Proxies as Fast As Possible

Techquickie ·Techquickie ·2015-05-07 · 931 words · ~4 min read
Floatplane YouTube

Transcript

JSON SRT VTT 70
0:00 for those already familiar with the function of a proxy server there's a
0:03 good chance that the mere mention of them brings up images ranging from that
0:07 of your friendly network engineer to those of Steampunk inspired hackers
0:13 brandishing ridiculous looking headgear and while these two extremes are not
0:17 totally incorrect as far as examples go they don't exactly represent the
0:21 entirety of the spectrum either now originally proxy servers were
0:26 instrumental in allowing multiple computers on local network to access the
0:31 internet without their IP addresses conflicting but the invention of an IP
0:36 remapping method known as Network address translation allowed this
0:41 capability to be inexpensively integrated into routers but just because
0:45 proxies are no longer needed to connect to the internet doesn't mean they have
0:50 fallen completely out of use it turns out that there are still quite a few
0:54 functional roles that proxies can serve for those operating on a network one
1:00 role is squid style caching which can be used to store things like frequently
1:04 accessed Online files downloads and updates eliminating the need for a
1:09 Network's worth of users to download said materials individually this not
1:15 only has the benefit of greatly increasing transfer speeds because files
1:18 are now taken from a private network instead of over the internet but hey if
1:23 you're in Canada it might also have an impact on your overall bandwidth limits
1:28 as well and proxy networks can be used in conjunction with special tunneling
1:33 protocols to act as a security gatekeeper verifying or encrypting
1:38 packets routed through it depending on their direction of travel recent demands
1:42 for increased security among businesses and individuals alike has led to Greater
1:47 use of these Services known as vpns which businesses use in an effort to
1:51 shield things like their customers monetary information or internal company
1:57 data that they need to be able to access remotely and indiv uals use for well
2:02 similar reasons and also things like accessing online services that are
2:06 region locked or skirting around overzealous governmental intrusion and
2:10 censorship so to better explain this aspect of proxy server functionality
2:15 will turn to one of my ever popular analogies let's say your uh PC IP
2:21 address sitting at your local uh internet bar or whatever when suddenly
2:25 you spy this beautiful lus Tech tips Forum site two doors down the street in
2:29 the window of a foreign bar now although theoretically you should be able to walk
2:34 down and take a peek at that foreign website's content in reality there is a
2:39 bouncer named The Great firewall who prevents you from entering so what you
2:43 have to do then is go next door to your
2:46 boy the proxy servers Place who is able
2:50 to let you slip into the foreign Club through a side door because they can't
2:54 tell that you came from you know scrub land internet cafe or whatever the case
2:58 may be you can score that with websites binary digits and sneak back out without
3:02 them ever knowing where you came from but with all of that said we've painted
3:06 proxy servers with a rainbow colored brush so far and they're not purely used
3:12 as a Force for good while most people have honest intentions when using proxy
3:17 services to discreetly Cruise the web a small percentage of users including the
3:22 fashionably challenged hackers I mentioned before use them for attacks
3:26 including what is referred to as a manin the-middle attack which disguises an
3:31 intrusion into a system as legitimate IP traffic originating from a proxy this is
3:36 particularly worrisome because it can end up painting a very large red Target
3:40 on those servers which contain copious amounts of valuable information because
3:44 as the old saying goes one man's cash is another man's treasure or something
3:49 along those lines so while automated data caching can be tremendous for
3:53 reducing little headaches the big headaches that can result if your IT
3:57 staff isn't on the ball and some compromis files slip through and push to
4:01 an entire network of PCS is a clear potential downside speaking of clear
4:07 potential downsides I can't think of one for Cooler Master they make great cases
4:13 power supplies fans they've got laptop coolers they've got all kinds of great
4:18 stuff and probably the best thing though about Cooler Master is just like this
4:22 series of videos they're all about actually legitimately educating their
4:25 user so if you check out Cooler Master University on their website they've got
4:29 great information that helps you make an educated decision about whether it's
4:34 something like a CPU Cooler or whether it's something like a case or a mouse
4:38 they've got lots of great peripherals like mice and keyboards and uh oh also
4:43 they do a bunch of community outreach as well so stuff like their case mod World
4:47 Series which was running very recently and allowed anyone with a Dremel or I
4:52 mean really even if you just had a screwdriver if you could use it really creatively to enter their case modding
4:57 contest cool guys there's a link to them in the video description so if you're
5:00 considering a PC upgrade definitely check them out and I think that's pretty
5:04 much it guys like this video if you liked it dislike it if you thought it was trash leave a comment if you have
5:08 suggestions for future fast as possible just like this one and as always don't
5:12 forget to subscribe