A proxy server can serve several purposes; it can hold the most commonly and recently used content from the World Wide Web for users (versus having to go all the way to the server on which it was originally stored) thus providing quicker access. Also it can filter web content (so it can be used by schools and libraries) and it can convert web pages to match the capabilities of the receiving software and/or hardware.
A connection through a modem and telephone line to the Internet that enables you to use full-screen programs, such as Mosaic and Netscape, to browse the Internet.
A proxy is something that sits between you and the internet, making requests for you and returning the response back to you. Many companies use proxies to share internet access among multiple computers. If you are behind a proxy, you must change certain settings in Trillian. See ProxySettings? for more information.
something or someone who does something on behalf of someone else. Proxies are used on the Internet for several legitimate reasons: some increase speed of web access by caching web pages, some provide an indirect method of Internet access for computers that aren't be connected directly, and some are used to impose restrictions on what Internet resources may be accessed from a particular location. A good proxy only fulfills requests from people it can identify, usually those "inside" a specific home or business network, and keeps track of who did what. The bad proxies are open proxies.
From Web Characterization Terminology & Definitions Sheet ( 1999-05-24) A proxy is an intermediary which acts as both a server and a client for the purpose of retrieving resources or resource manifestations on behalf of other clients. Clients using a proxy know the proxy is present and that it is an intermediary.
"A computer that acts as a bridge between two computer systems..." (Digital Libraries by William Y. Arms). Proxy servers are in use in libraries to provide user authentication so that remote users can access proprietary databases. The University of South Florida, UMUC and many other libraries use Useful Utilities.
A proxy is an intermediary which acts as both a server and a client for the purpose of retrieving resources or resource manifestations on behalf of other clients. Clients using a proxy know the proxy is present and that it is an intermediary. This term was taken verbatim from Web Characterization Terminology & Definitions Sheet.
Server placeret mellem en brugers maskine og Internettet. Den kan fungere som en firewall og give beskyttelse og som et cache-område der giver hurtigere visning af hjemmesider.
proxy is a surrogate for a service provider that emulates the provision of its services. Proxies are used as intermediaries in network applications between clients and servers in order to speed up, replicate, monitor or safeguard service provision.
A proxy server is a kind of buffer between your computer and the Internet resource(s) you are accessing. The data you request come to the proxy first, and only then it transmits the data to you. A proxy server receives a request for an Internet service (such as a web page request) from a user. If the proxy server is also a cache server, it can use its local cache of previously downloaded web pages to provide the page without forwarding the request to the Internet. If the page is not in the cache, the proxy server uses one of its own IP addresses to request the page from the server on the Internet. When the page is returned, the proxy server relates it to the original request and forwards it to the user.
A facility that indirectly provides some service. Proxy crypto applies crypto services to network traffic without individual hosts having to support the services themselves. Firewall proxies provide access to Internet services that are on the other side of the firewall while controlling access to services in either direction.
An individual designated by an Academic to conduct library business in their behalf.
a system to shield users directly from the Internet. Computers behind the proxy request documents from the proxy, which in turn retrieves the data from the Internet on the users' behalf.
A placeholder for a remote object implementation. When requests are received by the proxy they are forwarded to the remote object that it reprepresents via IIOP.
A proxy is a computer running software which will forward requests and data-packets from another computer on the net. A proxy can be used to speed-up web surfing, to tunnel through a corporate firewall, to protect a computer or network from spying/hacking/attacks, etc. Proxies act as bi-directional relays between an originating computer, and a destination computer.
A Proxy (server) is a third-party computer or switching computer which is inserted between two communicating computers and which routes communications bidirectionally.
A proxy has the capability of changing Purdue Electronic Directory fields for individuals on their behalf. Proxy can consist of one or more people (up to 10 maximum).
Someone other than the selected sample member who answers survey questions on behalf of that member.
Computer server or program providing a special service by diverting traffic. Can be used to increase performance, disguise the user, filter traffic, etc.
A computer or a server that represents other computers on the Internet.
A large disk cache on a web server which holds copies of documents retrieved from distant sources on the Internet.
Server placed between a user's machine and the Internet. It can act as a firewall to provide protection and as a cache area to speed up Web page display.
This is (1) a firewall mechanism relays all traffic through it so that it can replace the IP address of a host on the internal (protected) network with its own IP address, or (2) a software agent that will act on the behalf of a user.
Allows the LAN to connect to the internet through addressing. This will not allow the internet to access the Local Area Network (LAN)
A server that acts as a guaranteed route through a firewall. It is used to isolate all traffic from the internal network and the external network; all traffic is funnelled through this route. By implementing a proxy, a machine that is on the internal network can conduct transactions with a machine on the external network, and vice versa, by using the proxy as an intermediary.
someone who acts on behalf of another (in filling out an absentee ballot, for example.)
a server setup designed to offer either firewall security or faster access to cached content normally accessible only through slower connections.
An entity that caches frequently accessed documents to conserve network bandwidth and reduce network response times for users.
Generally used to speed up internet connections by storing frequently accessed images/html locally. Used in the FXP community to hide your identity by using anonymous proxies to connect to a ftp. Usually SOCKS4 or SOCKS5 are used for FTP transfers and are located on port 1080.
For BMCC it is an application to redirect a request received from a remote library user to a particular Internet services, such as a restricted database. In the process, the user's status is being checked (authenticated) to ascertain that the user is a legitimate member of the college. This process is referred to as remote patron authentification.
A server that connects to another server on behalf of a client.
Server used by many ISPs (Internet Service Providers) to cache web downloads locally in order to decrease net traffic
server used by ISP's to store commonly accessed files - speeds up Internet access.
Device used to access the Internet around a "fire wall" put up to ensure security in a large system. Return to the top
Any firewall that blocks and re-creates a connection between two points. As a defensive tool, a proxy in an organization hides a user from the outside world. As a pest, a proxy hides an attacker from a user. As a pest, a proxy is a tool that can be used to anonymize a connection between an attacker and your machine, making the connection more difficult to trace. The attacker interacts with the proxy; the proxy translates the interaction and interacts with your machine. As attack tools, SMTP and FTP proxies are often used in conjunction with Firewall Killers, Downloaders, RATs, and Trojans.
An application that is allowed to pass information through a firewall..
A server that caches commonly accessed files to speed up service.
Typically refers to a computer that serves as intermediate storage for data transferred from the Internet. If the same document is requested more than once, the second request can be served much faster. Computers intended to take advantage of this must be configured to issue their requests via the proxy.
Server sits between a Client and the "real" Server that a Client is trying to use
A proxy is a software interaction layer that prevents direct communication between a sending computer and a receiving one. In this way it is a little like a firewall, but it is more oriented towards packet monitoring and less towards security.
A device whose IP address is specified as a configuration option to the browser or other protocol program in order to handle Internet service requests between web clients and servers.
a machine that sits between a network and the Internet, whose role is to speed up data transfers for the most widely used protocols (for example, HTTP and FTP). It maintains a cache of previous requests, so a machine which makes a request for something which is already cached will receive it quickly, because it will get the information from the local cache. Proxies are very useful on low bandwidth networks (such as modem connections). Sometimes the proxy is the only machine able to access outside the network.
A server used to seek requests on behalf of another computer.
a small program that is able to read messages on both sides of a firewall. (p. 154)
A firewall and content cache server that provides Internet security and improves network performance.
An intermediary server that provides Internet access to a pool of workstations.
A proxy is a server that acts as a firewall between a user an a network in that the user is connecting through the proxy server, which sort of relays the network signal to the target desired. The benefit of this (for an ISP running a proxy for web access) is controlled security and added user protection.
A proxy is something that you instruct to get web pages on your behalf. In the case of a cache proxy, this speeds up web downloads. In the case of using WebMask as a (local) proxy, this removes adverts from the pages.
A form of security on the Internet. By using a proxy or proxy server, a user can send a request to a server on the Internet and, to the server, it appears as though the request is coming from the proxy rather than from the user's machine.
A software program that connects a user to a remote destination through an intermediary gateway.
A computer that listens to name query broadcasts and responds for those names not on the local subnet. The proxy communicates with the name server to resolve names and then caches them for a time period.
Software designed to improve the performance and security of Web server capabilities. Performance is enhanced because information from frequently accessed Web sites is stored locally, preventing the need to constantly access other sites at the cost of performance. Security is enhanced because the proxy can reside on a firewall and forward information to a Web server outside the firewall, thereby disguising the source URL from inside the firewall.
A software agent that acts on behalf of a user. Typical proxies accept a connection from a user, make a decision as to whether or not the user or client IP address is permitted to use the proxy, perhaps does additional authentication, and then completes a connection on behalf of the user to a remote destination.
Or proxy server - A technique used to cache information on a Web server and acts as an intermediary between a Web client and that Web server. It basically holds the most commonly and recently used content from the World Wide Web for users in order to provide quicker access and to increase server security. This is common for an ISP especially if they have a slow link to the Internet.
A proxy is an intermediary server that redirects a client's requests. One common type of proxy provides content filtering. When the client computer requests access to some network resource deemed inappropriate, it is redirected to a "request denied" document.
Server software, typically installed in the firewall DMZ, that allows access to the Internet across the firewall. A proxy is a special server that typically runs in conjunction with firewall software. The proxy server waits for a request from inside the firewall, forwards the request to the remote server outside the firewall, reads the response, then sends the response back to the client. The Netscape Proxy Server also provides caching of documents for improved performance, extensive logging, and fine-grain access control.
Form of security on the Internet. When you use a proxy or proxy server, you send a request to a server on the Internet via this proxy. For the server on the Internet it looks like the request is coming from the proxy, not from your machine.
An intermediary program that acts as both a server and a client for the purpose of making requests on behalf of other clients. Proxies are often used as client-side portals (i.e., a trusted agent that can access the Internet on the client's behalf) through the network firewall and as helper applications for handling requests via protocols not implemented by the user agent.
Proxy server acts on behalf of one or more other servers, usually for screening, firewall, caching, or a combination of these purposes. Typically, a proxy server is used within a company or enterprise to gather all Internet requests, forward them out to Internet Servers, and then receive the responses and in turn forward them to the original requestor in the company. The proxy is invisible to the user. A proxy server is required for each protocol. One advantage is that the cache of a proxy can be used by all users, improving user response time. Back to the Top QoS : Quality of service refers to the measure of service quality provided to the user. Back to the Top
A third party server which acts as an anonymous go between whenever you request a web page or contact a remote server. The message from your computer is first sent through the proxy server before being relayed to the final destination so that it appears as though the request has come from the IP address of the proxy server rather than you. Used when you wish to maintain your privacy on the net or speed up your connection (much more detailed info on this subject in the "more tips" section).
Some device performing some service on behalf of some other device. Proxy servers use their IP address to hide stations on a private network from the Internet. back to the top
the procedure that permits a remote user to access a specific account at the local node, without supplying the username and password
A service on the BrightBox which your web browser must connect through to access the World Wide Web. The proxy is responsible for Content Filtering and Caching all content which passes through, ensuring an economical, fast and safe Internet experience. Because the proxy is optimised and located on the BrightBox in your school, your downloads are kept to an absolute minimum.
Using one computer or device to make requests or "stand in" in place of another. Proxies are often used for Internet security. You can use a proxy to pass data between an internal network and the Internet. The server on the Internet never knows that the request is coming from anywhere but the proxy. Some proxies have caching and site filtering built in.
An intermediary program which acts as both a server and a client for the purpose of making requests on behalf of other clients. Requests are serviced internally or by passing them on, with possible translation, to other servers. A proxy must implement both the client and server requirements of this specification. A "transparent proxy" is a proxy that does not modify the request or response beyond what is required for proxy authentication and identification. A "non-transparent proxy" is a proxy that modifies the request or response in order to provide some added service to the user agent, such as group annotation services, media type transformation, protocol reduction, or anonymity filtering. Except where either transparent or non-transparent behavior is explicitly stated, the HTTP proxy requirements apply to both types of proxies. [ HTTP
The use of one computer or device to make requests in place of another over a network. Proxies are often used for Internet security, or to control connections....
A system (host, server, cache) which send requests to another system on behalf of someone else. For exmple it is used to collect into a cache most requested documents to avoid new connections to retrieve the same document.
Proxy servers are computers designed to speed up access to the internet and also to provide additional security. A proxy server speeds up web browsing by keeping local copies of frequently accessed pages and many can also be used to filter out unwanted content.
A software that can accept or reject the connection of a user to the target destination with some kind of rules or authentication mechanisms.
A special server that runs in the secure portion of a network with a firewall and allows users to access Internet services from that same secure portion of the network. The name and port numbers of proxy server can be entered in the Network preferences, Proxies panel of the Options menu.
For chat purposes, a computer and associated software which passes on a request for a URL from a World Wide Web browser to an outside server and returns the results. This provides clients that are sealed off from the Internet (here, by a firewall) with an agent that can access the Internet on their behalf. A properly configured proxy gateway should be completely unobtrusive.
Software that receives HTTP requests and forwards that request toward the origin server (possibly by way of an upstream proxy) using HTTP. The proxy receives the response from the origin server and forwards it to the requesting client. In providing its forwarding functions, the proxy may modify either the request or response or provide other value-added functions. For the purposes of this specification, "proxy" refers to request/response forwarding functionality, which may exist in a stand-alone HTTP proxy or may be co-located with a gateway or origin server.
The mechanism that allows one system to mediate between two other systems in response to protocol requests. A RADIUS server can act as a proxy client and forward an Access-Request to another AAA server for authentication. As a proxy client, the server would mediate the requests and replies between the client where the Access-Request originated from and the server that the request was forwarded to. R - S
A proxy server provides network address translation and Web content caching services for Web browsers. Proxy settings can be configured automatically as part of an IEAK package.
An intermediary between a client software (such as a browser) and server software (such as a web site). Proxy servers provide an added level of security.
A proxy server is a system that caches items from other servers to speed up access. On the Web, a proxy first attempts to find data locally, and if it's not there, fetches it from the remote server where the data resides permanently.
A node that relays a message between a requester and a Web service, appearing to the Web service to be the requester.
a machine which sits between a network and the Internet , whose role is to speed up data transfers for the most widely used protocols ( HTTP and FTP , for example). It maintains a cache of previous demands, which avoids the cost of asking for the file again if another machine asks for the same thing. Proxies are very useful on low bandwidth networks (such as modem connections). Sometimes the proxy is the only machine able to access outside the network.
An agent that acts on behalf of a user, typically accepting a connection from a user and completing a connection on behalf of the user with a remote host or service. See also gateway and proxy server.
Proxy is another method of sharing of Internet access. Proxy operates with the data on a higher protocol level so that Internet sharing with Proxy servers was never reliable and also required a special application gateway for each networking protocol.
A proxy server stores copies of web pages that you access so that they can be brought up more quickly when you want to access them again. When you ask for a web page, the proxy server checks to see if the web page is stored in its cache. If it is, it returns that copy, without having to access the Internet. The proxy server may be located with the Internet Service Provider that you dial in to, or it may be located on your own server. Proxies do speed up access considerably, but depending on how the proxy server is configured, they may sometimes bring up stored older versions of websites, without showing changes made in the last few hours. Source: TechSoup.org
An agent that relays a message between a requester agent and a provider agent, appearing to the Web service to be the requester.
A proxy server keeps a cache of information about pages on the Internet. If you use it, it helps to make browsing the web faster because it stores copies of web pages in a place that's closer to you. Most large organisations will use a proxy server to save on Internet access.
Proxy services are based upon Microsoft Internet Security & Acceleration (ISA) product. A proxy server is used between a browser client and web servers on the Internet as a means of improving browser performance as well as to reduce bandwidth utilization of our Internet connections. To access functionality on some internal and external websites (e.g., web-based software), you may need to add the appropriate proxy script to your web browser's configuration settings. More details
In an enterprise that uses the Internet, a proxy is a server that acts as an intermediary between a workstation user and the Internet so that the enterprise can ensure security, administrative control, and caching service.
A proxy is an intermediate server, which makes requests on behalf of it's clients. A client doesn't need direct access to a server, if it can communicate with a proxy that does have such access.
Used in conjunction with a firewall, a proxy or proxy service is a server that acts as an intermediary to first determine if a requested connection between a computer on the internal network and one on the outside is permitted. If the connection is authorized, the firewall sets up the necessary communication links between the two computers. The firewall can then monitor the communication between the two networks and suppress any unauthorized activity.
An intermediate server that sits between the client and the origin server. It accepts requests from clients, transmits those requests on to the origin server, and then returns the response from the origin server to the client. If several clients request the same content, the proxy can deliver that content from its cache, rather than requesting it from the origin server each time, thereby reducing response time. See: mod_proxy
A device that performs a function on behalf of another device. When referring to firewalls, proxy is a process used to run a number of application checks on the incoming traffic. This process can negatively impact firewall performance.
Tools that redirect information bound to an IP address, domain name, or all Internet traffic to a third party PWS See password stealer.
A server that sits between a client application, such as a Web browser, and a real server. It intercepts all requests to the real server to see if it can fulfil the requests itself. If not, it forwards the request to the real server. Proxy servers have two main purposes. They can dramatically improve performance for groups of users, because they save the results of all requests for a certain amount of time. Proxy servers can also be used to filter requests.
The mechanism whereby one system acts for another system in responding to protocol requests.
A method of hiding data by rerouting requests. Proxy network: A computer and associated software which will pass on a request for a URL from a World-Wide-Web browser such as Mosaic to an outside server and return the results. This provides clients that are sealed off from the Internet a trusted agent that can access the Internet on their behalf. Once the client is properly configured, its user should not be aware of the proxy gateway. A proxy gateway often runs on a firewall machine. Its main purpose is to act as a barrier to the threat of crackers. It may also be used to hide the IP addresses of the computers inside the firewall from the Internet if they do not use official registered network numbers.
A body of code which acts on behalf of another invoking still other code. For instance, an application program invoking another program which it thinks to be local but in fact resides elsewhere and is invoked by proxy code. A software gateway used to connect network nodes, acting as both a client and a server. Popular usage is to provide local/remote transparency, encryption/decryption or intranet/internet connectivity.
An intermediary server that accepts requests from clients and forwards them to other proxy servers, the origin server, or services the request from its own cache. A proxy acts as a server as well as a client; the proxy is a server to the client connecting to it, and a client to servers that it connects to.
server A way to protect your local area network from being accessed by others on the Internet. The proxy server acts as a security barrier between your internal network and the Internet, keeping others on the Internet from accessing confidential information on your internal network.
A type of firewall that relays requests and responses between clients on a secure internal network and servers on an untrusted network. The proxy server hides the internal network by breaking the TCP/IP connection. Hosts outside your network perceive the proxy server as the source of the communication.
A Proxy (or Proxy Server) is between a Client and a Server - ie. a browser and a Web Server. Proxy servers can store Web Sites and serve the cached version of a Web Site to a Client instead of connecting to the same Site again and again. This makes surfing the web much faster, especially on bigger networks. Proxies can also be used to make an anonymous connection.
A software agent that acts on behalf of a user as a bridge over secure networks by authenticating your identity and then helping you to access the server.
A proxy server is an interface between your browser and the destination server. The proxy server will take your page request and handles the connection to the destination for your browser. These proxy servers are also able to cache pages. If such a proxy is configured to cache it will at first take look to its local cache if the requested page already exist. If not it can search in other caching proxy servers or makes the request directly to the destination. Back to the Top
Refers to a special kind of server that functions as an intermediate link between a client application (like a web browser) and a real server. The proxy server intercepts requests for information from the real server and whenever possible, fills the request. When it is unable to do so, the request is forwarded to the real server. Example: OIT supports an HTTP proxy server called wwwcache.service.osu.edu; its function is to speed up requests for the same web pages. If someone else has recently requested the same page, it's much faster to download the page from the proxy server instead of forwarding the request over the Internet to the place where the page really is located.
At OhioLINK, software that allows an off-campus user to access licensed resources, by making it appear as though the user is coming from a recognized OhioLINK IP address. A proxy acts as a "middleman" by sending requests and information between the user and the licensed database. OhioLINK uses two different proxy servers, EZProxy (for databases that all libraries subscribe to) and Delegate (for the rest). Users access the OhioLINK proxy servers through Remote Authentication.
S. Tuecke, et al., Internet X.509 Public Key Infrastructure Proxy Certificate Profile, Internet Draft. 2001.
An intermediary or "go-between" program that acts as both a server and a client for the purpose of making requests on behalf of other clients.
A proxy server acts as a cache file for an organization. It is also used where firewalls protect the internal network from the external Internet, while continuing to serve Web pages from the inside. [ Source: 1
A person who is knowledgeable about the former student’s current situation and high school participation and answers the interview on behalf of the student when the student is unavailable to answer the interview questions for them self, and may include a parent, guardian, spouse, friend or other relative.
A stand in, such as an intermediary server on a LAN, an image in the DTP application that is for position only, or the object manipulation tool on the PageMaker control strip.
A proxy is a server or a program on a server that performs request relay and caching services. When a computer in a LAN makes a request for a page on the Internet, the proxy checks its cache of pages to see if it has stored the page. If it has, it returns the page to the LAN computer. If not, it makes the request on behalf of the LAN computer and relays the information from the Internet to the LAN computer.
An agent that typically accepts the connection from a user, authenticates that user and completes the connection to a remote destination.
See Application Proxy Firewall