Skip to content
GProxy
Sign up

Glossary

Explanation of terms and concepts from the world of proxy servers and network technologies.

6 Connection Type:

Sticky IP

Understand how GProxy's Sticky IP proxies provide a fixed IP address for the entire session duration, ensuring stability and reliability for your online tasks.

5 Connection Type: Security

IP Whitelisting

Understand IP whitelisting and its role in securing your proxy IP white list. Explore best practices for robust access control and network protection.

6 Connection Type: Security

Tunnel Proxy

Understand how GProxy's Tunnel Proxy works to securely tunnel your internet traffic, providing enhanced privacy and bypassing online restrictions.

6 Connection Type:

WPAD

Discover WPAD (Web Proxy Auto-Discovery), the protocol that automates proxy settings for network clients. Understand its role in network configuration and potential vulnerabilities.

7 Connection Type:

PAC File

Understand PAC files, the key to automatic proxy configuration through scripts. Simplify network management and enhance security with this powerful method.

6 Connection Type: HTTP

Keep-Alive

Discover how Keep-Alive ensures persistent connections through proxy servers. Learn its benefits for faster web browsing and reduced server load.

6 Connection Type:

Connection Pooling

Understand connection pooling, connection pools, and proxies. Discover how GProxy enhances database efficiency and application performance through smart resource management.

6 Connection Type:

Upstream Proxy

Explore upstream proxies and how they function. Learn step-by-step to configure cascading proxy servers for enhanced network control.

7 Connection Type:

IP Subnets

Dive into IP subnets and their function within proxy networks. Discover how proper subnetting enhances efficiency and security for your operations.

8 Connection Type:

PROXY Protocol

Understand the PROXY Protocol and how it enables services like GProxy to correctly identify the original client IP address when behind a proxy, enhancing logging and analytics.

7 Connection Type: Browser Security

WebRTC Leak

WebRTC leaks can expose your real IP address, bypassing VPNs and compromising privacy. Understand this critical security flaw and learn to protect your identity.

7 Connection Type: Security

DNS Leak

Understand what a DNS leak is and why it compromises your online privacy and security. Discover simple steps to prevent DNS leaks effectively.

Showing 61-72 of 94 articles
support_agent
GProxy Support
Usually replies within minutes
Hi there!
Send us a message and we'll reply as soon as possible.