Web Based Proxy Script

Learn about web based proxy script, we have the largest and most updated web based proxy script information on alibabacloud.com

NiX Proxy Script 1.3.3 publish web-based agent scripts

The NiX proxy script is a web-based proxy. It is similar to a typical proxy server where Web proxy scripts download the required pages and files and forward them to the user. The service provided is a Web page that allows you to edit your browser connection to set up an instant access agent. NiX Proxy script version adds a detection access site and a geographic information display that supports Google PageRank values, and supports custom scripting to include detection and prevention of human validation, session hijacking. Software information: http: ...

NiX Proxy Script 1.4.1 publish web-based agent scripts

The NiX proxy script is a web-based proxy. It is similar to a typical proxy server where Web proxy scripts download the required pages and files and forward them to the user. The service provided is a Web page that allows you to edit your browser connection to set up an instant access agent. The NiX Proxy Script version 1.4.1 corrects some of the associated URL//CSS parsing errors. All users should download or reinstall the software because the previous download page has the wrong version. Software Information: htt ...

NiX Proxy Script 1.3.1 Publish web-based agent scripts

The NiX proxy script 1.3.1 is a web-based proxy scripting. It is similar to a typical proxy server where Web proxy scripts download the required pages and files and forward them to the user. The service provided is through a Web page that allows you to edit your browser connection to set up an instant access agent. NiX Proxy Script 1.3.1 This version supports Web sites that require authentication, browsing SSL-protected Web pages, server-side cookies and certifications, temporary file storage and downloads, adjustable browsing lines ...

Implementing access control through Safesquid deployment content filtering Proxy Server

"51cto.com exclusive translation" Content filtering proxy server to help administrators control the content delivery process of Internet access, it is often used in institutions, schools to ensure that the use of the Internet is consistent with their own use of the policy, content filtering agents must be for the Internet access rights and cross-enterprise constraints for fine-grained adjustment. Content filtering agents can be used to filter unwanted content, using such methods as URL or DNS blacklist, URL filtering, MIME filtering, keyword filtering, cookie filtering, packet header filtering, pornographic image filtering, etc. Content filtering agent support authentication, ...

SQL Relay 0.43 Publishing database connection pooling Proxy Server

SQL Relay is a persistent database connection pool, proxy server and http://www.aliyun.com/zixun/aggregation/13996.html "> Load Balancing system that supports a variety of database systems and programming languages." The application of SQL Relay: * Accelerate database-driven web-based applications * Increase the scalability of Web applications * Distributed access to replicated database systems ...

SQL Relay 0.42 Publishing Database pool Connection Proxy Server

SQL Relay is an open source database pool connection Proxy server. Used to provide database connection pooling, proxies, and http://www.aliyun.com/zixun/aggregation/13996.html "> Load Balancing" for Unix or Linux. The application of SQL Relay: • Accelerate database-driven web-based applications • Increase the scalability of Web applications ...

Third group: Large scale load test platform based on cloud computing bench4q

Third group: Fellow students, distinguished guests, everyone, hello, today I bring a topic is: Based on cloud computing large-scale load test platform, I am Chen Tienan. Unlike just two students, we are providing services for the service. Based on the open Internet, in the case of unpredictable users, can still provide users with good service. The following is an introduction to the basics of our project. Bench4q is a large scale load test platform based on cloud computing. We come up with products that are relative to the style of the college, unlike other, they are marketable and commercialized. What the...

Webmaster must read the server: The ultimate guide to defending against DDoS attacks

The intermediary transaction SEO diagnoses Taobao guest Cloud host technology Hall One, why to DDoS? With the increase of Internet network bandwidth and the continuous release of multiple DDoS hacker tools, DDoS attack is becoming more and more easy to implement. For commercial competition, retaliation and network blackmail and other factors, resulting in many IDC hosting rooms, business sites, game servers, chat networks and other network services have long been plagued by DDoS attacks, followed by customer complaints 、...

"Ask the Bottom" Xu Hanbin: The Web system massively concurrent--electricity merchant second kills with buys up

"Guide" Xu Hanbin has been in Alibaba and Tencent engaged in more than 4 years of technical research and development work, responsible for the daily request over billion web system upgrades and refactoring, at present in Xiaoman technology entrepreneurship, engaged in SaaS service technology construction. The electric dealer's second kill and buys, to us, is not a strange thing. However, from a technical standpoint, this is a great test for the web system. When a web system receives tens or even more requests in a second, system optimization and stability are critical. This time we will focus on the second kill and snapping of the technology implementation and ...

Construction of enterprise security building open source SIEM platform (in)

Construction of enterprise security building open source SIEM platform. SIEM (security information and event management), as its name implies, is a management system for security information and events. It is not a cheap security system for most enterprises. This article uses the author's experience to introduce how to use open source software to analyze data offline and use attack modeling Way to identify attacks. Review the system architecture to the database, for example, through logstash to collect mysql query log, near real-time backup ...

Total Pages: 2 1 2 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.