A proxy protocol can be used to access certain web resources (websites) that are blocked from the network of the user. The proxies used for surfing the web are encrypted differently and provide varying levels of anonymity. For example, the level of anonymity provided by a simple web proxy will be way different from that of an SSH/FTP proxy. Here is a brief look at some of the common proxies used for access applications.

Web

Web proxies are websites that run software that allows users to access other websites through its own site. These proxies have the ability to download the website requested by the user and present the content to the users without needing any direct user connection to the target website. That’s why a web proxy works pretty similarly to an internet proxy. Web proxies also operate on a shared IP address and let target websites know that a web proxy is being used. What’s more, web proxies are usually CGI based or PHP script based.

SOCKS/SMTP

SOCKS proxies are general purpose proxy servers that establish a TCP connection to the target server on behalf of a user. The server works for any kind of network protocol on any port as well as leave the port 25 open. At Proxy Key, we do not provide any spam SMTP proxy servers. If you are seeking proxy servers that can add additional support for UDP and security, a SOCKS proxy server is the answer.

HTTP/HTTPS

HTTPS stands for Hypertext Transfer Protocol over Secure Socket Layer. It is a request/response protocol used for facilitating secure communications and transactions. A HTTPS proxy can be used to secure a web server and examine HTTPS traffic requested by client on a particular network. In addition, HTTPS servers establish a TCP connection on port 443.

SSH/FTP

Also known as File Transfer Protocol, FTP is a protocol used to move files on the Internet. This protocol usually utilizes two different connections: control connection and data connection. The former is used to send commands between an FTP server and FTP client. The latter is used for facilitating the actual file transfers. With that in mind, an FTP proxy is used to handle active and passive FTP sessions. It is designed to restrict FTP protocol commands and protect an FTP server.