Modernization of old PCs
I note right away that the article has been for several years and it was left on the site for a change. It is clear that now on the market…

Continue reading →

VPN Basic Concepts and Classification
The term VPN (Eng. "Virtual Private Network") refers to a group of technologies that provide a network connection, or the so-called logical network, functioning on top of some other network,…

Continue reading →

Linux operating systems
Linux is not an operating system, but just its kernel. Everything that you are accustomed to see and understand as an OS (buttons, windows and panels) - in fact, it…

Continue reading →

Destination of proxies and NAT

A proxy server is the link between users and the Internet. Proxy server – a server that is constantly on the Web, transmitting all requests from the user computer to the network, and sends the received responses back.

The proxy server of your Internet service provider significantly speeds up your Internet experience. Why is this happening? Yes, because it is not uncommon for a large number of different clients of the same provider to use the same sources. Certain files, sites can be downloaded by other people, and is located in a temporary storage (cache), so the page loads much faster from a proxy server than from an Internet server.

Certain proxy servers make it possible to hide your IP address, thereby giving you the opportunity to visit sites incognito, access FTP archives.

The site administration can easily get comprehensive information about the user: country of residence, information about your Internet service provider, browser, operating system, IP address. Therefore, you have the opportunity to protect and conceal this valuable information. There are a number of sites that can change the answer based on which country the request was sent from, using a proxy server will also help solve this problem and provide you with the opportunity to get the information you need from these sites. In addition, with the help of a proxy server you can visit a competitor’s website absolutely discreetly.

Currently, there is a great threat to become an object of attack by hackers who can also get your IP address, and if you catch a virus, you risk losing valuable files / documents from your computer. However, not all proxies can be considered completely anonymous, because only a small part of them can hide your valid IP address, which in most cases remains open information for site owners. In addition, proxy does not solve the problem with cookies.

We ourselves can increase the security of our computer, thereby protecting the information on it more reliably using two simple tricks: a) make cookies read-only; b) prohibit the browser from storing cookies on the computer. If we resort to a search, we will immediately find a number of proxies that do not completely restrict external access and remain open to extract information.

Anonymizer
For the purpose of a confidential and anonymous journey in the realm of the Internet, special services have been specially created, which are also called anonymizer.
In order to visit the site incognito, i.e. secretly and anonymously, all you need to do is enter his address and click “Hide me”. Clicking on any link located on the page that you are currently viewing does not require re-entering the required address, since the anonymizer itself reproduces the process for the new page.

By visiting various web resources using the anonymizer, you do not leave traces of your presence on them in the log files, since the information remains only about the anonymizer service itself (anonimizer), which in turn prevents the leakage of all your personal data. In addition, cookies are not transmitted and do not remain on your computer.

At the same time, not all websites have the opportunity to visit using anonymizer (through our personal development – that’s all;)), since the resource owners themselves want to have access to information about their website’s traffic by customers.

A proxy server is designed to mediate between a workstation and a worldwide network.

A proxy computer passes user requests through itself and then returns the results obtained from Inetrnet. This is a kind of “trustee”, contributing to the simultaneous access of all machines on the local network to the Internet. At the same time, the administrator setting up the grid is relieved of the need to assign an individual IP address to each individual point, build a complex routing scheme, and contact the provider for an additional (usually paid) service.

In addition to unnecessary troubles and unjustified high cost with methods that, fortunately, are already a thing of the past, the level of data security in LAN is lost, making each computer a potential target for virus attacks and hacking. In addition, due to the lack of centralized management, the administrator will have to worry about the control of each individual station. And, by the way, with the second method of setting the LAN access to the Internet, an additional program is also needed on the main computer, which will route packets, but, unlike proxies, transmitting real IP-clients of clients.

A router that knows how to change addresses is called NAT-proxy (from the English abbreviation network address translation, which can be translated as “network address translator”).

NAT is the first, simplest form of this program, such a transitional link from one type of LAN settings to another type. Under the name “Shared access to the boarding school connection” NAT-proxy is already found in Windows 2000 and XP.

SeaMonkey Web Browser Overview
Shrimp support is not as dynamic (in every way) as Firefox. But as it turned out, this has not only disadvantages, but also a number of advantages. I switched to…

...

Drivers & Firmware
Very often I come across a situation where I need to find and download drivers for various devices. Especially often this has to be done when repairing computers (reinstalling the…

...

Apple iPhone OS
Preamble: Recently, all sorts of mobile and, especially fashionable, cloud technologies have captured the attention of mankind. Desktops and laptops faded into the background, giving way to more compact and…

...

What is a firewall and why is it needed?
We will not go into little things like translating words, occupying them some part of the article. Just point out that a firewall (from the English - fire wall), or…

...