SlideShare a Scribd company logo
1 of 29
Proxy Server: A
Comprehensive Guide
Table of Contents
2
 Server
 Types of Servers
 Website and Web Servers
 Web Servers Facilitate
 Proxy Server
 Proxy Server’s Functionalities
 Use of Proxy Servers
 Accessing services anonymously
 Improving Performance
 Security
 Monitoring and Filtering
 Translation
 Types of Proxy Servers
 Reverse Proxy
 Web Proxy Server
 Anonymous Proxy
 High Anonymity Proxy
 Transparent Proxy
 CGI Proxy
 Suffix Proxy
 Distorting Proxy
 TOR Onion Proxy
 I2P Anonymous Proxy
 DNS Proxy
 Conclusion
 A server is a computer or system which is meant to provide resources, services,
data, as well as programs, over a network, to other computers that are known as
clients. Whenever computers share resources with client machines these are known
as servers. A single client can use multiple servers, as well as a single server can
cater to many clients.
3
Server
YELLOW
 Web Servers
 Database Servers
 File Servers
 Mail Servers
 Print Servers
 Game Servers
 Application Servers
Types of Servers
4
Websites and Web Servers
 In the context of websites, every website is hosted on the
web server of a web hosting company. These hosting
companies provide the server space, services and
technologies that a website needs to be accessible. When
one refers to “Windows Hosting” or “Cloud Hosting” one is
referring to a particular type of hosting service. When one
talks about the “best Web Hosting Company” one is
referring to a web hosting service provider who leases a
web server for a website’s files to be stored on it and
delivered from the server.
5
Web Servers Facilitate
6
Web servers fulfil many functions. Some of those are mentioned here, in no
particular order.
 Accessibility to websites
 Configuration of website/directory security
 Configuration of log file settings
 Creation of an FTP site
 Configuration of custom error pages
 Creation of virtual directories
Proxy Server
7
A proxy server functions as an intermediary between a server and a user. It is used
most often to isolate either the users or the servers for security reasons. Proxy
servers accept the request from the user and then rather than responding to the
user, these relay the request to another server or process. The response that is
received by the second server is from the proxy server, which then replies to the
original user as if it were replying on its own. This ensures that neither the user nor
the responding server needs to be connected directly to each other.
Proxy Servers’ Functionalities
8
Proxy Servers’ Functionalities
Proxy servers hide the user’s IP address and make it possible to conceal and make
his network ID anonymous. The functionalities offered by proxy servers are
mentioned below, in no particular order-
 Firewall and network data filtering
 Data caching
 Network connection sharing
Uses of Proxy Servers
9
Proxy servers are used for the following purposes-
 Accessing services anonymously
 Improving performance
 Security
 Monitoring and Filtering
 Translation
These uses are touched upon briefly in the following slides.
Accessing services anonymously
10
When proxy servers are used for this purpose, the anonymous proxy server sends the request
to the destination server. This makes sure that no information about the end user is received
by the destination server.
11
1-800-123 -8156
Whoa! That’s a big number, aren’t you proud?
Improving performance
Enhanced performance is achieved through it, as it retrieves content from the cache
which was saved when previous request was made by the client.
Security
Since the proxy server hides the identity of the user, it protects from spam as well as
from any sort of other malicious cyberattack such as hacking.
Monitoring and Filtering
With the aid of Proxy Servers, several kinds of filtering can be achieved-
 Content Filtering
 Bypass filters
 Logging and eavesdropping
 Filtering encrypted data
Translation
It aids in customizing the source site for local users. This is achieved by excluding the
source content or substituting it with original local content. In this case, Translation
proxy makes it possible to route the traffic from the global users to the source
website.
Types of Proxy Servers
The various types of Proxy Servers are touched upon in the following slides.
Reverse Proxy
In it the requests are forwarded to one or more proxy servers. The response from the
proxy server is retrieved in a way as if it came directly from the original server.
Web Proxy Server
Here, the HTTP requests are forwarded. In it, only the URL is passed instead of a
path. Request is sent and the proxy server responds to it. Apache, HAProxy are
examples of it.
Anonymous Proxy
In this type of proxy server, there isn’t any original IP address. Despite being
detectable, these servers provides rational anonymity to the client device.
High Anonymity Proxy
This type of proxy server ensures that the original IP address does not get detected.
Moreover, this proxy server cannot be detected by anyone.
Transparent Proxy
A Transparent Proxy is also known as an Intercepting Proxy, a Forged proxy and an
Inline Proxy. The original IP address can be easily detected when Transparent Proxy
is used. Hence, this type of proxy server doesn’t provide anonymity to the client. It is
used as a cache for websites. A transparent proxy when combined with gateway,
produces a proxy server where the connection requests sent by the client IP are
redirected. For this redirection to take place, the client IP address configuration is not
required. The HTTP headers present on the server-side can detect very easily this
redirection. A Transparent Proxy intercepts the communication at the network level,
without the need for any configuration. These types of proxies are usually used to
enforce any policy over communication, at business level. A Transparent Proxy also
tries to prevent any attack on TCP servers, such as a denial-of-service attack.
CGI Proxy
Websites are made more accessible by CGI Proxy. Requests are accepted by it to
target URLs by using a web form. It processes the request and returns the result to the
web browser. Its popularity has been reduced due to VPNs and other privacy
policies. Yet it receives a substantial amount of requests.
Suffix Proxy
This type of proxy server is used for bypassing the web filters. It appends the name
of the proxy to the URL to the content that has been requested to the proxy. It
doesn’t preserve a higher level of anonymity. A Suffix Proxy is easy to use and
implement but it is used less due to the large number or web filters that are present.
Distorting Proxy
Distorting Proxy servers can generate an incorrect original IP address of clients. This
type of server uses HTTP headers to ensure the confidentiality of the client’s IP
address.
TOR Onion Proxy
It aims to ensure online anonymity of the users’ personal information. It routes the
traffic through various networks that are present globally to make it difficult to track
the users’ address. It ensures that it becomes difficult for anyone doing traffic
analysis to track the original address. For this purpose it uses Onion Routing.
I2P Anonymous Proxy
It is an anonymous network enhanced version of Tor onion proxy. It makes use of
encryption to hide every communication at various levels. This encrypted data is then
relayed using various network routers that are present in different locations. I2P is a
fully distributed proxy that ensures online anonymity. I2P router finds other peers to
build an anonymous identity. This is done to protect the user’s personal information.
DNS Proxy
Unlike other proxies, DNS Proxy accepts requests in the form of DNS queries. It then
forwards those to the Domain server where these can be cached and the flow of
request can also be redirected.
Conclusion
Proxy servers come in handy in various types of situations where
anonymity is required at different levels by either the client or the
service provider. Different types of proxies are available which
follow various routing protocols and serve different uses and
provide different levels of anonymity which have been touched
upon in this PPT.
29
Thanks!
ANY QUESTIONS?
You can find me at:
www.htshosting.org
www.htshosting.org/best-web-hosting-company-India
www.htshosting.org/best-windows-hosting
www.htshosting.org/best-cloud-hosting-company
support@htshosting.org

More Related Content

What's hot

Advantages of proxy server
Advantages of proxy serverAdvantages of proxy server
Advantages of proxy servergreatbury
 
Proxy servers
Proxy serversProxy servers
Proxy serversKumar
 
WT - Firewall & Proxy Server
WT - Firewall & Proxy ServerWT - Firewall & Proxy Server
WT - Firewall & Proxy Servervinay arora
 
Firewall with proxy server.
Firewall with proxy server.Firewall with proxy server.
Firewall with proxy server.stableproxies
 
Group18_Awesome4some:Proxy server.ppt
Group18_Awesome4some:Proxy server.pptGroup18_Awesome4some:Proxy server.ppt
Group18_Awesome4some:Proxy server.pptAnitha Selvan
 
How a Proxy Server Works
How a Proxy Server WorksHow a Proxy Server Works
How a Proxy Server WorksMer Joyce
 
Virtual Private Networks
Virtual Private NetworksVirtual Private Networks
Virtual Private Networksprimeteacher32
 
Introduction to stable proxies.
Introduction to stable proxies.Introduction to stable proxies.
Introduction to stable proxies.stableproxies
 
HTTPS presentation at Port80 Sydney meetup March 2016
HTTPS presentation at Port80 Sydney meetup March 2016HTTPS presentation at Port80 Sydney meetup March 2016
HTTPS presentation at Port80 Sydney meetup March 2016Jason Stangroome
 
HTTP and HTTPS Basics
HTTP and HTTPS BasicsHTTP and HTTPS Basics
HTTP and HTTPS BasicsKanishk Raj
 

What's hot (20)

Proxy Presentation
Proxy PresentationProxy Presentation
Proxy Presentation
 
Advantages of proxy server
Advantages of proxy serverAdvantages of proxy server
Advantages of proxy server
 
Proxy servers
Proxy serversProxy servers
Proxy servers
 
WT - Firewall & Proxy Server
WT - Firewall & Proxy ServerWT - Firewall & Proxy Server
WT - Firewall & Proxy Server
 
Firewall with proxy server.
Firewall with proxy server.Firewall with proxy server.
Firewall with proxy server.
 
Proxy Servers
Proxy ServersProxy Servers
Proxy Servers
 
Group18_Awesome4some:Proxy server.ppt
Group18_Awesome4some:Proxy server.pptGroup18_Awesome4some:Proxy server.ppt
Group18_Awesome4some:Proxy server.ppt
 
Proxy Servers
Proxy ServersProxy Servers
Proxy Servers
 
Reverse proxy
Reverse proxyReverse proxy
Reverse proxy
 
How a Proxy Server Works
How a Proxy Server WorksHow a Proxy Server Works
How a Proxy Server Works
 
Proxies
ProxiesProxies
Proxies
 
Proxies
ProxiesProxies
Proxies
 
Proxy server
Proxy serverProxy server
Proxy server
 
Proxies
ProxiesProxies
Proxies
 
Virtual Private Networks
Virtual Private NetworksVirtual Private Networks
Virtual Private Networks
 
Introduction to stable proxies.
Introduction to stable proxies.Introduction to stable proxies.
Introduction to stable proxies.
 
Cc proxy
Cc proxyCc proxy
Cc proxy
 
HTTPS presentation at Port80 Sydney meetup March 2016
HTTPS presentation at Port80 Sydney meetup March 2016HTTPS presentation at Port80 Sydney meetup March 2016
HTTPS presentation at Port80 Sydney meetup March 2016
 
HTTP and HTTPS Basics
HTTP and HTTPS BasicsHTTP and HTTPS Basics
HTTP and HTTPS Basics
 
HTTPS
HTTPSHTTPS
HTTPS
 

Similar to Proxy Server: A Comprehensive Guide

cybersecurity unit 5 basics of cybersecurity
cybersecurity unit 5 basics of cybersecuritycybersecurity unit 5 basics of cybersecurity
cybersecurity unit 5 basics of cybersecurityJayaMishra170943
 
VPN vs Proxy: Which One Should You Use?
VPN vs Proxy: Which One Should You Use?VPN vs Proxy: Which One Should You Use?
VPN vs Proxy: Which One Should You Use?FredReynolds2
 
Securely managed and timed proxy server
Securely managed and timed proxy serverSecurely managed and timed proxy server
Securely managed and timed proxy serverProxies Rent
 
Proxy http ftp dns email
Proxy http ftp dns emailProxy http ftp dns email
Proxy http ftp dns emailHeera K S
 
Pre Week13
Pre Week13Pre Week13
Pre Week13Ryosuke
 
Pre Week14
Pre Week14Pre Week14
Pre Week14Ryosuke
 
Stable proxies it's type and advantages
Stable proxies it's type and advantagesStable proxies it's type and advantages
Stable proxies it's type and advantagesstableproxies
 
Linux11 Proxy Server
Linux11 Proxy ServerLinux11 Proxy Server
Linux11 Proxy ServerJainul Musani
 
Reverse proxy
Reverse proxyReverse proxy
Reverse proxytim4911
 
IT Server infra
IT Server  infraIT Server  infra
IT Server infraSafexIndia
 
Proxy : effective logs for tracking down usage trends
Proxy : effective logs for tracking down usage trendsProxy : effective logs for tracking down usage trends
Proxy : effective logs for tracking down usage trendsProxies Rent
 
Hidden ip does not allow hackers to identify your location
Hidden ip does not allow hackers to identify your locationHidden ip does not allow hackers to identify your location
Hidden ip does not allow hackers to identify your locationProxies Rent
 
Download Presentation
Download PresentationDownload Presentation
Download Presentationwebhostingguy
 
E-Commerce Under this we will get to know
E-Commerce Under this we will get to knowE-Commerce Under this we will get to know
E-Commerce Under this we will get to knowRealPranaya
 
KILLME NOWITSELF
KILLME NOWITSELFKILLME NOWITSELF
KILLME NOWITSELFShehab Imam
 

Similar to Proxy Server: A Comprehensive Guide (20)

cybersecurity unit 5 basics of cybersecurity
cybersecurity unit 5 basics of cybersecuritycybersecurity unit 5 basics of cybersecurity
cybersecurity unit 5 basics of cybersecurity
 
Proxy Server
Proxy ServerProxy Server
Proxy Server
 
VPN vs Proxy: Which One Should You Use?
VPN vs Proxy: Which One Should You Use?VPN vs Proxy: Which One Should You Use?
VPN vs Proxy: Which One Should You Use?
 
Uses of proxies
Uses of proxiesUses of proxies
Uses of proxies
 
Securely managed and timed proxy server
Securely managed and timed proxy serverSecurely managed and timed proxy server
Securely managed and timed proxy server
 
Firewall vpn proxy
Firewall vpn proxyFirewall vpn proxy
Firewall vpn proxy
 
Proxy http ftp dns email
Proxy http ftp dns emailProxy http ftp dns email
Proxy http ftp dns email
 
Pre Week13
Pre Week13Pre Week13
Pre Week13
 
Pre Week14
Pre Week14Pre Week14
Pre Week14
 
Stable proxies it's type and advantages
Stable proxies it's type and advantagesStable proxies it's type and advantages
Stable proxies it's type and advantages
 
Linux11 Proxy Server
Linux11 Proxy ServerLinux11 Proxy Server
Linux11 Proxy Server
 
Reverse proxy
Reverse proxyReverse proxy
Reverse proxy
 
IT Server infra
IT Server  infraIT Server  infra
IT Server infra
 
Proxy : effective logs for tracking down usage trends
Proxy : effective logs for tracking down usage trendsProxy : effective logs for tracking down usage trends
Proxy : effective logs for tracking down usage trends
 
Hidden ip does not allow hackers to identify your location
Hidden ip does not allow hackers to identify your locationHidden ip does not allow hackers to identify your location
Hidden ip does not allow hackers to identify your location
 
Download Presentation
Download PresentationDownload Presentation
Download Presentation
 
E-Commerce Under this we will get to know
E-Commerce Under this we will get to knowE-Commerce Under this we will get to know
E-Commerce Under this we will get to know
 
KILLME NOWITSELF
KILLME NOWITSELFKILLME NOWITSELF
KILLME NOWITSELF
 
Network Testing ques
Network Testing quesNetwork Testing ques
Network Testing ques
 
How does proxy works?
How does proxy works?How does proxy works?
How does proxy works?
 

More from HTS Hosting

Web Hosting and WordPress Hosting
Web Hosting and WordPress HostingWeb Hosting and WordPress Hosting
Web Hosting and WordPress HostingHTS Hosting
 
Availing Windows Dedicated Servers of HTS Hosting
Availing Windows Dedicated Servers of HTS HostingAvailing Windows Dedicated Servers of HTS Hosting
Availing Windows Dedicated Servers of HTS HostingHTS Hosting
 
HTS Dedicated Servers
HTS Dedicated ServersHTS Dedicated Servers
HTS Dedicated ServersHTS Hosting
 
Linux Dedicated Server Plans
Linux Dedicated Server PlansLinux Dedicated Server Plans
Linux Dedicated Server PlansHTS Hosting
 
HTS Dedicated Servers
HTS Dedicated ServersHTS Dedicated Servers
HTS Dedicated ServersHTS Hosting
 
Common Web Hosting Solutions
Common Web Hosting SolutionsCommon Web Hosting Solutions
Common Web Hosting SolutionsHTS Hosting
 
Basic Web Host Manager Setup
Basic Web Host Manager SetupBasic Web Host Manager Setup
Basic Web Host Manager SetupHTS Hosting
 
Essential Features in Web Hosting Plans
Essential Features in Web Hosting PlansEssential Features in Web Hosting Plans
Essential Features in Web Hosting PlansHTS Hosting
 
Difference Between Managed VPS Hosting Self-Managed VPS Hosting
Difference Between Managed VPS Hosting Self-Managed VPS HostingDifference Between Managed VPS Hosting Self-Managed VPS Hosting
Difference Between Managed VPS Hosting Self-Managed VPS HostingHTS Hosting
 
Web Hosting, Web Servers, Web Hosts and More
Web Hosting, Web Servers, Web Hosts and MoreWeb Hosting, Web Servers, Web Hosts and More
Web Hosting, Web Servers, Web Hosts and MoreHTS Hosting
 
Know about Hosting a Business Website
Know about Hosting a Business WebsiteKnow about Hosting a Business Website
Know about Hosting a Business WebsiteHTS Hosting
 
Web Hosting Terms
Web Hosting TermsWeb Hosting Terms
Web Hosting TermsHTS Hosting
 
Reseller Hosting and Dedicated Web Servers
Reseller Hosting and Dedicated Web ServersReseller Hosting and Dedicated Web Servers
Reseller Hosting and Dedicated Web ServersHTS Hosting
 
Reseller Hosting and Managed VPS Hosting
Reseller Hosting and Managed VPS HostingReseller Hosting and Managed VPS Hosting
Reseller Hosting and Managed VPS HostingHTS Hosting
 
Backup Tarball Contents
Backup Tarball ContentsBackup Tarball Contents
Backup Tarball ContentsHTS Hosting
 
VPS and Dedicated Servers
VPS and Dedicated ServersVPS and Dedicated Servers
VPS and Dedicated ServersHTS Hosting
 
Best WordPress Hosting Plans
Best WordPress Hosting Plans Best WordPress Hosting Plans
Best WordPress Hosting Plans HTS Hosting
 
Best Linux Dedicated Hosting Plans
Best Linux Dedicated Hosting PlansBest Linux Dedicated Hosting Plans
Best Linux Dedicated Hosting PlansHTS Hosting
 
Different Types of Web Hosting Services
Different Types of Web Hosting ServicesDifferent Types of Web Hosting Services
Different Types of Web Hosting ServicesHTS Hosting
 

More from HTS Hosting (20)

Web Hosting and WordPress Hosting
Web Hosting and WordPress HostingWeb Hosting and WordPress Hosting
Web Hosting and WordPress Hosting
 
Availing Windows Dedicated Servers of HTS Hosting
Availing Windows Dedicated Servers of HTS HostingAvailing Windows Dedicated Servers of HTS Hosting
Availing Windows Dedicated Servers of HTS Hosting
 
HTS Dedicated Servers
HTS Dedicated ServersHTS Dedicated Servers
HTS Dedicated Servers
 
Linux Dedicated Server Plans
Linux Dedicated Server PlansLinux Dedicated Server Plans
Linux Dedicated Server Plans
 
HTS Dedicated Servers
HTS Dedicated ServersHTS Dedicated Servers
HTS Dedicated Servers
 
Common Web Hosting Solutions
Common Web Hosting SolutionsCommon Web Hosting Solutions
Common Web Hosting Solutions
 
Basic Web Host Manager Setup
Basic Web Host Manager SetupBasic Web Host Manager Setup
Basic Web Host Manager Setup
 
Essential Features in Web Hosting Plans
Essential Features in Web Hosting PlansEssential Features in Web Hosting Plans
Essential Features in Web Hosting Plans
 
VPS Hosting
VPS HostingVPS Hosting
VPS Hosting
 
Difference Between Managed VPS Hosting Self-Managed VPS Hosting
Difference Between Managed VPS Hosting Self-Managed VPS HostingDifference Between Managed VPS Hosting Self-Managed VPS Hosting
Difference Between Managed VPS Hosting Self-Managed VPS Hosting
 
Web Hosting, Web Servers, Web Hosts and More
Web Hosting, Web Servers, Web Hosts and MoreWeb Hosting, Web Servers, Web Hosts and More
Web Hosting, Web Servers, Web Hosts and More
 
Know about Hosting a Business Website
Know about Hosting a Business WebsiteKnow about Hosting a Business Website
Know about Hosting a Business Website
 
Web Hosting Terms
Web Hosting TermsWeb Hosting Terms
Web Hosting Terms
 
Reseller Hosting and Dedicated Web Servers
Reseller Hosting and Dedicated Web ServersReseller Hosting and Dedicated Web Servers
Reseller Hosting and Dedicated Web Servers
 
Reseller Hosting and Managed VPS Hosting
Reseller Hosting and Managed VPS HostingReseller Hosting and Managed VPS Hosting
Reseller Hosting and Managed VPS Hosting
 
Backup Tarball Contents
Backup Tarball ContentsBackup Tarball Contents
Backup Tarball Contents
 
VPS and Dedicated Servers
VPS and Dedicated ServersVPS and Dedicated Servers
VPS and Dedicated Servers
 
Best WordPress Hosting Plans
Best WordPress Hosting Plans Best WordPress Hosting Plans
Best WordPress Hosting Plans
 
Best Linux Dedicated Hosting Plans
Best Linux Dedicated Hosting PlansBest Linux Dedicated Hosting Plans
Best Linux Dedicated Hosting Plans
 
Different Types of Web Hosting Services
Different Types of Web Hosting ServicesDifferent Types of Web Hosting Services
Different Types of Web Hosting Services
 

Recently uploaded

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 

Recently uploaded (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 

Proxy Server: A Comprehensive Guide

  • 2. Table of Contents 2  Server  Types of Servers  Website and Web Servers  Web Servers Facilitate  Proxy Server  Proxy Server’s Functionalities  Use of Proxy Servers  Accessing services anonymously  Improving Performance  Security  Monitoring and Filtering  Translation  Types of Proxy Servers  Reverse Proxy  Web Proxy Server  Anonymous Proxy  High Anonymity Proxy  Transparent Proxy  CGI Proxy  Suffix Proxy  Distorting Proxy  TOR Onion Proxy  I2P Anonymous Proxy  DNS Proxy  Conclusion
  • 3.  A server is a computer or system which is meant to provide resources, services, data, as well as programs, over a network, to other computers that are known as clients. Whenever computers share resources with client machines these are known as servers. A single client can use multiple servers, as well as a single server can cater to many clients. 3 Server
  • 4. YELLOW  Web Servers  Database Servers  File Servers  Mail Servers  Print Servers  Game Servers  Application Servers Types of Servers 4
  • 5. Websites and Web Servers  In the context of websites, every website is hosted on the web server of a web hosting company. These hosting companies provide the server space, services and technologies that a website needs to be accessible. When one refers to “Windows Hosting” or “Cloud Hosting” one is referring to a particular type of hosting service. When one talks about the “best Web Hosting Company” one is referring to a web hosting service provider who leases a web server for a website’s files to be stored on it and delivered from the server. 5
  • 6. Web Servers Facilitate 6 Web servers fulfil many functions. Some of those are mentioned here, in no particular order.  Accessibility to websites  Configuration of website/directory security  Configuration of log file settings  Creation of an FTP site  Configuration of custom error pages  Creation of virtual directories
  • 7. Proxy Server 7 A proxy server functions as an intermediary between a server and a user. It is used most often to isolate either the users or the servers for security reasons. Proxy servers accept the request from the user and then rather than responding to the user, these relay the request to another server or process. The response that is received by the second server is from the proxy server, which then replies to the original user as if it were replying on its own. This ensures that neither the user nor the responding server needs to be connected directly to each other.
  • 8. Proxy Servers’ Functionalities 8 Proxy Servers’ Functionalities Proxy servers hide the user’s IP address and make it possible to conceal and make his network ID anonymous. The functionalities offered by proxy servers are mentioned below, in no particular order-  Firewall and network data filtering  Data caching  Network connection sharing
  • 9. Uses of Proxy Servers 9 Proxy servers are used for the following purposes-  Accessing services anonymously  Improving performance  Security  Monitoring and Filtering  Translation These uses are touched upon briefly in the following slides.
  • 10. Accessing services anonymously 10 When proxy servers are used for this purpose, the anonymous proxy server sends the request to the destination server. This makes sure that no information about the end user is received by the destination server.
  • 11. 11 1-800-123 -8156 Whoa! That’s a big number, aren’t you proud?
  • 12. Improving performance Enhanced performance is achieved through it, as it retrieves content from the cache which was saved when previous request was made by the client.
  • 13. Security Since the proxy server hides the identity of the user, it protects from spam as well as from any sort of other malicious cyberattack such as hacking.
  • 14. Monitoring and Filtering With the aid of Proxy Servers, several kinds of filtering can be achieved-  Content Filtering  Bypass filters  Logging and eavesdropping  Filtering encrypted data
  • 15. Translation It aids in customizing the source site for local users. This is achieved by excluding the source content or substituting it with original local content. In this case, Translation proxy makes it possible to route the traffic from the global users to the source website.
  • 16. Types of Proxy Servers The various types of Proxy Servers are touched upon in the following slides.
  • 17. Reverse Proxy In it the requests are forwarded to one or more proxy servers. The response from the proxy server is retrieved in a way as if it came directly from the original server.
  • 18. Web Proxy Server Here, the HTTP requests are forwarded. In it, only the URL is passed instead of a path. Request is sent and the proxy server responds to it. Apache, HAProxy are examples of it.
  • 19. Anonymous Proxy In this type of proxy server, there isn’t any original IP address. Despite being detectable, these servers provides rational anonymity to the client device.
  • 20. High Anonymity Proxy This type of proxy server ensures that the original IP address does not get detected. Moreover, this proxy server cannot be detected by anyone.
  • 21. Transparent Proxy A Transparent Proxy is also known as an Intercepting Proxy, a Forged proxy and an Inline Proxy. The original IP address can be easily detected when Transparent Proxy is used. Hence, this type of proxy server doesn’t provide anonymity to the client. It is used as a cache for websites. A transparent proxy when combined with gateway, produces a proxy server where the connection requests sent by the client IP are redirected. For this redirection to take place, the client IP address configuration is not required. The HTTP headers present on the server-side can detect very easily this redirection. A Transparent Proxy intercepts the communication at the network level, without the need for any configuration. These types of proxies are usually used to enforce any policy over communication, at business level. A Transparent Proxy also tries to prevent any attack on TCP servers, such as a denial-of-service attack.
  • 22. CGI Proxy Websites are made more accessible by CGI Proxy. Requests are accepted by it to target URLs by using a web form. It processes the request and returns the result to the web browser. Its popularity has been reduced due to VPNs and other privacy policies. Yet it receives a substantial amount of requests.
  • 23. Suffix Proxy This type of proxy server is used for bypassing the web filters. It appends the name of the proxy to the URL to the content that has been requested to the proxy. It doesn’t preserve a higher level of anonymity. A Suffix Proxy is easy to use and implement but it is used less due to the large number or web filters that are present.
  • 24. Distorting Proxy Distorting Proxy servers can generate an incorrect original IP address of clients. This type of server uses HTTP headers to ensure the confidentiality of the client’s IP address.
  • 25. TOR Onion Proxy It aims to ensure online anonymity of the users’ personal information. It routes the traffic through various networks that are present globally to make it difficult to track the users’ address. It ensures that it becomes difficult for anyone doing traffic analysis to track the original address. For this purpose it uses Onion Routing.
  • 26. I2P Anonymous Proxy It is an anonymous network enhanced version of Tor onion proxy. It makes use of encryption to hide every communication at various levels. This encrypted data is then relayed using various network routers that are present in different locations. I2P is a fully distributed proxy that ensures online anonymity. I2P router finds other peers to build an anonymous identity. This is done to protect the user’s personal information.
  • 27. DNS Proxy Unlike other proxies, DNS Proxy accepts requests in the form of DNS queries. It then forwards those to the Domain server where these can be cached and the flow of request can also be redirected.
  • 28. Conclusion Proxy servers come in handy in various types of situations where anonymity is required at different levels by either the client or the service provider. Different types of proxies are available which follow various routing protocols and serve different uses and provide different levels of anonymity which have been touched upon in this PPT.
  • 29. 29 Thanks! ANY QUESTIONS? You can find me at: www.htshosting.org www.htshosting.org/best-web-hosting-company-India www.htshosting.org/best-windows-hosting www.htshosting.org/best-cloud-hosting-company support@htshosting.org