![]() This configuration is sometimes called a forced proxy, because users are required to use it. In this case, the network operator may use a firewall to block connections that do not go through the restrictive proxy. The network operator can program this proxy to keep records of what users access and also to deny access to certain sites or services (IP blocking or port blocking). Proxies that restrict accessĪ network operator may force users to access the Internet (or at least Web pages) only through a certain proxy. However, application proxies are also a tool for users to get around censorship and other network restrictions. Good proxies and bad proxiesĪpplication proxies can be used by network operators to censor the Internet or to monitor and control what users do. ![]() In this chapter we will look at HTTP proxies and how they work. ![]() ![]() The most common kinds of application proxies are HTTP proxies, which handle requests for Web sites, and SOCKS proxies, which handle connection requests from a wide variety of applications. Software called an application proxy enables one computer on the Internet to process requests from another computer. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |