Searching all of Tech Target| 2,782 results for "proxy"

SearchSecurity

By Mike Chapple Problem Solve Jul 08, 2006

How do proxy servers and proxy firewalls differ?

In this network security Ask the Expert Q&A, SearchSecurity's resident expert Mike Chapple examines how proxy servers and proxy firewalls differ and explains how they work together. Continue Reading

SearchSecurity

By Michael Cobb Evaluate Feb 06, 2006

The pros and cons of proxy firewalls

In this Ask the Expert Q&A, our application security expert reviews the pros and cons of proxy firewalls. Continue Reading

SearchSecurity

By Michael Cobb Manage Mar 18, 2010

The benefits of application proxy firewalls

Michael Cobb explains the benefits of application proxy firewalls as compared to other firewall technologies including packet filtering firewalls and stateful inspection firewalls or circuit-level gateways. Continue Reading

SearchSecurity

By Michael Cobb Manage Dec 21, 2005

Proxy server functions

In this Ask the Expert Q&A, our platform security expert details how proxy servers work and determines whether they protect personal and sensitive information safe from hacker exploits. Continue Reading

SearchSecurity.com.au

By John Strand News Mar 11, 2009

Detect and destroy web proxy servers

Some users set up proxy servers to anonymise their web browsing or circumvent content-filtering policies. Here's how to find their proxies and destroy them. UPDATE: Sophos responds to the story. Continue Reading

SearchSecurity

By Mike Chapple Problem Solve Jun 22, 2009

What are the disadvantages of proxy-based firewalls?

Network security expert Mike Chapple explains why he strongly recommends the use of proxy-based firewalls. Continue Reading

SearchSecurity

By Mike Chapple Problem Solve Aug 17, 2006

Application proxy firewall features and functionalities

Learn how using application proxy firewalls can enhance network security in this Network Security Ask the Expert Q&A. Continue Reading

SearchDomino

News Mar 23, 2006

Open relays, proxy servers and phishing

Learn how phishers take advantage of open relays, combined with proxy servers to hide their IP addresses. Continue Reading

SearchNetworking

Apr 05, 2006

Building a wireless LAN proxy server

Our router expert, Michael Martin, walks you through building an http proxy server for a wireless LAN with a Linux base. Continue Reading

SearchSecurity

By Mike Chapple Problem Solve Jul 10, 2007

Troubleshooting proxy firewall connections

Investigating the TCP 'handshake' between clients and servers has always been a useful way to diagnose Web server and application problems. Firewalls, however, can interfere with the normal transmission control ... Continue Reading