Thursday, February 10, 2011

The basics of Anonymous Proxy Servers

In the field of networking, a proxy server is defined as a system or a program that process the requests of clients and by forwarding queries and request to other systems or servers. There are many types of proxy server, and one of this is the anonymous proxy server, a.k.a. anonymizer. This type of server can turn Internet activities untraceable. It will access the Internet on a user’s behalf without revealing the user’s information. In essence, this type of server can secure a user by not revealing the computer’s information.
Proxy servers can serve a lot of purpose, i. e. lowering risks. They can also be utilized in rendering violations in human rights (i.e. expression). With a server, users need not worry losing their reputation. These servers also prevent false identity claim, and they can also protect browsing histories from being exposed to the public. Despite the protection it offers; anonymous servers are not perfectly safe. If the server has the ability to store logs of arriving and outgoing connections, then it is unavoidable that experts can reverse the ability of the server to reveal the users that used that particular server. This also applies to server that re located in countries where it can be tested to warrant searches.
An anonymous proxy server
Web-based anonymous proxy servers have “man in the middle” ability attacks. The server may opt to modify the message the user is forwarding. It ma add and remove content. The server can also screen, block, and keep track of unsecured data such as username, passwords, credit card information, and other personal information. This can be avoided by ensuring that the information to be requested is encrypted. Also, as much as possible communications involving sensitive information should be kept outside of the serer.
Even the finest servers have loopholes. No matter how secure, an anonymizer cannot screen malicious data that may give a clue on the indentity of a user. Safety precautions should be properly observed to avoid leakage of information. Such servers are also common targets, especially public anonymous proxy servers. Anonymous proxy servers can be protocol specific or protocol independent. Protocol-specific server can only work with a single protocol. A plus in the use of the said type is that it needs no extra software. An operation starts when a user makes a connection to the server. Instructions are transported via a message. The server will then contact the source indicated in the message and relay with the command exposed.
On the other hand, protocol-independent servers use tunneling. The protocols that can be used by the server include SOCKS, OpenVPN, and PPTP. In this type, the application requested should be capable of supporting a tunneling protocol. If not, software that would force the connections in the tunnel should be installed.
Free anonymous proxy servers, such as SOCKS and HTTP proxies, are typically operated without the consent of the serve owner. Malwares are the ones that usually the ones that installs such service. These servers can be used to track passwords, generate advertisements, or cause any severe damage to a server owner. This is the indirect consequence of a high bandwidth used by the breach in security.
Thanks:- http://sendanonymousemail.com

No comments:

Post a Comment


Thank you
Thank you... Come Again...!