Jump Firewalls in a Single Bound with Proxy Servers
- Date: 2007-03-07 - Word Count: 369
Share This!
There are millions of students worldwide that feel hindered by measures taken by their schools to filter the content available to them on school-based internet. They have taken it upon themselves to find ways to preserve anonymity by bypassing the firewalls implemented by the schools. In this way, they are able to hide their school's IP address from the desired website. This allows the student to quickly gain access to websites like MySpace, personal email accounts, gaming sites, and yes, pornography.The method most commonly employed by such students involves the use of proxy servers. These are small servers that allow clients to make indirect network connections to various network services. The proxy computer hides the location of the student's computer thus allowing an informational bridge between the student and the desired website. This capacitates the students with the ability to view banned content from their school's network.There are several websites that provide proxy services. They are useful for many other applications besides allowing students to access non-academic material. For example, network operators may employ a proxy server to intercept harmful viruses or other questionable content from remote websites. When a proxy server is utilized, it does not reveal the IP address, browser type, operating type or cookies to the requested site. It allows the viewing of pages by sending the request from an alternate location.For student's using proxy servers to bypass their school's firewalls, the specific type of proxy server necessary is called a circumventor. A circumventor takes a website that has been blocked by a firewall and redirects it through an unblocked website. In a never-ending circle, the student's demand for creative freedom creates a supply of fresh circumventors as quickly as filters detect them. The issue that students need to be aware of is that it is possible for a proxy site to be run by corrupt individuals. These people may use the information that they become privy to for malicious purposes such as identity theft. Even though information is hidden by the proxy server from the requested site, it is visible to the administrator of the proxy site itself.Written by Scott Smithson. Find more information on topics like School proxy and Myspace Proxy or Anonymous Proxy
Related Tags: ip address, browser type
Your Article Search Directory : Find in Articles
Recent articles in this category:
- Improper Way Of Marketing Reflects Poorly On A Company.
New business, product or service everything requires visibility, awareness in order to come into the - Replacing Paper Prints With Online Versions
Nowadays saving out on resources and being additionally informative are both aspects that are in. In - Stop Smoking Effectively
If I told you of a way that you could stop smoking harmful tobacco would you believe it? Most people - What Is Runtime Error 182? And How To Fix It
Are you finding an effective way to fix runtime error 182? Do you think fixing runtime error 182 is - Do You Know How To Fix Runtime Error 87 In Minutes?
Are you finding an effective way to fix runtime error 87? Do you think fixing runtime error 87 is to - Knowledge About Avi, Avi Player, Avi Converter On Mac
Knowledge about AVI, AVI player, AVI Converter on MacWhat is an AVI?AVI, an acronym for Audio Video - Buy Your Highly Successful Email Survey Software Today
Email Survey Software- Boost Your Business and Increase ProfitsAn email survey software could be one - Xrm - The Anything Relationship Management Solution
I recently attended the Microsoft Dynamics West Region FY11 Sales Planning Retreat. This year's meet - What Are The Benefits Of Working With Electronic Medical Records
Recording medical information is a vital part of health care services. These records are necessary f - Basic Factor To Make Website Business Oriented
Internet is home for millions of websites. The online business is becoming more and more competitive
Most viewed articles in this category:
- Parental Control Software
Parental control software is software that can help parents protect their children when they are onl - Digital Asset Management Software
Managing and organizing your organization's documents is a critical component to your business's suc - AdobeRGB vs. sRGB
Understanding color spaces I'll try to explain it very simplified, but understandable for everyone - Confessions of a Prankster
I wanted to get a jump on April Fool's Day, partially because of the long, cold winter blues, and pa - Malicious Thoughts About The Spyware Ills Of My PC
Who would think I was capable of such revengeful thoughts about the parties responsible for inflicti - Recover File and Recover Deleted File Tools
Data recovery software is a very effective way of retrieving data from a worn or damaged hard disk d - Life without Windows
Ubuntu, a user-friendly version of Linux, has been running so nicely on my home PC that I decided to - What Benefit Does an Online Software Download Site Offer You?
Are you having a problem that where you find a good softeware when you consider to have a try or wan - Maintaining A Website
There was an era when people were talking about how to create a website using html coding or some ea - Benefits Of Proper Time Tracking
Have you ever written down time when you have started and finished your work? Maybe you have had mul