Skip to main content

what is so called proxy ?

what is so called proxy ?

Introduction to proxy (noobs-friendly)


Today i will Explain you what is "Proxy" how they help Internet users (mostly it helps peoples using internet illegaly) in different ways and i will explain its methodology too to you.

Proxy acts as intermediate between user and web server.

Proxy changes your ip address or it will convert your request into a protocol allowing you to content that server.

Just take the example of one student living in hostel where he have access to Internet but some websites (social networking sites) like Facebook,Twitter,Myspace are not allowed to access. so he get the help of proxy site and through proxy he can access Facebook etc now , this encodes the URL & Page and will not allow the server to identify your computer too. this was just scenario of student living in hostel.

But Hackers use proxy in many ways for example: he can enter into a corporate firewalls just by imitating the IP own the victim who is already inside the firewall network.
Here is the Simple explanation on how proxy servers work :D

what is so called proxy

Example of Proxy site created as demo  > 
http://3night.3owl.com/


Some uses of Proxy. 

1. using caching
2. can be used to be anonymous
3. to bypass parental control of pc.
4. to avoid internet filtering to access content
5. to scan transmitted content for malware before delivery
6. used by people using internet for illegal purposes.

Popular posts from this blog

Hide Drives for security & Privacy

Hide Drives for security & Privacy   My dear friends....!!! I am YASH  , and I again back for improving your computer skill. Today i am going to telling one more interesting tip that is "HIDE DRIVES FOR SECURITY AND PRIVACY", This is a great trick you can play on your friends to disable the display of local or networked drives when you click My Computer. 1.Go to start->run.Type regedit. Now go to: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer Now in the right pane Create a new DWORD item and name it NoDrives (it is case sensitive). Now modify it's value and set it to 3FFFFFF (Hexadecimal) . Now restart your computer. So, now when you click on My Computer, no drives will be shown (all gone...). To enable display of drives in My Computer, simply delete this DWORD item that you created. Again restart your computer. You can now see all the drives again. If you have any oth

HOW TO SAVE | SECURE PERSONAL EMAIL | ACCOUNT FROM HACKER'S

HOW TO SAVE | SECURE PERSONAL EMAIL | ACCOUNT FROM HACKER'S Today Hacking is the becoming normal and then Many people are suffering from the great lose by losing email accounts. so email is very important because the very important data in a email like over PayPal account , important document etc etc . so in the same way Facebook hacking is common . in my previous article I should try to deliver that how to save Facebook from hacker’s .  so the most of people losing there thousands of dollar lose by Email .the most of the person thing that the hacker attack on email with the software , java script etc etc . so try to save your email from hacker like Yahoo , Facebook , Hotmail and Gmail .so today I will tell try to help you that how to save your email from black hat hacker. Before I am starting that its depend on you that you can save your email or help to the mr hacker to hack the email .so most of the person common mistake.so let start STEP # 01 When so

How To check | Stop | Secure that Your Computer Hacked or Not

How To check | Stop | Secure that Your Computer Hacked or Not   The Computer hackers can the cause serious damage to most of computer and may be your personal information.  Hacking can mean the number of things but the computer hacking is a basically when someone accesses into your computer or may be its resources. Without your permission and then initially may be without your knowledge. Computers can be the hacked without leaving any evidence behind that. As the home user and you can always find out that if you have been hacked by the black hat hackers because the black hat hacker either wants keep using your personal computer resources or may be want to harm the computer. As the black hat can try to access your computer. So as I am security Researcher it’s my duty to stop the black hat hacker from the unethical work and also inform to the people about the all activity of those person. So here is simple trick that how you can check your computer that may hacked by hacke