Simply explained: what is a proxy server?


In connection with the Internet, and -mail and your browser, you are definitely the term «Proxy-Server» encountered. Is a Practical system for the sailing of identity and acceleration of network traffickingwhich jellies between your computer and the internet. In this article you will learn how a proxy server works and what advantages and disadvantages offers in which areas of application. We also show you how to do it in some steps Gross your IP in the browser Candies.

  • Proxy servers will also request client requests from target servers.
  • With the help of a proxy server, you can mask your position and avoid specific restrictions of the country.
  • Large companies use proxy server to adjust the employee employee.

1. Definition: What is a proxy server and how does it work?

If you go online with your computer, for example to call a specific website, send yours Request directly from the web serverThis returns the content corresponding to you. Will also be Transferred your IP address. This is comparable to a digital imprint through which they can be clearly identified.

A Proxy (by Latin Proximus = «The Next») Passes between the client and the recipient’s server And it is – to simply say – A sort of communication broker within a computer network. Leads the customer’s requests through your address to the recipient’s server Continue without having to obtain a direct connection between the two. The content of the target server will therefore be Back to the Proxy server And from there led to the applicant client.

Figures the function of a proxy server

Basically, a distinction is made between two types of proxy servers:

  • Proxys Forward Accepts requests from internal clients and then guide with your address To the Target calculator on the Internet further. In this way it becomes the LAN shielded by the network from harmful influences.
  • Reverse proxy protect the server from Accepts and controls customer requests from the public networkbefore they are forwarded to the internal server.

Good to know: The proxy service currently known is the Tor («The Onion Router» network). This is a system that has been originally developed for the secret communication of the United States government and army.

https://www.youtube.com/watch?v=zrmwmrxn8ng

2. What are proxy servers for?

There are Various uses for proxy serversThat we would like to take another look in this section.

2.1. Surfing behavior anonymous

Navigate anonymously on the proxy server.

The most important task of a proxy server is that Anonymization. By forwarding the requests, you can mask your identity on the Internet, because it will do so Always only that IP address of the proxy and not yours sent to the destination server. In addition, this also provides some information, such as the Position or supplier, falsified or completely removed.

For the other participants in the network they are always You can only see the proxy dataSo they practically sail anonymously. In this way you can also Use specific restrictions of the country (e.g. in video streaming). Using a proxy server that is abroad, you can pretend to the destination server, your request would not be from Germany.

Danger: Please note that the Proxy lock bypass is a legal gray area. Most of the lawyers, however, increase the process on the basis of the block that is easy to avoid and therefore it is not effective as legal. The consequences are therefore not predictable, the website operator can only react by blocking your IP address.

2.2. Unwanted content filter

Proxy explanation as a filter

In addition to the identity veil, proxy servers are often used also for Filtering of incoming requests. This practice becomes Above all used in corporate networksto block certain services (e.g. sharing files or porn websites).

In addition, proxy servers can also be used as so -called proxy firewallin which the monitoring of communications (in contrast with the firewalls oriented to the package) is not only through guidance and protocol data, but also with the data of the package of their respective applications. This automatically increases security, because data traffic can be analyze much more deeply and more detailed.

Tipp: By installing a corresponding virus protection directly on the proxy server, it is possible to protect users of a network from a central point from malware from the Internet.

2.3. Caching: proxy as an intermediate memory

Proxy servers can also Used for storage in the cache become. Receiving the received files saved as a local copy for further use Not all requests for this must be forwarded to the destination server again and again, but it will be Responded directly on the cache and returned to the customer.

The proxy cache therefore allows one much more efficient and faster way to work AND reduces stress on resources to remote network servers. Also save the recording space because only one copy of the result of the query must be saved. It is also possible to access server services that are currently not occupied online or heavily (e.g. due to a network error). However, the prerequisite for this is that the proxy server itself is accessible and the result of the query is already in the cache.

2.4. Loading and control of bandwidth control and control

Load system

A proxy server can also help To uniformly divide the workload between different servers. For this purpose, a URL is connected to several LAN servers. The proxy therefore acts as a central interface and can With particularly resources requests or in case of failure Distribute the load uniformly within the network.

We the proxy, however, Used for the regulation of bandwidthshares customers depending on the employment rate Dedicates resources A. In this way it can be guaranteed that individual programs or applications Do not claim the complete interval.

3. The advantages and disadvantages of the proxy servers at a glance

  • Faster access to identical data
  • Enable anonymous surf
  • It offers the possibility to avoid censorship and proxy locks
  • Savings of storage space through the storage in the cache
  • The integration of spam filters and virus protection is possible
  • Protection of network resources to remote servers
  • Enables the distribution of the load and the regulation of the bandwidth
  • Each Internet protocol needs its own proxy
  • The proxy are not available for all protocols
  • The proxy are not supported by all applications (for example online games or sharing portals)
  • Possible discrepancies through obsolete content in the cache

4. Proxy server for domestic use: how to mask the IP address via the browser

Modern operating systems such as Windows have two different placeswhere you can create proxy settings: once In the system itself or directly in the browser.

By explanation: during the «System proxy» It is used by all programsUse only Chrome & Co. «Browser-proxy». This means that the browser is used, but it can let all other web applications work without working. In this chapter we will show you how to get one Set browsers -proxy Candies.

4.1. Change the proxy settings in Chrome

Obviously very few users have at home A separated proxy server in use (You can do it optionally rent or buy). Fortunately, there are also online Numerous suppliers that provide free services.

Select one of them and enter the data in the browser. In Google Chrome, proceed as follows:

  1. Open the «Extensive settings«And go to the section»System«During the voice»Open Proxy Settings“.
Use Chrome Proxy Server
  1. Click the tab «Connections«On»LAN settings“.
Use Chrome Web Proxy Server
  1. Put the check mark «Use the proxy server for LAN“And wear the previous one selected IP address and associated door A.
Chrome proxy tax
  1. Confirm your voices with «Ok“.

Then you should test again If the selected settings also work as desired. Using Utrace, for example, you can check if the The position actually changed hat.

Danger: Think well of the server that passes between your client and the internet. A prosecutor blocked their tracks on the net, However, the respective supplier always has the full access to traffic (Key word: data protection!), Which works on its machines.

1 star

2 stars

3 stars

4 stars

5 stars

(54 votes, media: 4,20 out of 5)

Loading …

latest posts published

The best learning apps for students and students

In today's world, smartphones and tablets have become inseparable parts of our daily lives. Given ...

The best browser apps for Android in comparison

The majority of Android users typically rely on Chrome or the pre-installed browser provided by ...

The best tools of email marketing 2023

E-mail marketing is also an important tool in 2023 to reach multiple customers. Various email ...

How do I choose a hard disk for the laptop

The hard drive is a short-term component, typically functioning for up to five years in ...

Because I don’t use a protective sheet for smartphone

A smartphone isn’t exactly inexpensive, and you’ve likely spent several hundred euros to purchase one ...

Does the situation relax or not?

The current half -deductor bottleneck is now in its fourth year. The crisis of Corona ...

OBD2 app for Android and iPhone compared

All systems and control units in the car are controlled by the on -board diagnosis ...

Creation of a Windows 10 restoration point

One effective method for restoring Windows 10 is by utilizing system restore points. These allow ...

What is the EPS format and what do you need?

EPS stands for "Encapsulated PostScript" and refers to a graphic file format based on the ...

Winget: the Windows Package Manager

In the latest versions of Windows 10 and Windows 11, Microsoft's free "Winget" packages manager ...

Leave a Reply

Tu dirección de correo electrónico no será publicada. Los campos obligatorios están marcados con *