Sentences with phrase «use of proxy server»

The Milwaukee Public Library does make use of proxy server technology in order to give city residents access to private databases to which the library subscribes on behalf of its customers.
The use of proxy servers and spoofed Internet addresses to route the attacks, however, made it very difficult to trace their source, and the Russian government has denied any involvement.

Not exact matches

Other than as necessary for the purpose of viewing the site in the course of a business it is strictly forbidden to copy any material on this site for commercial use or to republish any or all of the contents of this site on a proxy server, cache or other similar form of storage.
Reproduction (except temporary download from the web site to the user's pc hard drive or proxy servers), copy, use, distribution, reuse, exploit, doing second copies, email, transfer, modification, delegation oar any other act with the totality or part of the information contained in this platforms, that has been not explicitly authorized by the titular, are forbidden.
For all the fuss made about Amazon's Silk Web browser, which uses a proxy server to cache frequently accessed sites and purportedly increases surfing speeds, I can't say I noticed much of a difference in my Web surfing.
Since the mobile version of opera just is a mobile version of opera, the mini version uses a special proxy server to shrink the amount of data.
More evidence of the government loosening up was the fact that I had access to websites such as Facebook and Twitter and various U.S. newspaper sites in Internet cafes - without using a proxy server like the old days.
i.e. what is far worse than all this is the use of P2P behind a proxy server to hide the fact that, the game is still P2P!
Additionally, the browser can be configured to run under a proxy server and can be protected by the security PIN to enable the use of web filtering or monitoring software through a network.
He came in via a misconfigured proxy server in Turkey that was on a list of the proxy servers people use if they want to hide their tracks.
The effective sunspot number — R12eff is used in DIAS (European Digital Upper Atmosphere Server) as a proxy of the ionospheric conditions over Europe for regional ionospheric mapping purposes (Zolesi et al. 2004; Tsagouri et al. 2005).
Even the use of a proxy to post up the information to the russian server wouldn't be that hard to learn, just a matter of searching and experimenting.
I'm sure whoever cracked the RC server knew enough to proxy access rather than connect directly, perhaps using the russian server they had available for storage of the e-mails.
The article is titled Social Media & Business Productivity, and addresses the current trend of law firms using proxy servers to block in - house access to social media websites.
In our previous work, 27 we showed that Hacking Team's clients — which, according to HT, are governments or government agencies28 — appear to use one or more fixed circuits of «proxy servers» to exfiltrate data from computers infected with RCS, through third countries, before reaching an «endpoint.»
Carriers can let people top up their data in their phone's settings menu, and Chrome Data Saver — Google's traffic - saving tool that uses proxy servers, compression, and machine intelligence to cut down on the amount of data consumed by web pages — will be switched on by default.
When bitcoin came, they were an excellent proxy for what a server could do in terms of emulating heat, and whether we could use that heat for agricultural purposes.
If none of these things sound like deal breakers (and if you're not using a proxy server that could interfere with Data Saver) you can turn on the feature by tapping «More» (the three dots) in the Chrome app then heading to «Settings.»
«When bitcoin came, they were an excellent proxy for what a server could do in terms of emulating heat, and whether we could use that heat for agricultural purposes,» said Mr. Hardy.
• Enhanced systems and database performance through tuning of systems and databases • Installed and configured Veritas Net Backup, VCS, VxVM, VxFS in heterogeneous environment • Architected roll out of Solaris systems for development, testing, and production environments using customized Jumpstar • Devised and implemented the design and architecture for new Internet infrastructure environment, which included firewalls, caching proxy servers (including audio / video streaming technologies), directory / LDAP servers, DNS Bind servers, intrusion detection systems (ISS), Web content filters • Developed shell scripts for Bourne shell, Korn shell, C Shell, Bash, AWK, PL / SQL and PERL • Installed, configured, and provided support for Checkpoint (4.0 / 4.1 / NG) firewalls running on Sun Solaris Netra T1's (Management Stations) and Nokia IP440 / 530/650 platforms (IPSO 3.3 / 3.4) • Assisted in design and configuration of SNMP monitoring infrastructure using HP Open view and Cisco Secure • Worked with the software development groups to resolve application issues and daily job stream activities, involving applications for both the Institutional and Individual Investment Management groups • Complete job stream automation for various applications using Perl and shell scripting
a b c d e f g h i j k l m n o p q r s t u v w x y z