Welcome, Guest: Register On Nairaland / LOGIN! / Trending / Recent / New
Stats: 3,152,433 members, 7,815,981 topics. Date: Thursday, 02 May 2024 at 10:45 PM

What Is Proxy And How It Works? - Science/Technology - Nairaland

Nairaland Forum / Science/Technology / What Is Proxy And How It Works? (246 Views)

Extratorrent Proxy And Mirror Sites Are Safe Or Not? / 1337x Proxy Sites For 2021 / Best Proxy And And VPN Apps For Android Smartphone (2) (3) (4)

(1) (Reply)

What Is Proxy And How It Works? by tanzu678: 6:05pm On Oct 24, 2019
What is Proxy and how it works?
Re: What Is Proxy And How It Works? by Tanzina: 6:49pm On Oct 24, 2019
Two types of proxies are available these days. One is a regular proxy and the other is a transparent proxy. A regular proxy is that one does setup/connect to intentionally for many reasons. Monitoring traffic from the office, caching traffic for speed limits, blocking sites at home and a lot more. On the other hand, a transparent proxy is also familiar as a forced or intercepting proxy, it is a middle system deployed by one's ISP. It is called as ‘transparent’ because the client is unaware of its existence or can say anonymous. A transparent proxy acts as an intermediary between a user and a website one want to visit. While one is connecting to that website, the proxy intercepts between the connection, before going through it to the website. This does put one’s data privacy and online behavior at a risk. One can not connect to sites that are inappropriate in some cases. Such as parent filter for adult content. Logging one's online behavior is what sites one access, at what times and how long he or she spends on those sites. If one is not using encryption during his access to a particular website or application, the content of his traffic will be exposed to the ISP. This can also go for intimate photos to comment on a forum. A transparent proxy can limit the number of bytes one can download or upload. The uses of the Internet are growing day by day, so there are several people trying to exploit privacy and hijack the traffic, there is a lot of money to be made by doing that. About this is mentioned above various methods of doing. From ISP monitoring to government censoring to traffic being hijacked. One might say that he has nothing to hide, but one’s online behavior does mirror his physical presence. Someone's chat, intimate photos and all kinds of other information can be monitored, think of it as the house is full of CCTV cameras that are monitored every day. It is up to the person to decide whether he wants an added layer of protection or not.

(1) (Reply)

Computer Programming / Uav-assisted Power Transmission Line Inspection / Spider-man: Into The Spider-verse 2 Release Date, Trailer, Cast, Plot And Everyt

(Go Up)

Sections: politics (1) business autos (1) jobs (1) career education (1) romance computers phones travel sports fashion health
religion celebs tv-movies music-radio literature webmasters programming techmarket

Links: (1) (2) (3) (4) (5) (6) (7) (8) (9) (10)

Nairaland - Copyright © 2005 - 2024 Oluwaseun Osewa. All rights reserved. See How To Advertise. 9
Disclaimer: Every Nairaland member is solely responsible for anything that he/she posts or uploads on Nairaland.