Anonymous Proxy

March 2007
Network Dictionary;2007, p36
Reference Entry
An encyclopedia entry for "Anonymous Proxy" is presented. In computer security, this term refers to a proxy server that can be used for anonymous Web browsing. It retains the anonymity of the real user because only information on the proxy server will be visible to outsiders.


Related Articles

  • A Novel Page Ranking Method based on Link- Visits of Web Pages. Sharma, A. K .; Duhan, Neelam; Kumar, Gyanendra // International Journal on Recent Trends in Engineering & Technolo;Nov2010, Vol. 4 Issue 1, p58 

    Search engines generally return a large number of pages in response to user queries. To assist the users to navigate in the result list, ranking methods are applied on the search results. Most of the ranking algorithms proposed in the literature are either link or content oriented, which do not...

  • Learned Information Ltd Launches Internet Server.  // Information Today;Jul/Aug1994, Vol. 11 Issue 7, p33 

    The article reports that Learned Information Ltd. has launched an Internet document server, the Learned InfoNet, which is accessible via both the World Wide Web and Gopher. As a natural extension of their Internet activities, Learned Information will be using the Internet to publicize details of...

  • An Approach of Cryptography for Web User Authentication using Secure Remote Password Protocol. Dewangan, Revati Raman; Parganiha, Vivek; Thombre, Deepali // International Journal of Computer Science Engineering & Technolo;Jan2012, Vol. 2 Issue 1, p823 

    This research paper describes generation of a crypt key for user of web application using SRP techniques for the purpose of secure authentication in web. A numbers of web sites offer different kinds of users in world wide to access web application using unique user name and corresponding a...

  • Provide Secure Access to OWA Attachments.  // Windows IT Pro;Dec2005, Vol. 11 Issue 12, p18 

    The article reports that Messageware released AttachView 7.0, a server-based software that provides increased Microsoft Outlook Web Access (OWA) security features. It is noted that to prevent security threats and protect corporate standards, Messageware AttachView provides security Web access to...

  • Web-based management. Passmore, David // Business Communications Review;Oct96, Vol. 26 Issue 10, p16 

    Discusses developments in World Wide Web-based management which involves the use of World Wide Web server and browser technology. Network management vendors' addition of Web browser interfaces to existing systems; Formation of the Web-Based Enterprise Management; Development of Sun's Java...

  • Net surfing in Mexico. Chorost, Michael // Hispanic;May1995, Vol. 8 Issue 4, p64 

    Presents a guide to Web servers in Mexico. How Web servers distribute information on the Internet; MexPlaza, a Web page that bills itself as a Mexican shopping center on the Internet; Mexican FAQ list; Mexican newspaper services on-line; A map of Web servers in Mexico available through the...

  • Anonymous Remailer.  // Network Dictionary;2007, p36 

    An encyclopedia entry for "Anonymous Remailer" is presented. In computer security, this term refers to a server computer that receives e-mails and forwards them without revealing the original source of the letter. Anonymous remailers are classified according to their policies and the type of...

  • EXTENDED NYMBLE: METHOD FOR TRACKING MISBEHAVING USERS ANONYMOSLY WHILE BLOCKING. Durga Prasad, M.; Chenna Reddy, P.; Samya, Banoth // International Journal of Computer Science & Information Technolo;Feb2013, Vol. 5 Issue 1, p87 

    We have many of anonymizing networks which provide users to access services of server anonymously. Anonymity has received increasing attention in the literature due to user awareness of their privacy. Nowadays, anonymity provides protection to users to enjoy network services without being...

  • Study on Detection Method of Server Intrusion for Small and Medium Sized Enterprises. Zhi Zhang // Applied Mechanics & Materials;2014, Issue 608-609, p507 

    This article analyses in detail the safety hazards and risks among all levels of the enterprise from the point of view of the structure, there may be in accordance with the overall balance, principle, technology integration, propose a network security requirements of the enterprise, and further...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics