locked
Question about proxies (server, port, etc) RRS feed

  • Question

  • User609686767 posted

    Sorry guys, just trying to get my head around these things.

    Basically when my app is making a web request from another site and I have to set the proxy server name, username, password and port, does that mean these proxy settings should be set by my company network guys? Why can't I just create a basic web request without supplying the proxy details, what's the difference?

    Question about HTTP vs HTTPS, who would normally set this and where should the certificate come from, will it be from the IP Hosting company that hosts my site?

    Thanks!

    Thursday, September 26, 2013 10:05 PM

Answers

  • User2019981500 posted

    Suggest to understand below terms

    what is a Proxy Server?

    A <dfn>proxy server</dfn> is a computer that offers a computer network service to allow clients to make indirect network connections to other network services. A client connects to the proxy server, then requests a connection, file, or other resource available on a different server. The proxy provides the resource either by connecting to the specified server or by serving it from a cache. In some cases, the proxy may alter the client's request or the server's response for various purposes.

    Web proxies

    A common proxy application is a caching Web proxy. This provides a nearby cache of Web pages and files available on remote Web servers, allowing local network clients to access them more quickly or reliably.

    When it receives a request for a Web resource (specified by a URL), a caching proxy looks for the resulting URL in its local cache. If found, it returns the document immediately. Otherwise it fetches it from the remote server, returns it to the requester and saves a copy in the cache. The cache usually uses an expiry algorithm to remove documents from the cache, according to their age, size, and access history. Two simple cache algorithms are Least Recently Used (LRU) and Least Frequently Used (LFU). LRU removes the least-recently used documents, and LFU removes the least-frequently used documents.

    Web proxies can also filter the content of Web pages served. Some censorware applications - which attempt to block offensive Web content - are implemented as Web proxies. Other web proxies reformat web pages for a specific purpose or audience; for example, Skweezer reformats web pages for cell phones and PDAs. Network operators can also deploy proxies to intercept computer viruses and other hostile content served from remote Web pages.

    A special case of web proxies are "CGI proxies." These are web sites which allow a user to access a site through them. They generally use PHP or CGI to implement the proxying functionality. CGI proxies are frequently used to gain access to web sites blocked by corporate or school proxies. Since they also hide the user's own IP address from the web sites they access through the proxy, they are sometimes also used to gain a degree of anonymity.

    You may see references to four different types of proxy servers:

    • <dfn>Transparent Proxy</dfn>

      This type of proxy server identifies itself as a proxy server and also makes the original IP address available through the http headers. These are generally used for their ability to cache websites and do not effectively provide any anonymity to those who use them. However, the use of a transparent proxy will get you around simple IP bans. They are transparent in the terms that your IP address is exposed, not transparent in the terms that you do not know that you are using it (your system is not specifically configured to use it.)

    • <dfn>Anonymous Proxy</dfn>

      This type of proxy server identifies itself as a proxy server, but does not make the original IP address available. This type of proxy server is detectable, but provides reasonable anonymity for most users.

    • <dfn>Distorting Proxy</dfn>

      This type of proxy server identifies itself as a proxy server, but make an incorrect original IP address available through the http headers.

    • <dfn>High Anonymity Proxy</dfn>

      This type of proxy server does not identify itself as a proxy server and does not make available the original IP address.

    Now questions is

    does that mean these proxy settings should be set by my company network guys?

    Actually, you are trying to access from some other domain,obviousely need opening permission to access that.right? those configuration are done on other server not yours.

    usually,crossscripting(from one to another n/w) it not allowed by default.So when we try to consume or access anything from that server ,we need to set that server for permitting someone to access,

    Question about HTTP vs HTTPS, who would normally set this and where should the certificate come from, will it be from the IP Hosting company that hosts my site?

    Cetifications are hosted on the server which hosts ur site and only those can access it who can pass cerificate validity?

    • Marked as answer by Anonymous Thursday, October 7, 2021 12:00 AM
    Friday, September 27, 2013 3:52 AM