In this application program the request of a client is put forward to the other servers and in this way the client has been served. Often the clients makes several request such as connection, a file, web page and some other sources found on other severs by being connected to proxy server. Proxy server gets connected to a specific server in order to provide the clients with the information after requesting for the information to that server on clients’ behalf. Both the client’s request and the server’s response can be optionally altered by the proxy server.
The requests are sometimes served by the proxy server without its contact to the specified servers. The first request is sent to the remote server to save the information of later making the fastest possible speed of everything. A gateway or a tunneling proxy passes all request and replies unmodified. Users may keep the proxy server in their local computer or at a specific key point between themselves and the destination servers or internet. A proxy server can act a plenty of functions.
Caching of the proxy server is a famous term in which the proxy servers retrieve the data the saved information from some of the previous requests made by the similar or different clients. It is done by keeping the local copies of the frequently requested sources by the proxy servers. This allows the larger organization an immense increase in performance as well as reducing the bandwidth stream and costs of the organizations quite significantly. The caching has some neatly defined rules. The proxies that are implemented rather in-efficiently are struggling down sided which are known to be the inability to use user authentication. RFC 3143 explains some of the problems regarding caching. The proxy focusing on WWW is called “web proxy”. The cache is the most common use that a proxy can serve. Many proxies provide content filtering by denying the access to many URLs in blacklist. This process is not done in larger corporations a great deal because of LINUX frequent use in the smaller corporations and businesses.
The online criminals are very much capable of installing proxies. Of course the purpose is to eavesdrop upon the dataflow between the client machine and the web. The proxy operator can capture and analyze all the accessed pages as well as submitted forms so once if an unauthorized proxy has been detected the password of all the online services such as webmail, banking etc, should immediately be changed.