4 Knowledge Base

 

 TelecomTrainning.net > Knowledge Base
 Viewing KB Article
Good Evening, - Please register or - log-in to your account.
Search
Search   Saved Questions   Ask a question
Keywords 
 
Available categories
LTE
100 of Questions in LTE
CCNA Certification
CCNA Sample Q & A (1000 + Q &A)
(Network +) Certification
(Network +) Sample Q & A (1000 + Q &A)
Networking
General/Interview Q& A on Networking
Home Networking
General/Interview Q& A on Networking
VOIP, SIP & Asterisk
Q & A on VOIP,Ethereal, SIP & Asterisk
Telecom Test Equipments
Q & A on Telecom Test Equipment
PSTN / Wireline
General / Interview Q & A on PSTN / Wireline
LTE, Wireless, 3G ,Diameter and HSS
General/Interview Q & A on LTE, Wireless, 3G ,Diameter and HSS
Telecom General
Any Q & A in Telecom in General

Top Questions
Friends, Describe Secure storage and distribution of A-Keys?
what is the difference between E1 signal & Ethernet signal ?
How do I monitor SS7 Traffic in spectra2?
Can you tell me about PBGT?
Explain me the difference between a repeater, bridge and router? Relate this to the OSI model.
What is the difference between BRI & PRI ?
Guys what is the purpose of Umbrella Cell Approach in GSM ?
how can we explain media gateway in MSc?
What is GGSN?
What is the difference between Electrical-tilt and Mechanical-tilt of an antenna?
What is BSC?
What is demarc point?
Can any one explain me how sms flow will work using ss7 network ?( from physical layer to application layer)
why cellphone towers are painted in red and white?
Explain SLTA and SLTM messages in MTP3?
Hi guys what is WAP?
wat is the difference betweem MSC & GMSC, & MSS & GCS?
what is EDAp? what is the functions of EDAP?
What is a circuit id?
what is sdh?

What is Proxy Chaining?
snjysanjay05 30-June-2008 02:13:57 PM

Comments


So simple By using proxy chaining you will work by this way:

your computer => proxy1 => proxy2 => ... => proxy X => web-site

When you use proxy chaining software, in fact you create one "virtual proxy". And when you want to use chain proxy1 => proxy2 => ... => proxy X you need to use address of created "virtual proxy". This address you will know when you set up your chain of proxies.
Posted by HamidAliKhan


- There may be also cases when a local outbound proxy may be involved
- Provides locally important call processing logic (e.g., identifying nearest 911)
- Manages firewall
- provides least-gateway-cost routing service
- IP phones must know address of the proxy: may be configured manually or with a configuration protocol (DHCP, TFTP ...)
- In general, servers may be arbitrarily chained a central company’s server may distribute signaling to departmental servers
- A user may want to forward incoming calls to her cell phone
- Servers have to avoid loops and recognize spirals
Posted by yogendra


Proxy chaining is merely connecting to more than one proxy and then to your intended destination. You can use as many proxy servers as you can or want. The more you have, the more anonymous you will be.

By using proxy chaining you will work by this way:

your computer => proxy1 => proxy2 => ... => proxy X => web-site

When you use proxy chaining software, in fact you create one "virtual proxy". And when you want to use chain proxy1 => proxy2 => ... => proxy X you need to use address of created "virtual proxy". This address you will know when you set up your chain of proxies.
Posted by sagitraz

Q&A Rating

Q&A Rating
Rate This Question and Answer

Related Questions
How can you install firewall software that prevents unauthorized internet traffic from entering or leaving the computer network?
 
Can anyone explain me the meaning of attenuation?
 
Which command is not being used to check LAN connectivity problems?
 


Search questions via popularity
Top viewed questions  Top emailed questions  Most printed questions  Most saved questions
 
Copyright © Telecom Training, All Rights Reserved