Question about Computers & Internet

1 Answer

Web server and web browser

What is the difference between web server and web browser? Give some examples.

Posted by on

1 Answer

  • Level 3:

    An expert who has achieved level 3 by getting 1000 points

    All-Star:

    An expert that got 10 achievements.

    MVP:

    An expert that got 5 achievements.

    Genius:

    An expert who has answered 1,000 questions.

  • Master
  • 1,913 Answers

Web server stores websites allifo and databse .
Browser read the html or xml code.then give output on page.
Example are:
web server :apache server.
Browser:mozila firefox

Posted on Jan 21, 2009

1 Suggested Answer

6ya6ya
  • 2 Answers

SOURCE: I have freestanding Series 8 dishwasher. Lately during the filling cycle water hammer is occurring. How can this be resolved

Hi,
a 6ya expert can help you resolve that issue over the phone in a minute or two.
best thing about this new service is that you are never placed on hold and get to talk to real repairmen in the US.
the service is completely free and covers almost anything you can think of (from cars to computers, handyman, and even drones).
click here to download the app (for users in the US for now) and get all the help you need.
goodluck!

Posted on Jan 02, 2017

Add Your Answer

Uploading: 0%

my-video-file.mp4

Complete. Click "Add" to insert your video. Add

×

Loading...
Loading...

Related Questions:

5 Answers

What is the difference between VPN-connection and Proxy websites?


While both a Proxy and VPN service will re-route your internet traffic and change your IP, they function slightly differently.
Think of a Proxy as a Web Filter. The proxy settings are applied to your internet browser whether you're using MSIE, Chrome, Safari, Firefox, Etc. When browsing the internet through a proxy server, all benefits with that server are used, for example, (Security, Speed, and Geographic Location). The proxy will only secure traffic via the internet browser using the proxy server settings.
Unlike a Proxy, a VPN service provider(Virtual Private Network) encrypts all of your traffic, replacing your ISP and routing ALL traffic through the VPN server, including all programs and applications. This also will use all benefits of the VPN server such as (Speed, Geopgraphic Location, and Security).
The VPN can be easily connected or disconnected with the click of a button.
In conclusion, a proxy server is completely browser based, and is not as compatible with certain web pages that use non-browser technology such as: Comedy Central,Zatoo, Fox OD, and Sky Player. However, a VPN will work with ALL internet based services, but will offer less choice on which applications will get run through your ISP, as with the VPN, everything is routed through that server when connected.
So, you can get VPN services from sources like HideMyAss, Super VPN, etc., Once you have enabled a VPN service, you can visit IP-Details.com and have an IP lookup to ensure the change in your IP address.

Jan 21, 2015 | Computers & Internet

Tip

Anonymity


I can see you hiding in the shadows over there and so can the logs of all the web sites, FTP servers and other nooks and crannies you visit on the web. The sort of information gathered by these logs and which is available to the webmasters of the sites you visit include the address of the previous site you visited, your IP address, your computer's ID name, your physical location and the name of your ISP along with less personal details such as the operating system you're using and your screen resolution. If someone was snooping through your dustbin to gather information on consumer trends or tracking your every move to see where it is you go everyday you woudn't be too chuffed would you. Well the web is no different, it's still an invasion of privacy and a threat to security and you don't have to put with it.

Proxy Servers:
Every time you visit a web site, detailed information about your system is automatically provided to the webmaster. This information can be used by hackers to exploit your computer or can be forwarded to the market research departments of consumer corporations who by tracking your activities on the internet are better equipped to direct more relevant spam at you. Your best defence against this is to use what is known as a proxy server, which will hide revealing information from the web sites you visit, allowing you to surf the web anonymously. These work by altering the way in which your browser retrieves web pages or connects to remote servers. With a proxy server set up, whenever you 'ask' IE or Netscape to look at a web page, the request is first sent through an external server which is completely independent of your ISP's servers. This third party server then does the requesting on your behalf so that it appears that the request came from them rather than you and your real IP address is never disclosed to the sites you visit. There is nothing to download and the whole process takes less than a minute.

There are two different ways to use proxy servers and both have their advantages and disadvantages. The first method is to use a web based service. What this method is to use a web based service. What this involves is visiting the proxy's home page each time you want to browse a web site anonymously. The core component of such a system is the dialog box where you enter the address of the web site you want to visit. Each time you enter the URL of the site you want to browse via the proxy into this box, your personal information, IP address and so on is first encrypted before being sent to the site allowing you to maintain your anonymity.

Anonymity - Cookies
One last important point you need to be aware of before jumping in with both feet is that different programs have to be setup in different ways before being able to make external connections via a proxy server. For example, you can surf the wed anonymously by modifying the settings in Internet Explorer or Netscape Navigator as explained earlier in this tutorial, but this will only affect your browser. If you then used Flash FXP to copy a batch of 0-day releases from one FTP server to another, this isn't going to protect you in the slightest. What you have to do is enter the name of the proxy server into each application you wish to make anonymous before making any external connections. This can usually be done by browsing through the preferences of your program to see it there is a 'use proxy server' option available. If there is, make sure you use it.

Cookies
The solution to this problem is to delete any cookies which contain sensitive data once you have completed your transactions. You cookies will be stored in a different place depending on which operating system you are using so you will have to use your detective skills to find them. As an example, in Windows XP they are located in your 'c:\documents and settings\Rob Brown\cookies' directory (that is if your name is Rob Brown. Mine isn't in case you're wondering!). If you look in this directory, in some cases it is easy to identify which cookie is associated with which web site, but in other cases it's not so obvious. The cookie which was created when you visited yahoo.com to check your email may be called rob brown@yahoo.txt for example. Unfortunately some cookies refer to the IP address of the site you visited and so look more like rob brown@145.147.25.21. These cookies can be selectively deleted one at a time if it's obvious which ones are causing a threat to your security, or you can just wipe out the whole lot in one fell swoop and have then recreated as and when they are required. However, if you're really struggling to find your cookie jar, you could delete your cookies via your browser's tool bar instead. In Internet Explorer this can be done through the 'Tools" > Internet Options' menu items.

If all this sounds like to much hassle, you can always find a labour saving program which will be happy to take the job off your hands. These 'cookie crunching programs allow you to be more selective when editing, viewing and deleting cookies from your system, and some of them will even prevent cookies from being created in the first place. I know you're hungry for links so I won't deprive you. Have a look here - Code: hxxp://www.rbaworld.com/programs.cookiecruncher.

Good luck!


on Dec 22, 2009 | Computers & Internet

Tip

Whenever you surf the Web, you leave yourself open to being snooped upon by web...



Whenever you surf the Web, you leave yourself open to being snooped upon by web sites. They can track your online travels, know what operating system and browser you're running, find out your machine name, peer into your clipboard, uncover the last sites you've visited, examine your history list, delve into your cache, examine your IP address and use that to learn basic information about you such as your geographic location, and more. To a great extent, your Internet life is an open book when you visit.
Don't believe me? Head to http://www.anonymizer.com/snoop/test_ip.shtml. This page, run by the Anonymizer.com web service, tells you what your IP address and machine name are. And that's just a start. Click on the links on the left side, such as "Exposed Clipboard" and "Geographical Location." You'll see just a small sampling of what web sites can learn about you.
Much of the reason why web sites can find out this information about you is due to the trusting nature of the Internet's infrastructure and is inherent in the open client/server relationship between your web browser and the servers on the sites you visit. But a lot of it also has to do with the ability to match up information from your PC to information in publicly available databases—for example, databases that have information about IP addresses.
The best way to make sure web sites can't gather personal information about you and your computer is to surf anonymously; use an anonymous proxy server to sit between you and the web sites you visit. When you use an anonymous proxy server, your browser doesn't contact a web site directly. Instead, it tells a proxy server which web site you want to visit. The proxy server then contacts the web site, and when you get the web site's page you don't get it directly from the site. Instead, it's delivered to you by the proxy server. In that way, your browser never directly contacts the web server whose site you want to view. The web site sees the IP address of the proxy server, not your PC's IP address. It can't read your cookies, see your history list, or examine your clipboard and cache, because your PC is never in direct contact with it. You're able to surf anonymously, without a trace.
There are two primary ways to use anonymous proxy servers. You can run client software on your PC, which does the work of contacting the server for you, or you can instead visit a web site, which then does the work of contacting the server.

on Mar 17, 2008 | HP Pavilion a1410n (ER890AA) PC Desktop

1 Answer

At school my computer willnot allow me to go to certain websites how do i unlock it


You have to follow the instructions

Unblocking Websites Technique #1: Use Proxy Servers Proxy servers can make your computer access the internet in an anonymous way. They bypass the filters the network administrator has chosen to limit your freedom to explore the world wide web. Quite simply a proxy server is a computer outside the control of the computer network you’re using. Since proxy servers have their own IP address, they can be accessed from your computer. You simply connect to the proxy server and in turn it connects to the blocked website. You can now both read and interact with the blocked website.

If your computer has been restricted from the browser, once you have loaded up your browser, go to the tools tab and change the security settings. Suppose, for some reason, you do not wish to change the settings on your browser, then another option is to download and install another browser. If, for example, your restrictions are on Microsoft Internet Explorer download and install Mozilla Firefox to surf the web.

thanks

May 18, 2010 | Computers & Internet

2 Answers

Difference between hub and server


Hub, sometimes referred to as a concentrator or repeater Hub, refers to a networking2_bing.gif component which acts as a convergence point of a Network, allowing the transfer of data packets.

In its simplest form, a hub works by duplicating the data packets received via one Port, and making it available to all ports, therefore allowing data sharing between all devices connected to the hub.

A networknetworknetwork serverserverserver is a computer that provides various shared resources to workstations and other servers on a computer networknetworknetwork. The shared resources can include disk space, hardware access, and email services. Any computer can be a “networknetworknetwork serverserverserver.” What separates a serverserverserver from a workstation is not the hardware, but rather the function performed by the computer. In general, a workstation is any computer used by an individual person to perform his or her job duties, while a networknetworknetwork serverserverserver is any computer that provides users with access to shared software or hardware resources.

Feb 04, 2010 | Gateway Essential 400 PC Desktop

1 Answer

My windows 7 pc wont port forward through my dlink router dir-625 for my ventrilo server


Normally the Router does the Port forwarding as below, try this, Prepare the Router
as this stage differs from one router to another. We will give you a general idea and you should refer to the manual of your router for confirmation.
  • Go to the administration interface of the router by typing its IP address in the web browser (for example 192.168.1.1)
  • Enter Login and Password
  • In the page that comes up, search for Port Forwarding.
  • Then add following data:
    • Name: Give it a unique name like Remote Desktop
    • External Port: 3389 or whatever
    • Internal Port: 3389 or whatever
    • Destination IP address/server: Enter the IP address of the computer as defined in step 1 (e.g. 192.168.1.99)
    If necessary punch through the firewall too, on those same ports.

Jan 28, 2010 | D-Link DIR-625 (790069292637) Wireless...

2 Answers

I am unable to access my e-mail. Error message


write to the provider and communicate the error code...at least for yahoo I managed to unlock in this way some mail addresses
but in theory it ok for all mail servers ///

Oct 07, 2009 | Computers & Internet

2 Answers

Get a 403 error message


Hi,I am hosting with this http://www.tucktail.com/ site,still now there is no problem for me,you too also try this one,All the best.

Jun 17, 2009 | Twitter Tweets

2 Answers

Proxy sever


A server that sits between a client application, such as a Web browser, and a real server
. It intercepts all requests to the real server to see if it can fulfill the requests itself. If not, it forwards the request to the real server.


Proxy servers have two main purposes:

# Improve Performance: Proxy servers can dramatically improve performance for groups of users. This is because it saves the results of all requests for a certain amount of time. Consider the case where both user X and user Y access the World Wide Web through a proxy server. First user X requests a certain Web page, which we'll call Page 1. Sometime later, user Y requests the same page. Instead of forwarding the request to the Web server where Page 1 resides, which can be a time-consuming operation, the proxy server simply returns the Page 1 that it already fetched for user X. Since the proxy server is often on the same network as the user, this is a much faster operation. Real proxy servers support hundreds or thousands of users. The major online services
such as America Online, MSN and Yahoo, for example, employ an array of proxy servers.


# Filter Requests: Proxy servers can also be used to filter requests. For example, a company might use a proxy server to prevent its employees from accessing a specific set of Web sites.



A proxy server receives a request for an Internet service (such as a Web page request) from a user. If it passes filtering requirements, the proxy server, assuming it is also a cache server , looks in its local cache of previously downloaded Web pages. If it finds the page, it returns it to the user without needing to forward the request to the Internet. If the page is not in the cache, the proxy server, acting as a client on behalf of the user, uses one of its own IP addresses to request the page from the server out on the Internet. When the page is returned, the proxy server relates it to the original request and forwards it on to the user.

To the user, the proxy server is invisible; all Internet requests and returned responses appear to be directly with the addressed Internet server. (The proxy is not quite invisible; its IP address has to be specified as a configuration option to the browser or other protocol program.)

An advantage of a proxy server is that its cache can serve all users. If one or more Internet sites are frequently requested, these are likely to be in the proxy's cache, which will improve user response time. In fact, there are special servers called cache servers. A proxy can also do logging.

The functions of proxy, firewall, and caching can be in separate server programs or combined in a single package. Different server programs can be in different computers. For example, a proxy server may in the same machine with a firewall server or it may be on a separate server and forward requests through the firewall.

Dec 17, 2008 | Sega Medieval II: Total War for Windows

2 Answers

SQL Server 2000


I'm not sure I understand what your trying to do. Are you talking about trying to perform a 'join'? Could you explain a bit more, or even give an example?

Jan 28, 2008 | Computers & Internet

Not finding what you are looking for?

Open Questions:

Computers & Internet Logo

Related Topics:

246 people viewed this question

Ask a Question

Usually answered in minutes!

Top Computers & Internet Experts

Brian Sullivan
Brian Sullivan

Level 3 Expert

27725 Answers

kakima

Level 3 Expert

102366 Answers

David Payne
David Payne

Level 3 Expert

14161 Answers

Are you a Computer and Internet Expert? Answer questions, earn points and help others

Answer questions

Manuals & User Guides

Loading...