In connection with the Internet, and -mail and your browser, you are definitely the term «Proxy-Server» encountered. Is a Practical system for the sailing of identity and acceleration of network traffickingwhich jellies between your computer and the internet. In this article you will learn how a proxy server works and what advantages and disadvantages offers in which areas of application. We also show you how to do it in some steps Gross your IP in the browser Candies.
- Proxy servers will also request client requests from target servers.
- With the help of a proxy server, you can mask your position and avoid specific restrictions of the country.
- Large companies use proxy server to adjust the employee employee.
1. Definition: What is a proxy server and how does it work?
If you go online with your computer, for example to call a specific website, send yours Request directly from the web serverThis returns the content corresponding to you. Will also be Transferred your IP address. This is comparable to a digital imprint through which they can be clearly identified.
A Proxy (by Latin Proximus = «The Next») Passes between the client and the recipient’s server And it is – to simply say – A sort of communication broker within a computer network. Leads the customer’s requests through your address to the recipient’s server Continue without having to obtain a direct connection between the two. The content of the target server will therefore be Back to the Proxy server And from there led to the applicant client.

Basically, a distinction is made between two types of proxy servers:
- Proxys Forward Accepts requests from internal clients and then guide with your address To the Target calculator on the Internet further. In this way it becomes the LAN shielded by the network from harmful influences.
- Reverse proxy protect the server from Accepts and controls customer requests from the public networkbefore they are forwarded to the internal server.
Good to know: The proxy service currently known is the Tor («The Onion Router» network). This is a system that has been originally developed for the secret communication of the United States government and army.
https://www.youtube.com/watch?v=zrmwmrxn8ng
2. What are proxy servers for?
There are Various uses for proxy serversThat we would like to take another look in this section.
2.1. Surfing behavior anonymous

The most important task of a proxy server is that Anonymization. By forwarding the requests, you can mask your identity on the Internet, because it will do so Always only that IP address of the proxy and not yours sent to the destination server. In addition, this also provides some information, such as the Position or supplier, falsified or completely removed.
For the other participants in the network they are always You can only see the proxy dataSo they practically sail anonymously. In this way you can also Use specific restrictions of the country (e.g. in video streaming). Using a proxy server that is abroad, you can pretend to the destination server, your request would not be from Germany.
Danger: Please note that the Proxy lock bypass is a legal gray area. Most of the lawyers, however, increase the process on the basis of the block that is easy to avoid and therefore it is not effective as legal. The consequences are therefore not predictable, the website operator can only react by blocking your IP address.
2.2. Unwanted content filter

In addition to the identity veil, proxy servers are often used also for Filtering of incoming requests. This practice becomes Above all used in corporate networksto block certain services (e.g. sharing files or porn websites).
In addition, proxy servers can also be used as so -called proxy firewallin which the monitoring of communications (in contrast with the firewalls oriented to the package) is not only through guidance and protocol data, but also with the data of the package of their respective applications. This automatically increases security, because data traffic can be analyze much more deeply and more detailed.
Tipp: By installing a corresponding virus protection directly on the proxy server, it is possible to protect users of a network from a central point from malware from the Internet.
2.3. Caching: proxy as an intermediate memory
Proxy servers can also Used for storage in the cache become. Receiving the received files saved as a local copy for further use Not all requests for this must be forwarded to the destination server again and again, but it will be Responded directly on the cache and returned to the customer.
The proxy cache therefore allows one much more efficient and faster way to work AND reduces stress on resources to remote network servers. Also save the recording space because only one copy of the result of the query must be saved. It is also possible to access server services that are currently not occupied online or heavily (e.g. due to a network error). However, the prerequisite for this is that the proxy server itself is accessible and the result of the query is already in the cache.
2.4. Loading and control of bandwidth control and control

A proxy server can also help To uniformly divide the workload between different servers. For this purpose, a URL is connected to several LAN servers. The proxy therefore acts as a central interface and can With particularly resources requests or in case of failure Distribute the load uniformly within the network.
We the proxy, however, Used for the regulation of bandwidthshares customers depending on the employment rate Dedicates resources A. In this way it can be guaranteed that individual programs or applications Do not claim the complete interval.
3. The advantages and disadvantages of the proxy servers at a glance
- Faster access to identical data
- Enable anonymous surf
- It offers the possibility to avoid censorship and proxy locks
- Savings of storage space through the storage in the cache
- The integration of spam filters and virus protection is possible
- Protection of network resources to remote servers
- Enables the distribution of the load and the regulation of the bandwidth
- Each Internet protocol needs its own proxy
- The proxy are not available for all protocols
- The proxy are not supported by all applications (for example online games or sharing portals)
- Possible discrepancies through obsolete content in the cache
4. Proxy server for domestic use: how to mask the IP address via the browser
Modern operating systems such as Windows have two different placeswhere you can create proxy settings: once In the system itself or directly in the browser.
By explanation: during the «System proxy» It is used by all programsUse only Chrome & Co. «Browser-proxy». This means that the browser is used, but it can let all other web applications work without working. In this chapter we will show you how to get one Set browsers -proxy Candies.
4.1. Change the proxy settings in Chrome
Obviously very few users have at home A separated proxy server in use (You can do it optionally rent or buy). Fortunately, there are also online Numerous suppliers that provide free services.
Select one of them and enter the data in the browser. In Google Chrome, proceed as follows:
- Open the «Extensive settings«And go to the section»System«During the voice»Open Proxy Settings“.

- Click the tab «Connections«On»LAN settings“.

- Put the check mark «Use the proxy server for LAN“And wear the previous one selected IP address and associated door A.

- Confirm your voices with «Ok“.
Then you should test again If the selected settings also work as desired. Using Utrace, for example, you can check if the The position actually changed hat.
Danger: Think well of the server that passes between your client and the internet. A prosecutor blocked their tracks on the net, However, the respective supplier always has the full access to traffic (Key word: data protection!), Which works on its machines.
latest posts published
The best learning apps for students and students
The best browser apps for Android in comparison
The best tools of email marketing 2023
How do I choose a hard disk for the laptop
Because I don’t use a protective sheet for smartphone
Does the situation relax or not?
OBD2 app for Android and iPhone compared
Creation of a Windows 10 restoration point
What is the EPS format and what do you need?
