As firewall, a proxy protects the local network from outside access.
*
As IP-addresses multiplexer, a proxy allows to connect a number of computers to Internet when having only one IP-address
*
Proxy servers can be used (to some extent) to anonymous web surfing.
*
Specialized proxy servers can filter out unwanted content, such as ads or 'unsuitable' material.
*
Proxy servers can afford some protection against hacking attacks.
The program Win gate is often used as proxy. Quite a number of such proxies are open to easy access. Anonymous proxies hide the real IP address (and sometimes other information) from websites that the user visits. There are two sorts; ones can be used in the same way as the non-anonymous proxies above, and web-based anonymizers.
Using a non-anonymous proxy:
HTTP_X_FORWARDED_FOR = 62.64.175.55, 194.72.9.37. This shows the IP address (first number) and possibly the IP address of the proxy server used (second).
Using an anonymous proxy:
HTTP_X_FORWARDED_FOR = 66.51.107.3 This now only shows the IP address of the proxy.
Saturday, 26 February 2011
// //
0
comments
//
0 comments to "What is Proxy?"
Total Pageviews
Blog Archive
-
▼
2011
(43)
-
▼
February
(28)
-
▼
Feb 26
(19)
- Anonymizers- Make your web surfing anonymous
- What is Proxy?
- Cheops-Network management tool-equivalent of a Swi...
- Passive Fingerprinting
- Active Stack Fingerprinting: This technique is cal...
- Tool: Super Scan - Port scanner
- Tool: Net Scan Tools Pro
- Ethical Hacker and Scanning Tools
- What is Nslookup?
- Footprinting - Attack Methods
- What is Footprinting?
- Hacker Classes - Black hats, White Hats, Gray Hats,
- Hacking Phase 5 - Covering Tracks
- Hacking Phase 4 - Maintaining Access
- Hacking Phase 3 - Gaining Access - The hacker expl...
- Hacking Phase 2 - Scanning
- Hacking Phase 1 - Reconnaissance
- Hacktivism
- What do Ethical Hackers do?
-
▼
Feb 26
(19)
-
▼
February
(28)



Post a Comment