Design and Configuration of App Supportive Indirect Internet Access using a Transparent Proxy Server
Journal Title: International Journal of Modern Engineering Research (IJMER) - Year 2014, Vol 4, Issue 10
Abstract
Nowadays apps satisfy a wide array of requirements but are particularly very useful for educational institutions trying to realize their mobile learning systems or for companies wishing to bolster their businesses. A company/institute that wants to perform web filtering, caching, user monitoring etc. and allow Internet access only after authentication might use an explicit proxy. It has been observed that most of the apps that need to connect to the Internet through an explicit proxy, do not work whatsoever. In this paper, a solution has been proposed to get the apps working without having to avoid the use of a proxy server. The solution is developed around transparent proxy and makes use of a captive portal for authentication. Oracle VM VirtualBox was used to develop a test bed for the experiment and pfSense was used as the firewall which has both proxy server and captive portal services integrated on a single platform. When tested, Windows 8 apps as well as Ubuntu apps worked well without sacrificing proxy server services such as web filtering. The proposed solution is widely applicable and cost-effective as it uses open source software and essentially the same hardware as used for explicit proxy deployments.
Authors and Affiliations
Pranjal Sharma , T. Benith
Dynamic Structural Optimization with Frequency Constraints
The present work introduces a new method of structural optimization based on frequency constraints by using FEM in conjunction with Evolution optimization. First able as in any structure using this type of opti...
The Impact of HIV/AIDS on Rural Household Welfare in Rukungiri District-Uganda
Many able bodied household members in Rukungiri district have died of HIV/AIDS. Consequently there are many house heads (often young and married) whose partners died. This study investigated the impact of HIV/AIDS on r...
A Novel Data Extraction and Alignment Method for Web Databases
Online databases, also called web databases, comprise the deep web tag and value. Compared with WebPages in the surface web, which can be accessed by using a unique URL, pages in the deep web are dynamically genera...
Three Party Authenticated Key Distribution using Quantum Cryptography
Cryptography is the science of writing in secret message and is an ancient art. In data and telecommunications, cryptography is necessary when communicating over any untrusted medium, which includes just abou...
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid engine is a combination of Stirling engine, IC engine and Electric motor. All these 3 are connected together to a single shaft. The power source of the Stirling engine will be a Solar Panel. The aim of&...