https://store-images.s-microsoft.com/image/apps.43437.eeeb9848-0e70-4e7f-9fe6-ac1f6118b409.85248f55-2957-49e0-98a7-58fd6aa16aa1.e62d4b21-8633-4997-a7e5-9a0c477c47d9

Linux 8.3 with Squid Protected Proxy

Virtual Pulse S. R. O.

Linux 8.3 with Squid Protected Proxy

Virtual Pulse S. R. O.

Squid is a great tool for network performance and security!

Linux 8.3 with Squid Protected Proxy

This Squid Protected Proxy Server has been optimized for seamless and robust work in the Azure environment and will respond to the needs of any type of user and enterprise of all sizes.

Squid provides a wide usability range, including speeding up a web server by caching repeated requests, caching web, DNS, and other computer network lookups for a group of people sharing network resources, and aiding security by filtering traffic.

Although primarily used for HTTP and FTP, Squid provides limited support for several other protocols including Internet Gopher, SSL, TLS, and HTTPS. Squid does not support the SOCKS protocol, unlike Privoxy, with which Squid can be used in order to provide SOCKS support.

Squid Features:

  • - Squid handles all requests in a single, non-blocking, I/O-driven process over IPv4 or IPv6.
  • - Squid keeps metadata and especially hot objects cached in RAM
  • - Caches DNS lookups, supports non-blocking DNS lookups
  • - Implements negative caching of failed requests.
  • - Squid supports SSL, extensive access controls, and full request logging.
  • - By using the lightweight Internet Cache Protocol, Squid caches can be arranged in a hierarchy or mesh for additional bandwidth savings.

Squid has some features that can help anonymize connections, such as disabling or changing specific header fields in a client's HTTP requests. Whether these are set, and what they are set to do, is up to the person who controls the computer running Squid.

Squid, also, has a wide list of security features. Here are some of them:

  • ACLs (Access Control Lists) allow us to restrict access to websites, and/or monitor the access on a per user basis. You can restrict access based on the day of week or time of day, or domain, for example.
  • Bypassing web filters is made possible through the use of a web proxy to which requests are made and which returns requested content to a client, instead of having the client request it directly to the Internet.

Keeping all this in mind Virtual Pulse provides you with a fully pre-configured, cloud hardened Linux 8.3 with Squid Protected Proxy Image, fully ready to run in Azure environments right out of the box!

Disclaimer:Virtual Pulse does not offer commercial licenses of the products mentioned above. Squid is a registered trademark of respective companies. No warranty of any kind, express or implied, is included with this software.

https://store-images.s-microsoft.com/image/apps.10069.eeeb9848-0e70-4e7f-9fe6-ac1f6118b409.85248f55-2957-49e0-98a7-58fd6aa16aa1.1b912df1-63d9-4709-90d2-f716f99fe3db
https://store-images.s-microsoft.com/image/apps.10069.eeeb9848-0e70-4e7f-9fe6-ac1f6118b409.85248f55-2957-49e0-98a7-58fd6aa16aa1.1b912df1-63d9-4709-90d2-f716f99fe3db