proxies | ISGMLUG

Welcome to our SGML and XML Resource site


Introduction to Object Technologies

Object orientated technology has brought software development past procedural programming and into a world where programmes can be readily reused. This of course vastly simplifies development of applications because any programmer can leverage existing modules quickly and efficiently. OPerating systems and applications are created as multiple modules that are slotted together to create a functional…

Read More

Internet VPNs

An internet VPN can provide a secure way to move data packets across the web if you have the right equipment. There are two basic methods for doing this. Transport Mode – which is the technique of encrypting only the payload section of the IP packet for transport across the internet. Using this method the…

Read More

Different Types of XML Parser

XML parser is a software module to read documents and a way to give access for their content. XML parser generates a structured tree to return the results to the browser. An XML parser resembles a processor that determines the construction and properties of the data. An XML document can be read by an XML…

Read More

Proxy Protocol Verification

Any circuit level tunneling through a proxy server such as SOCKS or SSL, will allow most protocols to be passed through a standard proxy gateway. Whenever you see a statement like this, you should remember that it implies that the protocol is not actually understood but merely transparently transmits it. For instance, the popular tunneling…

Read More

Identity Systems – Distributing Authentication and Authorization

Any identity system which is automated needs some way of both creating and distributing authorization and authentication assertions.  One of the most famous is of course Kerberos, which has it’s own methods for dealing with this requirement.  However many digital systems are now starting to use SAML – the Security Assertion Markup Language – it’s…

Read More

Confidentiality Using XML Encryption

Just like every other type of communication method that exists online, you can use encryption for securing XML documents. In fact it is recommended if possible that all important XML documents should be encrypted completely before being transmitted across the wire. The document would then be decrypted using the appropriate key when it reaches it’s…

Read More

Social Networks to Form Disaster Warning Systems

Japan is planning a brand new disaster warning system this year.  It will be based on social networking sites and has been drafted in the terrible aftermath of the 2011 disasters.  One of the major problems in the aftermath of a disaster is coordination and communication.  Natural disasters tend to destroy telephone lines and standard…

Read More

Performance Issues – For Web Servers and Proxies

One of the most important issues that may affect your servers performance is how they deal with DNS. The look ups that your server has to make is something that will affect the speed of your web server or proxy. So in most circumstances, a DNS lookup is used to find the IP address that…

Read More

Proxy and Web Authentication Methods – Cookies

When HTTP authentication is required by a web server, then this authentication takes place for every single request.  So for every single request that the web server receives it must decode the message, find the username and passwords then verify these with the ones in it’s user database (if this is the method being used)….

Read More

Some IP Routing Stuff

Conceptually IP routing is pretty straight forward, especially when you look at it from the hosts point of view.  If the destination is directly connected such as a direct link or on the same Ethernet network then the IP datagram is simply forwarded to it’s destination.  If it’s not connected then the host simply send…

Read More


  • Recent Posts