We have considered the problem of tracking proxy servers in our article “Proxy server detecting methods” and found out an obvious dilemma: using a proxy on the one hand should provide anonymity but on the other hand no proxy gives a 100% guarantee of anonimity. At the same time we pointed out that own shared proxy server can help solving this problem. Using the shared proxy server that acts as a hub to process the outgoing and incoming data, the encryption process can be controlled and users can protect confidential information including their location.
There are several recommendations from Microsoft (that owns the oldest active proxy) that suggests using the following parameters of the proxy server equipment to operate normally:
- up to 450 users - 1 processor, 2.2 GHz CPU, 2 GB of RAM;
- 450 to 2,200 users - 2 processors, 2.0 GHz CPU, 2 GB of RAM;
- 2200 to 3600 users - 4 processors, 2.0 GHz CPU, 2 GB RAM
Quite naturally the described configuration can be increased or decreased proportionally depending on the number of users.
But you should not forget that the equipment is only the first part of the tasks to be performed for deployment of a proxy server. More issues arise during its setup and maintenance. In practice server protection needs lots of attention and sometimes costs thousands of dollars monthly.
High costs are also needed to properly maintain the equipment that must flawlessly operate in a 24/7/365 mode. It is provided at a hardware level (mounting cooling equipment, removing dust, moisture, etc.) and software (redistribution of flows, careful apropos repair and prophylaxy).
We can note that supporting a proxy server is rather expensive and the only way to get income is putting ads on the website or to get some funding. That’s why people buy shared proxies after appreciating all their advantages.