Free Essay

Proxy

In:

Submitted By skkishor
Words 392
Pages 2
DEVELOPMENT OF HTTP CACHING PROXY SERVER

Abstract
A proxy server is a computer that offers a computer network service to allow clients to make indirect network connections to other network services. A client connects to the proxy server, and then requests a connection, file, or other resource available on a different server.
The proxy provides the resource either by connecting to the specified server or by serving it from a cache. In some cases, the proxy may alter the client's request or the server's response for various purposes, usually to view websites that are normally not allowed, such as game sites in school or work place.
A proxy acts as an intermediary agent between its clients and the servers which they want to access, performing functions directed towards a variety of purposes, like security, caching, etc, in its capacity as an intermediary. Specifically, caching HTTP Proxy Servers are intermediate servers, which maintain a cache of Internet objects like html files, image files, etc which are obtained via HTTP.

Module Description
In computer networks, a proxy server is a server (a computer system or an application program) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. The proxy server evaluates the request according to its filtering rules. A proxy acts as an intermediary agent between its clients and the servers which they want to access, performing functions directed towards a variety of purposes, like security, caching, etc, in its capacity as an intermediary. Specifically, caching http proxy servers are intermediate servers, which maintain a cache of internet objects like html files, image files, etc which are obtained via http. Aims and objectives of the study The following aims and objectives will be fulfilled: • to keep machines behind it anonymous (mainly for security) • to speed up access to resources (using caching).
Web proxies are commonly used to cache web pages from a web server. • to apply access policy to network services or content
The modules involved are: • Administrator This module the administrator has maintain this system and search the network place and find all transferring the data and whose system should be work and how many computers will working this system.

Similar Documents

Free Essay

Munchausens Syndrome by Proxy

...Munchausen Syndrome by Proxy is one of the worlds most hidden forms, and therefore also least recognised forms of child abuse. The syndrome is a psychological disorder where the parent fabricates illnesses and symptoms in their child, resulting in unnecessary medication that is often over prescribed or overdosed, and sometimes even exploratory surgeries on the child. How many people know about this? Such a minority that it is easily forgotten and almost never detected by doctors, nurses and surgeons, but the friends and family of the sufferer and their victim who is their very own flesh and blood. Therefore, while most child abuse cases go straight to the police, being assault and such other common forms, awareness needs to be raised about this because not only are these children dying from fabricated sickness, but these crimes are committed on a regular basis and are in such clear view that nobody notices them. Munchausen's syndrome by Proxy is an important issue because it is a form of child abuse and there needs to be awareness raised. But although it can be easy enough to spot for some, who wants to accuse someone of this? When it comes to symptoms, they can either be hard or easy to spot, depending on the position you're in. The children usually don't respond, or respond oddly to treatment; have medical problems that don't add up with their history; become well when the parent is away have a deteriorating health either away from medical facilities or when the parent...

Words: 1154 - Pages: 5

Free Essay

Muchausen by Proxy

...Munchausen By Proxy Anthony Conejos Taylor College Mrs.Brooks 2/26/2015 Anthony Conejos Munchausen By Proxy Munchausen is a mental illness, in which a person repeatedly acts as if he or she has a physical, emotional or psychological disorder when, in truth, he or she has caused the problems. People with factitious disorders act this way because of an inner need to be seen as ill or injured, not to achieve a concrete benefit, such as financial gain. They are even willing to undergo painful or risky tests and operations in order to get the sympathy and special attention given to people who are truly ill. Some will secretively hurt themselves to cause signs like blood in the urine or cyanosis of a limb. Cyanosis is the condition occurring when the blood supply is cut off to a particular part of the body and the skin takes on a dusky blue color. Factitious disorder imposed on self is associated with severe emotional difficulties. Originally called Munchausen syndrome, named for Baron von Munchausen, an 18th century German officer who was known for embellishing the stories of his life and experience. He was known to invent fantastic stories of his adventures, including his riding cannonballs and traveling to the moon. Munchausen by Proxy however is where a parent is in need to gain attention and does so by inflicting harm or illness on their child. The adult deliberately tricks others, mostly medical professionals, and may go as far as to actually cause symptoms in...

Words: 1342 - Pages: 6

Premium Essay

Proxy War

...In his article Proxy War, Author Michael Brus claims that affirmative action and racial discrimination are one in the same. He says that the main difference between the two is that affirmative action singles out minorities for desirable things while racial discrimination singles them out for something undesirable. to a certain degree, I can agree with him, but this debate is a lot more complex and is not as simple as white or black. Racial profiling is a very real problem, and many people have claimed to have experienced it, especially in the black and hispanic communities. Nobody should ever be judged or face discrimination by the color of their skin. But, opponents to the practice of affirmative action claim reverse racism towards white people. Affirmative action is a practice that is intended to promote fairness to minorities in this country by stating that individuals are created equally and they should not be judged by their race or gender. Using for an example jobs and university applications, minorities applicants should be considered as an acceptable choice as a white applicant. This is of course taking into consideration their background and experience. In other words,affirmative action is intended to give minorities that have experienced disadvantages an opportunity to succeed. Although this practice has good intentions, this is not what happens. While this practice is meant to support individuals, it is resulting in it being solely based on race. Imagine this hypothetical...

Words: 529 - Pages: 3

Free Essay

Munchausen by Proxy

...History of Munchausen In the 18th century, Karl Friedrich Hieronymus also known as Baron von Munchausen (1720-1797) was known for his highly unlikely stories of adventure and escapes and being one of the most notorious liars in the century. In 1737 as a German soldier, he served in the Russian–Turkish war and returned with exaggerated stories of adventure. Every evening after supper in the banqueting-hall he would gather his friends and those in attendance and tell stories of his past. He loved the attention he received from the stories he would tell.His stories were so extreme and extravagant that an author named Rudolph Erich Raspe, who was seeking refuge in England from the German law, decided to write about the adventures of Munchausen.The first edition of Munchausen's tales that was attributed to him appeared anonymously in 1785 and was called Baron Munchausen's Narrative of his Marvelous Travels and Campaigns in Russia. Gottfried August Burger edited the first German version the following year. Rudolph Erich Raspe never claimed his rights over the success from his books. Some still debate whether Raspe or Burger actually published the first book about the tales of Baron von Munchausen. Munchausen’s tales are so outrageous; many of the stories attributed to him have appeared in French, Spanish, Welsh and Greek literature. (Heritage, 2013) Today his name is known for boasting, fabrications and exaggerated stories. Definition In 1951the name Munchausen made its way into...

Words: 1464 - Pages: 6

Premium Essay

Proxy Voting in Australia

...1. Process of Voting by Proxies Public companies at many times require resolutions to be passed by members. These resolutions are passed by holding general meetings. However, it is inconvenient for many members to attend the meetings, for example members maybe living abroad or in different states. In the absence of members, there is provision of proxy voting. Proxy voting means to appoint an individual or a body corporate (s 249X 1A) to vote in place of a member (Halsbury, pg 1). A proxy appointment form is sent to members along with notice of meeting. Members unable to attend the meeting then fill in the proxy form and send it back. The proxy appointed has the same right as the member would have in a meeting, to speak, vote or not vote and demand for a poll. However, a proxy is expected to act according to the instruction of the member or, if undirected, in the interest of the member (Halsbury, pg 12). Voting occurs either by a show of hands or a poll. A proxy can join a demand for poll and take part in it, however, a company’s constitution may restrict partake of proxies in a show of hands (Halsbury, pg 12). Yet, proxy voting has its own criticism. Appointing a proxy does not necessarily mean that they will vote, a proxy may decide not to vote (CSA, pg 4) thus the shareholders vote is not utilised. Moreover, a proxy who has been appointed by many shareholders may choose to cast vote of those shareholders, with whom his views match (CSA, pg 6). This is a concept...

Words: 720 - Pages: 3

Premium Essay

Thesis Proxy

...Foxy cases study. 1) Discuss the pros and cons to launching the Foxy brand in the United States. Pros | Cons | U.S. market is 10 times larger than Canada. The brand seeks great opportunity to further develop the business, enhance product design as well company’s brand image | U.S market is quite different in terms of tastes for jewelry; it might take foxy some time to adapt to different customers. | Having the ability to infiltrate fashion hubs; cities like New York and Los Angeles are not only fashion epicenters in the U.S but they have world-wide influence and a significant presence in the international fashion industry. | The product will lose some distinctiveness since it will be available to consumers on a larger scale. | The United States features very large trade shows with over 75,000 buyers in attendance. | Launching the Foxy brand within the United States they will lose the personal contact as well as the assurance that their brand is being appropriately represented | Launching the Foxy brand in the United States would be beneficial to the company because of the sheer size of the market. | Foxy’s original Canadian customers could potentially be alienated and refuse to continue buying the product | 2) Assess each distribution strategy from a qualitative point of view. First is to decide the best appropriate method of distribution * Attending trade shows * Sales representatives Trade shows- this strategy will give an opportunity to learn...

Words: 696 - Pages: 3

Premium Essay

Realism In The Proxy War

...describe the relationship between the USA and the USSR (Soviet Union) after the World War II. It is the period of time from 1947 to 1991 when ideologies of USA and USSR – which are capitalism and communism – clashed against each other. Also, both sides aimed for the hegemony position and power expansion. The dissolution of the Soviet Union marked the end of the Cold War, precisely on December 26th, 1991. The defeat of Soviet Union left the USA as a single hegemony of the world, making it the only super power country with no rival to be fight against for the title. It can be understood why there is no more direct conflict between the great powers. Although there was no direct war between the USA and the Soviet Union, “proxy wars” have been happening since then. Proxy war is a conflict which happen because it is incited by major powers without them actually engaged in it. In this case, either the USA and the Soviet Union assist their allies on fighting the...

Words: 1425 - Pages: 6

Premium Essay

Munchausen Syndrome By Proxy

...Munchausen Syndrome by Proxy in Relation to Child Abuse The traditional procedure of mothers leading their children through the doors of a doctor’s office for a physical examination or check-up has in recent years been undermined by deceptive parents whose only intent is to abuse both the health of their children and the trust of their physicians. Munchausen Syndrome by Proxy (MSP) is a horrifying behavioral form of abuse in which parents, often mothers, wittingly cause their child to become sick and purposely falsify important medical records or data when presenting the child for medical attention. With deception being at its core, this behavior is elusive, potentially fatal, and very often misunderstood form of child abuse that is not...

Words: 284 - Pages: 2

Premium Essay

Ge Proxy Statement

...Notice of 2013 ANNuAl MeetiNg ANd Proxy stAteMeNt April 24, 2013 New orleans, louisiana Notice of 2013 ANNuAl MeetiNg of sHAreoWNers Time and Date: 10:00 a.m. central time, April 24, 2013 Location: ernest N. Morial convention center, 900 convention center Blvd., New orleans, lA 70130 March 13, 2013 Dear Shareowners: You are invited to attend General Electric Company’s 2013 Annual Meeting of Shareowners to be held at the Ernest N. Morial Convention Center, 900 Convention Center Blvd., New Orleans, LA 70130, on April 24, 2013, at 10:00 a.m. Central Time. Following a report on GE’s business operations, shareowners will vote: • to elect the directors named in the proxy statement for the coming year; • to approve our named executives’ compensation in an advisory vote; • to ratify the selection of our independent registered public accounting firm for 2013; and • on the shareowner proposals set forth on pages 44 through 49, if properly presented at the meeting. Shareowners also will transact any other business that may properly come before the meeting. You are eligible to vote if you were a shareowner of record at the close of business on February 25, 2013. Please ensure that your shares are represented at the meeting by promptly voting and submitting your proxy by telephone or the Internet, or by completing, signing, dating and returning your proxy form in the enclosed envelope. If you plan to attend the meeting, please follow the advance registration instructions under...

Words: 42064 - Pages: 169

Free Essay

Mauchausen Proxy Seyndrome

...Munchausen by proxy syndrome (MBPS) is a relatively rare form of child abuse that involves the exaggeration or fabrication of illnesses or symptoms by a primary caretaker. Also known as "medical child abuse," MBPS was named after Baron von Munchausen, an 18th-century German dignitary known for making up stories about his travels and experiences in order to get attention. "By proxy" indicates that a parent or other adult is fabricating or exaggerating symptoms in a child, not in himself or herself. Munchausen by proxy syndrome is a mental illness and requires treatment. About MBPS In MBPS, an individual — usually a parent or caregiver— causes or fabricates symptoms in a child. The adult deliberately misleads others (particularly medical professionals), and may go as far as to actually cause symptoms in the child through poisoning, medication, or even suffocation. In most cases (85%), the mother is responsible for causing the illness or symptoms. Typically, the cause is a need for attention and sympathy from doctors, nurses, and other professionals. Some experts believe that it isn't just the attention that's gained from the "illness" of the child that drives this behavior, but also the satisfaction in deceiving individuals who they consider to be more important and powerful than themselves. Because the parent or caregiver appears to be so caring and attentive, often no one suspects any wrongdoing. Diagnosis is made extremely difficult due to the the ability of the parent...

Words: 689 - Pages: 3

Premium Essay

How to Appoint a Proxy

...whether it can be used instead of holding an annual general meeting. (8 marks) b) Aminah, one of the shareholders of the company, seeks your advice on the rules relating to appointment of proxies to the meeting. (8 marks) c) Mr. Alan, a director, wants to know when is the latest date for the company to post the notice of the meeting. Give reasons for your answer. (4 marks) Reference | | | | b) Aminah, one of the shareholders of the company, seeks your advice on the rules relating to appointment of proxies to the meeting.(8 marks) At common law, there is no right to appoint a proxy or substitute and vote on the member half. The right to appoint proxy to vote at general meeting arises out of express regulation or by the article of the statute. A proxy is ‘lawfully constituted agent or the proxy form which is document appointing the proxy and the person authorized by the proxy form to act or for the appointor to attend and vote at the meeting on the appointors behalf. The Companies Act 1965 provided right for a member of a company to appoint another person to attend company meetings as a proxy. In section 149 1 (a) to (d), such a person can have the same rights as a member at the meeting. This right is restricted to the proxy voting in a poll which he must be a member, an approved company auditor or a person approved by...

Words: 537 - Pages: 3

Premium Essay

Mobile Net

...network administrators to know exactly the state of the network security. Currently, there are different types of firewall implementation. These ranges from dedicated routers and switches with embedded software to a single dedicated host computer with appropriate software. A firewall does not exist as a single piece of hardware solution. In fact, it is the software that is hosted by the hardware that is capable of carrying out the appropriate analyses of the network traffic to ensure that the correct policies are enforced. To achieve this, a firewall normally utilizes one or more of the following technologies: 1. Packet – Filtering 2. Proxy Types of firewalls Generally, a firewall is categorized by the type of technology that it uses. The two main types of firewalls are: Packet – Filtering Firewalls and Proxy Firewalls. Packet-Filtering Firewalls: Packet...

Words: 2370 - Pages: 10

Free Essay

Bull Shit

...Skip to main content Chrome: developer DEVTOOLS MULTI-DEVICE PLATFORM Learn Basics Use Tools Inspecting & Tweaking Debugging JavaScript Device Mode & Mobile Emulation Remote Debugging on Android Saving Changes with Workspaces Performance & Profiling Reference Contents Requirements Setting up your Android device Discovering devices in Chrome Debugging remote browser tabs Debugging WebViews Live screencasting Port forwarding Virtual host mapping Troubleshooting Additional information Remote Debugging on Android with Chrome The way your web content behaves on mobile can be dramatically different from the desktop experience. Remote debugging with Chrome DevTools lets you debug live content on your Android device from your development machine. Debugging Chrome for Android using the Chrome Developer Tools Remote debugging on Android supports: Debugging websites in browser tabs. Debugging WebViews in native Android apps. Screencasting live to your development machine from your Android device. Accessing your development server on Android using port forwarding and virtual host mapping. Requirements To begin remote debugging, you need: Chrome 32 or later installed on your development machine. A USB cable to connect your Android device. For browser debugging: Android 4.0+ and Chrome for Android. For app debugging: Android 4.4+ and a WebView configured for debugging. Note: Remote debugging requires your version of desktop Chrome to be newer...

Words: 2425 - Pages: 10

Premium Essay

Matrix

...This is the only working trick found on net for 3g Aircel.  Use apn as POCKECT INTERNET TRICK FOR PC: use this any links for browse and download. http://0.facebook.com.kproxy.com http://0.facebook.com.scarewar.com http://0.facebook.com.flyproxy.com   TRICK FOR MOBILE: download any handler mod app. Go to handler setting and put proxy as 0.facebook.com and change http to host.other fields set blank. connect with apn POCKET INTERNET. Free Unlimited AIRTEL 3G SEPT 2012 12:22 PM  DEEPAK KUMAR YADAV  NO COMMENTS Friends today i found a trick for internet on mobile using airtel . You have to create a profile as shown below it is working in few states only. Following are the setting : APN:- airtelgprs.com Proxy:- vuclip.com Port:- 80 Homepage: 174.142.196.230 OR 50.7.14.182 Now save your settings and restart your mobile. Below are the steps for AIRCEL unlimted 3G gprs. I will be providing setting below ,create a profile of same or edit the older one:- Name-AircelGprs apn-aircelwap IP address-10.4.42.15 proxy server address-010.004.042.015 proxy port-8080 hp-www.google.com Now you have to use UC Browser 8.0+ after  installation of the browser goto setting>>accespoint>>select AircelGprs and Enjoy free internet on your mobile this trick is tested on nokia and samsung phones and is working fine. Note- * Try at low balance 1rs *  Tricks shared here are using loop holes of aircel's network shared are making use...

Words: 337 - Pages: 2

Free Essay

Unit 2 Assign 2

...Unit 2 Assignment 2: Microsoft Environment Analysis Vulnerabilities: * “Cross-site request forgery (CSRF) vulnerability in the Services module 6.x-3.x and 7.x-3.x before 7.x-3.4 for Drupal allows remote attackers to hijack the authentication of unspecified victims via unknown vectors”. * “SQL injection vulnerability in the Backend History module in TYPO3 4.5.x before 4.5.21, 4.6.x before 4.6.14, and 4.7.x before 4.7.6 allows remote authenticated backend users to execute arbitrary SQL commands via unspecified vectors”. * “The HP StoreOnce D2D backup system with software before 3.0.0 has a default password of badg3r5 for the HPSupport account, which allows remote attackers to obtain administrative access and delete data via an SSH session.” * “The default configuration of the Digital Alert Systems DASDEC EAS device before 2.0-2 and the Monroe Electronics R189 One-Net EAS device before 2.0-2 contains a known SSH private key, which makes it easier for remote attackers to obtain root access, and spoof alerts, via an SSH session.” * Use-after-free vulnerability in the mozilla::ResetDir function in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.” Elevation/Priority: * The priority level is medium, also should be seen to when possible. Priority Level = 4...

Words: 565 - Pages: 3