AfterAcademy Tech
•
10 Feb 2020

The IP address which is given to your system by the ISP(Internet Service Providers) is used to uniquely identify your system. But there are many risks involved with the IP addresses like they might find personal information about you, spam you with “Personalized Ads”, etc. So, Proxy Servers or VPNs can be used to overcome this problem. In this blog, we will learn how the proxy server will protect your computer network. So, let's get started.
The word proxy literally means a substitute. A proxy server substitutes the IP address of your computer with some substitute IP address. If you can't access a website from your computer or you want to access that website anonymously because you want your identity to be hidden or you don't trust that website then you can use a proxy. These proxy servers are dedicated computer systems or software running on a computer system that acts as an intermediary separating the end-users from the server. These proxy servers have special popularity among countries like China where the government has banned connection to some specific websites.
Every computer on the network has a unique IP address. This IP address is analogous to your street address which must be known by the post office in order to deliver your parcel to your home. A proxy server is a computer on the internet with its own IP address and the client which is going to use this proxy server knows this IP address. Whenever the client makes any request to any web server then its request first goes to this proxy server. This proxy server then makes a request to the destination server on behalf of the client. The proxy server actually changes the IP address of the client so that the actual IP address of the client is not revealed to the webserver. The proxy server then collects the response from the webserver and forwards the result to the client and the client can see the result in its web browser.

This was all about why you need to use a proxy server and what are the risks associated with it. Hope you learned something new today.
Do share this blog with your friends to spread the knowledge. Visit our YouTube channel for more content. You can read more blogs from here.
Keep Learning 🙂
Team AfterAcademy!!
AfterAcademy Tech
In this blog, we will learn about the types of network based on design, that are Peer-to-Peer, and Server-Based networks. We will also see the applications, advantages, and disadvantages of using these networks.

AfterAcademy Tech
In this blog, we will mainly learn about a computer network and its node. We will also cover the classification, goals, and applications of a computer network.

AfterAcademy Tech
In this blog, we will learn about various network topologies, their advantages and disadvantages in a computer network.

AfterAcademy Tech
In this blog, we will learn about different data transmission modes based on the direction of exchange, synchronization between the transmitter and receiver, and the number of bits sent simultaneously in a computer network.
