1
00:00:00,040 --> 00:00:05,480
for those already familiar with the function of a proxy server there's a

2
00:00:03,639 --> 00:00:10,240
good chance that the mere mention of them brings up images ranging from that

3
00:00:07,839 --> 00:00:15,440
of your friendly network engineer to those of Steampunk inspired hackers

4
00:00:13,440 --> 00:00:20,160
brandishing ridiculous looking headgear and while these two extremes are not

5
00:00:17,720 --> 00:00:24,359
totally incorrect as far as examples go they don't exactly represent the

6
00:00:21,760 --> 00:00:29,000
entirety of the spectrum either now originally proxy servers were

7
00:00:26,760 --> 00:00:34,320
instrumental in allowing multiple computers on local network to access the

8
00:00:31,840 --> 00:00:38,920
internet without their IP addresses conflicting but the invention of an IP

9
00:00:36,960 --> 00:00:42,760
remapping method known as Network address translation allowed this

10
00:00:41,079 --> 00:00:48,600
capability to be inexpensively integrated into routers but just because

11
00:00:45,960 --> 00:00:52,600
proxies are no longer needed to connect to the internet doesn't mean they have

12
00:00:50,079 --> 00:00:57,000
fallen completely out of use it turns out that there are still quite a few

13
00:00:54,399 --> 00:01:02,719
functional roles that proxies can serve for those operating on a network one

14
00:01:00,199 --> 00:01:07,520
role is squid style caching which can be used to store things like frequently

15
00:01:04,839 --> 00:01:12,200
accessed Online files downloads and updates eliminating the need for a

16
00:01:09,720 --> 00:01:16,720
Network's worth of users to download said materials individually this not

17
00:01:15,040 --> 00:01:20,759
only has the benefit of greatly increasing transfer speeds because files

18
00:01:18,640 --> 00:01:26,040
are now taken from a private network instead of over the internet but hey if

19
00:01:23,960 --> 00:01:31,280
you're in Canada it might also have an impact on your overall bandwidth limits

20
00:01:28,520 --> 00:01:35,600
as well and proxy networks can be used in conjunction with special tunneling

21
00:01:33,280 --> 00:01:39,720
protocols to act as a security gatekeeper verifying or encrypting

22
00:01:38,119 --> 00:01:44,240
packets routed through it depending on their direction of travel recent demands

23
00:01:42,079 --> 00:01:49,520
for increased security among businesses and individuals alike has led to Greater

24
00:01:47,000 --> 00:01:54,399
use of these Services known as vpns which businesses use in an effort to

25
00:01:51,600 --> 00:01:58,680
shield things like their customers monetary information or internal company

26
00:01:57,000 --> 00:02:04,600
data that they need to be able to access remotely and indiv uals use for well

27
00:02:02,159 --> 00:02:08,239
similar reasons and also things like accessing online services that are

28
00:02:06,280 --> 00:02:13,239
region locked or skirting around overzealous governmental intrusion and

29
00:02:10,480 --> 00:02:18,040
censorship so to better explain this aspect of proxy server functionality

30
00:02:15,120 --> 00:02:23,000
will turn to one of my ever popular analogies let's say your uh PC IP

31
00:02:21,160 --> 00:02:27,720
address sitting at your local uh internet bar or whatever when suddenly

32
00:02:25,599 --> 00:02:32,440
you spy this beautiful lus Tech tips Forum site two doors down the street in

33
00:02:29,680 --> 00:02:36,519
the window of a foreign bar now although theoretically you should be able to walk

34
00:02:34,440 --> 00:02:42,000
down and take a peek at that foreign website's content in reality there is a

35
00:02:39,480 --> 00:02:46,879
bouncer named The Great firewall who prevents you from entering so what you

36
00:02:43,720 --> 00:02:50,200
have to do then is go next door to your

37
00:02:46,879 --> 00:02:51,879
boy the proxy servers Place who is able

38
00:02:50,200 --> 00:02:56,440
to let you slip into the foreign Club through a side door because they can't

39
00:02:54,280 --> 00:03:00,319
tell that you came from you know scrub land internet cafe or whatever the case

40
00:02:58,640 --> 00:03:04,959
may be you can score that with websites binary digits and sneak back out without

41
00:03:02,760 --> 00:03:09,159
them ever knowing where you came from but with all of that said we've painted

42
00:03:06,720 --> 00:03:15,159
proxy servers with a rainbow colored brush so far and they're not purely used

43
00:03:12,519 --> 00:03:19,760
as a Force for good while most people have honest intentions when using proxy

44
00:03:17,280 --> 00:03:23,879
services to discreetly Cruise the web a small percentage of users including the

45
00:03:22,080 --> 00:03:28,640
fashionably challenged hackers I mentioned before use them for attacks

46
00:03:26,720 --> 00:03:33,680
including what is referred to as a manin the-middle attack which disguises an

47
00:03:31,000 --> 00:03:37,760
intrusion into a system as legitimate IP traffic originating from a proxy this is

48
00:03:36,200 --> 00:03:42,560
particularly worrisome because it can end up painting a very large red Target

49
00:03:40,480 --> 00:03:47,200
on those servers which contain copious amounts of valuable information because

50
00:03:44,599 --> 00:03:51,200
as the old saying goes one man's cash is another man's treasure or something

51
00:03:49,239 --> 00:03:55,519
along those lines so while automated data caching can be tremendous for

52
00:03:53,439 --> 00:03:59,200
reducing little headaches the big headaches that can result if your IT

53
00:03:57,360 --> 00:04:04,120
staff isn't on the ball and some compromis files slip through and push to

54
00:04:01,280 --> 00:04:10,079
an entire network of PCS is a clear potential downside speaking of clear

55
00:04:07,360 --> 00:04:16,440
potential downsides I can't think of one for Cooler Master they make great cases

56
00:04:13,480 --> 00:04:20,120
power supplies fans they've got laptop coolers they've got all kinds of great

57
00:04:18,440 --> 00:04:24,240
stuff and probably the best thing though about Cooler Master is just like this

58
00:04:22,079 --> 00:04:27,800
series of videos they're all about actually legitimately educating their

59
00:04:25,919 --> 00:04:31,960
user so if you check out Cooler Master University on their website they've got

60
00:04:29,960 --> 00:04:37,039
great information that helps you make an educated decision about whether it's

61
00:04:34,320 --> 00:04:40,120
something like a CPU Cooler or whether it's something like a case or a mouse

62
00:04:38,720 --> 00:04:45,479
they've got lots of great peripherals like mice and keyboards and uh oh also

63
00:04:43,639 --> 00:04:49,639
they do a bunch of community outreach as well so stuff like their case mod World

64
00:04:47,320 --> 00:04:53,960
Series which was running very recently and allowed anyone with a Dremel or I

65
00:04:52,440 --> 00:04:59,080
mean really even if you just had a screwdriver if you could use it really creatively to enter their case modding

66
00:04:57,240 --> 00:05:02,560
contest cool guys there's a link to them in the video description so if you're

67
00:05:00,680 --> 00:05:05,880
considering a PC upgrade definitely check them out and I think that's pretty

68
00:05:04,520 --> 00:05:10,680
much it guys like this video if you liked it dislike it if you thought it was trash leave a comment if you have

69
00:05:08,919 --> 00:05:16,520
suggestions for future fast as possible just like this one and as always don't

70
00:05:12,880 --> 00:05:16,520
forget to subscribe
