All proxies mentioned on proxybox.org differ from each other, as they are designed to fulfill different goals and objectives. For example, HTTP is the most common type of proxy. It allows you to buy proxy, view sites. It also supports various browsers and modern programs like Skype. CGI-proxy is designed to work through browsers only. Anonymizer can be easily applied here. FTP proxy is used in large companies, where there is a need to create a corporate network. This server is used where there is a security system that prevents intrusion into the system from the outside.
Proxies that are smart enough to operate at Layer 7 (HTTP or Application Layer). To do this, the proxy server has to intercept messages and check them. This means it works at both Layer 4 (TCP) and Layer 7 (HTTP). They are the “middle ground” of the network, providing a convenient place to control decision-making about how requests are processed (and, therefore, replies).
So what is the principle of Proxy working? DNS passes the IP address to the client, and the client uses it to start a TCP session. This session is actually initiated by the proxy server. Here he just establishes a connection without doing anything else. At this stage, you can apply basic IP security, such as blacklisting to prevent known malware from connecting or allowing access only to authorized networks. Better protection can be provided at the stable proxies level.
Is this work possible without anonymous proxies? Yes, it is possible – once everyone did that. But such work requires the fulfillment of certain additional conditions and has its drawbacks in comparison with using a proxy. It can perform a wide variety of operations, starting with selecting a service or resource to respond to a request.