翻訳と辞書
Words near each other
・ PRR H8
・ PRR HH1
・ PRR HH1s
・ PRR I1s
・ PRR J1
・ PRR J28
・ PRR K4s
・ PRR K5
・ PRR L1s
・ PRR L2s
・ PRR L5
・ PRR L6
・ PRR locomotive classification
・ PRR M1
・ Proxy Husband
Proxy list
・ Proxy marriage
・ Proxy Mobile IPv6
・ Proxy murder
・ Proxy Networks, Inc.
・ Proxy pattern
・ Proxy re-encryption
・ Proxy server
・ Proxy statement
・ Proxy voting
・ Proxy war
・ Proxy-based estimating
・ Proxyfan
・ Proxymetacaine
・ Proxyon


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Proxy list : ウィキペディア英語版
Proxy list

A proxy list is a list of open HTTP/HTTPS/SOCKS proxy servers all on one website. Proxies allow users to make indirect network connections to other computer network services. Proxy lists include the IP addresses of computers hosting open proxy servers, meaning that these proxy servers are available to anyone on the internet. Proxy lists are often organized by the various proxy protocols the servers use. Many proxy lists index Web proxies, which can be used without changing browser settings.
==Proxy server basics==

There are 3 types of HTTP proxies:
* Fully anonymous proxies - Such proxies do not change request fields and look like real browser. Your real IP is also hidden of course. People that administer internet servers will think that you are not using any proxies.
* Anonymous proxies - Do not show a real IP but change the request fields, so it is very easy to detect that a proxy is being used by log analysis. You are still anonymous, but some server administrators restrict proxy requests.
* Transparent proxies (not anonymous, simply HTTP) - Change the request fields and they transfer the real IP. Such proxies are not applicable for security and privacy while surfing on the web. You can use them only for network speed improvement.
SOCKS is a protocol that relays TCP sessions at a firewall host to allow application users transparent access across the firewall. Because the protocol is independent of application protocols, it can be (and has been) used for many different services, such as telnet, ftp, finger, whois, gopher, WWW, etc. Access control can be applied at the beginning of each TCP session; thereafter the server simply relays the data between the client and the application server, incurring minimum processing overhead. Since SOCKS never has to know anything about the application protocol, it should also be easy for it to accommodate applications which use encryption to protect their traffic from nosy snoopers. No information about the client is sent to the server – thus there is no need to test the anonymity level of the SOCKS proxies.

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Proxy list」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.