Computer and vision
This article will focus on the effect of the computer on vision. Initially, the article was focused on CRT-monitors (tube), which could seriously impair vision with regular work on the…

Continue reading →

Mozilla Firefox Web Browser Overview
For more than 10 years I have been using the "Firefox" browser in my daily work on my PC and have gained a decent experience, which I hasten to share.…

Continue reading →

Personal Data Security
What is personal information, and why does the state develop entire laws designed to protect such data? Imagine that you are making an order online. In the process of forming…

Continue reading →

Destination of proxies and NAT

A proxy server is the link between users and the Internet. Proxy server – a server that is constantly on the Web, transmitting all requests from the user computer to the network, and sends the received responses back.

The proxy server of your Internet service provider significantly speeds up your Internet experience. Why is this happening? Yes, because it is not uncommon for a large number of different clients of the same provider to use the same sources. Certain files, sites can be downloaded by other people, and is located in a temporary storage (cache), so the page loads much faster from a proxy server than from an Internet server.

Certain proxy servers make it possible to hide your IP address, thereby giving you the opportunity to visit sites incognito, access FTP archives.

The site administration can easily get comprehensive information about the user: country of residence, information about your Internet service provider, browser, operating system, IP address. Therefore, you have the opportunity to protect and conceal this valuable information. There are a number of sites that can change the answer based on which country the request was sent from, using a proxy server will also help solve this problem and provide you with the opportunity to get the information you need from these sites. In addition, with the help of a proxy server you can visit a competitor’s website absolutely discreetly.

Currently, there is a great threat to become an object of attack by hackers who can also get your IP address, and if you catch a virus, you risk losing valuable files / documents from your computer. However, not all proxies can be considered completely anonymous, because only a small part of them can hide your valid IP address, which in most cases remains open information for site owners. In addition, proxy does not solve the problem with cookies.

We ourselves can increase the security of our computer, thereby protecting the information on it more reliably using two simple tricks: a) make cookies read-only; b) prohibit the browser from storing cookies on the computer. If we resort to a search, we will immediately find a number of proxies that do not completely restrict external access and remain open to extract information.

Anonymizer
For the purpose of a confidential and anonymous journey in the realm of the Internet, special services have been specially created, which are also called anonymizer.
In order to visit the site incognito, i.e. secretly and anonymously, all you need to do is enter his address and click “Hide me”. Clicking on any link located on the page that you are currently viewing does not require re-entering the required address, since the anonymizer itself reproduces the process for the new page.

By visiting various web resources using the anonymizer, you do not leave traces of your presence on them in the log files, since the information remains only about the anonymizer service itself (anonimizer), which in turn prevents the leakage of all your personal data. In addition, cookies are not transmitted and do not remain on your computer.

At the same time, not all websites have the opportunity to visit using anonymizer (through our personal development – that’s all;)), since the resource owners themselves want to have access to information about their website’s traffic by customers.

A proxy server is designed to mediate between a workstation and a worldwide network.

A proxy computer passes user requests through itself and then returns the results obtained from Inetrnet. This is a kind of “trustee”, contributing to the simultaneous access of all machines on the local network to the Internet. At the same time, the administrator setting up the grid is relieved of the need to assign an individual IP address to each individual point, build a complex routing scheme, and contact the provider for an additional (usually paid) service.

In addition to unnecessary troubles and unjustified high cost with methods that, fortunately, are already a thing of the past, the level of data security in LAN is lost, making each computer a potential target for virus attacks and hacking. In addition, due to the lack of centralized management, the administrator will have to worry about the control of each individual station. And, by the way, with the second method of setting the LAN access to the Internet, an additional program is also needed on the main computer, which will route packets, but, unlike proxies, transmitting real IP-clients of clients.

A router that knows how to change addresses is called NAT-proxy (from the English abbreviation network address translation, which can be translated as “network address translator”).

NAT is the first, simplest form of this program, such a transitional link from one type of LAN settings to another type. Under the name “Shared access to the boarding school connection” NAT-proxy is already found in Windows 2000 and XP.

SeaMonkey Web Browser Overview
Shrimp support is not as dynamic (in every way) as Firefox. But as it turned out, this has not only disadvantages, but also a number of advantages. I switched to…

...

The computer does not turn on: the problem is in the power supply
All PC malfunctions falling under the “computer does not turn on” category boil down to one single problem: it is impossible to download any of the known operating systems to…

...

Present day viruses
There are a huge number of computer viruses in the world. To establish their exact number (along with all modifications and upgrades) no one is taken. Instead, it is customary…

...

Child Safety Online
Many users, even the most experienced, sometimes do not suspect that having protected themselves, they forget about their own children. They forget, especially when creating different accounts in the OS…

...