{"id":14,"date":"2010-01-15T07:57:24","date_gmt":"2010-01-15T07:57:24","guid":{"rendered":"http:\/\/www.proxville.com\/guides\/?p=14"},"modified":"2024-09-02T12:10:26","modified_gmt":"2024-09-02T12:10:26","slug":"content-filtering-web-proxy","status":"publish","type":"post","link":"https:\/\/www.proxville.com\/guides\/content-filtering-web-proxy","title":{"rendered":"Content-filtering web proxy"},"content":{"rendered":"<p style=\"float: left;margin: 4px;\"><script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-2174962885476117\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- Responsive -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-2174962885476117\"\r\n     data-ad-slot=\"5070544181\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script><\/p><p>Content-filtering web proxy server provides administrative control over the content that can be transmitted through  the proxy. It is commonly used in both commercial organizations and  non-commercial\u00a0 to ensure that Internet usage adapts to the policy of acceptable use. In some cases, users can  bypass the proxy, as there are services designed to proxy information  from a website filtered through an unfiltered site that can be submitted  via the proxy users.<\/p>\n<p>Some common methods used for content  filtering include: URL or DNS blacklists, URL regex filtering, MIME  filtering, or keyword content filtering. Some products have been known  to employ content analysis techniques to look for traits commonly used  by certain types of content providers.<\/p>\n<p>A content filtering proxy  often support user authentication to control web access. It also  usually produces logs, either to give detailed information about the  URLs accessed by specific users, or to monitor statistics of bandwidth  usage. You can also contact the daemon based and \/ or antivirus software  based on the ICAP to provide security against viruses and other malware  by scanning incoming content in real time before entering the network.<\/p>\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>Content-filtering web proxy server provides administrative control over the content that can be transmitted through the proxy. It is commonly used in both commercial organizations and non-commercial\u00a0 to ensure that Internet usage adapts to the policy of acceptable use. In some cases, users can bypass the proxy, as there are services designed to proxy information [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/www.proxville.com\/guides\/wp-json\/wp\/v2\/posts\/14"}],"collection":[{"href":"https:\/\/www.proxville.com\/guides\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.proxville.com\/guides\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.proxville.com\/guides\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.proxville.com\/guides\/wp-json\/wp\/v2\/comments?post=14"}],"version-history":[{"count":4,"href":"https:\/\/www.proxville.com\/guides\/wp-json\/wp\/v2\/posts\/14\/revisions"}],"predecessor-version":[{"id":377,"href":"https:\/\/www.proxville.com\/guides\/wp-json\/wp\/v2\/posts\/14\/revisions\/377"}],"wp:attachment":[{"href":"https:\/\/www.proxville.com\/guides\/wp-json\/wp\/v2\/media?parent=14"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.proxville.com\/guides\/wp-json\/wp\/v2\/categories?post=14"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.proxville.com\/guides\/wp-json\/wp\/v2\/tags?post=14"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}