injection
 

Similar to Uses of proxies

Http Proxy Server
Http Proxy ServerHttp Proxy Server
Http Proxy Server
Sourav Roy
 
Group18_Awesome4some:Proxy server.ppt
Group18_Awesome4some:Proxy server.pptGroup18_Awesome4some:Proxy server.ppt
Group18_Awesome4some:Proxy server.ppt
Anitha Selvan
 

Similar to Uses of proxies (20)

Proxy Server
Proxy ServerProxy Server
Proxy Server
 
Proxy Server: A Comprehensive Guide
Proxy Server: A Comprehensive GuideProxy Server: A Comprehensive Guide
Proxy Server: A Comprehensive Guide
 
cybersecurity unit 5 basics of cybersecurity
cybersecurity unit 5 basics of cybersecuritycybersecurity unit 5 basics of cybersecurity
cybersecurity unit 5 basics of cybersecurity
 
Web Proxy Server
Web Proxy ServerWeb Proxy Server
Web Proxy Server
 
Reverse proxy
Reverse proxyReverse proxy
Reverse proxy
 
Firewall with proxy server.
Firewall with proxy server.Firewall with proxy server.
Firewall with proxy server.
 
Reverse proxy
Reverse proxyReverse proxy
Reverse proxy
 
Introduction to stable proxies.
Introduction to stable proxies.Introduction to stable proxies.
Introduction to stable proxies.
 
Firewall vpn proxy
Firewall vpn proxyFirewall vpn proxy
Firewall vpn proxy
 
week14
week14week14
week14
 
Using Proxies To Secure Applications And More
Using Proxies To Secure Applications And MoreUsing Proxies To Secure Applications And More
Using Proxies To Secure Applications And More
 
Http Proxy Server
Http Proxy ServerHttp Proxy Server
Http Proxy Server
 
Group18_Awesome4some:Proxy server.ppt
Group18_Awesome4some:Proxy server.pptGroup18_Awesome4some:Proxy server.ppt
Group18_Awesome4some:Proxy server.ppt
 
Proxy Servers
Proxy ServersProxy Servers
Proxy Servers
 
Proxies
ProxiesProxies
Proxies
 
Proxies
ProxiesProxies
Proxies
 
How does proxy works?
How does proxy works?How does proxy works?
How does proxy works?
 
Advantages of proxy server
Advantages of proxy serverAdvantages of proxy server
Advantages of proxy server
 
Proxies
ProxiesProxies
Proxies
 
Web Browser Basics, Tips & Tricks - Draft 20 (Revised 5/18/17)
Web Browser Basics, Tips & Tricks - Draft 20 (Revised 5/18/17)Web Browser Basics, Tips & Tricks - Draft 20 (Revised 5/18/17)
Web Browser Basics, Tips & Tricks - Draft 20 (Revised 5/18/17)
 

More from Proxies Rent

Bandwidth proxyserver
Bandwidth proxyserverBandwidth proxyserver
Bandwidth proxyserver
Proxies Rent
 

More from Proxies Rent (20)

Torrent
TorrentTorrent
Torrent
 
Features supported by squid proxy server
Features supported by squid proxy serverFeatures supported by squid proxy server
Features supported by squid proxy server
 
Optimiszing proxy
Optimiszing proxyOptimiszing proxy
Optimiszing proxy
 
Proxy
ProxyProxy
Proxy
 
How to bypass web restrictions
How to bypass web restrictionsHow to bypass web restrictions
How to bypass web restrictions
 
Hidden ip does not allow hackers to identify your location
Hidden ip does not allow hackers to identify your locationHidden ip does not allow hackers to identify your location
Hidden ip does not allow hackers to identify your location
 
Securely managed and timed proxy server
Securely managed and timed proxy serverSecurely managed and timed proxy server
Securely managed and timed proxy server
 
How to access torrent
How to access torrentHow to access torrent
How to access torrent
 
Bandwidth proxyserver
Bandwidth proxyserverBandwidth proxyserver
Bandwidth proxyserver
 
Optimiszing proxy
Optimiszing proxyOptimiszing proxy
Optimiszing proxy
 
Proxy server
Proxy serverProxy server
Proxy server
 
Torrent
TorrentTorrent
Torrent
 
Proxy
ProxyProxy
Proxy
 
Unristricted proxy
Unristricted proxyUnristricted proxy
Unristricted proxy
 
Unrestricted Internet Access Using a Proxy Server
Unrestricted Internet Access Using a Proxy ServerUnrestricted Internet Access Using a Proxy Server
Unrestricted Internet Access Using a Proxy Server
 
Optimizing proxy
Optimizing proxyOptimizing proxy
Optimizing proxy
 
How to access torrent?
How to access torrent?How to access torrent?
How to access torrent?
 
Proxy : effective logs for tracking down usage trends
Proxy : effective logs for tracking down usage trendsProxy : effective logs for tracking down usage trends
Proxy : effective logs for tracking down usage trends
 
Proxy For employee monitoring
Proxy  For employee monitoringProxy  For employee monitoring
Proxy For employee monitoring
 
L ive streaming
L ive streamingL ive streaming
L ive streaming
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Uses of proxies

  • 1.
  • 2. UsesUses To keep machines behind it anonymous, mainly for security.  To speed up access to resources. Web proxies are commonly used to cache web pages from a web server.  To prevent downloading the same content multiple times.  To log / audit usage, e.g. to provide company employee Internet usage reporting.  To scan transmitted content for malware before delivery.  To scan outbound content, e.g., for data loss prevention.  To bypass website restrictions at work.  Access enhancement/restriction
  • 3.
  • 4. How do I use a Proxy Server?How do I use a Proxy Server? Please be aware that the use of proxy servers without the express permission from the owner of the proxy server may be illegal in some states and/or countries. Use at your own risk.Use your favorite search engine and search for 'proxy server list'. You'll find many sites with lists of proxy servers, their IP address, the port they listen on, and usually what country they are in. Write down a few of them.
  • 6. Transparent ProxyTransparent Proxy This type of proxy server identifies itself as a proxy server and also makes the original IP address available through the http headers. These are generally used for their ability to cache websites and do not effectively provide any anonymity to those who use them. However, the use of a transparent proxy will get you around simple IP bans. They are transparent in the terms that your IP address is exposed, not transparent in the terms that you do not know that you are using it
  • 7. Anonymous ProxyAnonymous Proxy This type of proxy server indentifies itself as a proxy server, but does not make the original IP address available. This type of proxy server is detectable, but provides reasonable anonymity for most users.
  • 8. Distorting ProxyDistorting Proxy This type of proxy server identifies itself as a proxy server, but make an incorrect original IP address available through the http headers.
  • 9. High Anonymity ProxyHigh Anonymity Proxy This type of proxy server does not identify itself as a proxy server and does not make available the original IP address.
  • 10.
  • 11. Web proxiesWeb proxies A common proxy application is a caching Web proxy. This provides a nearby cache of Web pages and files available on remote Web servers, allowing local network clients to access them more quickly or reliably.
  • 12. When it receives a request for a Web resource (specified by a URL), a caching proxy looks for the resulting URL in its local cache. If found, it returns the document immediately. Otherwise it fetches it from the remote server, returns it to the requester and saves a copy in the cache. The cache usually uses an expiry algorithm to remove documents from the cache, according to their age, size, and access history. Two simple cache algorithms are Least Recently Used (LRU) and Least Frequently Used
  • 13. Web proxies can also filter the content of Web pages served. Some censorware applications - which attempt to block offensive Web content - are implemented as Web proxies. Other web proxies reformat web pages for a specific purpose or audience; for example, Skweezer reformats web pages for cell phones and PDAs. Network operators can also deploy proxies to intercept computer viruses and other hostile content served from remote Web pages.
  • 14. Thanking you...Thanking you... Presented by Proxiesforrent.. Located at Mumbai....