Proxy

出典: くみこみックス

版間での差分
1 行 1 行
-
A proxy is also identified as proxy server and application level gateway. It is a form of technologies created for the use of numerous business institutions and people when it comes to their network and Net access wants. With this, a proxy acts [http://cricsee.com/read_blog/83518/proxy open in a new browser window] as a computer that serves as a mediator amongst the computers that make up the neighborhood network of a company and the Net or any other significant-scale network.<br><br>A proxys perform starts when incoming data is requested by a particular computer in the neighborhood network. When this takes place, the proxy guarantees that the information correctly enters and passes via one of its ports. Subsequently, the data is forwarded to the unit that requested it via another port. Therefore, by supplying a signifies of prohibiting the direct access between networks, a proxy can avert hackers and unauthorized individuals from getting sensitive info such as the internal addresses of a group.<br><br>A proxy has 2 types. These incorporate:<br><br>(1) the http proxy and<br><br>(two) the SMTP proxy.<br><br>The former acts as a gateway for Net access, although the latter acts as a gateway for email. Apart from controlling the access level of external networks, the proxy can also restrict computer systems inside the neighborhood network in terms of the on the internet resources they could access. This is particularly valuable in conditions when the network administrator wants to stop the customers from opening sites they are not supposed to access.<br><br>A proxy can also cache web pages. This is a function that allows the principal computer to retailer copies of downloaded Web pages in its hard disk. When a personal computer in the [http://colin-e.org/read_blog/149476/proxy click here] nearby network requests for an external URL, a copy of that URL is stored in the server. Subsequently, when yet another pc requests for the exact same URL, the proxy can supply the stored copy instead of getting the original 1 from the Web. This, of course, minimizes the time for acquiring [http://dementedmedia.com/read_blog/104399/proxy consumers] information.
+
A proxy is also identified as proxy server and application level gateway. It is a type of technologies created for the use of numerous business institutions and men and women when it comes to their network and Web access requirements. With this, a proxy acts as a laptop or computer that serves as a mediator among the computer systems that make up the nearby network of a firm and the Web or any other large-scale network.<br><br>A proxys perform starts when incoming information is requested by a precise computer in the local network. When this occurs, the proxy guarantees that the data correctly enters and passes via 1 of its ports. Subsequently, the data is forwarded to the unit that requested it via an additional port. Hence, by providing [http://tokiohtv.com/read_blog/43969/proxy vin check] a means of prohibiting the direct access between networks, a proxy can avert hackers and unauthorized people from getting sensitive information such as the internal [http://v.wanjie.info/read_blog/111971/proxy needs] addresses of a group.<br><br>A proxy has [http://starcinematv.com/read_blog/69638/proxy needs] two varieties. These consist of:<br><br>(1) the http proxy and<br><br>(two) the SMTP proxy.<br><br>The former acts as a gateway for Net access, even though the latter acts as a gateway for e-mail. Apart from controlling the access level of external networks, the proxy can also restrict computers inside the neighborhood network in terms of the on-line resources they could access. This is specifically valuable in conditions when the network administrator wants to stop the customers from opening websites they are not supposed to access.<br><br>A proxy can also cache internet pages. This is a feature that enables the primary computer to store copies of downloaded Web pages in its tough disk. When a laptop or computer in the nearby network requests for an external URL, a copy of that URL is stored in the server. Subsequently, when another personal computer requests for the same URL, the proxy can give the stored copy rather of getting the original a single from the Web. This, of course, minimizes the time for acquiring info.

2012年8月20日 (月) 02:58の版

A proxy is also identified as proxy server and application level gateway. It is a type of technologies created for the use of numerous business institutions and men and women when it comes to their network and Web access requirements. With this, a proxy acts as a laptop or computer that serves as a mediator among the computer systems that make up the nearby network of a firm and the Web or any other large-scale network.

A proxys perform starts when incoming information is requested by a precise computer in the local network. When this occurs, the proxy guarantees that the data correctly enters and passes via 1 of its ports. Subsequently, the data is forwarded to the unit that requested it via an additional port. Hence, by providing vin check a means of prohibiting the direct access between networks, a proxy can avert hackers and unauthorized people from getting sensitive information such as the internal needs addresses of a group.

A proxy has needs two varieties. These consist of:

(1) the http proxy and

(two) the SMTP proxy.

The former acts as a gateway for Net access, even though the latter acts as a gateway for e-mail. Apart from controlling the access level of external networks, the proxy can also restrict computers inside the neighborhood network in terms of the on-line resources they could access. This is specifically valuable in conditions when the network administrator wants to stop the customers from opening websites they are not supposed to access.

A proxy can also cache internet pages. This is a feature that enables the primary computer to store copies of downloaded Web pages in its tough disk. When a laptop or computer in the nearby network requests for an external URL, a copy of that URL is stored in the server. Subsequently, when another personal computer requests for the same URL, the proxy can give the stored copy rather of getting the original a single from the Web. This, of course, minimizes the time for acquiring info.

表示