Web proxy
Proxies that hub on WWW traffic are called web proxies. Many web proxies try to block offensive web content. Other web proxies reformat web pages for an exact purpose or audience (e.g., cell phones and PDAs or persons with disabilities). Network operators can also set up proxies to intercept computer viruses and other hostile content served from remote web pages.
Many organizations — including schools, corporations, and countries — use proxy servers to implement acceptable network use policies or to provide security, anti-malware and/or caching services. A traditional web proxy is not translucent to the client application, which must be configured to use the proxy (manually or with a configuration script). In some cases, where substitute means of connection to the Internet are available ,the user may be able to avoid policy control by simply resetting the client configuration and bypassing the proxy. Furthermore administration of browser configuration can be a load for network administrators.
Proxies that hub on WWW traffic are called web proxies. Many web proxies try to block offensive web content. Other web proxies reformat web pages for an exact purpose or audience (e.g., cell phones and PDAs or persons with disabilities). Network operators can also set up proxies to intercept computer viruses and other hostile content served from remote web pages.
Many organizations — including schools, corporations, and countries — use proxy servers to implement acceptable network use policies or to provide security, anti-malware and/or caching services. A traditional web proxy is not translucent to the client application, which must be configured to use the proxy (manually or with a configuration script). In some cases, where substitute means of connection to the Internet are available ,the user may be able to avoid policy control by simply resetting the client configuration and bypassing the proxy. Furthermore administration of browser configuration can be a load for network administrators.