SlideShare a Scribd company logo
1 of 25
PRESENTED BY:

                     Javeria
                  11-arid-3303
                      MIT-3
University Institute of Information Technology ,
           Rawalpindi(UIIT,UAAR)
                    Pakistan
Topics to be covered:
 What is Web Proxy??
 Purpose of using Proxy
 Squid
 Installation & Configuration Of Squid
 Demo
Web Proxy

A web proxy is a is a server (a computer system or an
application) that acts as an intermediary for requests from
clients seeking resources from other servers.




                                                internet

    browser               Web proxy
                           server
Main purpose of using proxies
   Improve Performance

     o   Caching

     o   Bandwidth control

   Provides detailed logs of user activity

   Filter Requests

   Surfing Anonymously

   Security
Some proxies
 – Microsoft Proxy Server
 – Nginx
 – Ccproxy
 – Squid
SQUID
Squid is a free, open source, mostly used proxy caching
server

Internet Service Providers (ISPs) have used Squid proxy
servers since the early 1990s to provide faster download
speeds for delivering rich media and streaming video.

Website operators frequently put a Squid proxy server as a
content accelerator, caching frequently viewed content and
easing loads on Web servers, to improve the experience of
viewers, load balancing and handling traffic spikes for
popular content.
Squid as Proxy Cache
   Squid acts as a proxy cache. It behaves like an agent
    that receives requests from clients (web browsers) and
    passes them to the specified server.
   When the requested objects arrive at the agent, it stores
    a copy in a disk cache.
   When different clients request the same objects: these
    are served directly from the disk cache, much faster
    than obtaining them from the Internet.
   This results in less network traffic and thus saves
    bandwidth.
Squid provides a number of great features useful
    for administrative purpose such as:

   allow/ deny access to specific sites

   allow/ deny access to specific clients/ users

   block URL(s) with specific word

   deny some port numbers
   Squid support the use of a database such as mySQL for
    storing the access control list
   limit the number of connections from a client

   allow some clients/users to use the cache at specific times

   customize, or make your own error messages.

   use proxy-authentication. In this scheme, you assign
    usernames and passwords to individuals. When they first use
    the proxy they are asked to authenticate themselves by
    entering their username and password.

   Maintain user log
   sudo gedit /var/log/squid3/access.log

   You can use this file to find out who is using
    squid server and what they are doing etc
(Access Control Lists)

 Define ACLs in configuration file and apply rules
  on them.
 ACLs have many options to restrict access based
  on source ip address, destination ip address, source
  domain, and destination domain. A properly
  configured set of ACLs can do things like:
    ○ restrict access to websites by IP address,
    ○ limit or block websites by name,
    ○ restrict web access by time and day, or
    ○ regular expression matches, such as .exe files or “game” in
      URL names.
Syntax to create and implement ACL:
     ○ acl aclname acltype argument ...
     ○ aclelement allow(/deny) aclname


   Examples:
     ○ acl blocked_websites dstdomain .reddit.com .twitter.com
     ○ http_access deny blocked_websites


     ○ acl badURL url_regex valentine
     ○ http_access deny badURL


     ○ acl pm_work time MTWHF 15:00-17:00
     ○ http_access deny pm_work
ACL TYPES AVAILABLE
   Squid knows about almost 25 types of ACL. Some of them
    are:
     src: source (client) IP addresses
     dst: destination (server) IP addresses
     srcdomain: source (client) domain name
     dstdomain: destination (server) domain name
     time: time of day, and day of week
     url_regex: URL regular expression pattern matching
     maxconn: a limit on the maximum number of connections from a
      single client IP address
     max_user_ip: a limit on the maximum number of IP addresses one
      user can login from
ACCESS LISTS ELEMENTS AVAILABLE
   There are a number of different access lists elements. Some are:
     http_access: Allows HTTP clients (browsers) to access the HTTP
      port. This is the primary access control list.
     cache: Defines responses that should not be cached.
     url_rewrite_access: Controls which requests are sent through the
      redirector pool.
     always_direct: Controls which requests should always be
      forwarded directly to origin servers.
     never_direct: Controls which requests should never be forwarded
      directly to origin servers.
     delay_access: Controls which requests are handled by what delay
      pool
     log_access: Controls which requests are logged. This is global and
      overrides specific file access lists appended
      to access_log directives.
   Official web site:
          http://www.squid-cache.org/


     Contains:
         FAQ
         Lots of great information!
HARDWARE REQUIREMENTS
      FOR INSTALLING SQUID

 LINUX operating system
 128MB RAM minimum recommended
 Disk
     512MB to 1GB for small user counts
     16GB to 24GB for large user counts
DOWNLOAD AND INSTALL

   In Ubuntu:
    sudo apt-get install squid
[APT stands for “Advanced Packaging Tool”]



   In Redhat / CentOS
    yum install squid
[YUM stands for “Yellowdog Updater, Modified”]
EDIT CONFIGURATION FILE
   Command to Open conf file:
    sudo gedit /etc/squid3/squid.conf

   Make these changes in conf file:
     http_access deny all > change it to http_access allow all
     acl blocked_websites dstdomain .twitter.com
     http_access deny blocked_websites


   Save and close conf file

   Restart squid
    sudo service squid restart
CONNECT TO PROXY SERVER
Open Web Browser
Go to:
 Connection Settings
 Internet Properties
 LAN Settings
 Manual proxy configuration
   Http proxy: ip address of proxy server
   Port : 3128 (default port for Squid proxy server)
UNINSTALLING SQUID

   In Ubuntu:
    sudo apt-get remove squid

   In Redhat / CentOS
    yum remove squid
THANK YOU!


                Javeria
             (11-arid-3303)

More Related Content

What's hot

Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Zscaler
 
software defined Networking
software defined Networkingsoftware defined Networking
software defined NetworkingBousslama Hamza
 
Solar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenchesSolar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenchesInfosec
 
Traditional Firewall vs. Next Generation Firewall
Traditional Firewall vs. Next Generation FirewallTraditional Firewall vs. Next Generation Firewall
Traditional Firewall vs. Next Generation Firewall美兰 曾
 
Radware - WAF (Web Application Firewall)
Radware - WAF (Web Application Firewall)Radware - WAF (Web Application Firewall)
Radware - WAF (Web Application Firewall)Deivid Toledo
 
Cyber Security and Cloud Computing
Cyber Security and Cloud ComputingCyber Security and Cloud Computing
Cyber Security and Cloud ComputingKeet Sugathadasa
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security PresentationSimplex
 
Twitter - Architecture and Scalability lessons
Twitter - Architecture and Scalability lessonsTwitter - Architecture and Scalability lessons
Twitter - Architecture and Scalability lessonsAditya Rao
 
F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)F5 Networks
 
Cloud Security Top Threats
Cloud Security Top ThreatsCloud Security Top Threats
Cloud Security Top ThreatsTiago de Almeida
 
Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Mukesh Chinta
 
Difference between an SBC and a Firewall
Difference between an SBC and a FirewallDifference between an SBC and a Firewall
Difference between an SBC and a FirewallAbhishek Upadhyay
 
Network security
Network securityNetwork security
Network securityfatimasaham
 
SECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITY
SECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITYSECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITY
SECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITYRisman Hatibi
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Securitykentquirk
 

What's hot (20)

Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?
 
software defined Networking
software defined Networkingsoftware defined Networking
software defined Networking
 
Solar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenchesSolar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenches
 
Traditional Firewall vs. Next Generation Firewall
Traditional Firewall vs. Next Generation FirewallTraditional Firewall vs. Next Generation Firewall
Traditional Firewall vs. Next Generation Firewall
 
DDoS Protection
DDoS ProtectionDDoS Protection
DDoS Protection
 
SOC Cyber Security
SOC Cyber SecuritySOC Cyber Security
SOC Cyber Security
 
Radware - WAF (Web Application Firewall)
Radware - WAF (Web Application Firewall)Radware - WAF (Web Application Firewall)
Radware - WAF (Web Application Firewall)
 
Cyber Security and Cloud Computing
Cyber Security and Cloud ComputingCyber Security and Cloud Computing
Cyber Security and Cloud Computing
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
 
Twitter - Architecture and Scalability lessons
Twitter - Architecture and Scalability lessonsTwitter - Architecture and Scalability lessons
Twitter - Architecture and Scalability lessons
 
Intercept X - Sophos Endpoint
Intercept X - Sophos EndpointIntercept X - Sophos Endpoint
Intercept X - Sophos Endpoint
 
Cloudflare
CloudflareCloudflare
Cloudflare
 
F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 Networks: Introduction to Silverline WAF (web application firewall)
 
Cloud Security Top Threats
Cloud Security Top ThreatsCloud Security Top Threats
Cloud Security Top Threats
 
Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1
 
Difference between an SBC and a Firewall
Difference between an SBC and a FirewallDifference between an SBC and a Firewall
Difference between an SBC and a Firewall
 
Network security
Network securityNetwork security
Network security
 
SECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITY
SECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITYSECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITY
SECURE MEDIA EXCHANGE (SMX) HONEYWELL INDUSTRIAL CYBER SECURITY
 
Understanding SASE
Understanding SASE Understanding SASE
Understanding SASE
 
Wireless Network Security
Wireless Network SecurityWireless Network Security
Wireless Network Security
 

Viewers also liked

Presentacion Squid
Presentacion SquidPresentacion Squid
Presentacion Squidalexmerono
 
Instalación de Servidores GNU/Linux - PROXY SQUID (parte 3)
Instalación de Servidores GNU/Linux - PROXY SQUID (parte 3)Instalación de Servidores GNU/Linux - PROXY SQUID (parte 3)
Instalación de Servidores GNU/Linux - PROXY SQUID (parte 3)Max Morales
 
Proxy解說
Proxy解說Proxy解說
Proxy解說Tony Yeh
 
Stupid Web Caching Tricks
Stupid Web Caching TricksStupid Web Caching Tricks
Stupid Web Caching TricksMark Nottingham
 
Unidad 11 - Administración básica del sistema
Unidad 11 - Administración básica del sistemaUnidad 11 - Administración básica del sistema
Unidad 11 - Administración básica del sistemavverdu
 
Manual de squid creado por juanextk
Manual de squid creado por juanextkManual de squid creado por juanextk
Manual de squid creado por juanextkjuanextk
 
IPTABLES y SQUID‏
IPTABLES y SQUID‏IPTABLES y SQUID‏
IPTABLES y SQUID‏ingpuma
 
Squid3 - Servidor Proxy
Squid3 - Servidor ProxySquid3 - Servidor Proxy
Squid3 - Servidor ProxyTotus Muertos
 
Presentación de Kerio
Presentación de KerioPresentación de Kerio
Presentación de Kerionovaltec
 
Instalación y Configuración de un Servidor Proxy en Linux Ubuntu
Instalación y Configuración de un Servidor Proxy en Linux UbuntuInstalación y Configuración de un Servidor Proxy en Linux Ubuntu
Instalación y Configuración de un Servidor Proxy en Linux UbuntuMarcelo Alcivar
 
Proxy Squid en Ubuntu
Proxy Squid en UbuntuProxy Squid en Ubuntu
Proxy Squid en Ubuntujferrer1974
 

Viewers also liked (20)

Presentacion Squid
Presentacion SquidPresentacion Squid
Presentacion Squid
 
Instalación de Servidores GNU/Linux - PROXY SQUID (parte 3)
Instalación de Servidores GNU/Linux - PROXY SQUID (parte 3)Instalación de Servidores GNU/Linux - PROXY SQUID (parte 3)
Instalación de Servidores GNU/Linux - PROXY SQUID (parte 3)
 
Ictic4
Ictic4Ictic4
Ictic4
 
Introducción Administración TCP/IP
Introducción Administración TCP/IPIntroducción Administración TCP/IP
Introducción Administración TCP/IP
 
Proxy解說
Proxy解說Proxy解說
Proxy解說
 
Stupid Web Caching Tricks
Stupid Web Caching TricksStupid Web Caching Tricks
Stupid Web Caching Tricks
 
Squid
SquidSquid
Squid
 
Squid
SquidSquid
Squid
 
Unidad 11 - Administración básica del sistema
Unidad 11 - Administración básica del sistemaUnidad 11 - Administración básica del sistema
Unidad 11 - Administración básica del sistema
 
Manual de squid creado por juanextk
Manual de squid creado por juanextkManual de squid creado por juanextk
Manual de squid creado por juanextk
 
RESUMEN PROXY
RESUMEN PROXYRESUMEN PROXY
RESUMEN PROXY
 
Squid1
Squid1Squid1
Squid1
 
Manual Servidor Proxy Squid3
Manual Servidor Proxy Squid3Manual Servidor Proxy Squid3
Manual Servidor Proxy Squid3
 
IPTABLES y SQUID‏
IPTABLES y SQUID‏IPTABLES y SQUID‏
IPTABLES y SQUID‏
 
Squid3 - Servidor Proxy
Squid3 - Servidor ProxySquid3 - Servidor Proxy
Squid3 - Servidor Proxy
 
Presentación de Kerio
Presentación de KerioPresentación de Kerio
Presentación de Kerio
 
Curso Squid avanzado
Curso Squid avanzadoCurso Squid avanzado
Curso Squid avanzado
 
Squid
Squid Squid
Squid
 
Instalación y Configuración de un Servidor Proxy en Linux Ubuntu
Instalación y Configuración de un Servidor Proxy en Linux UbuntuInstalación y Configuración de un Servidor Proxy en Linux Ubuntu
Instalación y Configuración de un Servidor Proxy en Linux Ubuntu
 
Proxy Squid en Ubuntu
Proxy Squid en UbuntuProxy Squid en Ubuntu
Proxy Squid en Ubuntu
 

Similar to Squid

Squid Caching for Web Content Accerlation
Squid Caching for Web Content AccerlationSquid Caching for Web Content Accerlation
Squid Caching for Web Content Accerlationrahul8590
 
Ch 22: Web Hosting and Internet Servers
Ch 22: Web Hosting and Internet ServersCh 22: Web Hosting and Internet Servers
Ch 22: Web Hosting and Internet Serverswebhostingguy
 
Squid Proxy Server
Squid Proxy ServerSquid Proxy Server
Squid Proxy Server13bcs0012
 
Linux11 Proxy Server
Linux11 Proxy ServerLinux11 Proxy Server
Linux11 Proxy ServerJainul Musani
 
Using aphace-as-proxy-server
Using aphace-as-proxy-serverUsing aphace-as-proxy-server
Using aphace-as-proxy-serverHARRY CHAN PUTRA
 
Feb. 9, 2010 ICACT 2010@Phoenix Park, Korea
Feb. 9, 2010 ICACT 2010@Phoenix Park, Korea Feb. 9, 2010 ICACT 2010@Phoenix Park, Korea
Feb. 9, 2010 ICACT 2010@Phoenix Park, Korea webhostingguy
 
Open source technology
Open source technologyOpen source technology
Open source technologyaparnaz1
 
17937858 squid-server - [the-xp.blogspot.com]
17937858 squid-server - [the-xp.blogspot.com]17937858 squid-server - [the-xp.blogspot.com]
17937858 squid-server - [the-xp.blogspot.com]Krisman Tarigan
 
Defending against application level DoS attacks
Defending against application level DoS attacksDefending against application level DoS attacks
Defending against application level DoS attacksChu Xu
 
Information System Security
Information System Security Information System Security
Information System Security Elijah Konzo
 
cara menginstall router
cara menginstall routercara menginstall router
cara menginstall routerBobby Bobby
 
Securing MongoDB to Serve an AWS-Based, Multi-Tenant, Security-Fanatic SaaS A...
Securing MongoDB to Serve an AWS-Based, Multi-Tenant, Security-Fanatic SaaS A...Securing MongoDB to Serve an AWS-Based, Multi-Tenant, Security-Fanatic SaaS A...
Securing MongoDB to Serve an AWS-Based, Multi-Tenant, Security-Fanatic SaaS A...MongoDB
 
Web Server(Apache),
Web Server(Apache), Web Server(Apache),
Web Server(Apache), webhostingguy
 
Web Server(Apache),
Web Server(Apache), Web Server(Apache),
Web Server(Apache), webhostingguy
 
Web application & proxy server
Web application & proxy serverWeb application & proxy server
Web application & proxy serverMeera Hapaliya
 

Similar to Squid (20)

Squid Caching for Web Content Accerlation
Squid Caching for Web Content AccerlationSquid Caching for Web Content Accerlation
Squid Caching for Web Content Accerlation
 
Squid server
Squid serverSquid server
Squid server
 
Ch 22: Web Hosting and Internet Servers
Ch 22: Web Hosting and Internet ServersCh 22: Web Hosting and Internet Servers
Ch 22: Web Hosting and Internet Servers
 
Squid Proxy Server
Squid Proxy ServerSquid Proxy Server
Squid Proxy Server
 
Proxy Server
Proxy ServerProxy Server
Proxy Server
 
Linux11 Proxy Server
Linux11 Proxy ServerLinux11 Proxy Server
Linux11 Proxy Server
 
Firewall vpn proxy
Firewall vpn proxyFirewall vpn proxy
Firewall vpn proxy
 
Apache Web Server Setup 4
Apache Web Server Setup 4Apache Web Server Setup 4
Apache Web Server Setup 4
 
Using aphace-as-proxy-server
Using aphace-as-proxy-serverUsing aphace-as-proxy-server
Using aphace-as-proxy-server
 
Feb. 9, 2010 ICACT 2010@Phoenix Park, Korea
Feb. 9, 2010 ICACT 2010@Phoenix Park, Korea Feb. 9, 2010 ICACT 2010@Phoenix Park, Korea
Feb. 9, 2010 ICACT 2010@Phoenix Park, Korea
 
Open source technology
Open source technologyOpen source technology
Open source technology
 
17937858 squid-server - [the-xp.blogspot.com]
17937858 squid-server - [the-xp.blogspot.com]17937858 squid-server - [the-xp.blogspot.com]
17937858 squid-server - [the-xp.blogspot.com]
 
Defending against application level DoS attacks
Defending against application level DoS attacksDefending against application level DoS attacks
Defending against application level DoS attacks
 
Information System Security
Information System Security Information System Security
Information System Security
 
cara menginstall router
cara menginstall routercara menginstall router
cara menginstall router
 
Securing MongoDB to Serve an AWS-Based, Multi-Tenant, Security-Fanatic SaaS A...
Securing MongoDB to Serve an AWS-Based, Multi-Tenant, Security-Fanatic SaaS A...Securing MongoDB to Serve an AWS-Based, Multi-Tenant, Security-Fanatic SaaS A...
Securing MongoDB to Serve an AWS-Based, Multi-Tenant, Security-Fanatic SaaS A...
 
Web Server(Apache),
Web Server(Apache), Web Server(Apache),
Web Server(Apache),
 
Web Server(Apache),
Web Server(Apache), Web Server(Apache),
Web Server(Apache),
 
Web application & proxy server
Web application & proxy serverWeb application & proxy server
Web application & proxy server
 
PostgreSQL : Introduction
PostgreSQL : IntroductionPostgreSQL : Introduction
PostgreSQL : Introduction
 

More from Syeda Javeria

تعلق باللہ Relationship with Allah
تعلق باللہ  Relationship with Allahتعلق باللہ  Relationship with Allah
تعلق باللہ Relationship with AllahSyeda Javeria
 
Social Media - Introduction, Importance and our Responsibility to spread Islam
Social Media - Introduction, Importance and our Responsibility to spread IslamSocial Media - Introduction, Importance and our Responsibility to spread Islam
Social Media - Introduction, Importance and our Responsibility to spread IslamSyeda Javeria
 
Management by Objectives
Management by ObjectivesManagement by Objectives
Management by ObjectivesSyeda Javeria
 
Patient record management system(s.e. diagrams)
Patient record management system(s.e. diagrams)Patient record management system(s.e. diagrams)
Patient record management system(s.e. diagrams)Syeda Javeria
 
Nabi s.a.w.w ki daawat e deen
Nabi s.a.w.w ki daawat e deenNabi s.a.w.w ki daawat e deen
Nabi s.a.w.w ki daawat e deenSyeda Javeria
 
Windows Movie Maker Tutorial
Windows Movie Maker TutorialWindows Movie Maker Tutorial
Windows Movie Maker TutorialSyeda Javeria
 
Direct and Online marketing
Direct and Online marketingDirect and Online marketing
Direct and Online marketingSyeda Javeria
 
TRANSFORMATION OF AFFIRMATIVE SENTENCES
TRANSFORMATION OF AFFIRMATIVE SENTENCESTRANSFORMATION OF AFFIRMATIVE SENTENCES
TRANSFORMATION OF AFFIRMATIVE SENTENCESSyeda Javeria
 

More from Syeda Javeria (15)

تعلق باللہ Relationship with Allah
تعلق باللہ  Relationship with Allahتعلق باللہ  Relationship with Allah
تعلق باللہ Relationship with Allah
 
Whatsapp
Whatsapp Whatsapp
Whatsapp
 
Haya aur Iman
Haya aur ImanHaya aur Iman
Haya aur Iman
 
Social Media - Introduction, Importance and our Responsibility to spread Islam
Social Media - Introduction, Importance and our Responsibility to spread IslamSocial Media - Introduction, Importance and our Responsibility to spread Islam
Social Media - Introduction, Importance and our Responsibility to spread Islam
 
Phishing
PhishingPhishing
Phishing
 
Management by Objectives
Management by ObjectivesManagement by Objectives
Management by Objectives
 
Patient record management system(s.e. diagrams)
Patient record management system(s.e. diagrams)Patient record management system(s.e. diagrams)
Patient record management system(s.e. diagrams)
 
Hazrat ibrahim a.s.
Hazrat ibrahim a.s.Hazrat ibrahim a.s.
Hazrat ibrahim a.s.
 
Nabi s.a.w.w ki daawat e deen
Nabi s.a.w.w ki daawat e deenNabi s.a.w.w ki daawat e deen
Nabi s.a.w.w ki daawat e deen
 
Link list
Link listLink list
Link list
 
Depreciation
DepreciationDepreciation
Depreciation
 
Windows Movie Maker Tutorial
Windows Movie Maker TutorialWindows Movie Maker Tutorial
Windows Movie Maker Tutorial
 
Direct and Online marketing
Direct and Online marketingDirect and Online marketing
Direct and Online marketing
 
Branding
BrandingBranding
Branding
 
TRANSFORMATION OF AFFIRMATIVE SENTENCES
TRANSFORMATION OF AFFIRMATIVE SENTENCESTRANSFORMATION OF AFFIRMATIVE SENTENCES
TRANSFORMATION OF AFFIRMATIVE SENTENCES
 

Recently uploaded

Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Recently uploaded (20)

Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 

Squid

  • 1.
  • 2.
  • 3. PRESENTED BY: Javeria 11-arid-3303 MIT-3 University Institute of Information Technology , Rawalpindi(UIIT,UAAR) Pakistan
  • 4. Topics to be covered:  What is Web Proxy??  Purpose of using Proxy  Squid  Installation & Configuration Of Squid  Demo
  • 5. Web Proxy A web proxy is a is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers. internet browser Web proxy server
  • 6. Main purpose of using proxies  Improve Performance o Caching o Bandwidth control  Provides detailed logs of user activity  Filter Requests  Surfing Anonymously  Security
  • 7. Some proxies – Microsoft Proxy Server – Nginx – Ccproxy – Squid
  • 8.
  • 9. SQUID Squid is a free, open source, mostly used proxy caching server Internet Service Providers (ISPs) have used Squid proxy servers since the early 1990s to provide faster download speeds for delivering rich media and streaming video. Website operators frequently put a Squid proxy server as a content accelerator, caching frequently viewed content and easing loads on Web servers, to improve the experience of viewers, load balancing and handling traffic spikes for popular content.
  • 10. Squid as Proxy Cache  Squid acts as a proxy cache. It behaves like an agent that receives requests from clients (web browsers) and passes them to the specified server.  When the requested objects arrive at the agent, it stores a copy in a disk cache.  When different clients request the same objects: these are served directly from the disk cache, much faster than obtaining them from the Internet.  This results in less network traffic and thus saves bandwidth.
  • 11. Squid provides a number of great features useful for administrative purpose such as:  allow/ deny access to specific sites  allow/ deny access to specific clients/ users  block URL(s) with specific word  deny some port numbers  Squid support the use of a database such as mySQL for storing the access control list
  • 12. limit the number of connections from a client  allow some clients/users to use the cache at specific times  customize, or make your own error messages.  use proxy-authentication. In this scheme, you assign usernames and passwords to individuals. When they first use the proxy they are asked to authenticate themselves by entering their username and password.  Maintain user log
  • 13. sudo gedit /var/log/squid3/access.log  You can use this file to find out who is using squid server and what they are doing etc
  • 14. (Access Control Lists)  Define ACLs in configuration file and apply rules on them.  ACLs have many options to restrict access based on source ip address, destination ip address, source domain, and destination domain. A properly configured set of ACLs can do things like: ○ restrict access to websites by IP address, ○ limit or block websites by name, ○ restrict web access by time and day, or ○ regular expression matches, such as .exe files or “game” in URL names.
  • 15. Syntax to create and implement ACL: ○ acl aclname acltype argument ... ○ aclelement allow(/deny) aclname  Examples: ○ acl blocked_websites dstdomain .reddit.com .twitter.com ○ http_access deny blocked_websites ○ acl badURL url_regex valentine ○ http_access deny badURL ○ acl pm_work time MTWHF 15:00-17:00 ○ http_access deny pm_work
  • 16. ACL TYPES AVAILABLE  Squid knows about almost 25 types of ACL. Some of them are:  src: source (client) IP addresses  dst: destination (server) IP addresses  srcdomain: source (client) domain name  dstdomain: destination (server) domain name  time: time of day, and day of week  url_regex: URL regular expression pattern matching  maxconn: a limit on the maximum number of connections from a single client IP address  max_user_ip: a limit on the maximum number of IP addresses one user can login from
  • 17. ACCESS LISTS ELEMENTS AVAILABLE  There are a number of different access lists elements. Some are:  http_access: Allows HTTP clients (browsers) to access the HTTP port. This is the primary access control list.  cache: Defines responses that should not be cached.  url_rewrite_access: Controls which requests are sent through the redirector pool.  always_direct: Controls which requests should always be forwarded directly to origin servers.  never_direct: Controls which requests should never be forwarded directly to origin servers.  delay_access: Controls which requests are handled by what delay pool  log_access: Controls which requests are logged. This is global and overrides specific file access lists appended to access_log directives.
  • 18. Official web site: http://www.squid-cache.org/  Contains:  FAQ  Lots of great information!
  • 19.
  • 20. HARDWARE REQUIREMENTS FOR INSTALLING SQUID  LINUX operating system  128MB RAM minimum recommended  Disk  512MB to 1GB for small user counts  16GB to 24GB for large user counts
  • 21. DOWNLOAD AND INSTALL  In Ubuntu: sudo apt-get install squid [APT stands for “Advanced Packaging Tool”]  In Redhat / CentOS yum install squid [YUM stands for “Yellowdog Updater, Modified”]
  • 22. EDIT CONFIGURATION FILE  Command to Open conf file: sudo gedit /etc/squid3/squid.conf  Make these changes in conf file:  http_access deny all > change it to http_access allow all  acl blocked_websites dstdomain .twitter.com  http_access deny blocked_websites  Save and close conf file  Restart squid sudo service squid restart
  • 23. CONNECT TO PROXY SERVER Open Web Browser Go to:  Connection Settings  Internet Properties  LAN Settings  Manual proxy configuration  Http proxy: ip address of proxy server  Port : 3128 (default port for Squid proxy server)
  • 24. UNINSTALLING SQUID  In Ubuntu: sudo apt-get remove squid  In Redhat / CentOS yum remove squid
  • 25. THANK YOU! Javeria (11-arid-3303)