Your SlideShare is downloading. ×
Proxies for rent provide good proxies
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Proxies for rent provide good proxies

99
views

Published on

Published in: Technology

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
99
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. ● Proxy acts as an intermediary for request ofclients and seeks resource from differentserver by using Buy proxy.● A client connected to, two proxy serverrequesting some services which areavailable and the proxy server evaluate therequest as the way to simplify and control itscomplexity.Proxy
  • 2. Proxy
  • 3. Uses● keeps the machine behind it for security.● It helps to prevent downloading the samecontent multiple times.● Scan outbound content.● To log or audit usages.● To access prohibited sites or sites filtered byyour IPS with Private proxy● Bypass security or parental control.
  • 4. Purpose of Proxy serverIt dramatically improvesperformance for a groupof users, as it saves therequest for certainamount of time.It can also be used tofilter requests.
  • 5. Advantages1. It is used to enhance security and privacywhile surfing. 2. It is use to speed up thebrowsing and access of data in networkbecause of cache.3. It is used for bypassing blocked sites inschool, offices and allow access to parentalblock data.4. It is used for keeping log.5. It prevents your account from getting hacked.
  • 6. Disadvantages1. Caching will increase data access speed, butat the same time the proxy server owner cankeep a look on the cache and there they mayfind password, username etc.2. Even if the person using proxy and he/she ison encrypted connection/network, still thenthere are some techniques for intercepting bothTLS and SSL encrypted connections.

×