Installing a cooler on a processor
Background to the experiment: CPU cooling (LGA775 socket) was provided by the CNPS7700-AICu cooling system. Intel Pentium D930 processor, was purchased in 2005. At that time, quite powerful and expensive.…

Continue reading →

Drivers & Firmware
Very often I come across a situation where I need to find and download drivers for various devices. Especially often this has to be done when repairing computers (reinstalling the…

Continue reading →

Work on the Windows command line
The most common startup recommendations are: Start, Run, cmd. There is a Run item in the start menu. He runs a program that allows you to transfer single commands to the…

Continue reading →

Destination of proxies and NAT

A proxy server is the link between users and the Internet. Proxy server – a server that is constantly on the Web, transmitting all requests from the user computer to the network, and sends the received responses back.

The proxy server of your Internet service provider significantly speeds up your Internet experience. Why is this happening? Yes, because it is not uncommon for a large number of different clients of the same provider to use the same sources. Certain files, sites can be downloaded by other people, and is located in a temporary storage (cache), so the page loads much faster from a proxy server than from an Internet server.

Certain proxy servers make it possible to hide your IP address, thereby giving you the opportunity to visit sites incognito, access FTP archives.

The site administration can easily get comprehensive information about the user: country of residence, information about your Internet service provider, browser, operating system, IP address. Therefore, you have the opportunity to protect and conceal this valuable information. There are a number of sites that can change the answer based on which country the request was sent from, using a proxy server will also help solve this problem and provide you with the opportunity to get the information you need from these sites. In addition, with the help of a proxy server you can visit a competitor’s website absolutely discreetly.

Currently, there is a great threat to become an object of attack by hackers who can also get your IP address, and if you catch a virus, you risk losing valuable files / documents from your computer. However, not all proxies can be considered completely anonymous, because only a small part of them can hide your valid IP address, which in most cases remains open information for site owners. In addition, proxy does not solve the problem with cookies.

We ourselves can increase the security of our computer, thereby protecting the information on it more reliably using two simple tricks: a) make cookies read-only; b) prohibit the browser from storing cookies on the computer. If we resort to a search, we will immediately find a number of proxies that do not completely restrict external access and remain open to extract information.

Anonymizer
For the purpose of a confidential and anonymous journey in the realm of the Internet, special services have been specially created, which are also called anonymizer.
In order to visit the site incognito, i.e. secretly and anonymously, all you need to do is enter his address and click “Hide me”. Clicking on any link located on the page that you are currently viewing does not require re-entering the required address, since the anonymizer itself reproduces the process for the new page.

By visiting various web resources using the anonymizer, you do not leave traces of your presence on them in the log files, since the information remains only about the anonymizer service itself (anonimizer), which in turn prevents the leakage of all your personal data. In addition, cookies are not transmitted and do not remain on your computer.

At the same time, not all websites have the opportunity to visit using anonymizer (through our personal development – that’s all;)), since the resource owners themselves want to have access to information about their website’s traffic by customers.

A proxy server is designed to mediate between a workstation and a worldwide network.

A proxy computer passes user requests through itself and then returns the results obtained from Inetrnet. This is a kind of “trustee”, contributing to the simultaneous access of all machines on the local network to the Internet. At the same time, the administrator setting up the grid is relieved of the need to assign an individual IP address to each individual point, build a complex routing scheme, and contact the provider for an additional (usually paid) service.

In addition to unnecessary troubles and unjustified high cost with methods that, fortunately, are already a thing of the past, the level of data security in LAN is lost, making each computer a potential target for virus attacks and hacking. In addition, due to the lack of centralized management, the administrator will have to worry about the control of each individual station. And, by the way, with the second method of setting the LAN access to the Internet, an additional program is also needed on the main computer, which will route packets, but, unlike proxies, transmitting real IP-clients of clients.

A router that knows how to change addresses is called NAT-proxy (from the English abbreviation network address translation, which can be translated as “network address translator”).

NAT is the first, simplest form of this program, such a transitional link from one type of LAN settings to another type. Under the name “Shared access to the boarding school connection” NAT-proxy is already found in Windows 2000 and XP.

Cleaning your computer from dust
The topic Cleaning a computer (judging by queries in a search engine) from the point of view of the user for the most part involves cleaning the garbage of the…

...

Bat files, examples
You can perform all the examples published below not only by creating and running a BAT file containing these commands, but also copying them directly to the command line. To…

...

A bit about CCTV systems
When it comes to business security, peace of mind for the life and health of relatives, it is necessary to carefully approach the choice of security system. Over the past…

...

Computer and vision
This article will focus on the effect of the computer on vision. Initially, the article was focused on CRT-monitors (tube), which could seriously impair vision with regular work on the…

...