What Is "Tor"? | What is Proxy

Not too many of you have heard of the terms "proxy" or "proxy server," or understand what they mean or do. A proxy server is a website/server that acts as a middleman for you to get on the Internet. When you use a proxy server, you're not contacting a website directly—your information runs through a special computer that passes along your request for you.

But more than that, a proxy packages your request with a different "identifier." In other words, your IP address is no longer visible; instead, your request borrows the IP address of the proxy. If you read our article on proxies, you'll get an in-depth explanation.

But in a nutshell, people use proxies because they don't want anyone to have an idea of where they are located. Fact is, someone with limited technical skills can "track" your IP address to a general location, such as the city where you live. They cannot pinpoint your address or figure out who you are, but if you gave them your name or city in an email or correspondence, someone could guess or get close to figuring out where you are.

And if you were a lawbreaker online, a law enforcement agency could use legal means to get your name and address from your Internet Service Provider.

So what choices do people who want more anonymity have? That's where Tor comes in.
TorTor is a free software program that you load onto your computer (like a browser) that hides your IP address every time you send or request data on the Internet. The process is layered with heavy-duty encryption, which means your data is layered with privacy protection.

Then there's the route your data takes as it travels to its destination: Tor will bounce your Internet requests and data through a vast and extensive network of relays (servers) around the world. That data path is never the same, because Tor uses up to 5,000 Tor relays to send your data request. Think of it as a huge network of "hidden" servers that will keep your online identity (meaning your IP address) and your location invisible.

By using Tor, websites will no longer be able to track the physical location of your IP address or what you have been looking at online...and neither will any interested organizations that may want to monitor someone's Internet activity—meaning law enforcement or government security agencies. Tor is like a proxy on steroids.

Tor has extreme value because it can work with your website browser, remote log-in applications and even with instant-messaging software. Tor is registered as a nonprofit company, so they run mainly on donations and reliance on the hope that people will become a relay to their network.
People from all over the world use Tor to search and buy products and communicate with others with restricted Internet access, such as what exists in some foreign countries.

You see, Tor goes beyond simple anonymity—it provides access to a world of information (literally) that the "normal" everyday Web does not. That is a good thing, or a bad thing, depending on how you look at it.

Tor is used by a variety of people and organizations. But, it's a fact that many individuals and organizations are up to no good on the Internet, and Tor is their network of choice. They deal in merchandise or information that is illegal and would be blocked by most Internet Service Providers.

So while Tor does provide peace of mind for those who seek the highest level of Internet security and privacy, it also creates a haven for those who want to do online business out of the light of law enforcement.

And that brings up another problem: If you do business on Tor and you run into a problem or dispute—or if you're scammed—there might not be anything you can do about it. A recent article cited that a higher percentage of Tor transactions are fraudulent (when compared to ordinary Internet transactions). Russia has hopes of blocking all incoming Tor traffic for anti-terrorist purposes. Wikipedia, the online public encyclopedia, strives to prevent Tor users from accessing their website.
By using Tor, you can access virtually any website that's out there on the Internet—in any country you want to, and there won't be a block on it. However, many very undesirable websites and organizations also use Tor to conduct less-than-honorable business transactions—just so you know.

Maintaining online privacy in this digital world is very important to a lot of Internet users these days. However, Tor may or may not be the answer for you. You may find that a virtual private network (VPN) is a simpler solution.

What is a Proxy Server?

A proxy server is a computer that offers a computer network service to allow clients to make indirect network connections to other network services. A client connects to the proxy server, then requests a connection, file, or other resource available on a different server. The proxy provides the resource either by connecting to the specified server or by serving it from a cache. In some cases, the proxy may alter the client's request or the server's response for various purposes.

Web proxies

A common proxy application is a caching Web proxy. This provides a nearby cache of Web pages and files available on remote Web servers, allowing local network clients to access them more quickly or reliably.

When it receives a request for a Web resource (specified by a URL), a caching proxy looks for the resulting URL in its local cache. If found, it returns the document immediately. Otherwise it fetches it from the remote server, returns it to the requester and saves a copy in the cache. The cache usually uses an expiry algorithm to remove documents from the cache, according to their age, size, and access history. Two simple cache algorithms are Least Recently Used (LRU) and Least Frequently Used (LFU). LRU removes the least-recently used documents, and LFU removes the least-frequently used documents.

Web proxies can also filter the content of Web pages served. Some censorware applications - which attempt to block offensive Web content - are implemented as Web proxies. Other web proxies reformat web pages for a specific purpose or audience; for example, Skweezer reformats web pages for cell phones and PDAs. Network operators can also deploy proxies to intercept computer viruses and other hostile content served from remote Web pages.

A special case of web proxies are "CGI proxies." These are web sites which allow a user to access a site through them. They generally use PHP or CGI to implement the proxying functionality. CGI proxies are frequently used to gain access to web sites blocked by corporate or school proxies. Since they also hide the user's own IP address from the web sites they access through the proxy, they are sometimes also used to gain a degree of anonymity.

You may see references to four different types of proxy servers:
Transparent Proxy

This type of proxy server identifies itself as a proxy server and also makes the original IP address available through the http headers. These are generally used for their ability to cache websites and do not effectively provide any anonymity to those who use them. However, the use of a transparent proxy will get you around simple IP bans. They are transparent in the terms that your IP address is exposed, not transparent in the terms that you do not know that you are using it (your system is not specifically configured to use it.)

Anonymous Proxy

This type of proxy server identifies itself as a proxy server, but does not make the original IP address available. This type of proxy server is detectable, but provides reasonable anonymity for most users.

Distorting Proxy

This type of proxy server identifies itself as a proxy server, but make an incorrect original IP address available through the http headers.

High Anonymity Proxy

This type of proxy server does not identify itself as a proxy server and does not make available the original IP address.
What Is "Tor"? | What is Proxy What Is "Tor"? | What is  Proxy Reviewed by Unknown on 20:33 Rating: 5

No comments: