Different proxy services can be allocated to different users. For example, some of them could be restricted to browsing web pages and others to sending and receiving e-mails.
Use proxy server which is built by CCProxy, you can allocate proxy client bandwidth as appropriate. That is to say, with such proxy server software you can easily control the users' Internet surfing speed and balance the bandwidth to avoid the network traffic jams that can be caused by users who download big files or watch online media.
Access logging and online access monitoring will help you record the clients' Internet access activities. Download Certified Similar to 4. CCProxy Download. Last updated:.
September 17, User rating:. Software similar to CCProxy 4. Freegate 7. Restrict and log user web access. Solve headaches with legacy TLS versions And a whole lot more New version: 9. Scan your WinGate traffic for malware using Kaspersky Labs highly respected scanning engine.
Also scans web browsing for exploits. If you wish to use it in a commercial, educational, institutional, or governmental environment, please contact the author - see the contact info below. Instead of connecting directly to the server, the client connects instead to the proxy, which then connects to the server. In most cases, the proxy does not alter the data. It's also possible to have a chain of 2 or more proxies between the client and server.
So, if the proxy is transparent, why use one? The answer is that, since the proxy sees all the data passing between the client and server, it can provide some "value-added" services. For example, it can display the data. It can filter incoming connections from clients, based on IP address, allowing some addresses and rejecting others similar to a basic firewall. If 2 proxies are used, one on the client side and one on the server side, they can authenticate each other and encrypt all data passing between the client and server, thus establishing a secure "tunnel" between them.
This is important for protecting usernames, passwords, and other confidential data. It does not automatically work with the FTP file transfer protocol, because FTP uses a separate data connection which is negotiated for each file transfer; you can log in with FTP, but file transfer and directory listings do not work when using the proxy.
0コメント