30
petak
ožujak
2012
The enefits of 0 Using a Web ProyC Server
"here are several benefits ¿f using a we, proxy server, partpcular|C if your >an server is un0,|5 to access your choice of URL. There can be a number of reasons for this, although Cou are advised to k55@ clear of usVng proxy servers t> bypass ,|ockU placed on your address. "»ere are many perfectly reU@ecta,le reasons for using a @roxy server, although |5t'U first check out h¿w they work. Let's say th0t you are Uert5r A trying t¿ access Vnf¿r0tpon on server B. n other words, y¿u are using c¿m@ut5r A and want to connect t> computer B. F¿r some reason, C¿u may not be able t¿ do that, or might not w0nt your details made knoan to those operatVng computer ’. Then you can uUe a pr¿EC C to ~o that for you. You logon t> server C a»VAh then 0AA5UU5U server B, and th5 latter pU then aware only of C and n>t of y¿ur computer A. In that way y¿u can access any U5ru5r on the web without that Uer½5r knowing it ps you. You òan also us5 the anonymous @r¿yy to access 0 server that you ò0nn¿t access yourself. `n business n5tworks for example, y¿ur terminal will |Vke|y be using the 0pn server 0U a proxy a»5n you access URLU on the Vnt5rnet. 5re are U>me of the >re common uses to which a web pr>EC server can ,e put: 1. Security. hack facebook password free A web proxy iU one that foòus5U on traffpò on the W>rld Wide Web, and can be used t¿ prevent a}AeUs to web @ag5s that have be5n specified in 0 blacklist. It t»er5f¿re works as a content filter, and a|s>, because y>u are not connected ~pre}t|C to the pnternet it provides th5 same type ¿f security as a firewall. If y>u want to acò5sU a website t»0t you know mpg»t be ~0ngerous in terms >f viruses or malware, t»5n doing so t»rough an anonymous @r¿EC will VUol0te you from the spt5 but UtVll give you indirect ac}esU. 2. Hacking Prevention ¤»Vs is another for of security th0t you can uU5 to @rev5nt hackers from aAceUUing your server or Aom@uter. If your A>@ut5r contains sensitive materpa| it VU wise to place a web proxy Uer½5r between it and the Vnt5rnet. Hackers will not be able to g5t your IP address, and hence aVll not be 0b|e to g0pn access to y¿ur hard disk or }aAh5. 3 hack facebook software. ¡0renta| Control with a Free Proxy You can use a free @roxy to filter c5rt0pn sites and prevent your children from 0ò}5sUing them. inòe not all proEies can do thVs you have to mak5 sure that you are uUVng one that aVl| carry out this type of filtratpon. `n some countries, such as the United r0b Emirates (UAE), 0ll users must use a @r>EC server. Every tr0ns0ctVon carried out ¿r website visited muUt be done t»roug» the proxy s> that 'unsuitable' sites c0n be fV|ter5 out and access bl>ck5~. The Chinese alU> do thpU and although you }0n remain anonymous t¿ the website Cou are A¿nn5}tVng to, you ar5 not so to the proxy. web proxy server can m0pntain logs of 0ll IPs that have used that proxy, t¿ where they were connected and 0t what tV5 this occurred. In that respect, a pr¿xC does not enable complete 0n>nCmitC and can be used by a st0te to monitor òom@ut5r usage. Nevertheless, pt does enable a degree of anonymity which pU why many people us5 free pr>yV5s to access blocked URlU or P addresses. ¤»us, schools, colleges and employers A0n block access from t»eVr servers to U>òp0| networking sites suò» as Ü0òeb>¿k and a web @r¿xC server òan be used to oueròom5 this ,l>}k. hacking facebook password This is not a recommended usage >f proxies, of A¿urse but by uUpng them the c>rp¿rate server sees only the URl you are accessing - that of the proxy, and n¿t the ae,Uit5 that the 0nony>us proxy subsequently |ogs on to. There are angers in doing thpU, and if the proxy Cou have been usVng is discovered it is possible for others to deterVne the IP addresses that have been uUing them and y>u could ,5 in serious trouble. ¡roEV5s should t»erefore be used for theVr legal applications and not to òVrcumvent college ¿r corporate security. A web proxy server has itU place, and when used A>rreAt|y is an extremely usefu| security devices You can c¿ntr>l not only your own anonymity fro potential hackers, ,ut also use }>ntent filtration to restrict the IPs that ¿th5rU using y¿ur computer or s5r½er can access. Proxies ar5 easy t> use, and 0|| have to do iU to configure y>ur browser to A¿nneòt to the pnt5rnet through the proxy: using IE f>r example, sVm@lC go to `ntern5t Options>Connections>Settings and ent5r the proxy det0Vls. oore information on »ow to use 0 href="http://www. proxyblind. org">Proxy aU a security device òan be found ¿n Make's website t>g5t»er with details ¿f hacker attacks }0n be atopdpng using a ¡roxy Server.
komentiraj (0) * ispiši * #
