Get it on Google Play
New! Download Unionpedia on your Android™ device!
Faster access than browser!

Proxy server

Index Proxy server

In computer networks, a proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers. [1]

100 relations: Acceptable use policy, Acknowledgement (data networks), Anonymity, Anonymizer, Antivirus software, Apache HTTP Server, Apache Traffic Server, Application firewall, Application layer, Ari Luotonen, Authentication, Bandwidth (computing), Blacklist (computing), Captive portal, Client (computing), Common Gateway Interface, Comparison of web server software, Computer network, Computer security, Content-control software, Cross-site scripting, Daemon (computing), Darknet, Distributed Checksum Clearinghouse, DNSBL, Domain Name System, Dynamic Host Configuration Protocol, Eavesdropping, Encapsulation (networking), Extranet, Firewall (computing), Form (HTML), Free software, Garlic routing, Gateway (telecommunications), Geolocation, Geolocation software, Geotargeting, Gordon Lyon, HAProxy, HTTP cookie, HTTPS, Hypertext Transfer Protocol, I2P, Intermediary, Internet Content Adaptation Protocol, Internet Engineering Task Force, Internet Information Services, Internet privacy, Internet Protocol, ..., Internet Relay Chat, Internet troll, IP address, IP address blocking, JPEG, Load balancing (computing), Malware, Man-in-the-middle attack, Microsoft Forefront Threat Management Gateway, MIME, Mod proxy, Network address translation, Nginx, NT LAN Manager, Onion routing, OSI model, Performance-enhancing proxy, PHP, Polipo, Privoxy, Proxy, Proxy list, Reverse proxy, Router (computing), Secondary market, Server (computing), Server log, Slashdot effect, SMTP proxy, SOCKS, Spamming, Squid (software), SYN flood, Tinyproxy, Tor (anonymity network), Traceroute, Transmission Control Protocol, Transport Layer Security, United States Computer Emergency Readiness Team, URL, Varnish (software), Virtual private network, Web accelerator, Web Accessibility Initiative, Web cache, Web Cache Communication Protocol, WinGate, World Wide Web, X.509, Ziproxy. Expand index (50 more) »

Acceptable use policy

An acceptable use policy (AUP), acceptable usage policy or fair use policy, is a set of rules applied by the owner, creator or administrator of a network, website, or service, that restrict the ways in which the network, website or system may be used and sets guidelines as to how it should be used.

New!!: Proxy server and Acceptable use policy · See more »

Acknowledgement (data networks)

In data networking, telecommunications, and computer buses, an acknowledgement (ACK) is a signal passed between communicating processes, computers, or devices to signify acknowledgement, or receipt of message, as part of a communications protocol.

New!!: Proxy server and Acknowledgement (data networks) · See more »


Anonymity, adjective "anonymous", is derived from the Greek word ἀνωνυμία, anonymia, meaning "without a name" or "namelessness".

New!!: Proxy server and Anonymity · See more »


An anonymizer or an anonymous proxy is a tool that attempts to make activity on the Internet untraceable.

New!!: Proxy server and Anonymizer · See more »

Antivirus software

Antivirus software, or anti-virus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware.

New!!: Proxy server and Antivirus software · See more »

Apache HTTP Server

The Apache HTTP Server, colloquially called Apache, is a free and open-source cross-platform web server, released under the terms of Apache License 2.0.

New!!: Proxy server and Apache HTTP Server · See more »

Apache Traffic Server

The Apache Traffic Server (ATS) is a modular, high-performance reverse proxy and forward proxy server, generally comparable to Nginx and Squid.

New!!: Proxy server and Apache Traffic Server · See more »

Application firewall

An application firewall is a form of firewall that controls input, output, and/or access from, to, or by an application or service.

New!!: Proxy server and Application firewall · See more »

Application layer

An application layer is an abstraction layer that specifies the shared communications protocols and interface methods used by hosts in a communications network.

New!!: Proxy server and Application layer · See more »

Ari Luotonen

Ari Luotonen is a Finnish software developer and author.

New!!: Proxy server and Ari Luotonen · See more »


Authentication (from authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of confirming the truth of an attribute of a single piece of data claimed true by an entity.

New!!: Proxy server and Authentication · See more »

Bandwidth (computing)

In computing, bandwidth is the maximum rate of data transfer across a given path.

New!!: Proxy server and Bandwidth (computing) · See more »

Blacklist (computing)

In computing, a blacklist or block list is a basic access control mechanism that allows through all elements (email addresses, users, passwords, URLs, IP addresses, domain names, file hashes, etc.), except those explicitly mentioned.

New!!: Proxy server and Blacklist (computing) · See more »

Captive portal

A captive portal is a web page which is displayed to newly connected users before they are granted broader access to network resources.

New!!: Proxy server and Captive portal · See more »

Client (computing)

A client is a piece of computer hardware or software that accesses a service made available by a server.

New!!: Proxy server and Client (computing) · See more »

Common Gateway Interface

In computing, Common Gateway Interface (CGI) offers a standard protocol for web servers to execute programs that execute like console applications (also called command-line interface programs) running on a server that generates web pages dynamically.

New!!: Proxy server and Common Gateway Interface · See more »

Comparison of web server software

This article is a comparison of web server software. The first web servers only supported static files, such as HTML (and images), but now they most commonly allow embedding of server side applications.

New!!: Proxy server and Comparison of web server software · See more »

Computer network

A computer network, or data network, is a digital telecommunications network which allows nodes to share resources.

New!!: Proxy server and Computer network · See more »

Computer security

Cybersecurity, computer security or IT security is the protection of computer systems from theft of or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.

New!!: Proxy server and Computer security · See more »

Content-control software

Content-control software, commonly referred to as an internet filter, is software that restricts or controls the content an Internet user is capable to access, especially when utilised to restrict material delivered over the Internet via the Web, e-mail, or other means.

New!!: Proxy server and Content-control software · See more »

Cross-site scripting

Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications.

New!!: Proxy server and Cross-site scripting · See more »

Daemon (computing)

In multitasking computer operating systems, a daemon is a computer program that runs as a background process, rather than being under the direct control of an interactive user.

New!!: Proxy server and Daemon (computing) · See more »


A darknet (or dark net) is a portion of routed, allocated IP space not running any services.

New!!: Proxy server and Darknet · See more »

Distributed Checksum Clearinghouse

Distributed Checksum Clearinghouse (also referred to as DCC) is a hash sharing method of spam email detection.

New!!: Proxy server and Distributed Checksum Clearinghouse · See more »


A Domain Name System-based Blackhole List (DNSBL) or Real-time Blackhole List (RBL) is an effort to stop email spamming.

New!!: Proxy server and DNSBL · See more »

Domain Name System

The Domain Name System (DNS) is a hierarchical decentralized naming system for computers, services, or other resources connected to the Internet or a private network.

New!!: Proxy server and Domain Name System · See more »

Dynamic Host Configuration Protocol

The Dynamic Host Configuration Protocol (DHCP) is a network management protocol used on UDP/IP networks whereby a DHCP server dynamically assigns an IP address and other network configuration parameters to each device on a network so they can communicate with other IP networks.

New!!: Proxy server and Dynamic Host Configuration Protocol · See more »


Eavesdropping is secretly or stealthily listening to the private conversation or communications of others without their consent.

New!!: Proxy server and Eavesdropping · See more »

Encapsulation (networking)

In computer networking, encapsulation is a method of designing modular communication protocols in which logically separate functions in the network are abstracted from their underlying structures by inclusion or information hiding within higher level objects.

New!!: Proxy server and Encapsulation (networking) · See more »


An extranet is a controlled private network that allows access to partners, vendors and suppliers or an authorized set of customers – normally to a subset of the information accessible from an organization's intranet.

New!!: Proxy server and Extranet · See more »

Firewall (computing)

In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

New!!: Proxy server and Firewall (computing) · See more »

Form (HTML)

A webform, web form or HTML form on a web page allows a user to enter data that is sent to a server for processing.

New!!: Proxy server and Form (HTML) · See more »

Free software

Free software or libre software is computer software distributed under terms that allow users to run the software for any purpose as well as to study, change, and distribute it and any adapted versions.

New!!: Proxy server and Free software · See more »

Garlic routing

Garlic routing is a variant of onion routing that encrypts multiple messages together to make it more difficult for attackers to perform traffic analysis and to increase the speed of data transfer.

New!!: Proxy server and Garlic routing · See more »

Gateway (telecommunications)

A gateway is the piece of networking hardware used in telecommunications via communications networks that allows data to flow from one discrete network to another.

New!!: Proxy server and Gateway (telecommunications) · See more »


Geolocation is the identification or estimation of the real-world geographic location of an object, such as a radar source, mobile phone, or Internet-connected computer terminal.

New!!: Proxy server and Geolocation · See more »

Geolocation software

In computing, geolocation software is software that is capable of deducing the geolocation of a device connected to the Internet.

New!!: Proxy server and Geolocation software · See more »


Geo targeting in geomarketing and internet marketing is the method of determining the geolocation of a website visitor and delivering different content to that visitor based on their location.

New!!: Proxy server and Geotargeting · See more »

Gordon Lyon

Gordon Lyon (also known by his pseudonym Fyodor Vaskovich) is a network security expert, open source programmer, writer, and hacker.

New!!: Proxy server and Gordon Lyon · See more »


HAProxy is free, open source software that provides a high availability load balancer and proxy server for TCP and HTTP-based applications that spreads requests across multiple servers.

New!!: Proxy server and HAProxy · See more »

HTTP cookie

An HTTP cookie (also called web cookie, Internet cookie, browser cookie, or simply cookie) is a small piece of data sent from a website and stored on the user's computer by the user's web browser while the user is browsing.

New!!: Proxy server and HTTP cookie · See more »


HTTP Secure (HTTPS) is an extension of the Hypertext Transfer Protocol (HTTP) for secure communication over a computer network, and is widely used on the Internet.

New!!: Proxy server and HTTPS · See more »

Hypertext Transfer Protocol

The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, and hypermedia information systems.

New!!: Proxy server and Hypertext Transfer Protocol · See more »


The Invisible Internet Project (I2P) is an anonymous network layer that allows for censorship-resistant, peer to peer communication.

New!!: Proxy server and I2P · See more »


An intermediary (or go-between) is a third party that offers intermediation services between two parties.

New!!: Proxy server and Intermediary · See more »

Internet Content Adaptation Protocol

The Internet Content Adaptation Protocol (ICAP) is a lightweight HTTP-like protocol specified in RFC 3507 which is used to extend transparent proxy servers, thereby freeing up resources and standardizing the way in which new features are implemented.

New!!: Proxy server and Internet Content Adaptation Protocol · See more »

Internet Engineering Task Force

The Internet Engineering Task Force (IETF) develops and promotes voluntary Internet standards, in particular the standards that comprise the Internet protocol suite (TCP/IP).

New!!: Proxy server and Internet Engineering Task Force · See more »

Internet Information Services

Internet Information Services (IIS, formerly Internet Information Server) is an extensible web server created by Microsoft for use with the Windows NT family.

New!!: Proxy server and Internet Information Services · See more »

Internet privacy

Internet privacy involves the right or mandate of personal privacy concerning the storing, repurposing, provision to third parties, and displaying of information pertaining to oneself via of the Internet.

New!!: Proxy server and Internet privacy · See more »

Internet Protocol

The Internet Protocol (IP) is the principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries.

New!!: Proxy server and Internet Protocol · See more »

Internet Relay Chat

Internet Relay Chat (IRC) is an application layer protocol that facilitates communication in the form of text.

New!!: Proxy server and Internet Relay Chat · See more »

Internet troll

In Internet slang, a troll is a person who starts quarrels or upsets people on the Internet to distract and sow discord by posting inflammatory and digressive, extraneous, or off-topic messages in an online community (such as a newsgroup, forum, chat room, or blog) with the intent of provoking readers into displaying emotional responses and normalizing tangential discussion, whether for the troll's amusement or a specific gain.

New!!: Proxy server and Internet troll · See more »

IP address

An Internet Protocol address (IP address) is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.

New!!: Proxy server and IP address · See more »

IP address blocking

IP address blocking is a configuration of a network service so that requests from hosts with certain IP addresses are rejected.

New!!: Proxy server and IP address blocking · See more »


JPEG is a commonly used method of lossy compression for digital images, particularly for those images produced by digital photography.

New!!: Proxy server and JPEG · See more »

Load balancing (computing)

In computing, load balancing improves the distribution of workloads across multiple computing resources, such as computers, a computer cluster, network links, central processing units, or disk drives.

New!!: Proxy server and Load balancing (computing) · See more »


Malware (a portmanteau for malicious software) is any software intentionally designed to cause damage to a computer, server or computer network.

New!!: Proxy server and Malware · See more »

Man-in-the-middle attack

In cryptography and computer security, a man-in-the-middle attack (MITM) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.

New!!: Proxy server and Man-in-the-middle attack · See more »

Microsoft Forefront Threat Management Gateway

Microsoft Forefront Threat Management Gateway (Forefront TMG), formerly known as Microsoft Internet Security and Acceleration Server (ISA Server), is a network router, firewall, antivirus program, VPN server and web cache from Microsoft Corporation.

New!!: Proxy server and Microsoft Forefront Threat Management Gateway · See more »


Multipurpose Internet Mail Extensions (MIME) is an Internet standard that extends the format of email to support.

New!!: Proxy server and MIME · See more »

Mod proxy

mod_proxy is an optional module for the Apache HTTP Server.

New!!: Proxy server and Mod proxy · See more »

Network address translation

Network address translation (NAT) is a method of remapping one IP address space into another by modifying network address information in the IP header of packets while they are in transit across a traffic routing device.

New!!: Proxy server and Network address translation · See more »


Nginx (stylized as NGINX, NGiИX or nginx) is a web server which can also be used as a reverse proxy, load balancer, mail proxy and HTTP cache.

New!!: Proxy server and Nginx · See more »

NT LAN Manager

In a Windows network, NT LAN Manager (NTLM) is a suite of Microsoft security protocols that provides authentication, integrity, and confidentiality to users.

New!!: Proxy server and NT LAN Manager · See more »

Onion routing

Onion routing is a technique for anonymous communication over a computer network.

New!!: Proxy server and Onion routing · See more »

OSI model

The Open Systems Interconnection model (OSI model) is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system without regard to its underlying internal structure and technology.

New!!: Proxy server and OSI model · See more »

Performance-enhancing proxy

Performance-enhancing proxies (PEPs) are network agents designed to improve the end-to-end performance of some communication protocols.

New!!: Proxy server and Performance-enhancing proxy · See more »


PHP: Hypertext Preprocessor (or simply PHP) is a server-side scripting language designed for Web development, but also used as a general-purpose programming language.

New!!: Proxy server and PHP · See more »


Polipo is a lightweight caching and forwarding web proxy server.

New!!: Proxy server and Polipo · See more »


Privoxy is a free non-caching web proxy with filtering capabilities for enhancing privacy, manipulating cookies and modifying web page data and HTTP headers before the page is rendered by the browser.

New!!: Proxy server and Privoxy · See more »


A proxy is an agent or substitute authorized to act for another entity or a document which authorizes the agent so to act.

New!!: Proxy server and Proxy · See more »

Proxy list

A proxy list is a list of open HTTP/HTTPS/SOCKS proxy servers all on one website.

New!!: Proxy server and Proxy list · See more »

Reverse proxy

In computer networks, a reverse proxy is a type of proxy server that retrieves resources on behalf of a client from one or more servers.

New!!: Proxy server and Reverse proxy · See more »

Router (computing)

A router is a networking device that forwards data packets between computer networks.

New!!: Proxy server and Router (computing) · See more »

Secondary market

The secondary market, also called the aftermarket and follow on public offering is the financial market in which previously issued financial instruments such as stock, bonds, options, and futures are bought and sold.

New!!: Proxy server and Secondary market · See more »

Server (computing)

In computing, a server is a computer program or a device that provides functionality for other programs or devices, called "clients".

New!!: Proxy server and Server (computing) · See more »

Server log

A server log is a log file (or several files) automatically created and maintained by a server consisting of a list of activities it performed.

New!!: Proxy server and Server log · See more »

Slashdot effect

The Slashdot effect, also known as slashdotting, occurs when a popular website links to a smaller website, causing a massive increase in traffic.

New!!: Proxy server and Slashdot effect · See more »

SMTP proxy

SMTP proxies are specialized mail transfer agents (MTAs) that, similar to other types of proxy servers, pass SMTP sessions through to other MTAs without using the store-and-forward approach of a typical MTA.

New!!: Proxy server and SMTP proxy · See more »


SOCKS is an Internet protocol that exchanges network packets between a client and server through a proxy server.

New!!: Proxy server and SOCKS · See more »


Electronic spamming is the use of electronic messaging systems to send an unsolicited message (spam), especially advertising, as well as sending messages repeatedly on the same site.

New!!: Proxy server and Spamming · See more »

Squid (software)

Squid is a caching and forwarding HTTP web proxy.

New!!: Proxy server and Squid (software) · See more »

SYN flood

A SYN flood is a form of denial-of-service attack in which an attacker sends a succession of SYN requests to a target's system in an attempt to consume enough server resources to make the system unresponsive to legitimate traffic.

New!!: Proxy server and SYN flood · See more »


Tinyproxy is a HTTP proxy server daemon for POSIX operating systems.

New!!: Proxy server and Tinyproxy · See more »

Tor (anonymity network)

Tor is free software for enabling anonymous communication.

New!!: Proxy server and Tor (anonymity network) · See more »


In computing, traceroute is a computer network diagnostic tool for displaying the route (path) and measuring transit delays of packets across an Internet Protocol (IP) network.

New!!: Proxy server and Traceroute · See more »

Transmission Control Protocol

The Transmission Control Protocol (TCP) is one of the main protocols of the Internet protocol suite.

New!!: Proxy server and Transmission Control Protocol · See more »

Transport Layer Security

Transport Layer Security (TLS) – and its predecessor, Secure Sockets Layer (SSL), which is now deprecated by the Internet Engineering Task Force (IETF) – are cryptographic protocols that provide communications security over a computer network.

New!!: Proxy server and Transport Layer Security · See more »

United States Computer Emergency Readiness Team

The United States Computer Emergency Readiness Team (US-CERT) is an organization within the Department of Homeland Security’s (DHS) National Protection and Programs Directorate (NPPD).

New!!: Proxy server and United States Computer Emergency Readiness Team · See more »


A Uniform Resource Locator (URL), colloquially termed a web address, is a reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it.

New!!: Proxy server and URL · See more »

Varnish (software)

Varnish is an HTTP accelerator designed for content-heavy dynamic web sites as well as APIs.

New!!: Proxy server and Varnish (software) · See more »

Virtual private network

A virtual private network (VPN) extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.

New!!: Proxy server and Virtual private network · See more »

Web accelerator

A web accelerator is a proxy server that reduces web site access time.

New!!: Proxy server and Web accelerator · See more »

Web Accessibility Initiative

The World Wide Web Consortium (W3C)'s Web Accessibility Initiative (WAI) is an effort to improve the accessibility of the World Wide Web (WWW or Web) for people with disabilities.

New!!: Proxy server and Web Accessibility Initiative · See more »

Web cache

A web cache (or HTTP cache) is an information technology for the temporary storage (caching) of web documents, such as HTML pages and images, to reduce server lag.

New!!: Proxy server and Web cache · See more »

Web Cache Communication Protocol

Web Cache Communication Protocol (WCCP) is a Cisco-developed content-routing protocol that provides a mechanism to redirect traffic flows in real-time.

New!!: Proxy server and Web Cache Communication Protocol · See more »


WinGate is an integrated multi-protocol proxy server, email server and internet gateway from Qbik New Zealand Limited in Auckland.

New!!: Proxy server and WinGate · See more »

World Wide Web

The World Wide Web (abbreviated WWW or the Web) is an information space where documents and other web resources are identified by Uniform Resource Locators (URLs), interlinked by hypertext links, and accessible via the Internet.

New!!: Proxy server and World Wide Web · See more »


In cryptography, X.509 is a standard that defines the format of public key certificates.

New!!: Proxy server and X.509 · See more »


Ziproxy is a forwarding, non-caching, compressing, HTTP proxy server targeted for traffic optimization.

New!!: Proxy server and Ziproxy · See more »

Redirects here:

6a.nl, Anonymity network, Anonymous Surfing, Anonymous Web proxy, Anonymous Web surfing, Anonymous proxy server, Anonymous server, Anonymous web proxy, Application layer proxy, Application-layer proxy, Bypass (computing), CGI proxy, Caching proxy, Caching proxy server, Camolist, Circumventor, Dontcensorme.org, Forward proxy, Free proxy, HTTP proxy, HTTP proxying, HTTPS Proxy, Http proxy, Intercepting proxy server, Internet proxy, Myspace proxy, P roxy, Proxy Avoidance, Proxy Bouncing, Proxy IP, Proxy IP address, Proxy Server, Proxy Sites, Proxy Website, Proxy avoidance, Proxy bypass, Proxy chain, Proxy chaining, Proxy filter, Proxy gateway, Proxy servers, Proxyserver, SSL Proxy, Secure & Anonymous Internet Surfing, Server proxy, Split proxies, Suffix proxy, Tproxy, Translation proxy server, Transparent proxy, Web Proxy, Web proxies, Web proxy.


[1] https://en.wikipedia.org/wiki/Proxy_server

Hey! We are on Facebook now! »