Proxy servers

Results: 95



#Item
71Reverse proxy / Computer networking / Proxy servers / Cross-platform software / Network performance / Squid / Apache HTTP Server / WWWOFFLE / Tinyproxy / Software / Computing / System software

Prometeo internals Simone Tellini and Renzo Davoli Department of Computer Science - University of Bologna, Mura Anteo Zamboni, 7, I40127 Bologna, Italy {davoli, tellini}@cs.unibo.it

Add to Reading List

Source URL: prometeo-proxy.sourceforge.net

Language: English - Date: 2005-02-06 07:26:30
72Internet privacy / Network architecture / Network performance / Computer network security / Proxy servers / SOCKS / Reverse proxy / Cache / Proxy auto-config / Computing / Computer networking / Internet

INDEM DOCUMENTATION SERIES The Proxy Server R L

Add to Reading List

Source URL: indem.iiita.ac.in

Language: English - Date: 2011-04-07 03:00:01
73Identity management / Social issues / Cryptography / Identity / Proxy servers / Tor / Anonymity / Middleware / Pseudonymity / Ethics / Internet privacy / Privacy

SECURITY & PRIVACY SECURITY & PRIVACY Location Privacy in Pervasive Computing

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2009-08-21 16:21:29
74Internet / Internet privacy / Network performance / Proxy servers / Internet censorship circumvention / Computing / Computer networking / Computer network security

New features on a platform that’s second to none The Mission Control Web Proxy has recently gained some impressive new features. However, for Christoph Göldi, who is responsible with his team for the service and its o

Add to Reading List

Source URL: www.open.ch

Language: English - Date: 2014-05-07 10:27:44
75Computing / Anonymity / Proxy servers / Pseudonymity / Tor / Crowds / Internet Relay Chat / Block / Cryptography / Internet privacy / Internet

Nymble: Anonymous IP-Address Blocking? Peter C. Johnson1 , Apu Kapadia1,2 , Patrick P. Tsang1 , and Sean W. Smith1 1 Department of Computer Science Dartmouth College

Add to Reading List

Source URL: www.cs.indiana.edu

Language: English - Date: 2007-05-25 21:48:58
76Software / Port / HTTP Secure / Neopost / X Window System / Hypertext Transfer Protocol / Mod ssl / Proxy server / Computing / Email / Internet

Security datasheet Server communication Principle: When the machine needs to connect to the NEOPOST servers, it opens a secure communication, based on SSL protocol, over the Internet access. By this way, a secure tunnel

Add to Reading List

Source URL: www.neopost.se

Language: English - Date: 2013-05-23 17:07:04
77Computer network security / Network architecture / Computer networking / Network performance / Proxy servers / SOCKS / Tor / Internet security / Firewall / Internet privacy / Computing / Internet

Examining Proxies to Mitigate Pervasive Surveillance Eliot Lear Barbara Fraser Abstract

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
78Computer-mediated communication / Relational database management systems / Email client / Proxy server / Microsoft SQL Server / Simple Mail Transfer Protocol / Password / Oracle Database / Comparison of mail servers / Computing / Email / Software

Attensa StreamServer - Configuration Guide Introduction Attensa StreamServer supports a variety of configuration parameters which control how it integrates into your IT environment. This document describes those configur

Add to Reading List

Source URL: www.attensa.com

Language: English - Date: 2013-06-17 14:08:29
79Proxy servers / Software / Cryptographic software / Tor / Computer networking / Network performance / Internet privacy / Computing / Internet

Microsoft Word - howtoproxy.doc

Add to Reading List

Source URL: academicaffairs.ucsf.edu

Language: English - Date: 2012-02-04 22:52:57
80Concurrent computing / Internet privacy / I2P / File sharing networks / Proxy server / Garlic routing / .onion / Anonymity / Kad network / Software / Computing / Cross-platform software

Darknets and hidden servers: Identifying the true IP/network identity of I2P service hosts Adrian Crenshaw Abstract: This paper will present research into

Add to Reading List

Source URL: www.irongeek.com

Language: English - Date: 2012-02-19 09:51:38
UPDATE