0
Thanks

A few words of thanks would be greatly appreciated.

The Proxy Server

A proxy server can be a computer or a module that acts as a go-betweens between a Web browser and the Internet. The proxy is involved in network security. Proxy servers can secure and improve access to certain web page by storing cached. Thus when a browser sends a request on the request of a Web page that was previously stored, the response and display times are improved. The user accesses the site faster and does not saturate the proxy to exit.
Proxy servers also enhance security in certain Web content filtering and malware.



Filtering

Filtering is applied depending on the security policy in place on the network. This allows you to block using a black list, the malicious sites or irrelevant to the work of the company.

Authentication

To limit access to external network, and strengthen the security of local network, it may be necessary to develop an authentication system to access external resources.
This is enough deterrent for users wishing to visit sites contrary to the charter of their information systems and therefore perform their research wisely

Storing Logs

Storing the logs of sites visited and pages viewed allows the network administrator to redefine the security policy of the network and / or interfere with a user who frequently visit malicious sites or unrelated to the activity of the company.

The "anonymous" proxy

In addition to hide IP address, an anonymous proxy can delete:
  • Cookies
  • Pop-ups
  • Banners
  • Scripts
  • Confidential information in input area (login and password)
0
Thanks

A few words of thanks would be greatly appreciated.

Ask a question
CCM is a leading international tech website. Our content is written in collaboration with IT experts, under the direction of Jean-François Pillou, founder of CCM.net. CCM reaches more than 50 million unique visitors per month and is available in 11 languages.
This document, titled « The Proxy Server », is available under the Creative Commons license. Any copy, reuse, or modification of the content should be sufficiently credited to CCM (ccm.net).

0 Comments