Sunday, October 12, 2008

Uses of Proxy Servers

In the day-to-day network, there are many uses, here we are familiar with some of the role of the summary and analysis, classification:
First, sharing network
The most common is to use a proxy server may be shared online, many people unconsciously in, for example, through sygate, wingate, isa, ccproxy, NT systems bring their own network sharing, and so on, can provide enterprise-class file ease Survival, reproduction and address filtering, and other services, to make full use of the limited export of local area network bandwidth to speed up the network within the user's access speed, can be solved only with a line of a IP, IP resources, with a lot of local area network for Internet access function, as well as A firewall, network and outside the quarantine network, and they provide a network to monitor and record the information transmission function to enhance the local area network security, and easy to manage users on the Internet.
Second, the visit to Deputy
Visit the Web site to speed up the pace in the emergence of network congestion or failure, through a proxy server website purpose of the visit. For example, A visit to site C, but A to C network problems can bypass the assumption that B is a proxy server, A through B, and then from B to C. You will recall that a few months ago, the network time is not normal, basic access to foreign sites can not, such as GOOGLE, YAHOO, and even the CCF are unable to visit, was very anxious. The results through a proxy server, can be found in the visit, good speed, in such circumstances, the proxy server will be able to play a big role. There is also a type of proxy server to back up a considerable number of cache files that if we visit by the current data in the proxy server's cache file can be read directly without having to re-connect to a remote Web server. In this way, to accelerate the pace of the visit.
Third, to prevent attacks
To hide their true address information, but also to hide their own IP, to prevent attacks by hackers. By analyzing the designated IP address, users can query to the current location. For example, we see that in a number of forums, the forum clearly marked the location of the current users to post, which is in accordance with the Forum members log on at the time of the IP address resolution. Weekdays, we have the most commonly used version of IP significantly QQ, "sending messages" window, you can view each other and resolve the IP location. When we use the proxy server corresponding agreement, will be able to reach their current location of the hidden purpose of the address.
Fourth, limit break
Proxy server can also break through the network restrictions. For example, Internet users on the LAN port, the purpose of the site, the agreement, games, instant messaging software, and other restrictions, can break through these constraints, I can see this message, how to break through local area network for Internet users will not repeat some of the restrictions. For example: GOOGLE We all like to use, in fact, to GOOGLE a function somewhat similar to the proxy server functionality, is a snapshot of the page, the site is frequent changes in address or Web site clearance, site of the server broke down, or has been updated But we still have to check before very useful information on the web page snapshot of the use Paishang, Google with its complex and fully automated search methods ruled out any man-made factors on the search results, to ensure that the page rank of an objective and fair , Google can easily, honest and objective to help you find valuable information online. GOOGLE has a massive database, if can not find server, Google's page snapshot storage may also help in an emergency. Although the page snapshot of the information may not be up-to-date, but a snapshot of the page to find information than in the actual pages much faster, at this time can be encrypted proxy access Google, and then visit its website snapshots to help in an emergency.
Fifth, to hide the identity of
Proxy server is hacking basic knowledge, the hacker's activities, many through a proxy server, such as scanning, spying on the local area network within the machine to carry out infiltration, hacker attacks in general are a lot of transit-class springboard to attack the target machine. To hide the identity and ensure their safety.
Sixth, speed
Increase the download speed to break through the download limit. For instance, some Web site to download the resources to do a thread-IP restrictions, which can be used when the conveyor belt audio-visual, multi-threaded set for each agent to set up a thread. IP restrictions for a breakthrough in the situation very well, as long as a different proxy server, you can download at the same time a number of resources to apply from the WEB and FTP download. But if there is a forum of resources, each user an account and a restricted account a IP, proxy server could not break through on. As an example, here we are, telecommunications users on the movie Web site can not be Unicom, China Unicom users of telecommunications can not be on the film site, as long as the situation of the telecommunications Unicom to find an agent, IP address Unicom is on the line. Unicom, a telecommunications agent to find. Will be able to download movies to their film. Education Network through a proxy server can leave the country without authority or permission to visit a section of the IP-related computer resources.

No comments: