You are on page 1of 5

What Is A Proxy Server..

A proxy server is an intermediary computer which is placed between a users computer and the internet. It is a mode of hiding your identity to the rest of the world which is connected to the internet. When we log on to the website whatismyIP.com it shows us our Global IP address. This IP address is given to us by our ISP (Internet Service Provider). So when we connect to the internet we use this IP as our identity. A proxy server changes this Global IP and gives us a new IP address.

As we all must have experienced that there are some websites which have been blocked in some institutions, organisations, school, colleges, etc. To run those websites without authority we require a Proxy Server.

Types of Proxy Servers..


Web Proxy Server: These simply are websites which work as proxy servers. When we open such kind of website, we write down the url of the restricted website and press enter. This proxy server gives us another IP address which by passes the firewall of the server. Examples: kproxy, ninja proxy, slygeek, etc.

1.) Kproxy

2.) Slygeek

Standalone Proxy Server: These types of proxy servers are generally used when the administrator has blocked even the web based proxy servers and the restricted sites are unable to open. Stand alone proxy servers are software based proxy servers which works the same as the web based ones. These softwares act as an intermediary for requests from client seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource available from a different server. The proxy server evaluates the request as a way to simplify and control their complexity.

Examples:
1. Ultrasurf: Widely used software, easy to work with and is available free of cost. 2. Hot Spot Shield: Mostly websites are of http are blocked. It converts http:// to https://. 3. TOR: It lowers your bandwidth which disrupts the internet connection. So it is not that much used. 4. ProXPN: The best proxy server, works like a VPN. It is available free of cost and does not hamper the internet connection.

Download these softwares from the internet, they all are available free of cost. Install any of the mentioned software and use them as per your needs. **Warning: Please do not access any unauthorised website or commit any illegal job, these proxy servers are not totally dependable. The person using them can be tracked down and severe consequences can be faced by the user.

Uses
A proxy server has the various mentioned advantages: To keep machines behind it anonymous, mainly for security. To speed up access to resources (using caching). Web proxies are commonly used to cache web pages from a web server. To apply access policy to network services or content, e.g. to block undesired sites. To access sites prohibited or filtered by your ISP or institution. To log / audit usage, i.e. to provide company employee Internet usage reporting. To bypass security / parental controls. To circumvent Internet filtering to access content otherwise blocked by governments.

What Is A VPN..
A virtual private network (VPN) is a private network that interconnects remote (and often geographically separate) networks through primarily public communication infrastructures such as the Internet. VPNs provide security through tunneling protocols and security procedures such as encryption. For example, a VPN could be used to securely connect the branch offices of an organization to a head office network through the public Internet. A VPN can also be used to interconnect two similar-type networks over a dissimilar middle network for example, two IPv6 networks over an IPv4 network.

VPN makes a separate network which is a virtual network (ie. It doesnt actually exist). Whenever we open a website through VPN, it is undetectable by the ISP which we have surfed. Every VPN has a separate IP address which is a static IP. In this virtual network, no logs are formed so the user is untraceable. All the black hat hackers use these VPNs to work undetectably and leave no logs and proof.

You might also like