Sunday, December 4, 2016

What is the meaning of “proxy” in the computer world?

July 15, 2012 by admin  
Filed under Discussions

Question by Sherlock Holmes: What is the meaning of “proxy” in the computer world?

I have heard people use this word. What is the meaning.
Note:- I dont have the patience to read wiki. Just tell me the use of proxy.

Best answer:

Answer by ez80227
there is no use of you don’t understand it.
it’s a 3rd party server you use to hide your own ip address.

Add your own answer in the comments!

Comments

2 Responses to “What is the meaning of “proxy” in the computer world?”
  1. Divya Chutani says:

    In computer networks, a proxy server is a server (a computer system or an application program) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. The proxy server evaluates the request according to its filtering rules. For example, it may filter traffic by IP address or protocol. If the request is validated by the filter, the proxy provides the resource by connecting to the relevant server and requesting the service on behalf of the client. A proxy server may optionally alter the client’s request or the server’s response, and sometimes it may serve the request without contacting the specified server. In this case, it ‘caches’ responses from the remote server, and returns subsequent requests for the same content directly.

    A proxy server has a large variety of potential purposes, including:

    To keep machines behind it anonymous (mainly for security).[1]
    To speed up access to resources (using caching). Web proxies are commonly used to cache web pages from a web server.[2]
    To apply access policy to network services or content, e.g. to block undesired sites.
    To log / audit usage, i.e. to provide company employee Internet usage reporting.
    To bypass security/ parental controls.
    To scan transmitted content for malware before delivery.
    To scan outbound content, e.g., for data leak protection.
    To circumvent regional restrictions.
    A proxy server that passes requests and replies unmodified is usually called a gateway or sometimes tunneling proxy.

    A proxy server can be placed in the user’s local computer or at various points between the user and the destination servers on the Internet.

    A reverse proxy is (usually) an Internet-facing proxy used as a front-end to control and protect access to a server on a private network, commonly also performing tasks such as load-balancing, authentication, decryption or caching.

  2. David Trusty says:

    In computer networks, a proxy server is a server (a computer system or an application program) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. The proxy server evaluates the request according to its filtering rules.

    For example, it may filter traffic by IP address or protocol. If the request is validated by the filter, the proxy provides the resource by connecting to the relevant server and requesting the service on behalf of the client. A proxy server may optionally alter the client’s request or the server’s response, and sometimes it may serve the request without contacting the specified server. In this case, it ‘caches’ responses from the remote server, and returns subsequent requests for the same content directly.

    A proxy server has a large variety of potential purposes, including:

    * To keep machines behind it anonymous (mainly for security).
    * To speed up access to resources (using caching). Web proxies are commonly used to cache web pages from a web serve
    * To apply access policy to network services or content, e.g. to block undesired sites.
    * To log / audit usage, i.e. to provide company employee Internet usage reporting.
    * To bypass security/ parental controls.
    * To scan transmitted content for malware before delivery.
    * To scan outbound content, e.g., for data leak protection.
    * To circumvent regional restrictions.

Speak Your Mind

Tell us what you're thinking...
and oh, if you want a pic to show with your comment, go get a gravatar!

Get Adobe Flash playerPlugin by wpburn.com wordpress themes