Glossary
Essential networking and security terms explained for developers. Understand the technologies that power modern web applications.
Networking
Fundamental networking concepts
4G/LTE Proxy
A proxy server that routes internet traffic through mobile 4G or LTE cellular networks, providing authentic mobile IP addresses from real mobile carriers for accessing mobile-specific content and avoiding detection.
Anonymous Proxy
A proxy server that hides the client's IP address from destination servers while identifying itself as a proxy, providing privacy without full transparency about being a proxy service.
Caching Proxy
A caching proxy is a proxy server that stores copies of frequently requested web content locally, reducing bandwidth usage, improving response times, and decreasing load on origin servers by serving cached content to subsequent requests.
CDN
Content Delivery Network - A geographically distributed network of servers that delivers web content to users based on their location, improving performance, reliability, and reducing latency.
Datacenter Proxy
High-speed proxy servers hosted in data centers, offering fast connections and low latency for web scraping, automation, and high-volume data collection at affordable prices.
Dedicated Proxy
A proxy server or IP address reserved exclusively for a single user, providing consistent performance, clean IP reputation, and avoiding the shared resource issues of public proxies.
Exit Node
An exit node (or exit proxy) is the final server in a proxy chain or anonymity network that connects to the destination website on behalf of the user, making it the IP address visible to the target server.
Forward Proxy
A server that acts as an intermediary between clients and the internet, forwarding client requests to external servers and returning responses, commonly used for privacy, security, and access control.
HAProxy
HAProxy (High Availability Proxy) is a free, fast, and reliable open-source load balancer and proxy server for TCP and HTTP applications, widely used for high-traffic websites and distributing workloads across multiple servers.
HTTP Headers
Metadata fields in HTTP requests and responses that provide essential information about the request, response, or the data being transferred between client and server.
HTTP Proxy
A proxy server that specifically handles HTTP and HTTPS traffic, forwarding web requests and responses between clients and web servers.
Instagram Proxy
Instagram proxies are specialized residential or mobile proxies optimized for managing multiple Instagram accounts, automating engagement, and bypassing Instagram's strict rate limits and anti-bot detection systems without triggering account bans or restrictions.
IP Address
Internet Protocol Address - A unique numerical identifier assigned to every device connected to a network, enabling communication across the internet.
IP Geolocation
IP geolocation is the process of determining the geographic location of an internet-connected device using its IP address, providing information like country, city, latitude/longitude, ISP, and connection type.
IPv4
Internet Protocol version 4 - The fourth version of the Internet Protocol that uses 32-bit addresses to identify devices on a network, supporting approximately 4.3 billion unique addresses.
IPv6
Internet Protocol version 6 - The latest version of the Internet Protocol using 128-bit addresses, designed to replace IPv4 and provide virtually unlimited address space for internet-connected devices.
ISP Proxy
Proxy servers using IP addresses from Internet Service Providers (ISPs) that appear as regular residential users, combining the legitimacy of residential proxies with the speed and stability of datacenter infrastructure.
Load Balancer
A device or software that distributes network traffic across multiple servers to ensure no single server becomes overwhelmed, improving application availability, reliability, and performance.
Metered Proxy
A metered proxy charges based on actual bandwidth usage, data transfer volume, or request counts, offering pay-as-you-go pricing that scales with usage rather than flat monthly fees.
Mobile Proxy
Proxy servers that route traffic through real mobile devices and carrier networks, providing genuine mobile IP addresses from cellular providers for authentic mobile user simulation and bypassing mobile-specific restrictions.
Private Proxy
A proxy server exclusively assigned to a single user or organization, providing dedicated resources, clean IP reputation, and reliable performance without sharing with others.
Proxy Chain
A proxy chain (or proxy cascade) routes traffic through multiple proxy servers in sequence, adding layers of anonymity and making it extremely difficult to trace the original source of requests back to the user.
Proxy Farm
A proxy farm is a collection of proxy servers operated together to provide large-scale proxy services, offering thousands or millions of IP addresses for commercial proxy providers, web scraping operations, and high-volume internet access needs.
Proxy Pool
A collection of proxy servers managed together to distribute requests, provide redundancy, and enable rotation for web scraping, load balancing, and high-availability applications.
Proxy Server
An intermediary server that sits between clients and destination servers, forwarding requests and responses while providing benefits like anonymity, caching, and access control.
Residential Proxy
IP addresses assigned by Internet Service Providers to homeowners, providing high anonymity for web scraping and accessing geo-restricted content with lower detection rates.
Reverse Proxy
A server that sits in front of web servers and forwards client requests to those servers, providing load balancing, caching, SSL termination, and security benefits.
Rotating Proxy
A proxy service that automatically switches between multiple IP addresses for each request or at set intervals, helping to distribute traffic and avoid rate limiting or IP-based blocks.
SEO Proxy
SEO proxies are proxy servers used by SEO professionals and digital marketers to scrape search engine results, check keyword rankings, audit competitors, and gather market intelligence without triggering rate limits or detection by search engines like Google.
Sneaker Bot Proxy
Sneaker bot proxies are specialized proxies configured specifically to work with sneaker bot software like NSB, Cyber, and Balko, enabling automated purchasing of limited-edition sneakers while bypassing anti-bot systems and IP bans on retail websites.
Sneaker Proxy
Sneaker proxies are specialized residential or datacenter proxies optimized for purchasing limited-edition sneakers from retail websites, helping users bypass bot detection systems and increase success rates in securing high-demand footwear releases.
SOCKS Proxy
A protocol that routes network packets between client and server through a proxy server, supporting any protocol and providing more flexibility than HTTP proxies for applications like gaming, P2P, and specialized software.
SOCKS4
SOCKS4 is an early version of the SOCKS protocol that provides basic proxy functionality for TCP connections, offering simple IP-based authentication and IPv4 support without advanced features like UDP or DNS resolution.
SOCKS5
Socket Secure version 5 - A protocol that routes network packets between a client and server through a proxy server, supporting TCP and UDP traffic for enhanced flexibility.
Static Proxy
A proxy server with a fixed IP address that doesn't change over time, providing consistent identity for long-term connections, account management, and applications requiring stable sessions.
TCP
Transmission Control Protocol - A connection-oriented protocol that provides reliable, ordered, and error-checked delivery of data between applications over IP networks.
Transparent Proxy
A proxy server that intercepts network traffic without requiring client configuration and passes the original client IP address to destination servers, commonly used for content filtering and caching.
UDP
User Datagram Protocol (UDP) is a connectionless transport layer protocol that sends data packets without establishing a connection, offering low latency and minimal overhead for applications like gaming, streaming, and DNS.
Unmetered Proxy
An unmetered proxy (or unlimited proxy) provides unlimited bandwidth usage for a fixed monthly fee, making it cost-effective for high-volume operations like large-scale web scraping, continuous monitoring, and data-intensive applications.
Web Proxy
A web proxy is an online service that allows users to access websites through a web browser interface without installing software, providing quick anonymous browsing, geo-unblocking, and bypassing network restrictions directly from any browser.
WebSocket
A communication protocol providing full-duplex, bidirectional communication channels over a single TCP connection, enabling real-time data exchange between client and server with low latency.
X-Forwarded-For
An HTTP header that identifies the originating IP address of a client connecting through proxies or load balancers, preserving the client's real IP address through the proxy chain.
Security
Security and protection mechanisms
Anti-Detect Browser
An anti-detect browser is a specialized web browser designed to mask and manage multiple digital fingerprints, allowing users to create and maintain separate browser profiles with unique identities to avoid detection and tracking by websites.
CAPTCHA
Completely Automated Public Turing test to tell Computers and Humans Apart - A challenge-response test designed to determine whether the user is human or an automated bot.
CORB
Cross-Origin Read Blocking (CORB) and Opaque Response Blocking (ORB) - Browser security mechanisms that prevent malicious websites from reading sensitive cross-origin data, protecting against Spectre-class side-channel attacks.
CORS
Cross-Origin Resource Sharing - A security mechanism that allows web applications to make requests to a different domain than the one serving the web page, controlled through HTTP headers.
CSP
Content Security Policy - A security standard that helps prevent Cross-Site Scripting (XSS) and data injection attacks by controlling which resources browsers are allowed to load for a given page.
CSRF
Cross-Site Request Forgery (CSRF) is a security vulnerability where attackers trick authenticated users into executing unwanted actions on web applications, exploiting the browser's automatic inclusion of credentials like cookies.
Encryption
The process of converting plaintext data into ciphertext using cryptographic algorithms to protect information from unauthorized access during transmission or storage.
Fingerprint Spoofing
Fingerprint spoofing is the practice of modifying browser and device characteristics to mask your true digital identity, preventing websites from tracking and identifying you through browser fingerprinting techniques.
Firewall
A network security system that monitors and controls incoming and outgoing traffic based on predetermined security rules to protect against unauthorized access.
HSTS
HTTP Strict Transport Security (HSTS) is a security policy that forces browsers to only interact with websites over HTTPS, preventing protocol downgrade attacks and cookie hijacking.
IP Masking
IP masking is the technique of hiding your real IP address by routing internet traffic through intermediary servers like proxies, VPNs, or Tor, protecting your identity, location, and enabling access to geo-restricted content.
OPSEC
OPSEC (Operations Security) is a security process that identifies critical information and implements countermeasures to protect it from adversaries, essential for maintaining privacy, preventing tracking, and securing digital operations.
SSL
Secure Sockets Layer - A deprecated cryptographic protocol for establishing encrypted connections between web servers and clients, now superseded by TLS.
SSL Certificate
A digital certificate that authenticates a website's identity and enables encrypted HTTPS connections between web servers and clients using SSL/TLS protocols.
TLS
Transport Layer Security - The cryptographic protocol that provides secure communication over networks, succeeding the deprecated SSL protocol for HTTPS and other secure connections.
User Agent Rotation
User agent rotation is the practice of systematically changing the User-Agent header in HTTP requests to mimic different browsers, devices, and operating systems, helping avoid detection and rate limiting in web scraping and automation.
VPN
Virtual Private Network - A secure encrypted tunnel that routes internet traffic through remote servers to enhance privacy and security.
Protocols
Communication protocols and standards
HTTPS
HyperText Transfer Protocol Secure - The secure version of HTTP that encrypts data transmitted between browsers and web servers using SSL/TLS protocols.
REST API
Representational State Transfer Application Programming Interface - An architectural style for designing networked applications using HTTP methods and stateless communication.
Infrastructure
Core internet infrastructure
BeautifulSoup
A Python library for parsing HTML and XML documents, providing easy-to-use methods for navigating, searching, and extracting data from web pages.
cURL
A command-line tool and library for transferring data with URLs, supporting HTTP, HTTPS, FTP, and many other protocols for API testing and automation.
DNS
Domain Name System - The internet's phonebook that translates human-readable domain names into IP addresses that computers use to communicate.
Fortified Browser
An enhanced browser automation solution that mimics real user behavior with advanced fingerprint management, anti-detection techniques, and stealth capabilities to bypass sophisticated bot detection systems.
Headless Browser
A web browser without a graphical user interface that can be controlled programmatically, commonly used for automated testing, web scraping, and server-side rendering.
Playwright
An open-source browser automation framework developed by Microsoft that enables reliable end-to-end testing and web scraping across Chromium, Firefox, and WebKit with a single API.
Puppeteer
A Node.js library developed by Google that provides a high-level API to control Chrome or Chromium browsers, enabling automated testing, web scraping, and browser automation tasks.
Web Crawler
An automated program that systematically browses the internet to discover, index, and extract information from web pages by following links across domains and websites.
Web Scraping
The automated process of extracting data from websites using software tools or scripts, commonly used for data collection, price monitoring, and content aggregation.
Ready to solve CORS issues?
CorsProxy provides a global edge network with enterprise-grade security. Start building without CORS limitations.