Wednesday 31 January 2018

What is SEO ( Search Engine Optimization) ....?


Now a days using the internet is comman now a days. If you want to search for specific location or  thing instead of asking to someone you would prefer to search it on the Internet means on some websites . So what role does SEO i.e  Search Engine Optimization  plays for a websites ...?
         So, SEO stands for SEARCH ENGINE OPTIMIZATION . SEO is all about optimizing your website for search engines.SEO is a techniques which makes your websites friendly to a search engines, means if user search something on which your website is related your website should come on top 5-10 results. So before making your website search engine friendly you should know How does a Search engine works..?

How Search Engine Works..?

 A Search Engine has to perform several types of activities for selecting a write website for his top results :-
  • Crawling :-  Crawling is a process of fetching all the linked webpages to a website. This process is performed by a software named Crawler or Spider and in case of Google it's Googlebot
  •  Indexing  :- Process of creating index for all the fetched web pages and keeping them into a giant database from where it can later be retrieved. Essentially, the process of indexing is identifying the words and expressions that best describe the page and assigning the page to particular keywords. 
  • Processing :-  When a search request comes, the search engine processes it, i.e. it compares the search string in the search request with the indexed pages in the database.
  • Calculating Relevancy :-  It is likely that more than one page contains the search string, so the search engine starts calculating the relevancy of each of the pages in its index to the search string.
  • Retrieving Results :-  The last step in search engine activities is retrieving the best matched results. Basically, it is  nothing more than simply displaying them in the browser.
 So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms.


Facebook Page:- https://www.facebook.com/theprogrammer.harshit/

Monday 29 January 2018

What is Oauth Authentication. Is it safe..?

Now a days Internet is very comman in our day to day life . We even cannot think our life a second without Internet. Our life is surrounded by many websites and mobile applications . Some time you guys have seen some websites in which you have to login but you don't have account on that particular website so either you have to create that account by clicking Register or Signup button which takes longer process as after clicking you have to enter many details like your Name, Email, Mobile no. etc. and after that sometimes the sites will give you the verification code or link to click on it to verify.
             But its a long process you must have also seen an option of Login with Facebook or Google or with you Twitter account this , other way of logging into the websites with actually registering it is know as OAUTH AUTHENTICATION.

 Is OAUTH AUTHENTICATION safe..?

Now the question arises is it safe to Login with other account like Google or Facebook this might be possible that, the particular site for that you want access might steal you data from Facebook and Gmail account. 
              But here you are wrong.

These sites i.e Google and Facebook do not provides the details to that particular site like this .
As after clicking on Login with Facebook or Login with Google a page  is opened in your browser in with you have to login to your account if you are not logged it . And after that the site Facebook or Google tell you that the particular site for that you are going to logging in will take this much Information like Your Name , Email , or your Location etc.. if you agree with it then click ALLOW ACCESS if not then click deny.
               Now after that the particular site for which you are going to logging in will send an access code to Google and Facebook asking permission for details and showing access code as a proof as , that particular site is genuine.
             And after getting the access code Google or Facebook shares information with that particular site.
       So its safe to your OAUTH Authentication methods.
 
So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms.


Facebook Page:- https://www.facebook.com/theprogrammer.harshit/


Sunday 28 January 2018

What are Trojan Horses. How to take Precautions with it.


Now a days it has become a trend of your mobile phones , computers are getting infected of some viruses, malwares, worms, or Trojan Horses you must have listen about it. Some people think that Trojans, viruses, malwares, worms are all same things. But its wrong then all are different.If you want to know the difference between them then click on the link below.

Different types of viruses and malwares.


History of Trojan 

The term Trojans are taken since the Ancient time as when Geeks were going on War in the Troy City the used to escape the soldiers in the horse and at night when the people or we can say the soldiers of opponent team sleep at night as they think horse as a comman object the gates of the horses are opened and the Geek soldiers start fighting. Similary, some attacks also happening now a days in our mobile phones and computers.

What is Trojan Horse.. ?


Trojan Horse is a malicious computer program that can infect you computer in several ways :- 
  •  In can slow down the processing of your computer.
  •  It might steal data in the form of cookies and may mis-use of that data.
  •  It can interrupt you in the forms of advertisements and popups.






You all must have seen these types of advertisements when you visit some malicious websites .
As there advertisements sometimes encourages you to click on them and in the backed  after clicking they start doing there process.  So beware with this and please do not click on any types of advertisements.

 Take Precautions with Trojans Horses 

The best precautions with these types of malware is only NOT TO CLICK on any these types of stuffs that it.

  •   As if you are professional you may know have to deal with it but for comman persons perspective it is a headache. 
  • On more thing you can do is you can install a registered antivirus to deal with it or if you can you should switch to Linux.

So thats it. Hope you guys like it. If yes then please .. comment down below and do not forgot to like follow and share our social media platforms.


Facebook Page:- https://www.facebook.com/theprogrammer.harshit/




Thursday 25 January 2018

Everything you must know about JARVIS Operating System


A group of Indian Hackers has designed Artificial Intelligence Assistant Operating System called 'J.A.R.V.I.S' , who recognizes them, answer questions, tweet for them and Collect information, scan targets for them.

Chiragh Dewan, a 18 year old student who is currently pursuing his BCA has taken the initiative to be the first Indian to complete this project J.A.R.V.I.S , which is inspired by Iron Man’s (movie) artificial intelligence assistant Jarvis.
With his team of 7 including Himanshu Vaishnav, Mayur Singh, Krishanu Kashyap, Vikas Kumar, Vinmay Nair and Sravan Kumar, they are about to finish the 3rd level of the project.

Their long term goal is to create an OS which could adapt itself according to the user's needs. Like if a doctor is using the OS, it will adapt itself so as it is capable of helping him out in his field like searching for new techniques, medicines, help in their research, etc. Add for architects, other professions.
As for users in the IT Security field, it would help the users in information gathering, scanning, etc. Making an app for mobile by which you would be able to communicate with you're system remotely and give him tasks to do, ask questions, etc.

It all started with the release of Iron Man 3, after which Chiragh was determined to make Jarvis. Having no experience in Artificial Intelligence, he came home and started learning AI through online courses. The research work had started during which he came across a post by Himanshu stating that he too has been working on this project and would like people fro join him. After a detailed conversation and exchange of ideas, the project had started. During their course of development more people joined the project.
Project Task Completed: In the current version of Jarvis v1.0, it is capable of:

    Answering questions asked by the administrator
    Compile reports on any topic asked by the user.
    Control lights by voice.
    Basic interaction with the user.
    Handling Facebook, Email and Social profiles of users
    Using Twitter Account with voice control
    Basic OS kernel is ready.
    Can Scan targets for Hackers
    Gathering Basic information about the target

All the above functionalities are completely controlled by voice. It has only been four months since they have started this project and have achieved a lot in this short period of time.

The team will announce the OS publicly soon after completion of phase 3, but for now Chiragh proudly shows off his creation on the J.A.R.V.I.S project website.


So for more queries you can comment us below..
And you can also join us on Instagram and Facebook

Tuesday 23 January 2018

Qubes OS. A Security Oriented Operating System.

What is Qubes OS ?

Qubes OS is a security-oriented operating system (OS). The OS is the software that runs all the other programs on a computer. Some examples of popular OSes are Microsoft Windows, Mac OS X, Android, and iOS. Qubes is free and open-source software (FOSS). This means that everyone is free to use, copy, and change the software in any way. It also means that the source code is openly available so others can contribute to and audit it.


Why Security of an Operating System is Important.? 

Most people use an operating system like Windows or OS X on their desktop and laptop computers. These OSes are popular because they tend to be easy to use and usually come pre-installed on the computers people buy. However, they present problems when it comes to security. For example, you might open an innocent-looking email attachment or website, not realizing that you’re actually allowing malware (malicious software) to run on your computer. Depending on what kind of malware it is, it might do anything from showing you unwanted advertisements to logging your keystrokes to taking over your entire computer. This could jeopardize all the information stored on or accessed by this computer, such as health records, confidential communications, or thoughts written in a private journal. Malware can also interfere with the activities you perform with your computer. For example, if you use your computer to conduct financial transactions, the malware might allow its creator to make fraudulent transactions in your name.

 Aren't Antivirus and Firewall enough .?

 Unfortunately, conventional security approaches like antivirus programs and (software and/or hardware) firewalls are no longer enough to keep out sophisticated attackers. For example, nowadays it’s common for malware creators to check to see if their malware is recognized by any signature-based antivirus programs. If it’s recognized, they scramble their code until it’s no longer recognizable by the antivirus programs, then send it out. The best of these programs will subsequently get updated once the antivirus programmers discover the new threat, but this usually occurs at least a few days after the new attacks start to appear in the wild. By then, it’s too late for those who have already been compromised. More advanced antivirus software may perform better in this regard, but it’s still limited to a detection-based approach. New zero-day vulnerabilities are constantly being discovered in the common software we all use, such as our web browsers, and no antivirus program or firewall can prevent all of these vulnerabilities from being exploited.

How Does Qubes OS provide you security ?

Qubes takes an approach called security by compartmentalization, which allows you to compartmentalize the various parts of your digital life into securely isolated compartments called qubes.
This approach allows you to keep the different things you do on your computer securely separated from each other in isolated qubes so that one qube getting compromised won’t affect the others. For example, you might have one qube for visiting untrusted websites and a different qube for doing online banking. This way, if your untrusted browsing qube gets compromised by a malware-laden website, your online banking activities won’t be at risk. Similarly, if you’re concerned about malicious email attachments, Qubes can make it so that every attachment gets opened in its own single-use disposable qube. In this way, Qubes allows you to do everything on the same physical computer without having to worry about a single successful cyberattack taking down your entire digital life in one fell swoop.
Moreover, all of these isolated qubes are integrated into a single, usable system. Programs are isolated in their own separate qubes, but all windows are displayed in a single, unified desktop environment with unforgeable colored window borders so that you can easily identify windows from different security levels. Common attack vectors like network cards and USB controllers are isolated in their own hardware qubes while their functionality is preserved through secure networking, firewalls, and USB device management. Integrated file and clipboard copy and paste operations make it easy to work across various qubes without compromising security. The innovative Template system separates software installation from software use, allowing qubes to share a root filesystem without sacrificing security (and saving disk space, to boot). Qubes even allows you to sanitize PDFs and images in a few clicks. Users concerned about privacy will appreciate the integration of Whonix with Qubes, which makes it easy to use Tor securely, while those concerned about physical hardware attacks will benefit from Anti Evil Maid.

How does Qubes OS compare to running VMs in a conventional OS?

Not all virtual machine software is equal when it comes to security. You may have used or heard of VMs in relation to software like VirtualBox or VMware Workstation. These are known as “Type 2” or “hosted” hypervisors. (The hypervisor is the software, firmware, or hardware that creates and runs virtual machines.) These programs are popular because they’re designed primarily to be easy to use and run under popular OSes like Windows (which is called the host OS, since it “hosts” the VMs). However, the fact that Type 2 hypervisors run under the host OS means that they’re really only as secure as the host OS itself. If the host OS is ever compromised, then any VMs it hosts are also effectively compromised.
By contrast, Qubes uses a “Type 1” or “bare metal” hypervisor called Xen. Instead of running inside an OS, Type 1 hypervisors run directly on the “bare metal” of the hardware. This means that an attacker must be capable of subverting the hypervisor itself in order to compromise the entire system, which is vastly more difficult.
Qubes makes it so that multiple VMs running under a Type 1 hypervisor can be securely used as an integrated OS. For example, it puts all of your application windows on the same desktop with special colored borders indicating the trust levels of their respective VMs. It also allows for things like secure copy/paste operations between VMs, securely copying and transferring files between VMs, and secure networking between VMs and the Internet.

How does Qubes OS compare to using a separate physical machine?

Using a separate physical computer for sensitive activities can certainly be more secure than using one computer with a conventional OS for everything, but there are still risks to consider. Briefly, here are some of the main pros and cons of this approach relative to Qubes:
Pros
  • Physical separation doesn’t rely on a hypervisor. (It’s very unlikely that an attacker will break out of Qubes’ hypervisor, but if one were to manage to do so, one could potentially gain control over the entire system.)
  • Physical separation can be a natural complement to physical security. (For example, you might find it natural to lock your secure laptop in a safe when you take your unsecure laptop out with you.)
Cons
  • Physical separation can be cumbersome and expensive, since we may have to obtain and set up a separate physical machine for each security level we need.
  • There’s generally no secure way to transfer data between physically separate computers running conventional OSes. (Qubes has a secure inter-VM file transfer system to handle this.)
  • Physically separate computers running conventional OSes are still independently vulnerable to most conventional attacks due to their monolithic nature.
  • Malware which can bridge air gaps has existed for several years now and is becoming increasingly common.
So for more queries you can comment us below..
And you can also join us on Instagram and Facebook

Encrypt Files Using TrueCrypt


Introduction


If you save anything on your computer, it is likely that you do not want just anyone to be able to see what you have saved. You want a way to protect that information so that you can access it, and absolutely no one else except those you trust. Therefore, it makes sense to set up a system which protects your information and safeguards it against prying eyes.
The best such system for this is called “True Crypt”. “True Crypt” is an encryption software program which allows you to store many files and directories inside of a single file on your harddrive. Further, this file is encrypted and no one can actually see what you have saved there unless they know your password.
This sounds extremely high tech, but it is actually very easy to set up.
Setting up Truecrypt
Quote
1. Go to http://www.truecrypt.org/downloads (or go to www.truecrypt.org, and click on “Downloads”)
2. Under “Latest Stable Version”, under “Windows 7/Vista/XP/2000?, click “Download”
3. The file will be called “True Crypt Setup 7.0a.exe” or something similar. Run this file.
4. If prompted that a program needs your permission to continue, click “Continue”.
5. Check “I accept and agree to be bound by these license terms”
6. Click “Accept”
7. Ensure that “Install” is selected, and click “Next”
8. click “Install”
9. You will see a dialog stating “TrueCrypt has been successfully installed.” Click “Ok”
10. Click “No” when asked if you wish to view the tutorial/user’s guide.
11. Click “Finish”
At this point, TrueCrypt is now installed. Now we will set up truecrypt so that we can begin using it to store sensitive information.
Quote
1. Click the “Windows Logo”/”Start” button on the lower left corner of your screen.
2. Click “All Programs”
3. Click “TrueCrypt”
4. Click the “TrueCrypt” application

And now we can begin:

Quote
1. click the button “Create Volume”
2. Ensuring that “Create an encrypted file container” is selected, click “Next”
3. Select “Hidden TrueCrypt volume” and click “Next”.
4. Ensuring that “Normal mode” is selected, click “Next”
5. Click on “Select File”
Note which directory you are in on your computer. Look at the top of the dialog that has opened and you will see the path you are in, most likely the home directory for your username. An input box is provided with a flashing cursor asking you to type in a file name. Here, you will type in the following filename:
random.txt
You may of course replace random.txt with anything you like. This file is going to be created and will be used to store many other files inside. Do NOT use a filename for a file that already exists. The idea here is that you are creating an entirely new file.
It is also recommended though not required that you “hide” this file somewhere less obvious. If it is in your home directory, then someone who has access to your computer may find it easier. You can also choose to put this file on any other media, it doesn’t have to be your hard disk. You could for example save your truecrypt file to a usb flash drive, an sd card, or some other media. It is up to you.
Quote
6. Once you have typed in the file name, click “Save”
7. Make sure “Never save history” is checked.
8. Click “Next”
9. On the “Outer Volume” screen, click “Next” again.
10. The default Encryption Algorithm and Hash Algorithm are fine. Click “Next”
11. Choose a file size.
In order to benefit the most from this guide, you should have at least 10 gigabytes of free disk space. If not, then it is worth it for you to purchase some form of media (such as a removable harddrive, a large sd card, etc.) in order to proceed. TrueCrypt can be used on all forms of digital media not just your hard disk. If you choose to proceed without obtaining at least ten gigabytes of disk space, then select a size that you are comfortable with (such as 100 MB).
Ideally, you want to choose enough space to work with. I recommend 20 GB at least. Remember that if you do need more space later, you can always create additional TrueCrypt volumes using exactly these same steps.
Quote
12. Now you are prompted for a password. THIS IS VERY IMPORTANT. READ THIS CAREFULLY

READ THIS SECTION CAREFULLY


The password you choose here is a decoy password. That means, this is the password you would give to someone under duress. Suppose that someone suspects that you were accessing sensitive information and they threaten to beat you or worse if you do not reveal the password. THIS is the password that you give to them. When you give someone this password, it will be nearly impossible for them to prove that it is not the RIGHT password. Further, they cannot even know that there is a second password.
Here are some tips for your password:
A. Choose a password you will NEVER forget. It may be ten years from now that you need it. Make it simple, like your birthday repeated three times.
B. Make sure it seems reasonable, that it appears to be a real password. If the password is something stupid like “123? then they may not believe you.
C. Remember that this is a password that you would give to someone if forced. It is *NOT* your actual password.
D. Do not make this password too similar to what you plan to really use. You do not want someone to guess your main password from this one.
And with all of this in mind, choose your password. When you have typed it in twice, click “Next”.
Quote
13. “Large Files”, here you are asked whether or not you plan to store files larger than 4 GIGABYTES. Choose “No” and click “Next”
14. “Outer Volume Format”, here you will notice some random numbers and letters next to where it says “Random Pool”. Go ahead and move your mouse around for
a bit. This will increase the randomness and give you better encryption. After about ten seconds of this, click “Format”.
15. Depending on the file size you selected, it will take some time to finish formatting.
“What is happening?”
TrueCrypt is creating the file you asked it to, such as “random.txt”. It is building a file system contained entirely within that one file. This file system can be used to store files, directories, and more. Further, it is encrypting this file system in such a way that without the right password it will be impossible for anyone to access it. To *anyone* other than you, this file will appear to be just a mess of random characters. No one will even know that it is a truecrypt volume.
Quote
16. “Outer Volume Contents”, click on the button called, “Open Outer Volume”
An empty folder has opened up. This is empty because you have yet to put any files into your truecrypt volume.

DO NOT PUT ANY SENSITIVE CONTENT HERE


This is the “Decoy”. This is what someone would see if you gave them the password you used in the previous step. This is NOT where you are going to store your sensitive data. If you have been forced into a situation where you had to reveal your password to some individual, then that individual will see whatever is in this folder. You need to have data in this folder that appears to be sensitive enough to be protected by truecrypt in order to fool them. Here are some important tips to keep in mind:
A. Do NOT use porn. Adult models can sometimes appear to be underaged, and this can cause you to incriminate yourself unintentionally.
B. Do NOT use drawings/renderings/writings of porn. In many jurisdictions, these are just as illegal as photographs.
C. Good choices for what to put here include: backups of documents, emails, financial documents, etc.
D. Once you have placed files into this folder, *NEVER* place any more files in the future. Doing so may damage your hidden content.
Generally, you want to store innocent data where some individual looking at it would find no cause against you, and yet at the same time they would understand why you used TrueCrypt to secure that data.
Now, go ahead and find files and store them in this folder. Be sure that you leave at least ten gigabytes free. The more the better.
When you are all done copying files into this folder, close the folder by clicking the “x” in the top right corner.
Quote
17. click “Next”
18. If prompted that “A program needs your permission to continue”, click “Continue”
19. “Hidden Volume”, click “Next”
20. The default encryption and hash algorithms are fine, click “Next”
21. “Hidden Volume Size”, the maximum available space is indicated in bold below the text box. Round down to the nearest full unit. For example, if 19.97 GB
is available, select 19 GB. If 12.0 GB are available, select 11 GB.
22. If a warning dialog comes up, asking “Are you sure you wish to continue”, select “Yes”
23. “Hidden Volume Password”

IMPORTANT READ THIS


Here you are going to select the REAL password. This is the password you will NEVER reveal to ANYONE else under any circumstances. Only you will know it. No one will be able to figure it out or even know that there is a second password. Be aware that an individual intent on obtaining your sensitive information may lie to you and claim to be able to figure this out. They cannot.
It is HIGHLY recommended that you choose a 64 character password here. If it is difficult to remember a 64 character password, choose an 8 character password and simply repeat it 8 times. A date naturally has exactly 8 numbers, and a significant date in your life repeated 8 times would do just fine.
Quote
24. Type in your password twice, and click “Next”
25. “Large Files”, select “Yes” and click “Next”.
26. “Hidden Volume Format”, as before move your mouse around for about ten seconds randomly, and tehn click “Format”.
27. If prompted “A program needs your permission to continue”, select “Continue”
28. A dialog will come up telling you that the hidden TrueCrypt volume has been successfully created. Click “Ok”
29. Click “Exit”
Congratulations! You have just set up an encrypted file container on your hard drive. Anything you store here will be inaccessible to anyone except you. Further, you have protected this content with TWO passwords. One that you will give to someone under threat, and one that only you will know. Keep your real password well protected and never write it down or give it to anyone else for any reason.
Now, we should test BOTH passwords.
Testing TrueCrypt Volumes
Once you have completed the above section, you will be back at TrueCrypt. Go ahead and follow these steps to test the volumes you have made.
Quote
1. Click “Select File…”
2. Locate the file you created in the last section, most likely called “random.txt” or something similar. Remember that even though there is both an outer and
a hidden volume, both volumes are contained in a single file. There are not two files, only one.
3. Click “Open”
4. Choose a drive letter that you are not using (anything past M is probably just fine). Click on that, For example click on “O:” to highlight it.
5. Click “Mount”
6. Now you are prompted for a password. Read the below carefully:
The password you provide here will determine WHICH volume is mounted to the drive letter you specified. If you type in your decoy password, then O:\ will show all the files and directories you copied that you would reveal if forced. If you type in your real password, then O:\ will show the files and directories that you never intend anyone to see.
7. After successfully typing in your password, you will see additional detail to the right of the drive letter, including the full path to the file you selected as well as the kind of volume it is (for example, hidden).
8. Right click on your “Windows Logo”/”Start Menu” icon, and scroll down to the bottom where you can see your different drive letters. You will see the drive letter you selected, for example: “Local Disk (O:)”. Click on that.
9. If you selected your decoy password, you will see all the files and folders that you moved there during the installation phase. If you selected the real password, you will see whatever files and directories you have placed so far into the hidden volume, if any.
If you selected your hidden volume password, you may now begin moving any sensitive information you wish. Be aware that simply moving it from your main hard disk is not enough. We will discuss how to ensure deleted data is actually deleted later in the guide.

“What is happening?”

When you select a file and mount it to a drive, you are telling your computer that you have a new drive with files and folders on it. It is the same thing as if you had plugged in a usb flash drive, a removable harddrive, or an sd card into your computer. TrueCrypt causes your computer to think that there is an entirely new disk drive on your computer. You can use this disk drive just as if it *was* actually a usb flash drive. You can copy files to it, directories, and use it just as you would use a usb flash drive.
When you are done, simply close all open windows/folders/applications that are using your truecrypt drive letter, and then click “Dismount” from within TrueCrypt while you have the drive letter highlighted. This will once again hide all of this data, accessible only by re-mounting it with the correct password.

VERY IMPORTANT SAFETY INFORMATION

When a true crypt hidden volume is mounted, someone who has access to your computer can access anything that is inside that hidden volume. If for example you left your computer running while a truecrypt volume was mounted, then if someone gained access to your computer they would be able to see everything you have in that volume. Therefore:

ALWAYS REMEMBER TO DISMOUNT ANY TRUECRYPT VOLUME CONTAINING ANY SENSITIVE INFORMATION WHEN YOU ARE NOT USING YOUR COMPUTER

You can tell that it is dismounted because the drive letter inside of “TrueCrypt”‘s control panel will appear the same as all of the other drive letters, with no information to the right of the drive letter.
You should practice Mounting and Dismounting a few times with both passwords to make sure you understand this process.
Once you have copied files/folders into the hidden volume, do NOT touch the files or folders in the outer volume anymore. Remember that both volumes occupy the same single file, and therefore changing the outer volume can damage the hidden volume. Once you have copied files/folders into the outer volume during the installation process, that is the last time you should do so. From that point forward, use ONLY the hidden volume. The outer volume exists only as a decoy if you need it.

Monday 22 January 2018

Proxy Server. How does it works.?


A proxy server is a function that is used to obtain Web pages by other computers. It acts as a go-between from a computer to a target server. There is no communication between the computer and the server. Rather, the computer requests a Web page or a file housed on the target server. This request goes to the proxy server
Go, which, in turn, sends the request to the server. The proxy server then obtains the file and sends it to the requesting computer.

      An example would be if you use your computer to request a Web page on the internet. The server requests the data and other files for you from the target server. When you type in a Web address, the request is sent to a proxy server. The server then sends the request to the target server that houses that particular website. Then the target server sends the Web page to the proxy server, which in turn, sends it to you. The target server sees the proxy server as the visitor, not you.

These servers improve the efficiency of your internet access. If you request a Web page or file, it is then stored on the proxy server. Once the data saves to the proxy server, it does not have to request the file again the next time you access it. The file automatically loads from the proxy server.
There are several types of proxy servers and uses. A proxy server that acts as the go-between for the requesting computer and server is a forwarding proxy. Another kind of forwarding proxy server is called an open proxy. You may use a public proxy if you want to conceal your IP address so that you remain anonymous during internet activity. An elite proxy offers the most anonymity. Not only does it not identify itself as a proxy, but also it does not reveal the IP address of the requesting computer.
A reverse proxy is different from the forward open proxies. With a forwarding proxy, the requesting computer is aware that it is connecting to a target server by way of a proxy, but a reverse proxy appears as an ordinary server. The computer thinks it is connecting to the target server when it is actually communicating with the proxy server.
Whatever kind of proxy you are using, remember that you must trust it. The proxy server provides both security and anonymity   that is its job. However, the proxy must decode your information in order to send it through to the target server. This means that the proxy sees everything that you are doing, unless you are using SSL (Secure Sockets Layer) connections. This is security technology that establishes an encrypted link between a Web server and the browser. The SSL ensures that any data passed between the Web server and the browser stays private. Therefore, if you do not have an SSL connection, make sure that you trust the proxy that you use. It is the one thing that knows your real IP address.
So for more queries you can comment us below..
And you can also join us on Instagram and Facebook