SlideShare a Scribd company logo
How Proxy
Works
By:
Taqi Shah
taqi.shajee@gamil.com
Regular browsing
• In a regular case your web browser connects
to the web site directly. Thus revealing quite a
lot of sensitive information. An orange arrow
denotes this case in the block scheme.
Proxy Browsing
• To change this situation Proxy Switcher was
written. It can be used to find working
anonymous proxy servers and redirect
requests through them.
How Proxy Software Works
• Proxy server is an application or a computer system
that acts as an agent or channel for requests from
clients looking for resources from other servers.
• Client connects to the proxy server with a service
(web, files or any other resources) and proxy server
sends that request to the server on behalf of the
client.
• There are many software and applications available
on the internet which can be used to setup a proxy
server.
How Proxy Software Works
• A proxy basically tells your computer to send all
requests somewhere else instead of to your ISP.
That proxy will then decide whether or not to
send you the page you requested.
• So in effect, you are simply bypassing your
school proxy, or bypassing your ISP proxy and
replacing it with another one.
Possible Usage Scenario
• If you get banned on the forum - use Proxy
Switcher to fake your IP and avoid the ban.
• If you are a webmaster that wants to check
Geotargetting of some sites (i.e. Google).
• Just want to hide your IP when visiting some
sites which you might not want to record your
IP address.

More Related Content

What's hot

Web hosting choices
Web hosting choicesWeb hosting choices
Web hosting choices
Vikram g b
 
Cache control directive
Cache control directiveCache control directive
Cache control directive
Mohamed Mamoon
 
Lecture 10 Answers
Lecture 10 AnswersLecture 10 Answers
Lecture 10 Answers
is4030.ray
 

What's hot (11)

Web hosting choices
Web hosting choicesWeb hosting choices
Web hosting choices
 
What Is Ajax
What Is AjaxWhat Is Ajax
What Is Ajax
 
Modern Web Applications
Modern Web ApplicationsModern Web Applications
Modern Web Applications
 
Types Of Web Hosting Explained
Types Of Web Hosting ExplainedTypes Of Web Hosting Explained
Types Of Web Hosting Explained
 
Proxy server
Proxy serverProxy server
Proxy server
 
Website Translation Proxy Tool for LSPs and Translation Agencies
Website Translation Proxy Tool for LSPs and Translation AgenciesWebsite Translation Proxy Tool for LSPs and Translation Agencies
Website Translation Proxy Tool for LSPs and Translation Agencies
 
Web Based APIs
Web Based APIsWeb Based APIs
Web Based APIs
 
PLNOG 13: Grzegorz Janoszka: Peering vs Tranzyt – Czy peering jest naprawdę s...
PLNOG 13: Grzegorz Janoszka: Peering vs Tranzyt – Czy peering jest naprawdę s...PLNOG 13: Grzegorz Janoszka: Peering vs Tranzyt – Czy peering jest naprawdę s...
PLNOG 13: Grzegorz Janoszka: Peering vs Tranzyt – Czy peering jest naprawdę s...
 
Bulletproof Ajax
Bulletproof AjaxBulletproof Ajax
Bulletproof Ajax
 
Cache control directive
Cache control directiveCache control directive
Cache control directive
 
Lecture 10 Answers
Lecture 10 AnswersLecture 10 Answers
Lecture 10 Answers
 

Similar to How proxy works

Reverse proxy
Reverse proxyReverse proxy
Reverse proxy
tim4911
 
Http Proxy Server
Http Proxy ServerHttp Proxy Server
Http Proxy Server
Sourav Roy
 

Similar to How proxy works (20)

Proxies
ProxiesProxies
Proxies
 
cybersecurity unit 5 basics of cybersecurity
cybersecurity unit 5 basics of cybersecuritycybersecurity unit 5 basics of cybersecurity
cybersecurity unit 5 basics of cybersecurity
 
Proxies
ProxiesProxies
Proxies
 
Proxies
ProxiesProxies
Proxies
 
Uses of proxies
Uses of proxiesUses of proxies
Uses of proxies
 
Proxy server
Proxy serverProxy server
Proxy server
 
Advantages of proxy server
Advantages of proxy serverAdvantages of proxy server
Advantages of proxy server
 
Proxy : effective logs for tracking down usage trends
Proxy : effective logs for tracking down usage trendsProxy : effective logs for tracking down usage trends
Proxy : effective logs for tracking down usage trends
 
Proxy Server: A Comprehensive Guide
Proxy Server: A Comprehensive GuideProxy Server: A Comprehensive Guide
Proxy Server: A Comprehensive Guide
 
Proxy Server
Proxy ServerProxy Server
Proxy Server
 
Reverse proxy
Reverse proxyReverse proxy
Reverse proxy
 
Reverse proxy
Reverse proxyReverse proxy
Reverse proxy
 
1-1.pdf
1-1.pdf1-1.pdf
1-1.pdf
 
Optimiszing proxy
Optimiszing proxyOptimiszing proxy
Optimiszing proxy
 
Reverse proxy
Reverse proxyReverse proxy
Reverse proxy
 
Proxy server
Proxy serverProxy server
Proxy server
 
Web Proxy Server
Web Proxy ServerWeb Proxy Server
Web Proxy Server
 
Firewall with proxy server.
Firewall with proxy server.Firewall with proxy server.
Firewall with proxy server.
 
Http Proxy Server
Http Proxy ServerHttp Proxy Server
Http Proxy Server
 
week14
week14week14
week14
 

More from Muhammad Taqi

How speech reorganization works
How speech reorganization worksHow speech reorganization works
How speech reorganization works
Muhammad Taqi
 
Software Cost and Effort Esitmation
Software Cost and Effort EsitmationSoftware Cost and Effort Esitmation
Software Cost and Effort Esitmation
Muhammad Taqi
 
Variable eliminatin example
Variable eliminatin exampleVariable eliminatin example
Variable eliminatin example
Muhammad Taqi
 
D sepration examples
D sepration examplesD sepration examples
D sepration examples
Muhammad Taqi
 
Adobe illustrator cs5 full tutorials
Adobe illustrator cs5  full tutorialsAdobe illustrator cs5  full tutorials
Adobe illustrator cs5 full tutorials
Muhammad Taqi
 

More from Muhammad Taqi (7)

Cloud computing
Cloud computingCloud computing
Cloud computing
 
How speech reorganization works
How speech reorganization worksHow speech reorganization works
How speech reorganization works
 
How e mail works
How e mail worksHow e mail works
How e mail works
 
Software Cost and Effort Esitmation
Software Cost and Effort EsitmationSoftware Cost and Effort Esitmation
Software Cost and Effort Esitmation
 
Variable eliminatin example
Variable eliminatin exampleVariable eliminatin example
Variable eliminatin example
 
D sepration examples
D sepration examplesD sepration examples
D sepration examples
 
Adobe illustrator cs5 full tutorials
Adobe illustrator cs5  full tutorialsAdobe illustrator cs5  full tutorials
Adobe illustrator cs5 full tutorials
 

Recently uploaded

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 

Recently uploaded (20)

JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Agentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfAgentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
The architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdfThe architecture of Generative AI for enterprises.pdf
The architecture of Generative AI for enterprises.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 

How proxy works

  • 2. Regular browsing • In a regular case your web browser connects to the web site directly. Thus revealing quite a lot of sensitive information. An orange arrow denotes this case in the block scheme.
  • 3. Proxy Browsing • To change this situation Proxy Switcher was written. It can be used to find working anonymous proxy servers and redirect requests through them.
  • 4.
  • 5. How Proxy Software Works • Proxy server is an application or a computer system that acts as an agent or channel for requests from clients looking for resources from other servers. • Client connects to the proxy server with a service (web, files or any other resources) and proxy server sends that request to the server on behalf of the client. • There are many software and applications available on the internet which can be used to setup a proxy server.
  • 6. How Proxy Software Works • A proxy basically tells your computer to send all requests somewhere else instead of to your ISP. That proxy will then decide whether or not to send you the page you requested. • So in effect, you are simply bypassing your school proxy, or bypassing your ISP proxy and replacing it with another one.
  • 7.
  • 8. Possible Usage Scenario • If you get banned on the forum - use Proxy Switcher to fake your IP and avoid the ban. • If you are a webmaster that wants to check Geotargetting of some sites (i.e. Google). • Just want to hide your IP when visiting some sites which you might not want to record your IP address.