Cybersecurity for Small Networks by Seth Enoka
Author:Seth Enoka [Enoka, Seth]
Language: eng
Format: epub
Tags: COM043050 COMPUTERS / Security / Network Security, COM043040 COMPUTERS / Networking / Network Protocols, COM046070 COMPUTERS / Operating Systems / Linux
Publisher: No Starch Press
6
Improving Browsing and Privacy with the Squid Proxy
A proxy server acts as an intermediary between you and the internet. When you request a web page, the proxy receives the request and then forwards it on to the web server (if necessary). A proxy allows you to protect your privacy by obfuscating the metadata that is usually available to the services we interact with daily on the internet. Proxies also allow the administrator to block access to certain content, like social media or online gambling.
This chapter will show you how to install, configure, and use the Squid proxy, a solution that runs on most operating systems. With Squid, youâll be able to speed up access to websites, enhance your security, and allow or prevent access to specific domains or websites. Chapter 7 covers another proxy solution, Pi-Hole, which offers the same benefits as Squid, but additionally blocks ads and prevents other tracking and privacy issues as well. Choosing the best proxy for your needs will depend on which you find easier to use and which provides you the best user experience.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4130)
Ego Is the Enemy by Ryan Holiday(3991)
Offensive Shellcode from Scratch by Rishalin Pillay(3661)
Exploring Deepfakes by Bryan Lyon and Matt Tora(3245)
Robo-Advisor with Python by Aki Ranin(3019)
Learning C# by Developing Games with Unity 2021 by Harrison Ferrone(2868)
Speed Up Your Python with Rust by Maxwell Flitton(2847)
Liar's Poker by Michael Lewis(2810)
Agile Security Operations by Hinne Hettema(2802)
Linux Command Line and Shell Scripting Techniques by Vedran Dakic and Jasmin Redzepagic(2801)
OPNsense Beginner to Professional by Julio Cesar Bueno de Camargo(2801)
Extreme DAX by Michiel Rozema & Henk Vlootman(2790)
Essential Cryptography for JavaScript Developers by Alessandro Segala(2738)
Elevating React Web Development with Gatsby by Samuel Larsen-Disney(2727)
AI-Powered Commerce by Andy Pandharikar & Frederik Bussler(2642)
Python for ArcGIS Pro by Silas Toms Bill Parker(2642)
Cryptography Algorithms by Massimo Bertaccini(2627)
Incident Response Techniques for Ransomware Attacks by Oleg Skulkin(2625)
Distributed .NET with Microsoft Orleans by Bhupesh Guptha Muthiyalu Suneel Kumar Kunani(2623)