Mozilla Firefox Web Browser Overview
For more than 10 years I have been using the "Firefox" browser in my daily work on my PC and have gained a decent experience, which I hasten to share.…

Continue reading →

D-Link DIR-300 Setup
The DIR-300 router has been discontinued today and you can see on sale its more modern version - DIR-300NRU. The difference between them is small: slightly different interfaces (NRU cannot…

Continue reading →

Computer and vision
This article will focus on the effect of the computer on vision. Initially, the article was focused on CRT-monitors (tube), which could seriously impair vision with regular work on the…

Continue reading →

Destination of proxies and NAT

A proxy server is the link between users and the Internet. Proxy server – a server that is constantly on the Web, transmitting all requests from the user computer to the network, and sends the received responses back.

The proxy server of your Internet service provider significantly speeds up your Internet experience. Why is this happening? Yes, because it is not uncommon for a large number of different clients of the same provider to use the same sources. Certain files, sites can be downloaded by other people, and is located in a temporary storage (cache), so the page loads much faster from a proxy server than from an Internet server.

Certain proxy servers make it possible to hide your IP address, thereby giving you the opportunity to visit sites incognito, access FTP archives.

The site administration can easily get comprehensive information about the user: country of residence, information about your Internet service provider, browser, operating system, IP address. Therefore, you have the opportunity to protect and conceal this valuable information. There are a number of sites that can change the answer based on which country the request was sent from, using a proxy server will also help solve this problem and provide you with the opportunity to get the information you need from these sites. In addition, with the help of a proxy server you can visit a competitor’s website absolutely discreetly.

Currently, there is a great threat to become an object of attack by hackers who can also get your IP address, and if you catch a virus, you risk losing valuable files / documents from your computer. However, not all proxies can be considered completely anonymous, because only a small part of them can hide your valid IP address, which in most cases remains open information for site owners. In addition, proxy does not solve the problem with cookies.

We ourselves can increase the security of our computer, thereby protecting the information on it more reliably using two simple tricks: a) make cookies read-only; b) prohibit the browser from storing cookies on the computer. If we resort to a search, we will immediately find a number of proxies that do not completely restrict external access and remain open to extract information.

Anonymizer
For the purpose of a confidential and anonymous journey in the realm of the Internet, special services have been specially created, which are also called anonymizer.
In order to visit the site incognito, i.e. secretly and anonymously, all you need to do is enter his address and click “Hide me”. Clicking on any link located on the page that you are currently viewing does not require re-entering the required address, since the anonymizer itself reproduces the process for the new page.

By visiting various web resources using the anonymizer, you do not leave traces of your presence on them in the log files, since the information remains only about the anonymizer service itself (anonimizer), which in turn prevents the leakage of all your personal data. In addition, cookies are not transmitted and do not remain on your computer.

At the same time, not all websites have the opportunity to visit using anonymizer (through our personal development – that’s all;)), since the resource owners themselves want to have access to information about their website’s traffic by customers.

A proxy server is designed to mediate between a workstation and a worldwide network.

A proxy computer passes user requests through itself and then returns the results obtained from Inetrnet. This is a kind of “trustee”, contributing to the simultaneous access of all machines on the local network to the Internet. At the same time, the administrator setting up the grid is relieved of the need to assign an individual IP address to each individual point, build a complex routing scheme, and contact the provider for an additional (usually paid) service.

In addition to unnecessary troubles and unjustified high cost with methods that, fortunately, are already a thing of the past, the level of data security in LAN is lost, making each computer a potential target for virus attacks and hacking. In addition, due to the lack of centralized management, the administrator will have to worry about the control of each individual station. And, by the way, with the second method of setting the LAN access to the Internet, an additional program is also needed on the main computer, which will route packets, but, unlike proxies, transmitting real IP-clients of clients.

A router that knows how to change addresses is called NAT-proxy (from the English abbreviation network address translation, which can be translated as “network address translator”).

NAT is the first, simplest form of this program, such a transitional link from one type of LAN settings to another type. Under the name “Shared access to the boarding school connection” NAT-proxy is already found in Windows 2000 and XP.

E-Wallet Protection
When comparing the degree of protection of client programs of payment systems Yandex.Money and Webmoney, it turned out that the latter offers more reliable means of protecting client data. However,…

...

Internet fraud
A proverb says: "Forewarned - means armed." Not to listen to her is stupid. Nowadays, the Internet is playing an increasingly important role in people's lives, and is of undoubted…

...

File encryption
Encryption is the most common and essentially the simplest way to protect any information. After all, it seems that it could be simpler to take the text, take some algorithm…

...

Windows Maintenance Programs
Computer maintenance can be both physical (dust removal, etc.) and software. The second is more related to the operating system, since the software maintenance of the PC itself at home…

...