3 main types of Proxy
Proxy is a server (a computer system or an application program) that acts as an intermediary or liaison
request from the computer client to the content of the Internet. Proxies can also store files, web pages
in memory for a while, so as to reduce the burden of excessive internet access at the time of taking
the same pages. Moreover, Proxy can also “unblock website” and hide the identity such as IP address,
location, and also used on the ISP connection while browsing with the goal of keeping the user’s identity
is not known by others. Pixy can be used as “hidden tool” to spy when opening websites like Facebook
or Youtube.
There are several types of proxies, including:
1. Transparent Proxy
You can find a lot of transparent proxy easily in proxy list. This type is usually serves as a liaison or
intermediary for data retrieval from the Internet. Usually the transparent proxy can be used to speed
up access to a website. So no need to take more data from a site that had previously accessed using
the same proxy. As the name implies, if we use transparent proxy, our original IP address can still be
detected by the server and can be tracked by using the methods or tools for tracking IP addresses.
2. Anonymous Proxy
This type is slightly different from the transparent proxy and is typically used to hide your IP address.
If we use anonymous proxy, then the original IP address will be hidden or wrapped by a proxy IP.
However, if we use this proxy type, identity / information such as IP Address, Location (Country, Region,
City), and also the ISP that we use normally still be tracked by using the methods or tools for tracking IP
addresses and its access speed is usually slower if compared with Transparent Proxy.
3. Highly Anonymous Proxy (Elite Proxy)
This proxy type is relatively same as anonymous proxy, but the difference is our original information like
IP Address, Location (Country, Region, City), and also the ISP that we use will be hidden by proxy. Proxy
information we use will be showed and detected and it seems that we use direct connection from ISP
proxy.
Incoming search terms:
No Comments »
No comments yet.
RSS feed for comments on this post. TrackBack URL
Leave a comment
You must be logged in to post a comment.
Recent Comments