Proxy

出典: くみこみックス

版間での差分
最新版 (2012年8月26日 (日) 15:51) (ソースを表示)
 
(間の 1 版分が非表示です)
1 行 1 行
-
A proxy is also identified as proxy server and application level gateway. It is a form of technologies created for the use of numerous business institutions and people when it comes to their network and Net access wants. With this, a proxy acts [http://cricsee.com/read_blog/83518/proxy open in a new browser window] as a computer that serves as a mediator amongst the computers that make up the neighborhood network of a company and the Net or any other significant-scale network.<br><br>A proxys perform starts when incoming data is requested by a particular computer in the neighborhood network. When this takes place, the proxy guarantees that the information correctly enters and passes via one of its ports. Subsequently, the data is forwarded to the unit that requested it via another port. Therefore, by supplying a signifies of prohibiting the direct access between networks, a proxy can avert hackers and unauthorized individuals from getting sensitive info such as the internal addresses of a group.<br><br>A proxy has 2 types. These incorporate:<br><br>(1) the http proxy and<br><br>(two) the SMTP proxy.<br><br>The former acts as a gateway for Net access, although the latter acts as a gateway for email. Apart from controlling the access level of external networks, the proxy can also restrict computer systems inside the neighborhood network in terms of the on the internet resources they could access. This is particularly valuable in conditions when the network administrator wants to stop the customers from opening sites they are not supposed to access.<br><br>A proxy can also cache web pages. This is a function that allows the principal computer to retailer copies of downloaded Web pages in its hard disk. When a personal computer in the [http://colin-e.org/read_blog/149476/proxy click here] nearby network requests for an external URL, a copy of that URL is stored in the server. Subsequently, when yet another pc requests for the exact same URL, the proxy can supply the stored copy instead of getting the original 1 from the Web. This, of course, minimizes the time for acquiring [http://dementedmedia.com/read_blog/104399/proxy consumers] information.
+
A proxy is also known as proxy server and application level gateway. It is a type of technologies developed for the use of a variety of enterprise institutions and men and women when it comes to their network and Web access wants. With this, a proxy acts as a laptop or computer that serves as a mediator between the computers that make up the nearby network of a business and the Internet or any other large-scale network.<br><br>A proxys perform starts when incoming data is requested by a specific laptop or computer in the local network. When this takes place, the proxy guarantees that the data properly enters and passes via one particular of its ports. Subsequently, the [http://bowltube.com/read_blog/53626/proxy rent proxy list] data is forwarded to the unit that requested it through an [http://funtimefederation.com/read_blog/144233/proxy rent proxy list] additional port. Therefore, by supplying a indicates of prohibiting the direct access between networks, a proxy can avert hackers and unauthorized folks from getting sensitive data such as the internal addresses of a group.<br><br>A proxy has 2 types. These include:<br><br>(1) the http proxy and<br><br>(2) the SMTP proxy.<br><br>The former acts as a gateway for Internet access, whilst the latter acts as a gateway for e mail. Apart from controlling the access level of external networks, the proxy can also restrict computer systems inside the neighborhood network in terms of the on the internet resources they could access. This is specially helpful in circumstances when the network administrator needs to avert the users from opening internet sites they are not supposed to access.<br><br>A proxy can also cache web pages. This is a function that enables the main laptop or computer to shop copies of downloaded Internet pages in its difficult disk. When a laptop or computer in the regional network requests for an external URL, a copy of that URL is stored in the server. Subsequently, when an additional computer requests for [http://164.115.5.167/read_blog/81247/proxy rent proxy list] the same URL, the proxy can offer the stored copy rather of finding the original one from the Web. This, of course, minimizes the time for acquiring data.

最新版

A proxy is also known as proxy server and application level gateway. It is a type of technologies developed for the use of a variety of enterprise institutions and men and women when it comes to their network and Web access wants. With this, a proxy acts as a laptop or computer that serves as a mediator between the computers that make up the nearby network of a business and the Internet or any other large-scale network.

A proxys perform starts when incoming data is requested by a specific laptop or computer in the local network. When this takes place, the proxy guarantees that the data properly enters and passes via one particular of its ports. Subsequently, the rent proxy list data is forwarded to the unit that requested it through an rent proxy list additional port. Therefore, by supplying a indicates of prohibiting the direct access between networks, a proxy can avert hackers and unauthorized folks from getting sensitive data such as the internal addresses of a group.

A proxy has 2 types. These include:

(1) the http proxy and

(2) the SMTP proxy.

The former acts as a gateway for Internet access, whilst the latter acts as a gateway for e mail. Apart from controlling the access level of external networks, the proxy can also restrict computer systems inside the neighborhood network in terms of the on the internet resources they could access. This is specially helpful in circumstances when the network administrator needs to avert the users from opening internet sites they are not supposed to access.

A proxy can also cache web pages. This is a function that enables the main laptop or computer to shop copies of downloaded Internet pages in its difficult disk. When a laptop or computer in the regional network requests for an external URL, a copy of that URL is stored in the server. Subsequently, when an additional computer requests for rent proxy list the same URL, the proxy can offer the stored copy rather of finding the original one from the Web. This, of course, minimizes the time for acquiring data.

表示