Proxies as Fast As Possible
Techquickie
·Techquickie
·2015-05-07
·
931 words · ~4 min read
0:00
for those already familiar with the function of a proxy server there's a
0:03
good chance that the mere mention of them brings up images ranging from that
0:07
of your friendly network engineer to those of Steampunk inspired hackers
0:13
brandishing ridiculous looking headgear and while these two extremes are not
0:17
totally incorrect as far as examples go they don't exactly represent the
0:21
entirety of the spectrum either now originally proxy servers were
0:26
instrumental in allowing multiple computers on local network to access the
0:31
internet without their IP addresses conflicting but the invention of an IP
0:36
remapping method known as Network address translation allowed this
0:41
capability to be inexpensively integrated into routers but just because
0:45
proxies are no longer needed to connect to the internet doesn't mean they have
0:50
fallen completely out of use it turns out that there are still quite a few
0:54
functional roles that proxies can serve for those operating on a network one
1:00
role is squid style caching which can be used to store things like frequently
1:04
accessed Online files downloads and updates eliminating the need for a
1:09
Network's worth of users to download said materials individually this not
1:15
only has the benefit of greatly increasing transfer speeds because files
1:18
are now taken from a private network instead of over the internet but hey if
1:23
you're in Canada it might also have an impact on your overall bandwidth limits
1:28
as well and proxy networks can be used in conjunction with special tunneling
1:33
protocols to act as a security gatekeeper verifying or encrypting
1:38
packets routed through it depending on their direction of travel recent demands
1:42
for increased security among businesses and individuals alike has led to Greater
1:47
use of these Services known as vpns which businesses use in an effort to
1:51
shield things like their customers monetary information or internal company
1:57
data that they need to be able to access remotely and indiv uals use for well
2:02
similar reasons and also things like accessing online services that are
2:06
region locked or skirting around overzealous governmental intrusion and
2:10
censorship so to better explain this aspect of proxy server functionality
2:15
will turn to one of my ever popular analogies let's say your uh PC IP
2:21
address sitting at your local uh internet bar or whatever when suddenly
2:25
you spy this beautiful lus Tech tips Forum site two doors down the street in
2:29
the window of a foreign bar now although theoretically you should be able to walk
2:34
down and take a peek at that foreign website's content in reality there is a
2:39
bouncer named The Great firewall who prevents you from entering so what you
2:43
have to do then is go next door to your
2:46
boy the proxy servers Place who is able
2:50
to let you slip into the foreign Club through a side door because they can't
2:54
tell that you came from you know scrub land internet cafe or whatever the case
2:58
may be you can score that with websites binary digits and sneak back out without
3:02
them ever knowing where you came from but with all of that said we've painted
3:06
proxy servers with a rainbow colored brush so far and they're not purely used
3:12
as a Force for good while most people have honest intentions when using proxy
3:17
services to discreetly Cruise the web a small percentage of users including the
3:22
fashionably challenged hackers I mentioned before use them for attacks
3:26
including what is referred to as a manin the-middle attack which disguises an
3:31
intrusion into a system as legitimate IP traffic originating from a proxy this is
3:36
particularly worrisome because it can end up painting a very large red Target
3:40
on those servers which contain copious amounts of valuable information because
3:44
as the old saying goes one man's cash is another man's treasure or something
3:49
along those lines so while automated data caching can be tremendous for
3:53
reducing little headaches the big headaches that can result if your IT
3:57
staff isn't on the ball and some compromis files slip through and push to
4:01
an entire network of PCS is a clear potential downside speaking of clear
4:07
potential downsides I can't think of one for Cooler Master they make great cases
4:13
power supplies fans they've got laptop coolers they've got all kinds of great
4:18
stuff and probably the best thing though about Cooler Master is just like this
4:22
series of videos they're all about actually legitimately educating their
4:25
user so if you check out Cooler Master University on their website they've got
4:29
great information that helps you make an educated decision about whether it's
4:34
something like a CPU Cooler or whether it's something like a case or a mouse
4:38
they've got lots of great peripherals like mice and keyboards and uh oh also
4:43
they do a bunch of community outreach as well so stuff like their case mod World
4:47
Series which was running very recently and allowed anyone with a Dremel or I
4:52
mean really even if you just had a screwdriver if you could use it really creatively to enter their case modding
4:57
contest cool guys there's a link to them in the video description so if you're
5:00
considering a PC upgrade definitely check them out and I think that's pretty
5:04
much it guys like this video if you liked it dislike it if you thought it was trash leave a comment if you have
5:08
suggestions for future fast as possible just like this one and as always don't
5:12
forget to subscribe