desktop security software  
security desktop order software software library technical support

security desktop

Home

Desktop Security

Internet Security

PC Time Limit

Protect Files

Security FAQ

Windows Tips

Internet FAQ

 

limit, kids, pc, time, security, desktop, child, online, limits, password, control, user, restrict, access, protect, privacy, internet, children

 

 

 

Proxy Servers

Along with a firewall, a proxy server provides additional security. The proxy server acts on behalf of either a server or client. It takes packet requests and process them through a firewall, if one is present, and passes the results back to the original requestor. This handing off provides a shield to the client that uses the proxy server by masking and filtering requests. This looks like a firewall, but a firewall does not provide alias identities to its users—only filtering. A single computer might run multiple servers, with each server connection identified by a port number. A proxy server, like an HTTP server or an FTP server, occupies a port. Typically, a connection uses standardized port numbers for each protocol. For example, HTTP is 80, and FTP is 21. Unlike common server protocols, however, the proxy server has no default port. Many of today's proxy servers also provide caching capabilities. The caching capability gives the end user the impression of wider bandwidth. This is because it takes information that has been passed and saves it in cache. When the user requests the information again, it is provided via the cache instead of going onto the Internet. Proxy servers also can be used in exclusive intranet situations in which the use of the caching capability has more significance. There are currently no proxy servers for the NT system.

Internet FAQ top
 

l Security Officer l Internet Explorer Security l Protect Files l User Time Control l Security Desktop l Site Map

Copyrights 2006 Eugene Mihailov. All rights reserved