0% found this document useful (0 votes)
57 views

Assignment: Submitted To:sir Javed

Proxy servers act as an intermediary between a user's device and the internet. There are different types of proxy servers that provide varying levels of functionality and security. Software proxies include programs like Squid and ISA Server, while hardware proxies include devices like Cisco PIX firewalls. Private proxy servers offer advantages like consistency, legal security, and privacy over public proxies. However, proxies also present disadvantages like reduced security if unencrypted connections are used and the potential for traffic to be intercepted. Project scope management involves key steps like requirements gathering and defining the project scope to establish boundaries and lay the foundation for successful completion.

Uploaded by

Rao Aqib Javed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views

Assignment: Submitted To:sir Javed

Proxy servers act as an intermediary between a user's device and the internet. There are different types of proxy servers that provide varying levels of functionality and security. Software proxies include programs like Squid and ISA Server, while hardware proxies include devices like Cisco PIX firewalls. Private proxy servers offer advantages like consistency, legal security, and privacy over public proxies. However, proxies also present disadvantages like reduced security if unencrypted connections are used and the potential for traffic to be intercepted. Project scope management involves key steps like requirements gathering and defining the project scope to establish boundaries and lay the foundation for successful completion.

Uploaded by

Rao Aqib Javed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

ASSIGNMENT

Prepared by:

(F17-BSIT-3003)
AQIB JAVED
(7TH SEMESTER)(EVE)

Submitted to:Sir Javed


What is Proxy server explain its types and also explain server/software used for proxy server?
Proxy Server
Proxy Server acts as a passage among you and the web. It is a middle person worker isolating
end clients from the sites they peruse. Proxy Server give fluctuating degrees of usefulness,
security, and protection relying upon your utilization case, needs, or organization strategy.
In case you're utilizing the Proxy Server, web traffic moves through the Proxy Server on its way
to the location you mentioned.
Kinds of Proxy Servers
Not all proxy servers work a similar way. It's imperative to see precisely the thing usefulness
you're getting from the proxy servers, and guarantee that the proxy server meets your
utilization case.
Straightforward Proxy
A straightforward proxy tells sites that it is Proxy Server and it will in any case pass along your IP
address, recognizing you to the web worker. Organizations, public libraries, and schools
frequently utilize straightforward intermediaries for content sifting: they're not difficult to set
up both customer and worker side.
Mysterious Proxy
A mysterious proxy will distinguish itself as an intermediary, however it will not pass your IP
address to the site – this forestalls wholesale fraud and keep your perusing propensities hidden.
They can likewise keep a site from serving you focused on advertising content dependent on
your area. For instance, if CNN.com knows you live in Raleigh, NC, they will show you reports
they feel are pertinent to Raleigh, NC. Perusing secretly will keep a site from utilizing some
promotion focusing on strategies, however is certifiably not a 100% assurance.
Misshaping intermediary
A mutilating proxy server passes along a bogus IP address for you while recognizing itself as an
intermediary. This fills comparable needs as the mysterious intermediary, yet by passing a
bogus IP address, you can give off an impression of being from an alternate area to get around
content limitations.
High Anonymity proxy
High Anonymity proxy server occasionally change the IP address they present to the web
worker, making it hard to monitor what traffic has a place with who. High secrecy
intermediaries, similar to the TOR Network, is the most private and secure approach to peruse
the web.
Web Proxy Server.
This type of proxies forward the HTTP requests. 
Reverse Proxy.
This represents the server. Dissimilar to a Forward proxy server, the reverse proxy server chips
away along the edge of a site (or web administration) concealing the IP addresses inside the
inner organization from the outer clients. The Opposite Intermediary chooses whether the web
clients may see the substance of a site or utilize a web administration or not.

Hardware and software proxies


Software proxy Hardware proxy
Ms. ISA Server CISCO PIX
Squid Blue Coat
Kerio WinRoute Cyberoam
Ist Up Ner Server Alacer
CCProxy
CProxy
Windows ICS
WinGate

Software used for proxy server


Artica proxy:
Artica Proxy is a network security software for large and multinational companies to log
internet performance, filter requests, and management reporting
Foxy proxy: Foxy Proxy offers proxy and VPN management tools.
Geoserf: Geosurf is a proxy service which works as a toolbar. Residential IPs proxies are used
along with a proxy network. The product boasts speed and reliability.
Gimmie Proxy: Gimmie Proxy is a rotating proxy API
Net Nut Proxy Network: NetNut gets its IPs directly from ISPs and does not depend on an end-
user or P2P networks, and offers particular advantages over others such as: • Faster proxy
speed and one-hop connectivity • 24/7 IP availability
Explain private and public advantage and disadvantages also mention range.
Advantages of Proxy Server
There are bunches of favorable circumstances to utilizing Proxy Server. As a business or an
association, you should realize these advantages to see how Proxy Server can help you. We
should give an eye on it.

 Proxy Server causes the customers to shield their significant data from getting hacked by
programmers.
 Proxy Server is likewise utilized in bypassing hindered sites. It happens numerous a
period that in certain workplaces or schools or in any associations they hindered a
portion of the sites for their own reasons. Additionally, numerous sites have some
nation limitations. In those cases, on the off chance that you need to get to those sites,
the Proxy Server will help you in doing that.
 The Proxy Server is additionally used to upgrade the security and protection level of the
customer's gadget while doing riding utilizing various intermediaries. It encourages
clients to peruse the Internet secretly; a client can keep their own data and perusing
propensities private.
 Proxy Server commonly utilized for accelerating the perusing and access information, in
view of their great reserve framework.
 Faster page loading speed

Advantages of Private Proxy Servers


 Private Proxy Servers offer a top-notch intermediary administration. These offer various
advantages over open or shared intermediaries:
 Consistency: Don't sit around idly scanning unlimited records with the expectation of
complimentary public Proxy Servers that work, reconfiguring your product each time
you locate another public Proxy Server, and rehashing the interaction each time a
worker goes out.
 Lawful security: Don't chance your organization's standing by having your web traffic
related with traffic produced by questionable or criminal operations. Law requirement
offices may thump on your entryway on the off chance that you are utilizing similar
public Proxy Servers as programmers or other troublemakers.
 Security: Don't chance your protection or organization information through phony
public Proxy Servers that may have been set up by programmers just to catch your own
or private subtleties.
 Significant serenity: Don't invest your energy stressing over whether you are utilizing
another person's PC assets without their insight.
Disadvantages of Proxy Server
Alongside all the commendable focal points, Proxy Server likewise accompanies not many
inconveniences. Try not to utilize Proxy Server since every other person is utilizing or somebody
has asked you to. You do should be mindful when you pick Proxy Server as there are sure
dangers related with it.

 The reserve arrangement of the Proxy Server is awesome and dynamic. By and large, it
might happen that your passwords, or your program sites or any got information can
undoubtedly be taken a gander at by the intermediary specialist organization. You may
go over a few free or shared alternatives for intermediaries on the web, however they
accompany a lot of security dangers. So it is fitting to go for a devoted or paid one.
 It happened numerous a period, despite the fact that utilizing the scrambled
associations or organization, your information or data can be spilled utilizing the
strategy of TLS and SSL encoded associations.
 Again as we have come to know over that, with the assistance of Proxy Server you can
get to any impeded sites. So it is discovered commonly that any hindered and hostile
sites which are bad for understudies are being gotten to.
 At the point when you are utilizing decoded associations with Proxy Server the worker
can adjust the reactions you get, bothly, fortunate or unfortunate.

RANGES
Class A 1.0.0.1 to 126.255.255.254
Class B 128.1.0.1 to 191.255.255.254
Class C 192.0.1.1 to 223.255.254.254
Class D 224.0.0.0 to 239.255.255.255
Class E 240.0.0.0 to 254.255.255.254

The main processes of the project scope management give a foundation for the manager to make
a good plan. Every step of the process is highly important in its own right, first step is
requirements gathering which is one of the difficult step, this process is necessary to be complete
before doing the next steps because the following steps in developing the project depends on it.
The second step is defining the scope of the project, one mistake you make to the project can be
costly as the project enters the execution phase.

You might also like