1 00:00:00,390 --> 00:00:09,930 So let's talk about this proxy and proxy battle between you and the brother and you in the sense your 2 00:00:09,930 --> 00:00:17,050 browser and this is Web server sorry, Web server and request and response go through this proxy. 3 00:00:17,730 --> 00:00:18,740 So what does that mean? 4 00:00:18,770 --> 00:00:24,380 If you want to send the request to this proxy server and this proxy server, we send that request to 5 00:00:24,510 --> 00:00:31,890 server if web server, since any response, then the proxy would receive that response and then send 6 00:00:31,890 --> 00:00:32,670 it to your browser. 7 00:00:32,910 --> 00:00:35,390 So that is the work of the proxy. 8 00:00:35,820 --> 00:00:37,800 So why do we need to use the proxy? 9 00:00:37,800 --> 00:00:42,520 Because proxy can control heavy traffic and can produce route for Web server. 10 00:00:42,540 --> 00:00:49,620 So if you have a thousand computers in your organization are and those computers are going to access, 11 00:00:50,220 --> 00:00:57,330 uh, a Web page, are sending the request to the server at the same time, I can say there are some 12 00:00:57,330 --> 00:00:58,800 any examples out there. 13 00:00:58,800 --> 00:01:02,490 Then the server becomes slow because of heavy traffic. 14 00:01:03,210 --> 00:01:06,410 So you can send the proxy server can control the high traffic. 15 00:01:06,660 --> 00:01:13,770 So if you set a proxy server for this Web server, this proxy are refused our requests and there are 16 00:01:14,810 --> 00:01:20,620 some other requests, then it will send only thing request to this Web server. 17 00:01:21,600 --> 00:01:28,710 So that is a load balancing that a server and this proxy maintain some queue for these requests. 18 00:01:28,710 --> 00:01:35,160 It will send whenever the Web server is somewhat, uh, uh, free. 19 00:01:36,000 --> 00:01:38,340 So Proxy can also Rocklands information. 20 00:01:38,850 --> 00:01:46,440 So this is where things get somewhat difficult for the client because you you just use the VPN, right, 21 00:01:46,440 --> 00:01:50,710 virtual network or you can use the free proxies. 22 00:01:50,880 --> 00:01:55,730 So what this free proxies and viewpoints does is they lock the client information. 23 00:01:56,130 --> 00:01:59,390 That is, if you are going to use any free we are not free proxy. 24 00:01:59,400 --> 00:02:07,110 They will block your information like IP address and date and time of the request and to which you have 25 00:02:07,110 --> 00:02:10,690 said you have to the request and all this information. 26 00:02:11,370 --> 00:02:20,610 So even the reports and the proxies are also doubtful that they are sold our client information so that 27 00:02:21,450 --> 00:02:25,620 you want to be careful when you are using some private proxies and private Vivienne's. 28 00:02:26,700 --> 00:02:33,720 But proxies may use this to control traffic and reducing the role for the Web server in the weapons 29 00:02:33,720 --> 00:02:34,890 testing section. 30 00:02:34,890 --> 00:02:41,790 We will use their proxy soup super sweet so we can edit this request in the proxy. 31 00:02:42,450 --> 00:02:45,030 So I will show you a diagram. 32 00:02:45,210 --> 00:02:47,250 So we're going to transgress. 33 00:02:47,940 --> 00:02:51,810 So this is my PC and he's the proxy server and this is the Web server. 34 00:02:52,050 --> 00:02:57,780 So I want to send the request to the Web server directory to access any resource. 35 00:02:59,270 --> 00:03:10,190 So I want to indicate that what I would do is if I if I said could directly my business or may not know 36 00:03:10,190 --> 00:03:14,620 about this Web server, because are the things have been said to this proxy server. 37 00:03:15,080 --> 00:03:19,370 So I need to send the request to this proxy server only. 38 00:03:19,910 --> 00:03:27,500 So in my college where I'm studying this, of course, this year, only this year are these four years 39 00:03:27,500 --> 00:03:32,140 we need to connect to the proxy to access the Internet. 40 00:03:33,140 --> 00:03:34,760 So they have set like this. 41 00:03:35,060 --> 00:03:41,310 We need to send the request to the proxy and the proxy will send the request to the server. 42 00:03:41,930 --> 00:03:48,980 So obviously the request will be received by the server and process and returns, not a response to 43 00:03:48,980 --> 00:03:49,680 the proxy. 44 00:03:51,210 --> 00:03:54,170 So let me read your request. 45 00:03:56,320 --> 00:03:57,490 Say response. 46 00:03:59,320 --> 00:04:05,980 So upon receiving the response from the several proxies, that response to the piece, that means our 47 00:04:05,980 --> 00:04:06,460 brother. 48 00:04:07,830 --> 00:04:09,480 So this is simply a proxy. 49 00:04:10,140 --> 00:04:16,760 What I have mentioned that there is a proxy global software, it is written in Java, and with that 50 00:04:16,770 --> 00:04:24,500 proxy, it is a kind of proxy, you said in our local computer only software. 51 00:04:24,780 --> 00:04:32,690 So what we can do with that bit of software is we can edit this request parameters like get we have 52 00:04:32,710 --> 00:04:36,360 seen already parameters and we can edit those. 53 00:04:38,010 --> 00:04:45,360 So and we can also see the response from that Web server that can also intercept the traffic of the 54 00:04:45,360 --> 00:04:45,960 response. 55 00:04:47,820 --> 00:04:52,590 So that's what this proxy I want to show you in the browser, how to set the proxy. 56 00:04:54,360 --> 00:04:59,250 So in the Firefox, you need to go to click on this. 57 00:05:00,850 --> 00:05:02,350 OK, hamburger icon. 58 00:05:02,430 --> 00:05:04,480 OK, I don't know what I think. 59 00:05:04,500 --> 00:05:07,340 So it's hamburger and you can see kind the options. 60 00:05:07,350 --> 00:05:10,380 You get these options and search for proxy. 61 00:05:13,120 --> 00:05:24,190 OK, so whenever these settings, you can see there is no proxy and you can also ordered the proxy settings 62 00:05:24,400 --> 00:05:31,480 and you can use proxy settings and then you can also click the menu proxy configuration here you can 63 00:05:31,480 --> 00:05:37,330 enter the IP address of the proxy and the board on which the service is receiving and you fill proxy 64 00:05:37,330 --> 00:05:39,850 how they should be and if you can find them also. 65 00:05:40,870 --> 00:05:45,010 So for now, I'm going to, uh, revert back to the changes. 66 00:05:46,150 --> 00:05:53,830 And if you want to add some computers, which for the non proxy settings, screen all the server websites. 67 00:05:56,700 --> 00:06:04,320 So if you add an IP address here with got here, whenever your computer is connected to this Web server, 68 00:06:04,710 --> 00:06:06,750 the proxy will be bypassed. 69 00:06:06,810 --> 00:06:10,260 So that's what no proxies for your PC will control. 70 00:06:10,350 --> 00:06:11,690 These are the systems here. 71 00:06:12,360 --> 00:06:16,890 So I'm going to click on OK, so let's talk about the proxy. 72 00:06:17,070 --> 00:06:19,590 The only thing you need to remember is proxy. 73 00:06:20,310 --> 00:06:24,660 And you can intercept the request using this Barbossa software.