Proxy is the term used to define the intermediates between the user and his / her server. And so it performs the function of connecting the computer (local) to the external network (Internet). Because local computer addresses are not valid for external access, it is up to the proxy to send the request from the local address to the server by translating and forwarding it to your computer.
All requests made to the server (the site you want to access) will go through your proxy. Upon reaching the place, the Internet Protocol (IP)of the proxy is registered in the cache of your destination and not yours. It is by IP that hackers can hack into computers, so keep the security level of your gateway secure. The risks are several; however, two of them can be listed as the strongest: having your computer hacked or having someone surfing with your IP.
IP works as your computer’s identity card number. It is he who determines who you are on the net, and it is by this number that other people will be able to find it (if you have an FTP address to send files directly to your folders). What the proxy does is to mask your legitimate IP number so that when a cracker wants to hack into your computer, it gets trickier.
Proxies help speed up internet access for companies that need speed when browsing. The log of the accessed page is stored in your cache. With this file already saved, the next access is much faster since it will not be necessary to redo the first recognition of the destination.
There is, also, another type of proxy, the web proxies. They are a version that hides your real IP and allows you to surf anonymously. Many of them are used in closed networks such as universities and workplaces to circumvent a blocking determination on some internet sites. The blocking content champions are relationship sites (Orkut, Facebook, and others), instant messaging programs (Msn Messenger, Yahoo! Messenger and others), not counting the so forbidden porn sites.
Open proxy Open proxy.
Connections are the most dangerous and inviting type of crackers and malicious users. When one of these users can access a computer, it installs a proxy server on it so that it can sign in at any time and can promote various types of illegality, such as scripts that steal bank passwords, credit card fraud, and a wide variety of illegal acts.
Proxy Networks Proxy
Networks are based on encrypted codes that allow anonymous communication between users. Let take some Example of this type of system is the P2P (peer to peer)in which one user connects to the other without knowing their identity and exchanging files with each other. These networks are characterized by not allowing the control of the servers, and the typical users are who provide all the content and data. Of course, many of these computers are used by malicious people with ulterior motives. Therefore, it should be featured in mind that any promise of privacy and security is more than rare.