Solved

proxy server

Posted on 1998-11-22
3
156 Views
Last Modified: 2010-04-27
thanx first for help me
i have one computer that is connected to the internet through a dial up networking account and the reset of the LAN is connected to the internet through the winproxy program that is installed on the main computer
is now all machines of the LAN have the same IP address on the net?i think that is impossible
how can the outside one enter to a certain computer on my LAN if all has the same IP address
0
Comment
Question by:aft
  • 2
3 Comments
 
LVL 12

Accepted Solution

by:
rwilson032697 earned 100 total points
ID: 1012934
A proxy is often used as part of a firewall. The main idea is that the proxy machine is the only one that actually connects to the internet and hence the only one visible from the internet.

Each individual machine on the LAN will have an individual IP address, but all of them will appear to disappear into the proxy machine from the internet side and appear to emerge from the proxy machine on the LAN side.

Cheers,

Raymond.
0
 

Author Comment

by:aft
ID: 1012935
since a month some one send to me a hack program server and i do not know that it is and i ran it on my computer which is connected through the LAN to the computer that has a proxy server and i found that this person enter to my computer,with which ip address he enter to me?
and can this person enter to the computer that has the proxy server although this computer does not has a copy of a hack program server?
0
 
LVL 12

Expert Comment

by:rwilson032697
ID: 1012936
I guess he would use the IP address of your machine. I don't know what the program server does so I can't tell :-(

I would get a hold of the person who sent it to you and get them to explain...

cheers,

Raymond
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this article we have discussed the manual scenarios to recover data from Windows 10 through some backup and recovery tools which are offered by it.
Every server (virtual or physical) needs a console: and the console can be provided through hardware directly connected, software for remote connections, local connections, through a KVM, etc. This document explains the different types of consol…
This tutorial gives a high-level tour of the interface of Marketo (a marketing automation tool to help businesses track and engage prospective customers and drive them to purchase). You will see the main areas including Marketing Activities, Design …
Both in life and business – not all partnerships are created equal. As the demand for cloud services increases, so do the number of self-proclaimed cloud partners. Asking the right questions up front in the partnership, will enable both parties …

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now