Glossary

Essential networking and security terms explained for developers. Understand the technologies that power modern web applications.

Networking

Fundamental networking concepts

4G/LTE Proxy

A proxy server that routes internet traffic through mobile 4G or LTE cellular networks, providing authentic mobile IP addresses from real mobile carriers for accessing mobile-specific content and avoiding detection.

Related: mobile-proxy residential-proxy rotating-proxy

Anonymous Proxy

A proxy server that hides the client's IP address from destination servers while identifying itself as a proxy, providing privacy without full transparency about being a proxy service.

Related: transparent-proxy elite-proxy proxy-server

Caching Proxy

A caching proxy is a proxy server that stores copies of frequently requested web content locally, reducing bandwidth usage, improving response times, and decreasing load on origin servers by serving cached content to subsequent requests.

Related: reverse-proxy cdn proxy-server

CDN

Content Delivery Network - A geographically distributed network of servers that delivers web content to users based on their location, improving performance, reliability, and reducing latency.

Related: proxy-server dns https

Datacenter Proxy

High-speed proxy servers hosted in data centers, offering fast connections and low latency for web scraping, automation, and high-volume data collection at affordable prices.

Related: residential-proxy proxy-server rotating-proxy

Dedicated Proxy

A proxy server or IP address reserved exclusively for a single user, providing consistent performance, clean IP reputation, and avoiding the shared resource issues of public proxies.

Related: private-proxy static-proxy datacenter-proxy

Exit Node

An exit node (or exit proxy) is the final server in a proxy chain or anonymity network that connects to the destination website on behalf of the user, making it the IP address visible to the target server.

Related: proxy-chain tor anonymous-proxy

Forward Proxy

A server that acts as an intermediary between clients and the internet, forwarding client requests to external servers and returning responses, commonly used for privacy, security, and access control.

Related: reverse-proxy proxy-server anonymous-proxy

HAProxy

HAProxy (High Availability Proxy) is a free, fast, and reliable open-source load balancer and proxy server for TCP and HTTP applications, widely used for high-traffic websites and distributing workloads across multiple servers.

Related: load-balancer reverse-proxy nginx

HTTP Headers

Metadata fields in HTTP requests and responses that provide essential information about the request, response, or the data being transferred between client and server.

Related: https rest-api proxy-server

HTTP Proxy

A proxy server that specifically handles HTTP and HTTPS traffic, forwarding web requests and responses between clients and web servers.

Related: proxy-server socks-proxy https

Instagram Proxy

Instagram proxies are specialized residential or mobile proxies optimized for managing multiple Instagram accounts, automating engagement, and bypassing Instagram's strict rate limits and anti-bot detection systems without triggering account bans or restrictions.

Related: mobile-proxy residential-proxy 4g-lte-proxy

IP Address

Internet Protocol Address - A unique numerical identifier assigned to every device connected to a network, enabling communication across the internet.

Related: dns vpn firewall

IP Geolocation

IP geolocation is the process of determining the geographic location of an internet-connected device using its IP address, providing information like country, city, latitude/longitude, ISP, and connection type.

Related: ipv4 ipv6 proxy-server

IPv4

Internet Protocol version 4 - The fourth version of the Internet Protocol that uses 32-bit addresses to identify devices on a network, supporting approximately 4.3 billion unique addresses.

Related: ipv6 ip-address proxy-server

IPv6

Internet Protocol version 6 - The latest version of the Internet Protocol using 128-bit addresses, designed to replace IPv4 and provide virtually unlimited address space for internet-connected devices.

Related: ipv4 ip-address proxy-server

ISP Proxy

Proxy servers using IP addresses from Internet Service Providers (ISPs) that appear as regular residential users, combining the legitimacy of residential proxies with the speed and stability of datacenter infrastructure.

Related: residential-proxy datacenter-proxy static-proxy

Load Balancer

A device or software that distributes network traffic across multiple servers to ensure no single server becomes overwhelmed, improving application availability, reliability, and performance.

Related: reverse-proxy haproxy proxy-server

Metered Proxy

A metered proxy charges based on actual bandwidth usage, data transfer volume, or request counts, offering pay-as-you-go pricing that scales with usage rather than flat monthly fees.

Related: unmetered-proxy proxy-server residential-proxy

Mobile Proxy

Proxy servers that route traffic through real mobile devices and carrier networks, providing genuine mobile IP addresses from cellular providers for authentic mobile user simulation and bypassing mobile-specific restrictions.

Related: 4g-lte-proxy residential-proxy isp-proxy

Private Proxy

A proxy server exclusively assigned to a single user or organization, providing dedicated resources, clean IP reputation, and reliable performance without sharing with others.

Related: dedicated-proxy shared-proxy static-proxy

Proxy Chain

A proxy chain (or proxy cascade) routes traffic through multiple proxy servers in sequence, adding layers of anonymity and making it extremely difficult to trace the original source of requests back to the user.

Related: anonymous-proxy socks-proxy tor

Proxy Farm

A proxy farm is a collection of proxy servers operated together to provide large-scale proxy services, offering thousands or millions of IP addresses for commercial proxy providers, web scraping operations, and high-volume internet access needs.

Related: proxy-pool datacenter-proxy residential-proxy

Proxy Pool

A collection of proxy servers managed together to distribute requests, provide redundancy, and enable rotation for web scraping, load balancing, and high-availability applications.

Related: rotating-proxy proxy-server datacenter-proxy

Proxy Server

An intermediary server that sits between clients and destination servers, forwarding requests and responses while providing benefits like anonymity, caching, and access control.

Related: http-proxy socks-proxy residential-proxy

Residential Proxy

IP addresses assigned by Internet Service Providers to homeowners, providing high anonymity for web scraping and accessing geo-restricted content with lower detection rates.

Related: proxy-server datacenter-proxy rotating-proxy

Reverse Proxy

A server that sits in front of web servers and forwards client requests to those servers, providing load balancing, caching, SSL termination, and security benefits.

Related: forward-proxy load-balancer cdn

Rotating Proxy

A proxy service that automatically switches between multiple IP addresses for each request or at set intervals, helping to distribute traffic and avoid rate limiting or IP-based blocks.

Related: proxy-server residential-proxy datacenter-proxy

SEO Proxy

SEO proxies are proxy servers used by SEO professionals and digital marketers to scrape search engine results, check keyword rankings, audit competitors, and gather market intelligence without triggering rate limits or detection by search engines like Google.

Related: web-crawler rotating-proxy residential-proxy

Sneaker Bot Proxy

Sneaker bot proxies are specialized proxies configured specifically to work with sneaker bot software like NSB, Cyber, and Balko, enabling automated purchasing of limited-edition sneakers while bypassing anti-bot systems and IP bans on retail websites.

Related: sneaker-proxy residential-proxy isp-proxy

Sneaker Proxy

Sneaker proxies are specialized residential or datacenter proxies optimized for purchasing limited-edition sneakers from retail websites, helping users bypass bot detection systems and increase success rates in securing high-demand footwear releases.

Related: residential-proxy sneaker-bot-proxy rotating-proxy

SOCKS Proxy

A protocol that routes network packets between client and server through a proxy server, supporting any protocol and providing more flexibility than HTTP proxies for applications like gaming, P2P, and specialized software.

Related: socks4 http-proxy proxy-server

SOCKS4

SOCKS4 is an early version of the SOCKS protocol that provides basic proxy functionality for TCP connections, offering simple IP-based authentication and IPv4 support without advanced features like UDP or DNS resolution.

Related: socks-proxy socks5 proxy-server

SOCKS5

Socket Secure version 5 - A protocol that routes network packets between a client and server through a proxy server, supporting TCP and UDP traffic for enhanced flexibility.

Related: proxy-server http-proxy vpn

Static Proxy

A proxy server with a fixed IP address that doesn't change over time, providing consistent identity for long-term connections, account management, and applications requiring stable sessions.

Related: dedicated-proxy rotating-proxy isp-proxy

TCP

Transmission Control Protocol - A connection-oriented protocol that provides reliable, ordered, and error-checked delivery of data between applications over IP networks.

Related: ipv4 ipv6 proxy-server

Transparent Proxy

A proxy server that intercepts network traffic without requiring client configuration and passes the original client IP address to destination servers, commonly used for content filtering and caching.

Related: anonymous-proxy forward-proxy intercepting-proxy

UDP

User Datagram Protocol (UDP) is a connectionless transport layer protocol that sends data packets without establishing a connection, offering low latency and minimal overhead for applications like gaming, streaming, and DNS.

Related: tcp socks-proxy websocket

Unmetered Proxy

An unmetered proxy (or unlimited proxy) provides unlimited bandwidth usage for a fixed monthly fee, making it cost-effective for high-volume operations like large-scale web scraping, continuous monitoring, and data-intensive applications.

Related: metered-proxy dedicated-proxy rotating-proxy

Web Proxy

A web proxy is an online service that allows users to access websites through a web browser interface without installing software, providing quick anonymous browsing, geo-unblocking, and bypassing network restrictions directly from any browser.

Related: proxy-server anonymous-proxy cors

WebSocket

A communication protocol providing full-duplex, bidirectional communication channels over a single TCP connection, enabling real-time data exchange between client and server with low latency.

Related: http-headers tcp proxy-server

X-Forwarded-For

An HTTP header that identifies the originating IP address of a client connecting through proxies or load balancers, preserving the client's real IP address through the proxy chain.

Related: http-headers proxy-server load-balancer

Security

Security and protection mechanisms

Anti-Detect Browser

An anti-detect browser is a specialized web browser designed to mask and manage multiple digital fingerprints, allowing users to create and maintain separate browser profiles with unique identities to avoid detection and tracking by websites.

Related: fingerprint-spoofing user-agent-rotation ip-masking

CAPTCHA

Completely Automated Public Turing test to tell Computers and Humans Apart - A challenge-response test designed to determine whether the user is human or an automated bot.

Related: web-scraping proxy-server http-proxy

CORB

Cross-Origin Read Blocking (CORB) and Opaque Response Blocking (ORB) - Browser security mechanisms that prevent malicious websites from reading sensitive cross-origin data, protecting against Spectre-class side-channel attacks.

Related: cors csp http-headers

CORS

Cross-Origin Resource Sharing - A security mechanism that allows web applications to make requests to a different domain than the one serving the web page, controlled through HTTP headers.

Related: http-headers proxy-server csp

CSP

Content Security Policy - A security standard that helps prevent Cross-Site Scripting (XSS) and data injection attacks by controlling which resources browsers are allowed to load for a given page.

Related: cors http-headers hsts

CSRF

Cross-Site Request Forgery (CSRF) is a security vulnerability where attackers trick authenticated users into executing unwanted actions on web applications, exploiting the browser's automatic inclusion of credentials like cookies.

Related: cors csp http-headers

Encryption

The process of converting plaintext data into ciphertext using cryptographic algorithms to protect information from unauthorized access during transmission or storage.

Related: https tls ssl

Fingerprint Spoofing

Fingerprint spoofing is the practice of modifying browser and device characteristics to mask your true digital identity, preventing websites from tracking and identifying you through browser fingerprinting techniques.

Related: anti-detect-browser user-agent-rotation ip-masking

Firewall

A network security system that monitors and controls incoming and outgoing traffic based on predetermined security rules to protect against unauthorized access.

Related: ip-address https vpn

HSTS

HTTP Strict Transport Security (HSTS) is a security policy that forces browsers to only interact with websites over HTTPS, preventing protocol downgrade attacks and cookie hijacking.

Related: https ssl tls

IP Masking

IP masking is the technique of hiding your real IP address by routing internet traffic through intermediary servers like proxies, VPNs, or Tor, protecting your identity, location, and enabling access to geo-restricted content.

Related: anonymous-proxy rotating-proxy opsec

OPSEC

OPSEC (Operations Security) is a security process that identifies critical information and implements countermeasures to protect it from adversaries, essential for maintaining privacy, preventing tracking, and securing digital operations.

Related: ip-masking fingerprint-spoofing anti-detect-browser

SSL

Secure Sockets Layer - A deprecated cryptographic protocol for establishing encrypted connections between web servers and clients, now superseded by TLS.

Related: tls https ssl-certificate

SSL Certificate

A digital certificate that authenticates a website's identity and enables encrypted HTTPS connections between web servers and clients using SSL/TLS protocols.

Related: ssl tls https

TLS

Transport Layer Security - The cryptographic protocol that provides secure communication over networks, succeeding the deprecated SSL protocol for HTTPS and other secure connections.

Related: ssl https ssl-certificate

User Agent Rotation

User agent rotation is the practice of systematically changing the User-Agent header in HTTP requests to mimic different browsers, devices, and operating systems, helping avoid detection and rate limiting in web scraping and automation.

Related: fingerprint-spoofing anti-detect-browser http-headers

VPN

Virtual Private Network - A secure encrypted tunnel that routes internet traffic through remote servers to enhance privacy and security.

Related: proxy firewall https

Protocols

Communication protocols and standards

Infrastructure

Core internet infrastructure

BeautifulSoup

A Python library for parsing HTML and XML documents, providing easy-to-use methods for navigating, searching, and extracting data from web pages.

Related: web-scraping web-crawler playwright

cURL

A command-line tool and library for transferring data with URLs, supporting HTTP, HTTPS, FTP, and many other protocols for API testing and automation.

Related: rest-api https http-headers

DNS

Domain Name System - The internet's phonebook that translates human-readable domain names into IP addresses that computers use to communicate.

Related: ip-address https firewall

Fortified Browser

An enhanced browser automation solution that mimics real user behavior with advanced fingerprint management, anti-detection techniques, and stealth capabilities to bypass sophisticated bot detection systems.

Related: headless-browser playwright puppeteer

Headless Browser

A web browser without a graphical user interface that can be controlled programmatically, commonly used for automated testing, web scraping, and server-side rendering.

Related: playwright puppeteer web-scraping

Playwright

An open-source browser automation framework developed by Microsoft that enables reliable end-to-end testing and web scraping across Chromium, Firefox, and WebKit with a single API.

Related: puppeteer headless-browser web-scraping

Puppeteer

A Node.js library developed by Google that provides a high-level API to control Chrome or Chromium browsers, enabling automated testing, web scraping, and browser automation tasks.

Related: playwright headless-browser web-scraping

Web Crawler

An automated program that systematically browses the internet to discover, index, and extract information from web pages by following links across domains and websites.

Related: web-scraping beautifulsoup playwright

Web Scraping

The automated process of extracting data from websites using software tools or scripts, commonly used for data collection, price monitoring, and content aggregation.

Related: proxy-server headless-browser http-headers

Ready to solve CORS issues?

CorsProxy provides a global edge network with enterprise-grade security. Start building without CORS limitations.

CORSPROXY Dashboard