Investors who hold shares in street name (that is, the shares are registered to the investor's brokerage firm rather than in his or her own name) might also not receive proxies. In these cases, the fund manager or brokerage firm is the actual shareholder in the eyes of the company, and they receive the proxy statement and can vote the shares. These representatives are responsible for voting the shares in the best interest of their investors, and in many cases, a mutual fund is a sizeable shareholder--its vote may have a significant impact on the company.


SOCKS is a protocol that relays TCP sessions at a firewall host to allow application users transparent access across the firewall. Because the protocol is independent of application protocols, it can be (and has been) used for many different services, such as telnet, ftp, finger, whois, gopher, WWW, etc. Access control can be applied at the beginning of each TCP session; thereafter the server simply relays the data between the client and the application server, incurring minimum processing overhead. Since SOCKS never has to know anything about the application protocol, it should also be easy for it to accommodate applications which use encryption to protect their traffic from nosy snoopers. No information about the client is sent to the server – thus there is no need to test the anonymity level of the SOCKS proxies.
Modern proxy servers do much more than forwarding web requests, all in the name of data security and network performance. Proxy servers act as a firewall and web filter, provide shared network connections, and cache data to speed up common requests. A good proxy server keeps users and the internal network protected from the bad stuff that lives out in the wild internet. Lastly, proxy servers can provide a high level of privacy.

Because NAT operates at layer-3, it is less resource-intensive than the layer-7 proxy, but also less flexible. As we compare these two technologies, we might encounter a terminology known as 'transparent firewall'. Transparent firewall means that the layer-3 proxy uses the layer-7 proxy advantages without the knowledge of the client. The client presumes that the gateway is a NAT in layer-3, and it does not have any idea about the inside of the packet, but through this method the layer-3 packets are sent to the layer-7 proxy for investigation.
Open or public proxies are a type of proxy setup on a system that allows users to connect and use the open proxy without providing any authentication. An open proxy can be setup on any computer or network that has opened the necessary ports and setup the necessary proxy software or system to provide proxy access, allowing Internet traffic to pass through the open proxy.
Before we decided to create this service we gathered an extensive proxy list. We tested proxysite, proxfree, hiload, tubeunblock, hide me proxy and others and realized that most of proxy sites are not comfortable to use nowadays. They don't natively support video and audio streaming, they are slow and break most of web applications. We wanted to make a better web proxy which works well with any kind of resource. That's why CroxyProxy is one of the best proxy browser you can find over the Internet and in any free proxy list.

A HTTP proxy is a server that sits between your HTTP requests, securing and anonymizing them. A client connects to the proxy server, then requests a connection, file, or other resource available on a different server. The proxy provides the resource either by connecting to the specified server or by serving it from a cache. Our proxies also change your IP address making it impossible to trace the request to the original caller (you).
×