*****************************************************************
Message delivered directly to members of the group:
publish-the...@googlegroups.com*****************************************************************
Please consider this free-reprint article written by:
Ajeet Khurana
*****************************
IMPORTANT - Publication/Reprint Terms
- You have permission to publish this article electronically in free-only publications such as a website or an ezine as long as the bylines are included.
- You are not allowed to use this article for commercial purposes. The article should only be reprinted in a publicly accessible website and not in a members-only commercial site.
- You are not allowed to post/reprint this article in any sites/publications that contains or supports hate, violence, porn and warez or any indecent and illegal sites/publications.
- You are not allowed to use this article in UCE (Unsolicited Commercial Email) or SPAM. This article MUST be distributed in an opt-in email list only.
- If you distribute this article in an ezine or newsletter, we ask that you send a copy of the newsletter or ezine that contains the article to
http://www.isnare.com/eta.php?aid=154798
- If you post this article in a website/forum/blog, ALL links MUST be set to hyperlinks and we ask that you send a copy of the URL where the article is posted to
http://www.isnare.com/eta.php?aid=154798
- We request that you ask permission from the author if you want to publish this article in print.
The role of iSnare.com is only to distribute this article as part of its Article Distribution feature (
http://www.isnare.com/distribution.php ). iSnare.com does NOT own this article, please respect the author's copyright and this publication/reprint terms. If you do not agree to any of these terms, please do not reprint or publish this article.
*****************************
Article Title: Making Net-surfing As Easy As Pie
Author: Ajeet Khurana
Word Count: 423
Article URL:
http://www.isnare.com/?aid=154798&ca=Internet
Format: 64cpl
Contact The Author:
http://www.isnare.com/eta.php?aid=154798
Easy Publish Tool:
http://www.isnare.com/html.php?aid=154798
*********************** ARTICLE START ***********************
Wouldn't you agree that the Internet is wonderful. It joins us with people all over the world. It allows us to view information that we would otherwise not be able to access. Using it is probably easier than "easy as pie". And one of the things that helps us access the Internet, is the proxy server.
A proxy server is something like an connector between the computer you are using and the server that you are trying to access. This concept becomes easier to understand once you figure out its mode of working. Suppose there is a website that is accessed regularly from a particular computer. This site gets saved in the cache of the proxy server. So, if another user tries to visit that very site, the page is pulled up from this cache.
The advantage of this style of functioning is that the process quickens significantly. This is because the proxy server does not have to contact the real server of that website to view it. The site has already been placed in the proxy server's cache.
Web proxies are proxy servers that limit their job to the net. Sometimes web proxies are used to impede websites that are provocative or offensive. They also serve another, perhaps more important, function of blocking viruses that may be present on the webpages that are being visited. In fact, a number of organizations make use of proxy servers to perform these very functions. A company could even impede its employees from viewing a particular website by making use of a proxy server. Notably, the user may not be aware of the presence of the proxy server.
There are many other kinds of proxy servers that are available online. These include transparent proxies, split proxies and reverse proxies. Open proxies are proxy servers that are preferred by spammers and Internet Relay Chat users.
There is also something called an anonymous proxy server. This supplies anonymity, and hence, privacy, to the user. It does this by hiding the IP address of the user. As a result, the number of junk mails and spam that one would otherwise be full of are lessened considerably. It is good to use an anonymous proxy server because it keeps you protected from hackers.
A lot more information about proxy servers is available on the net. But the next time you are able to quickly access your favorite webpage, make sure you silently thank your good old proxy server!
About The Author: The author Ajeet Khurana recommends Squid Myspace Proxy at
http://www.surfrex.com/ Web Messenger at
http://www.surfrex.com/webmessenger.html and Unlock Myspace at
http://www.myspaceunlock.org/
Please use the HTML version of this article at:
http://www.isnare.com/html.php?aid=154798
*********************** ARTICLE END ***********************
- To distribute your articles go to
http://www.isnare.com/distribution.php
- For more free-reprint articles go to
http://www.isnare.com