SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Reverse proxy andReverse proxy and
it's usesit's uses
In computer networks, a reverse proxy is a
type of proxy server that retrieves resources
on behalf of a client from one or more servers.
These resources are then returned to the
client as though they originated from the
proxy server itself. While a forward proxy acts
as an intermediary for its associated client
and returns to them resources accessible on
the Internet, a reverse proxy acts as an
intermediary for its associated server and only
returns resources provided by those
associated server
Uses of reverse proxiesUses of reverse proxies
Reverse proxies can hide the existence and
characteristics of an origin server or servers.
Application firewall features can protect
against common web-based attacks. Without
a reverse proxy, removing malware or
initiating takedowns, for example, can
become difficult.
In the case of secure websites, a web server
may not perform SSL encryption itself, but
instead offloads the task to a reverse proxy
that may be equipped with SSL acceleration
hardware.
A reverse proxy can distribute the load from
incoming requests to several servers, with
each server serving its own application area.
In the case of reverse proxying in the
neighborhood of web servers, the reverse
proxy may have to rewrite the URL in each
incoming request in order to match the
relevant internal location of the requested
resource.
A reverse proxy can reduce load on its origin
servers by caching static content, as well as
dynamic content - also known as web
acceleration. Proxy caches of this sort can
often satisfy a considerable number of
website requests, greatly reducing the load on
the origin server
A reverse proxy can optimize content by
compressing it in order to speed up loading
times.
In a technique known as "spoon feeding" a
dynamically generated page can be produced
all at once and served to the reverse-proxy,
which can then return it to the client a little bit
at a time. The program that generates the
page need not remain open, thus releasing
server resources during the possibly extended
time the client requires to complete the
transfer.
Reverse proxies can operate whenever
multiple web-servers must be accessible via a
single public IP address. The web servers
listen on different ports in the same machine,
with the same local IP address or, possibly,
on different machines and different local IP
addresses altogether. The reverse proxy
analyzes each incoming request and delivers
it to the right server within the local area
network.
Reverse proxies can perform A/B testing and
multivariate testing without placing javascript
tags or code into pages.
Reverse proxy is also a concept used in
Search Engine Marketing to automatically
instrument a destination website with usage
tracking code that can be used for campaign
reporting or campaign optimisation. It is a
technique typically accepted as being bad
practice.
Thanking you...Thanking you...
For more info log on too..
http://proxiesforrent.comhttp://proxiesforrent.com

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Http Proxy Server
Http Proxy ServerHttp Proxy Server
Http Proxy Server
 
seminar on proxyserver
seminar on proxyserverseminar on proxyserver
seminar on proxyserver
 
Proxy Presentation
Proxy PresentationProxy Presentation
Proxy Presentation
 
Web Proxy Server
Web Proxy ServerWeb Proxy Server
Web Proxy Server
 
Proxy server
Proxy serverProxy server
Proxy server
 
Firewall & Proxy Server
Firewall & Proxy ServerFirewall & Proxy Server
Firewall & Proxy Server
 
Proxy
ProxyProxy
Proxy
 
Proxy Servers & Firewalls
Proxy Servers & FirewallsProxy Servers & Firewalls
Proxy Servers & Firewalls
 
Proxy Servers
Proxy ServersProxy Servers
Proxy Servers
 
zigbee
zigbeezigbee
zigbee
 
Web proxy server
Web proxy serverWeb proxy server
Web proxy server
 
web server
web serverweb server
web server
 
Web Servers (ppt)
Web Servers (ppt)Web Servers (ppt)
Web Servers (ppt)
 
Proxy Server: A Comprehensive Guide
Proxy Server: A Comprehensive GuideProxy Server: A Comprehensive Guide
Proxy Server: A Comprehensive Guide
 
Web server
Web serverWeb server
Web server
 
Web server
Web serverWeb server
Web server
 
Virtual Private Networks
Virtual Private NetworksVirtual Private Networks
Virtual Private Networks
 
Web Server - Internet Applications
Web Server - Internet ApplicationsWeb Server - Internet Applications
Web Server - Internet Applications
 
Web servers – features, installation and configuration
Web servers – features, installation and configurationWeb servers – features, installation and configuration
Web servers – features, installation and configuration
 
Optimiszing proxy
Optimiszing proxyOptimiszing proxy
Optimiszing proxy
 

Andere mochten auch

Dr Rosanne Hawarden's thesis on the networks of men and women board directors
Dr Rosanne Hawarden's thesis on the networks of men and women board directorsDr Rosanne Hawarden's thesis on the networks of men and women board directors
Dr Rosanne Hawarden's thesis on the networks of men and women board directorsRosanne Hawarden
 
Apache httpd 2.4 Reverse Proxy
Apache httpd 2.4 Reverse ProxyApache httpd 2.4 Reverse Proxy
Apache httpd 2.4 Reverse ProxyJim Jagielski
 
Configuring Nginx as Reverse Proxy and Load Balancing Web Application
Configuring Nginx as Reverse Proxy and Load Balancing Web ApplicationConfiguring Nginx as Reverse Proxy and Load Balancing Web Application
Configuring Nginx as Reverse Proxy and Load Balancing Web ApplicationJagoan Neon
 
Choosing A Proxy Server - Apachecon 2014
Choosing A Proxy Server - Apachecon 2014Choosing A Proxy Server - Apachecon 2014
Choosing A Proxy Server - Apachecon 2014bryan_call
 
NGINX High-performance Caching
NGINX High-performance CachingNGINX High-performance Caching
NGINX High-performance CachingNGINX, Inc.
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationAmandeep Kaur
 

Andere mochten auch (8)

Dr Rosanne Hawarden's thesis on the networks of men and women board directors
Dr Rosanne Hawarden's thesis on the networks of men and women board directorsDr Rosanne Hawarden's thesis on the networks of men and women board directors
Dr Rosanne Hawarden's thesis on the networks of men and women board directors
 
Apache httpd 2.4 Reverse Proxy
Apache httpd 2.4 Reverse ProxyApache httpd 2.4 Reverse Proxy
Apache httpd 2.4 Reverse Proxy
 
Configuring Nginx as Reverse Proxy and Load Balancing Web Application
Configuring Nginx as Reverse Proxy and Load Balancing Web ApplicationConfiguring Nginx as Reverse Proxy and Load Balancing Web Application
Configuring Nginx as Reverse Proxy and Load Balancing Web Application
 
Choosing A Proxy Server - Apachecon 2014
Choosing A Proxy Server - Apachecon 2014Choosing A Proxy Server - Apachecon 2014
Choosing A Proxy Server - Apachecon 2014
 
NGINX High-performance Caching
NGINX High-performance CachingNGINX High-performance Caching
NGINX High-performance Caching
 
PLM Introduction
PLM IntroductionPLM Introduction
PLM Introduction
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
Proxy Server
Proxy ServerProxy Server
Proxy Server
 

Ähnlich wie Reverse proxy

A Proposed Model for Web Proxy Caching Techniques to Improve Computer Network...
A Proposed Model for Web Proxy Caching Techniques to Improve Computer Network...A Proposed Model for Web Proxy Caching Techniques to Improve Computer Network...
A Proposed Model for Web Proxy Caching Techniques to Improve Computer Network...Hossam Al-Ansary
 
Implementing Advanced Caching and Replication Techniques in ...
Implementing Advanced Caching and Replication Techniques in ...Implementing Advanced Caching and Replication Techniques in ...
Implementing Advanced Caching and Replication Techniques in ...webhostingguy
 
cybersecurity unit 5 basics of cybersecurity
cybersecurity unit 5 basics of cybersecuritycybersecurity unit 5 basics of cybersecurity
cybersecurity unit 5 basics of cybersecurityJayaMishra170943
 
Webscarab demo @ OWASP Belgium
Webscarab demo @ OWASP BelgiumWebscarab demo @ OWASP Belgium
Webscarab demo @ OWASP BelgiumPhilippe Bogaerts
 
Cloud Server vs. Traditional Server Hosting.pdf
Cloud Server vs. Traditional Server Hosting.pdfCloud Server vs. Traditional Server Hosting.pdf
Cloud Server vs. Traditional Server Hosting.pdfRekhaRani983756
 
Using Proxies To Secure Applications And More
Using Proxies To Secure Applications And MoreUsing Proxies To Secure Applications And More
Using Proxies To Secure Applications And MoreJosh Sokol
 
Presentation on java servlets
Presentation on java servletsPresentation on java servlets
Presentation on java servletsAamir Sohail
 
HTTP 완벽가이드 6장.
HTTP 완벽가이드 6장.HTTP 완벽가이드 6장.
HTTP 완벽가이드 6장.HyeonSeok Choi
 
Pantallas escaneo Sitio Web
Pantallas escaneo Sitio WebPantallas escaneo Sitio Web
Pantallas escaneo Sitio Webandres1422
 

Ähnlich wie Reverse proxy (20)

Reverse proxy
Reverse proxyReverse proxy
Reverse proxy
 
Proxy Server
Proxy ServerProxy Server
Proxy Server
 
Uses of proxies
Uses of proxiesUses of proxies
Uses of proxies
 
Firewall vpn proxy
Firewall vpn proxyFirewall vpn proxy
Firewall vpn proxy
 
A Proposed Model for Web Proxy Caching Techniques to Improve Computer Network...
A Proposed Model for Web Proxy Caching Techniques to Improve Computer Network...A Proposed Model for Web Proxy Caching Techniques to Improve Computer Network...
A Proposed Model for Web Proxy Caching Techniques to Improve Computer Network...
 
week14
week14week14
week14
 
Implementing Advanced Caching and Replication Techniques in ...
Implementing Advanced Caching and Replication Techniques in ...Implementing Advanced Caching and Replication Techniques in ...
Implementing Advanced Caching and Replication Techniques in ...
 
How does proxy works?
How does proxy works?How does proxy works?
How does proxy works?
 
cybersecurity unit 5 basics of cybersecurity
cybersecurity unit 5 basics of cybersecuritycybersecurity unit 5 basics of cybersecurity
cybersecurity unit 5 basics of cybersecurity
 
Proxies
ProxiesProxies
Proxies
 
Proxies
ProxiesProxies
Proxies
 
JAVA
JAVAJAVA
JAVA
 
Webscarab demo @ OWASP Belgium
Webscarab demo @ OWASP BelgiumWebscarab demo @ OWASP Belgium
Webscarab demo @ OWASP Belgium
 
Cloud Server vs. Traditional Server Hosting.pdf
Cloud Server vs. Traditional Server Hosting.pdfCloud Server vs. Traditional Server Hosting.pdf
Cloud Server vs. Traditional Server Hosting.pdf
 
Progressive Web Apps
Progressive Web AppsProgressive Web Apps
Progressive Web Apps
 
Using Proxies To Secure Applications And More
Using Proxies To Secure Applications And MoreUsing Proxies To Secure Applications And More
Using Proxies To Secure Applications And More
 
Presentation on java servlets
Presentation on java servletsPresentation on java servlets
Presentation on java servlets
 
HTTP 완벽가이드 6장.
HTTP 완벽가이드 6장.HTTP 완벽가이드 6장.
HTTP 완벽가이드 6장.
 
Proxies
ProxiesProxies
Proxies
 
Pantallas escaneo Sitio Web
Pantallas escaneo Sitio WebPantallas escaneo Sitio Web
Pantallas escaneo Sitio Web
 

Mehr von Proxies Rent

Features supported by squid proxy server
Features supported by squid proxy serverFeatures supported by squid proxy server
Features supported by squid proxy serverProxies Rent
 
How to bypass web restrictions
How to bypass web restrictionsHow to bypass web restrictions
How to bypass web restrictionsProxies Rent
 
Hidden ip does not allow hackers to identify your location
Hidden ip does not allow hackers to identify your locationHidden ip does not allow hackers to identify your location
Hidden ip does not allow hackers to identify your locationProxies Rent
 
Securely managed and timed proxy server
Securely managed and timed proxy serverSecurely managed and timed proxy server
Securely managed and timed proxy serverProxies Rent
 
How to access torrent
How to access torrentHow to access torrent
How to access torrentProxies Rent
 
Bandwidth proxyserver
Bandwidth proxyserverBandwidth proxyserver
Bandwidth proxyserverProxies Rent
 
Unristricted proxy
Unristricted proxyUnristricted proxy
Unristricted proxyProxies Rent
 
Unrestricted Internet Access Using a Proxy Server
Unrestricted Internet Access Using a Proxy ServerUnrestricted Internet Access Using a Proxy Server
Unrestricted Internet Access Using a Proxy ServerProxies Rent
 
How to access torrent?
How to access torrent?How to access torrent?
How to access torrent?Proxies Rent
 
Proxy : effective logs for tracking down usage trends
Proxy : effective logs for tracking down usage trendsProxy : effective logs for tracking down usage trends
Proxy : effective logs for tracking down usage trendsProxies Rent
 
Proxy For employee monitoring
Proxy  For employee monitoringProxy  For employee monitoring
Proxy For employee monitoringProxies Rent
 
usefulness of Proxies
usefulness of Proxiesusefulness of Proxies
usefulness of ProxiesProxies Rent
 

Mehr von Proxies Rent (20)

Torrent
TorrentTorrent
Torrent
 
Features supported by squid proxy server
Features supported by squid proxy serverFeatures supported by squid proxy server
Features supported by squid proxy server
 
Proxy
ProxyProxy
Proxy
 
How to bypass web restrictions
How to bypass web restrictionsHow to bypass web restrictions
How to bypass web restrictions
 
Hidden ip does not allow hackers to identify your location
Hidden ip does not allow hackers to identify your locationHidden ip does not allow hackers to identify your location
Hidden ip does not allow hackers to identify your location
 
Securely managed and timed proxy server
Securely managed and timed proxy serverSecurely managed and timed proxy server
Securely managed and timed proxy server
 
How to access torrent
How to access torrentHow to access torrent
How to access torrent
 
Bandwidth proxyserver
Bandwidth proxyserverBandwidth proxyserver
Bandwidth proxyserver
 
Optimiszing proxy
Optimiszing proxyOptimiszing proxy
Optimiszing proxy
 
Torrent
TorrentTorrent
Torrent
 
Proxy
ProxyProxy
Proxy
 
Unristricted proxy
Unristricted proxyUnristricted proxy
Unristricted proxy
 
Unrestricted Internet Access Using a Proxy Server
Unrestricted Internet Access Using a Proxy ServerUnrestricted Internet Access Using a Proxy Server
Unrestricted Internet Access Using a Proxy Server
 
Optimizing proxy
Optimizing proxyOptimizing proxy
Optimizing proxy
 
How to access torrent?
How to access torrent?How to access torrent?
How to access torrent?
 
Proxy : effective logs for tracking down usage trends
Proxy : effective logs for tracking down usage trendsProxy : effective logs for tracking down usage trends
Proxy : effective logs for tracking down usage trends
 
Proxy For employee monitoring
Proxy  For employee monitoringProxy  For employee monitoring
Proxy For employee monitoring
 
L ive streaming
L ive streamingL ive streaming
L ive streaming
 
Hulu
HuluHulu
Hulu
 
usefulness of Proxies
usefulness of Proxiesusefulness of Proxies
usefulness of Proxies
 

Kürzlich hochgeladen

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 

Kürzlich hochgeladen (20)

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 

Reverse proxy

  • 1. Reverse proxy andReverse proxy and it's usesit's uses
  • 2. In computer networks, a reverse proxy is a type of proxy server that retrieves resources on behalf of a client from one or more servers. These resources are then returned to the client as though they originated from the proxy server itself. While a forward proxy acts as an intermediary for its associated client and returns to them resources accessible on the Internet, a reverse proxy acts as an intermediary for its associated server and only returns resources provided by those associated server
  • 3. Uses of reverse proxiesUses of reverse proxies
  • 4. Reverse proxies can hide the existence and characteristics of an origin server or servers.
  • 5. Application firewall features can protect against common web-based attacks. Without a reverse proxy, removing malware or initiating takedowns, for example, can become difficult.
  • 6. In the case of secure websites, a web server may not perform SSL encryption itself, but instead offloads the task to a reverse proxy that may be equipped with SSL acceleration hardware.
  • 7. A reverse proxy can distribute the load from incoming requests to several servers, with each server serving its own application area. In the case of reverse proxying in the neighborhood of web servers, the reverse proxy may have to rewrite the URL in each incoming request in order to match the relevant internal location of the requested resource.
  • 8. A reverse proxy can reduce load on its origin servers by caching static content, as well as dynamic content - also known as web acceleration. Proxy caches of this sort can often satisfy a considerable number of website requests, greatly reducing the load on the origin server
  • 9. A reverse proxy can optimize content by compressing it in order to speed up loading times.
  • 10. In a technique known as "spoon feeding" a dynamically generated page can be produced all at once and served to the reverse-proxy, which can then return it to the client a little bit at a time. The program that generates the page need not remain open, thus releasing server resources during the possibly extended time the client requires to complete the transfer.
  • 11. Reverse proxies can operate whenever multiple web-servers must be accessible via a single public IP address. The web servers listen on different ports in the same machine, with the same local IP address or, possibly, on different machines and different local IP addresses altogether. The reverse proxy analyzes each incoming request and delivers it to the right server within the local area network.
  • 12. Reverse proxies can perform A/B testing and multivariate testing without placing javascript tags or code into pages.
  • 13. Reverse proxy is also a concept used in Search Engine Marketing to automatically instrument a destination website with usage tracking code that can be used for campaign reporting or campaign optimisation. It is a technique typically accepted as being bad practice.
  • 14. Thanking you...Thanking you... For more info log on too.. http://proxiesforrent.comhttp://proxiesforrent.com