Examples of using The proxy server in English and their translations into Japanese
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Programming
When you turn on impersonation, the Workbench job will run as the specified user, allowing access to the Internet through the proxy server.
Once you give this request, your IP address(which acts as your identity) gets replaced with an IP provided by the proxy server.
If a proxy is installed, set the proxy server.
Since the debugger runs inside XMLSpy, the machine on which XMLSpy is installed also serves as the proxy server.
When this attribute is false, all Internet requests are made through the proxy server.
By concentrating the Internet access within the company to the proxy server, it is possible to centrally manage log information such as who is watching what site and when.
If you plan to configure the Bridge Server and connectors behind a web proxy, complete the proxy server configuration before you install the Bridge Server. .
The proxy server waits for a request from inside the firewall, forwards the request to the server outside the firewall, gets the response, then sends the response back to the client.
The proxy server receives the request and redirects it to a CNN server to obtain the site content, then sends the content back to Ashley.
Second, the proxy server is usable, in an Internet context, with all sorts of document processing devices, none of which devices need be adapted specially for Internet use.
Finally, the proxy server uses a database in a manner that minimizes the amount of time required to obtain device related information requested by one or more clients.
If you leave the Proxy Server URL field empty, the device requests the wpad. dat file using DHCP(using a 252 entry) or DNS using an A Record with the name WPAD.
If your network uses a proxy server, you can specify which proxy settings to use, the address of the proxy server, and whether to use authentication.
Also, when using a proxy server, you normally put the proxy settings in the browser, but if you introduce" transparent proxy", you can use the proxy server without configuring the browser.
If you use a proxy server to access the internet and you want the communications between the proxy server and your computer to be scanned, you should enter the port which is used to connect to the proxy server. .
Because the proxy server 66 provides a single point of connection for a set of users, it is fairly easy to perform functions such as virus scanning, content filtering and access control at the proxy server 66 rather than at the individual web browsers 20A-20N.
In this way, others(such as her employer, her ISP, or whoever happens to be monitoring the network traffic) may see that she connected to the proxy server, but not CNN.
The proxy server's port number.