Proxy FAQ

Proxy server

Proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource available from a different server and the proxy server evaluates the request as a way to simplify and control its complexity. Proxies were invented to add structure and encapsulation to distributed systems. Today, most proxies are web proxies, facilitating access to content on the World Wide Web and providing anonymity.

Anonymity

Transparent proxies: your real IP address is used in the query and is easily determined. It may seem that this type of proxy is useless as it gives no privacy guarantee, but you should not jump to that sort of conclusion. This proxy type serves for a particular purpose: it allows passing by local firewalls which may block your access to the website or even give you some extra speed. The advantage of this type of proxies is their speed which is much higher than with anonymous or elite proxies.

Anonymous proxies help you hide your real IP address. It means you conceal your presence online and your actual location. No one will be able to establish a hidden connection with your PC. This proxy type is suitable for the majority of tasks, but its main disadvantages are low average speed and the fact that some websites may detect your using a proxy.

Elite proxies are the most private ones. They can provide all the advantages of anonymous proxies, but it also helps you conceal the fact you are using a proxy. This proxy type guarantees total privacy, but as such proxies are highly popular, they are normally not that fast due to their frequent reloads.

Protocol

HTTP is an application protocol for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web. HTTP functions as a request-response protocol in the client-server computing model. A web browser, for example, may be the client and an application running on a computer hosting a web site may be the server. The client submits an HTTP request message to the server. The server, which provides resources such as HTML files and other content, or performs other functions on behalf of the client, returns a response message to the client. The response contains completion status information about the request and may also contain requested content in its message body.

HTTPS is a protocol for secure communication over a computer network which is widely used on the Internet. HTTPS consists of communication over Hypertext Transfer Protocol (HTTP) within a connection encrypted by Transport Layer Security or its predecessor, Secure Sockets Layer. The main motivation for HTTPS is authentication of the visited website and to protect the privacy and integrity of the exchanged data.

SOCKS4/5 is an Internet protocol that routes network packets between a client and server through a proxy server. SOCKS5 additionally provides authentication so only authorized users may access a server. Practically, a SOCKS server proxies TCP connections to an arbitrary IP address, and provides a means for UDP packets to be forwarded.