Top Banner
Proxies & Anonymity O Lesson Objectives: O To differentiate between a proxy and a VPN. O To understand a proxy. O Types of proxies. O To know where proxies are used.
10
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: What are Proxies, Anonymity, VPN's, etc.

Proxies & Anonymity O Lesson

Objectives:O To differentiate

between a proxy and a VPN.

O To understand a proxy.

O Types of proxies.O To know where

proxies are used.

Page 2: What are Proxies, Anonymity, VPN's, etc.

Starter

Page 3: What are Proxies, Anonymity, VPN's, etc.

What is a PROXY ?O Well a proxy is simply a computer or

an application. This serves as a simple gateway – in and out, for internet requests.

Page 4: What are Proxies, Anonymity, VPN's, etc.

Proxy Servers?

OObscure Client Identity

OBlock Malicious TrafficOBlock SitesOLog ActivityOImprove Performance

Page 5: What are Proxies, Anonymity, VPN's, etc.

Type of Proxies

OOpen ProxiesOReverse Proxies

Page 6: What are Proxies, Anonymity, VPN's, etc.

PROXIES & VPN’s

O What is a VPN ?

Page 7: What are Proxies, Anonymity, VPN's, etc.
Page 8: What are Proxies, Anonymity, VPN's, etc.

VPNO A Virtual Private Network (VPN) is a

network technology that creates a secure network connection over a public network such as the Internet or a private network owned by a service provider. Large corporations, educational institutions, and government agencies use VPN technology to enable remote users to securely connect to a private network.

Page 9: What are Proxies, Anonymity, VPN's, etc.

Uses of ProxiesO Proxy servers are used for both legal

and illegal purposes. In the enterprise, a proxy server is used to facilitate security, administrative control or caching services, among other purposes. In a personal computing context, proxy servers are used to enable user privacy and anonymous surfing. Proxy servers can also be used for the opposite purpose: To monitor traffic and undermine user privacy.

Page 10: What are Proxies, Anonymity, VPN's, etc.