A substitute server, or totally a surrogate, is a computer that acts as an third party between the consumer and the object server. Win initially, the shopper connects to the proxy server and requests the required resource located on another server. On exemplar, email or html page. The proxy then either connects to the specified server and obtains the resource from it, or returns the resource from its own cache.
Companies privilege consumption proxies to protect security, improve network performance, and access “irrelevant” resources. Individuals consume proxies to anonymize traffic or avoid access restrictions.
Substitute approach
Surrogate operation
When talking nearby a representative, we inveterately positively b in any event a direct representative server. Welcome's consider that we are making a demand, championing exemplar, dispiriting to go to GitHub - begin the URL, impel Enter. The substitute does not join us to GitHub straight away, but intercepts the joint and updates the request content sooner than removing the entering IP and changing the header. As a fruit, GitHub believes that the demand came from another computer and sends the necessary matter not to us, but to the substitute server. The factor takes the GitHub dirt, verifies and sends the figures to our computer.
How are proxy servers used?
Stock proxy uses:
increasing network protection past encrypting requests;
preventing the interception of intimate message;
blocking malicious sites and advertising;
caching sites to save
proxy vn traffic;
monitoring the utility of a network canal;
kingdom blocking;
monitoring and logging web requests;
testing интернет resources when accessed from unusual IPs.
You can proffer your options in the comments to the publication.
What are the types of surrogate servers?
How a substitute server works: the simplest simplification tenable
On the level proxy is the simplest order; the agent server settings are not balance out registered in the browser. A transparent factor really intercepts new HTTP traffic. The user gets the notion that he is surfing the Internet without a representative server. Bring into play case: filtering production websites in an eye-opening network.
An anonymous proxy not in any way transmits the patient's IP location to the end resource. A goodness choice if you don't require targeted advertising to track you or your location. A important anonymity agent does not telephone any IP lecture or in person evidence and does not neutral categorize itself as a proxy. During operation, the IP discourse changes periodically - this allows in compensation greatest confidentiality. The TOR browser uses this type of factor server. Because IP changes, it is bloody obstructive to trace the provenience of requests.