Uploaded on

Please be aware that the use of proxy servers without the express permission from the owner of the proxy server may be illegal in some states and/or countries. Use at your own risk.Use your favorite …

Please be aware that the use of proxy servers without the express permission from the owner of the proxy server may be illegal in some states and/or countries. Use at your own risk.Use your favorite search engine and search for 'proxy server list'.

More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
354
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
7
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. UsesUsesTo keep machines behind it anonymous, mainly for security.To speed up access to resources. Web proxies are commonly used tocache web pages from a web server.To prevent downloading the same content multiple times.To log / audit usage, e.g. to provide company employee Internetusage reporting.To scan transmitted content for malware before delivery.To scan outbound content, e.g., for data loss prevention.To bypass website restrictions at work.Access enhancement/restriction
  • 2. How do I use a Proxy Server?How do I use a Proxy Server?Please be aware that the use of proxy serverswithout the express permission from theowner of the proxy server may be illegal insome states and/or countries. Use at yourown risk.Use your favorite search engineand search for proxy server list. Youll findmany sites with lists of proxy servers, theirIP address, the port they listen on, andusually what country they are in. Write downa few of them.
  • 3. Proxy TypesProxy Types
  • 4. Transparent ProxyTransparent ProxyThis type of proxy server identifies itself as aproxy server and also makes the original IPaddress available through the http headers.These are generally used for their ability tocache websites and do not effectivelyprovide any anonymity to those who usethem. However, the use of a transparentproxy will get you around simple IP bans.They are transparent in the terms that yourIP address is exposed, not transparent inthe terms that you do not know that you areusing it
  • 5. Anonymous ProxyAnonymous ProxyThis type of proxy server indentifies itself as aproxy server, but does not make the originalIP address available. This type of proxyserver is detectable, but providesreasonable anonymity for most users.
  • 6. Distorting ProxyDistorting ProxyThis type of proxy server identifies itself as aproxy server, but make an incorrect originalIP address available through the httpheaders.
  • 7. High Anonymity ProxyHigh Anonymity ProxyThis type of proxy server does not identifyitself as a proxy server and does not makeavailable the original IP address.
  • 8. Web proxiesWeb proxiesA common proxy application is a caching Webproxy. This provides a nearby cache of Webpages and files available on remote Webservers, allowing local network clients toaccess them more quickly or reliably.
  • 9. When it receives a request for a Webresource (specified by a URL), a cachingproxy looks for the resulting URL in its localcache. If found, it returns the documentimmediately. Otherwise it fetches it from theremote server, returns it to the requesterand saves a copy in the cache. The cacheusually uses an expiry algorithm to removedocuments from the cache, according totheir age, size, and access history. Twosimple cache algorithms are Least RecentlyUsed (LRU) and Least Frequently Used
  • 10. Web proxies can also filter the content of Webpages served. Some censorwareapplications - which attempt to blockoffensive Web content - are implemented asWeb proxies. Other web proxies reformatweb pages for a specific purpose oraudience; for example, Skweezer reformatsweb pages for cell phones and PDAs.Network operators can also deploy proxiesto intercept computer viruses and otherhostile content served from remote Webpages.
  • 11. Thanking you...Thanking you...Presented by Proxiesforrent..Located at Mumbai....