Login

Username
Password
 Stay connected

Password recovery
Register

Search

Search:

Theme

I Server Proxy

What is a proxy server


Discovering one of the options available to browse incognito online


At work, on your PC does not allow you to go on Facebook? This is for you!

Among the many options for navigation in disguise, that of the Proxy Server is among the most widely used, especially in the geek community. Thanks to this device, in fact, you can hide your IP address, meaning that the data on the Internet that defines their digital identity, behind another address. In this way it becomes possible to browse anonymously.

Wanting to make a parallel, that is exactly what happens when an individual decides to make personal calls passing through a corporate: in this case, the caller's number is that of the company and not a personal one, allowing our hypothetical individual to maintain a certain anonymity.

Specifically, what is a Proxy Server? And 'infrastructure, hardware or software, which allows you to interface a client computer and a server within a network (be it a home network, or worldwide). In this way, the proxy server acts as an intermediary itself, a sort of "bridge" computer, acting as an intermediary between requests coming from the client computer and the answers that come from the Internet. In practice, if a node of the network (eg a computer) would need, for example, the file hello_world.exe present in one of the Internet server but does not want to, for various reasons, download it directly, could get equally through a proxy server . For choosing this option, the client computer sends the request for the file to your proxy server, which analyzes it and then turns to the server where it is actually hosted, that hosted the file you want. At this point it will be the proxy server to actually download the file and then turn it to the client computer that had made the request. In other words, instead of having a direct connection between computer and server end, as in the vast majority of cases, in this particular case, we will have a connection to three which is also involved in a second server, the so-called proxy server, which is positioned as intermediary between the two extremes.

But how can this procedure have an influence on computer security dell'internauta? The answer is simple: because, as happens with TOR, your IP address will never appear directly in the course of navigation, while it will be visible only that associated with the proxy server. For this proxies are widely used in those states where censorship (print and web) is felt. The dissidents and journalists uncomfortable, thanks to proxy connections, they can navigate in complete anonymity, websites reaching otherwise inaccessible to them. Not only that. They can also share information and disseminate news without having their real identity is put at risk, as has often happened in the course of the so-called Arab Spring.

 

At this address, http://hidemyass.com/proxy-list/, you will find a list of proxy always updated.