Glossary
Explanation of terms and concepts from the world of proxy servers and network technologies.
Sticky IP
Understand how GProxy's Sticky IP proxies provide a fixed IP address for the entire session duration, ensuring stability and reliability for your online tasks.
IP Whitelisting
Understand IP whitelisting and its role in securing your proxy IP white list. Explore best practices for robust access control and network protection.
Tunnel Proxy
Understand how GProxy's Tunnel Proxy works to securely tunnel your internet traffic, providing enhanced privacy and bypassing online restrictions.
WPAD
Discover WPAD (Web Proxy Auto-Discovery), the protocol that automates proxy settings for network clients. Understand its role in network configuration and potential vulnerabilities.
PAC File
Understand PAC files, the key to automatic proxy configuration through scripts. Simplify network management and enhance security with this powerful method.
Keep-Alive
Discover how Keep-Alive ensures persistent connections through proxy servers. Learn its benefits for faster web browsing and reduced server load.
Connection Pooling
Understand connection pooling, connection pools, and proxies. Discover how GProxy enhances database efficiency and application performance through smart resource management.
Upstream Proxy
Explore upstream proxies and how they function. Learn step-by-step to configure cascading proxy servers for enhanced network control.
IP Subnets
Dive into IP subnets and their function within proxy networks. Discover how proper subnetting enhances efficiency and security for your operations.
PROXY Protocol
Understand the PROXY Protocol and how it enables services like GProxy to correctly identify the original client IP address when behind a proxy, enhancing logging and analytics.
WebRTC Leak
WebRTC leaks can expose your real IP address, bypassing VPNs and compromising privacy. Understand this critical security flaw and learn to protect your identity.
DNS Leak
Understand what a DNS leak is and why it compromises your online privacy and security. Discover simple steps to prevent DNS leaks effectively.