What Is Proxy ?
In communications, a proxy is something that acts as a server, but when given requests from clients, acts itself as a client to the real servers.
What does your IP address reveal about you?
Your IP address reveals your point of entry to the Internet and can be used to trace your communications back to your ISP, your employer’s network, your school, a public terminal. Though your IP address may not identify you personally, an IP is a unique identifier which represents your computer’s digital ID while you are online.
Know Your Ip Address:
IpMango.com – Freely track Geo IP,city country isp from ip,Ip to location api,find the IP Address of your computer.
It is possible to disguise your IP address on the Web by using an anonymous proxy server. A proxy acts as an intermediary, routing communications between your computer and the Internet. A proxy specializing in anonymous surfing, however, uses its own IP address in place of yours in every outgoing request.
Proxy Servers Are Used To:
- Security,
- Load balancing,
- Data caching in order to reduce bandwidth demands, and for
- Filtering Or Censorship.
Now a people mostly use proxy to bypass restrictions created in Office,Schools and Colleges to access blocked sites.To Access Blocked Website in Your school or College click here.
Filtering proxies insulate you from objectionable elements of Webpages such as cookies, ad banners, dynamic content like Javascript, Java Applets and ActiveX controls. Some anonymous proxies encrypt your Web communications, protecting you from routine monitoring or even dedicated surveillance. Be careful, though, not all proxies are anonymous!
Web-based Proxies:
Web-based Proxies are powered by server-side softwares such as CGIProxy, PHProxy, Poxy, and custom proxy scripts. These proxies work entirely through a Web browser. Usually all that is needed to hide your IP address and surf anonymously is to visit the service’s homepage in a Web browser and enter a URL in the form provided. There is no requirement to download or install software or reconfigure your computer. To work, a CGI based proxy must manipulate the document you’ve requested and all its associated elements and objects. This can be tricky, and not all proxies are as efficient or effective as others. Some services are slow and may produce errors while rendering the many variations of Web page code. But they are popular, numerous, and easy to use.
Open Proxies:
So-called “open proxies” are HTTP or SOCKS type proxy servers that are accidently or maliciously left “open” and accessible on the Internet. HTTP or SOCKS type proxy servers require that you configure your browser’s proxy settings in order to use them. These proxies have the advantage of being compatible with almost all webpages since they do not have to modify the requested page to keep you anonymous. However, there are several major disavantages to using open proxies. Many utilize computers that are compromised, operated by government agencies, or operated by malicious individuals. Often when an attacker obtains control of an end-user’s computer they will install a proxy server so the machine can be exploited to launch further attacks on other machines. It is also commonplace for open proxies to be operated as “honey pots”, where all actions are logged for forensic research. Open proxies are easy to abuse and there are many people using them to commit credit card fraud, pay-per-click fraud, attack or break into computers, and hundreds of other illegal activities. I strongly discourage the use of open proxies as they provide no privacy or security and using them can result in increased exposure and liability.
Click here to see Collection of Top 200 Proxy Sites
Ok,How Does A Proxy Server Works?
The working of the proxy server is explained neatly in this site.