{"id":468697,"date":"2020-11-30T00:00:00","date_gmt":"2020-11-30T00:00:00","guid":{"rendered":"https:\/\/proxycompass.com\/knowledge-base\/what-are-socks-proxies\/"},"modified":"2024-04-30T12:28:52","modified_gmt":"2024-04-30T12:28:52","slug":"what-are-socks-proxies","status":"publish","type":"knowledge-base","link":"https:\/\/proxycompass.com\/tr\/knowledge-base\/what-are-socks-proxies\/","title":{"rendered":"SOCKS5 Proxy&#039;leri Nedir ve Nas\u0131l \u00c7al\u0131\u015f\u0131rlar?"},"content":{"rendered":"<p>Muhtemelen proxy&#039;leri ve hatta belki SOCKS proxy&#039;lerini duymu\u015fsunuzdur. Onlar\u0131n \u00f6z\u00fcnde, <a href=\"https:\/\/proxycompass.com\/tr\/knowledge-base\/what-is-a-proxy-server\/\">proxy sunucular\u0131<\/a> veya proxy&#039;ler, yerel veya uzak bir makinede bulunan donan\u0131m veya yaz\u0131l\u0131m tabanl\u0131 arac\u0131lard\u0131r. Bu ara rolde, web taray\u0131c\u0131lar\u0131 (web istemcileri) ile web sunucular\u0131 aras\u0131ndaki t\u00fcm trafi\u011fi kendileri \u00fczerinden y\u00f6nlendirerek do\u011frudan ileti\u015fimi engeller veya engellerler.<\/p>\n<p>Ayn\u0131 zamanda, t\u00fcr\u00fcne ba\u011fl\u0131 olarak proxy&#039;ler \u00e7evrimi\u00e7i kimli\u011finiz hakk\u0131nda baz\u0131 bilgileri gizler. Gizlenen verilere \u00f6rnek olarak IP adresiniz ve konumunuz verilebilir.<\/p>\n<p>Asl\u0131nda birka\u00e7 t\u00fcr proxy vard\u0131r. Ve bunlar genel olarak a\u015fa\u011f\u0131dakilere dayal\u0131 olarak d\u00f6rt gruba ayr\u0131labilir:<\/p>\n<ul>\n<li>Protokol, yani SOCKS proxy&#039;leri ve HTTP ve HTTPS proxy&#039;leri<\/li>\n<li>Aktif kullan\u0131c\u0131 say\u0131s\u0131, yani, <a href=\"https:\/\/proxycompass.com\/tr\/knowledge-base\/what-are-shared-proxies\/\">payla\u015f\u0131lan proxy&#039;ler<\/a>, <a href=\"https:\/\/proxycompass.com\/tr\/knowledge-base\/what-are-private-proxies\/\">\u00f6zel vekiller<\/a>, Ve <a href=\"https:\/\/proxycompass.com\/tr\/knowledge-base\/what-are-virgin-proxies\/\">bakire vekiller<\/a><\/li>\n<li>Trafik y\u00f6nlendirmenin y\u00f6n\u00fc, yani ileri proxy&#039;ler ve ters proxy&#039;ler<\/li>\n<li>Atanan IP adresinin t\u00fcr\u00fc; <a href=\"https:\/\/proxycompass.com\/tr\/knowledge-base\/what-are-residential-proxies\/\">konut vekilleri<\/a>, <a href=\"https:\/\/proxycompass.com\/tr\/knowledge-base\/what-are-data-center-proxies\/\">veri merkezi proxy&#039;leri<\/a>, Ve <a href=\"https:\/\/proxycompass.com\/tr\/knowledge-base\/what-are-mobile-proxies\/\">mobil proxy&#039;ler<\/a><\/li>\n<\/ul>\n<p>Ancak bu makale esas olarak \u00e7evrimi\u00e7i ileti\u015fim kurmak i\u00e7in kullan\u0131lan protokol taraf\u0131ndan tan\u0131mlanabilen proxy&#039;lere odaklanacakt\u0131r. Bu kategori SOCKS proxy&#039;lerini ve HTTP ve HTTPS proxy&#039;lerini i\u00e7erir.<\/p>\n<h2>SOCKS Proxy Sunucusu Nedir?<\/h2>\n<p>SOCKS proxy&#039;si, ana bilgisayarlar aras\u0131nda veya bir web istemcisi ile bir web sunucusu aras\u0131nda bir g\u00fcvenlik duvar\u0131 arac\u0131l\u0131\u011f\u0131yla a\u011f ba\u011flant\u0131s\u0131n\u0131 kolayla\u015ft\u0131rmak i\u00e7in SOCKS protokol\u00fcn\u00fc kullanan bir arac\u0131d\u0131r. Bu proxy, SOCKS arka plan program\u0131 olarak bilinen yaz\u0131l\u0131m\u0131 \u00e7al\u0131\u015ft\u0131r\u0131r. Yaz\u0131l\u0131m \u00f6zellikle bir g\u00fcvenlik duvar\u0131 ana bilgisayar\u0131na (bir g\u00fcvenlik duvar\u0131n\u0131n kurulu oldu\u011fu makine) kurulur ve bu g\u00fcvenlik duvar\u0131 \u00fczerinden g\u00fcvenli bir yol olu\u015fturur.<\/p>\n<p>Bu nedenle bu, SOCKS protokol\u00fcn\u00fcn g\u00fcvenlik duvarlar\u0131n\u0131 atlamad\u0131\u011f\u0131, bunun yerine ileti\u015fimin bir proxy sunucu arac\u0131l\u0131\u011f\u0131yla g\u00fcvenlik duvar\u0131 \u00fczerinden y\u00f6nlendirilmesine izin verdi\u011fi anlam\u0131na gelir. Buna g\u00f6re, g\u00fcvenlik duvar\u0131 t\u00fcm yetkisiz trafi\u011fin yan\u0131 s\u0131ra, kullan\u0131c\u0131 ad\u0131 gibi belirli parametrelere uymayan veya SOCKS protokol\u00fc kullan\u0131larak g\u00f6nderilmeyen trafi\u011fi de engeller.<\/p>\n<p>Ancak ileti\u015fimin bu protokol arac\u0131l\u0131\u011f\u0131yla ve buna ek olarak SOCKS proxy arac\u0131l\u0131\u011f\u0131yla g\u00f6nderildi\u011fini varsayal\u0131m. Bu durumda kullan\u0131c\u0131lar internete eri\u015febilecek veya harici bir a\u011fdaki di\u011fer bilgisayarlarla ileti\u015fim kurabilecektir. Genel olarak SOCKS proxy sunucusu, uygulama d\u00fczeyindeki ba\u011flant\u0131lar\u0131, yani uygulama katman\u0131 protokolleri arac\u0131l\u0131\u011f\u0131yla g\u00f6nderilen ba\u011flant\u0131lar\u0131 destekler. (Uygulama katman\u0131 protokolleri HTTP, HTTPS, SMTP, TELNET, FTP, POP, MIME ve daha fazlas\u0131n\u0131 i\u00e7erir.)<\/p>\n<h3>SOCKS Proxy Sunucusu Nas\u0131l \u00c7al\u0131\u015f\u0131r?<\/h3>\n<p>Bu d\u00fczenlemenin bir sonucu olarak, topluca ana bilgisayarlar olarak bilinen kullan\u0131c\u0131 bilgisayarlar\u0131, di\u011fer ana bilgisayarlar veya web sunucular\u0131 ile g\u00fcvenli ileti\u015fim sa\u011flayan g\u00fcvenli bir ge\u00e7ici nokta olarak SOCKS proxy sunucusunu kullan\u0131r. Ve bir a\u011f g\u00fcvenlik duvar\u0131 veya g\u00fcvenlik duvar\u0131 ana bilgisayar\u0131n\u0131n bu arac\u0131 arac\u0131l\u0131\u011f\u0131yla ba\u011flant\u0131y\u0131 hala korudu\u011fu g\u00f6z \u00f6n\u00fcne al\u0131nd\u0131\u011f\u0131nda, istenmeyen davetsiz misafirlerin ana bilgisayarlar aras\u0131ndaki ileti\u015fime eri\u015fmesini engeller. B\u00f6ylece, g\u00fcvenlik duvar\u0131 \u00fczerinden SOCKS protokol\u00fc kullan\u0131larak g\u00f6nderilen a\u011f paketlerine yaln\u0131zca ana makinede hesab\u0131 (proxy hesab\u0131) bulunan taraflar eri\u015febilir.<\/p>\n<p>SOCKS proxy sunucusu yaln\u0131zca kullan\u0131c\u0131lar\u0131n bilgisayarlar\u0131 aras\u0131ndaki ileti\u015fimi de\u011fil ayn\u0131 zamanda web istemcileri ve web sunucular\u0131 aras\u0131ndaki ileti\u015fimi de sa\u011flar. Ve di\u011fer t\u00fcm proxy sunucularda oldu\u011fu gibi, a\u011f trafi\u011fine arac\u0131l\u0131k ederek do\u011frudan eri\u015fimi engeller. B\u00f6ylece, bir istemci HTTP, HTTPS veya FTP istekleri g\u00f6nderdi\u011finde, SOCKS sunucusu bunlar\u0131 al\u0131r ve daha sonra bunlar\u0131 istemci ad\u0131na web sunucusuna sunar. Ayn\u0131 zamanda sunucudan yan\u0131tlar al\u0131r ve bunlar\u0131 istemciye iletir. Ancak SOCKS proxy sunucular\u0131n\u0131 daha ayr\u0131nt\u0131l\u0131 olarak tart\u0131\u015fmadan \u00f6nce SOCKS protokol\u00fcn\u00fc, ge\u00e7mi\u015fini ve nas\u0131l \u00e7al\u0131\u015ft\u0131\u011f\u0131n\u0131 anlayal\u0131m.<\/p>\n<h2>SOCKS Protokol\u00fcn\u00fcn Tarih\u00e7esi<\/h2>\n<p>SOCKS proxy sunucusu ad\u0131, SOCKS ile s\u00f6zle\u015fmeli olan Socket Secure olarak bilinen bir a\u011f protokol\u00fcnden t\u00fcretilmi\u015ftir. Yukar\u0131daki a\u00e7\u0131klamaya dayanarak SOCKS protokol\u00fc, bir a\u011f g\u00fcvenlik duvar\u0131 arac\u0131l\u0131\u011f\u0131yla a\u011f ba\u011flant\u0131s\u0131 i\u00e7in bir \u00e7er\u00e7eve sa\u011flar. Protokol, 1990&#039;lar\u0131n ba\u015f\u0131nda ilk kez uygulamaya kondu\u011fundan bu yana \u00e7e\u015fitli iyile\u015ftirmelerden ge\u00e7ti. Ve bu b\u00f6l\u00fcmde y\u0131llar i\u00e7indeki evrim anlat\u0131lacakt\u0131r.<\/p>\n<h3>SOCKS S\u00fcr\u00fcm 1<\/h3>\n<p>Orijinal SOCKS protokol\u00fc bir <a href=\"https:\/\/www.usenix.org\/legacy\/publications\/library\/proceedings\/sec92\/full_papers\/koblas.pdf\" target=\"_blank\" rel=\"noopener\">ka\u011f\u0131t<\/a> 1992&#039;deki \u00fc\u00e7\u00fcnc\u00fc USENIX UNIX G\u00fcvenlik Sempozyumunda sunuldu. Ancak makalenin sunuldu\u011fu s\u0131rada SOCKS, MIPS Bilgisayar Sistemlerinde \u00fc\u00e7 y\u0131ld\u0131r \u00e7al\u0131\u015f\u0131yordu. Bu, SOCKS&#039;nin ilk olarak 1989&#039;da veya buna yak\u0131n bir tarihte olu\u015fturuldu\u011fu anlam\u0131na gelir.<\/p>\n<p>David Koblas ve Michelle Koblas taraf\u0131ndan yaz\u0131lan makalede, SOCKS protokol\u00fcn\u00fcn bir g\u00fcvenlik duvar\u0131 ana bilgisayar\u0131 arac\u0131l\u0131\u011f\u0131yla rahat ve g\u00fcvenli a\u011f ba\u011flant\u0131s\u0131 sa\u011flamak i\u00e7in nas\u0131l kullan\u0131labilece\u011fi tart\u0131\u015f\u0131ld\u0131. Yarat\u0131c\u0131lar\u0131 bunu o zamanlar var olan bir soruna \u00e7\u00f6z\u00fcm olarak tasarlad\u0131lar: bilgisayarlar\u0131n internete ba\u011flanabilmesi yoluyla g\u00fcvenli bir ortam yaratma y\u00f6ntemleri hantal, kullan\u0131\u015fs\u0131z veya kolayca tehlikeye at\u0131labilirdi.<\/p>\n<p>Makalede SOCKS kitapl\u0131\u011f\u0131, protokol ve bir arka plan program\u0131 (SOCKS proxy yaz\u0131l\u0131m\u0131) i\u00e7eren bir SOCKS paketi sunuldu. Kitapl\u0131k, g\u00fcvenlik duvar\u0131nda kurulu SOCKS arka plan program\u0131na ba\u011flant\u0131 kuran \u00e7a\u011fr\u0131lar\u0131 i\u00e7eriyordu. Bu \u015fekilde k\u00fct\u00fcphane, bilgi aktar\u0131m\u0131n\u0131 ve a\u011f ba\u011flant\u0131lar\u0131n\u0131, arka plan program\u0131n\u0131n isteklerin kayna\u011f\u0131 gibi g\u00f6r\u00fcnmesini sa\u011flayacak \u015fekilde etkinle\u015ftirdi. Bu nedenle, harici bir ana bilgisayara, arka plan program\u0131 (SOCKS proxy) isteklerin kayna\u011f\u0131 gibi g\u00f6r\u00fcnecektir. SOCKS k\u00fct\u00fcphane rutinleri veya \u00e7a\u011fr\u0131lar\u0131 \u015funlar\u0131 i\u00e7eriyordu:<\/p>\n<ul>\n<li><b>Ba\u011flamak<\/b>: SOCKS proxy&#039;sinin (arka plan program\u0131) belirli bir IP adresine, ba\u011flant\u0131 noktas\u0131 numaras\u0131na ve kullan\u0131c\u0131 ad\u0131na giden bir ba\u011flant\u0131 kurmas\u0131n\u0131 ister<\/li>\n<li><b>Ba\u011fla<\/b>: Belirli bir harici IP adresinden beklenen gelen ba\u011flant\u0131y\u0131 ister. Ayr\u0131ca kullan\u0131c\u0131 ad\u0131 gerekliliklerini de i\u00e7erir ancak bu kullan\u0131c\u0131 ad\u0131 istek sahibine (g\u00f6nderene) aittir ve bilgilerin kaydedilmesi i\u00e7in kullan\u0131l\u0131r. Genellikle Bind \u00e7a\u011fr\u0131s\u0131, yeni bir soket ba\u011flant\u0131s\u0131n\u0131 g\u00fcvenlik duvar\u0131ndaki bo\u015f bir ba\u011flant\u0131 noktas\u0131na ba\u011flar.<\/li>\n<li><b>Dinlemek<\/b>: Harici ana bilgisayardan gelen \u00e7a\u011fr\u0131lar\u0131 kabul etmeye haz\u0131r olarak bekler (dinler)<\/li>\n<li><b>GetSOCKName<\/b>: G\u00fcvenlik duvar\u0131ndaki soketin IP adresini ve port numaras\u0131n\u0131 al\u0131r.<\/li>\n<li><b>Kabul etmek<\/b>: Harici bir ana bilgisayardan gelen ba\u011flant\u0131y\u0131 kabul eder<\/li>\n<\/ul>\n<h3>SOCKS S\u00fcr\u00fcm 4 (SOCKS4)<\/h3>\n<p>Ying-Da Lee, SOCKS protokol\u00fcn\u00fc geni\u015fleterek \u015funlar\u0131 olu\u015fturdu: <a href=\"https:\/\/www.openssh.com\/txt\/socks4.protocol\" target=\"_blank\" rel=\"noopener\">SOCKS s\u00fcr\u00fcm 4<\/a> (SOCKS4) daha sonra tan\u0131t\u0131lmadan \u00f6nce <a href=\"https:\/\/www.openssh.com\/txt\/socks4a.protocol\" target=\"_blank\" rel=\"noopener\">SOCKS s\u00fcr\u00fcm 4a<\/a> (SOCKS4a). Buna g\u00f6re SOCKS4a, hedef ana bilgisayar\u0131n (sunucunun) alan ad\u0131n\u0131n IP adresini bulmak i\u00e7in \u00e7\u00f6z\u00fcmlenmesini destekleyerek protokol\u00fcn yeteneklerini geni\u015fletti.<\/p>\n<h3>SOCKS S\u00fcr\u00fcm 5 (SOCKS 5)<\/h3>\n<p>1996 y\u0131l\u0131nda bir grup katk\u0131da bulunan ki\u015fi \u015funlar\u0131 yazd\u0131: <a href=\"https:\/\/datatracker.ietf.org\/doc\/html\/rfc1928\" target=\"_blank\" rel=\"noopener\">haf\u0131za<\/a> SOCKS s\u00fcr\u00fcm 5&#039;i a\u00e7\u0131kl\u0131yor. Yaz\u0131, temel \u00e7er\u00e7evenin yeteneklerini daha karma\u015f\u0131k uygulama katman\u0131 protokollerini desteklemesini sa\u011flayacak \u015fekilde geni\u015fleterek SOCKS protokol\u00fcn\u00fcn yeteneklerini geni\u015fletti. Ayr\u0131ca SOCKS5, hem \u0130letim Kontrol Protokol\u00fcnde (TCP) hem de Kullan\u0131c\u0131 Datagram Protokol\u00fcnde (UDP) istemci-sunucu uygulamalar\u0131 i\u00e7in destek sa\u011flad\u0131. Ayr\u0131ca, adresleme sistemini kapsayacak \u015fekilde geni\u015fletildi <a href=\"https:\/\/proxycompass.com\/tr\/knowledge-base\/what-are-ipv4-and-ipv6-proxies\/\">IPv6 adresleri<\/a> ve alan ad\u0131 adresleme.<\/p>\n<p>Son olarak SOCKS5 g\u00fc\u00e7l\u00fc kimlik do\u011frulamay\u0131 tan\u0131tt\u0131. Yeni s\u00fcr\u00fcm, iste\u011fe ba\u011fl\u0131 kimlik do\u011frulama protokollerinin kullan\u0131lmas\u0131na y\u00f6nelik genelle\u015ftirilmi\u015f bir \u00e7er\u00e7eve belirtir. \u00d6rne\u011fin, SOCKS ba\u011flant\u0131s\u0131 ba\u015flat\u0131l\u0131rken a\u015fa\u011f\u0131daki kimlik do\u011frulamalar\u0131 kullan\u0131labilir:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.rfc-editor.org\/rfc\/rfc1929\" target=\"_blank\" rel=\"noopener\">Kullan\u0131c\u0131 Ad\u0131\/\u015eifre alt anla\u015fmas\u0131<\/a> kimlik do\u011frulama hizmetleri (Ancak, kullan\u0131c\u0131 ad\u0131\/\u015fifre alt anla\u015fmas\u0131 g\u00fcvenli de\u011fildir ve bu nedenle bilgisayar korsanlar\u0131n\u0131n veya \u00fc\u00e7\u00fcnc\u00fc taraflar\u0131n &#039;koklama&#039; ger\u00e7ekle\u015ftirebilece\u011fi durumlarda \u00f6nerilmez.)<\/li>\n<li><a href=\"https:\/\/ss5.sourceforge.net\/draft-supa.txt\" target=\"_blank\" rel=\"noopener\">G\u00fcvenli Kullan\u0131c\u0131 Ad\u0131 ve \u015fifre kimlik do\u011frulamas\u0131<\/a> bilinen ana bilgisayar anahtarlar\u0131n\u0131 kullanan ve anahtarlar\u0131 \u015fifreli ileti\u015fim yoluyla aktaran<\/li>\n<li><a href=\"https:\/\/www.rfc-editor.org\/rfc\/rfc1961.html\" target=\"_blank\" rel=\"noopener\">GSS-API kimlik do\u011frulamas\u0131<\/a> y\u00f6ntem<\/li>\n<\/ul>\n<p>Revizyonlar\u0131n \u00e7e\u015fitli SOCKS proxy t\u00fcrleriyle sonu\u00e7lanmas\u0131 dikkat \u00e7ekicidir:<\/p>\n<ul>\n<li>SOCKS4 proxy&#039;leri<\/li>\n<li>SOCKS5 proxy&#039;leri<\/li>\n<\/ul>\n<h2>SOCKS4 ve SOCKS5: Benzerlikler ve Farkl\u0131l\u0131klar<\/h2>\n<p><img decoding=\"async\" class=\"alignnone wp-image-1848 size-full\" title=\"SOCKS4 ve SOCKS5 aras\u0131ndaki benzerlikler ve farkl\u0131l\u0131klar\" src=\"https:\/\/proxycompass.com\/wp-content\/uploads\/2024\/03\/scheme_3_2_2_1.png\" alt=\"SOCKS4 ve SOCKS5 aras\u0131ndaki benzerlikler ve farkl\u0131l\u0131klar\" width=\"840\" height=\"193\" \/><\/p>\n<h3>SOCKS4 ve SOCKS5 Aras\u0131ndaki Benzerlikler<\/h3>\n<p>SOCKS4 ve SOCKS5 protokolleri ve buna ba\u011fl\u0131 olarak proxy&#039;ler a\u015fa\u011f\u0131daki y\u00f6nlerden benzerdir:<\/p>\n<ul>\n<li>SOCKS4 ve SOCKS5&#039;teki SOCKS hizmeti 1080 numaral\u0131 ba\u011flant\u0131 noktas\u0131nda bulunur<\/li>\n<li>Ayn\u0131 i\u015flemleri kullan\u0131rlar; <b>ba\u011flamak<\/b>, <b>ba\u011flamak<\/b>, <b>Dinlemek<\/b>, <b>kabul etmek<\/b>, Ve <b>getSOCKname<\/b>.<\/li>\n<\/ul>\n<h3>SOCKS4 ve SOCKS5 Aras\u0131ndaki Farklar<\/h3>\n<p>SOCKS4 ve SOCKS5 protokolleri ve proxy&#039;leri a\u015fa\u011f\u0131daki tabloda a\u00e7\u0131klanan \u00e7e\u015fitli \u015fekillerde farkl\u0131l\u0131k g\u00f6sterir:<\/p>\n<table>\n<tbody>\n<tr>\n<td style=\"text-align: left;\"><b>\u00a0<\/b><\/td>\n<td style=\"text-align: left;\"><b>SOCKS4<\/b><\/td>\n<td style=\"text-align: left;\"><b>SOCKS5<\/b><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\"><b>Desteklenen Alanlar<\/b><\/td>\n<td style=\"text-align: left;\">Yaln\u0131zca TCP&#039;yi destekler<\/td>\n<td style=\"text-align: left;\">Hem TCP hem de UDP&#039;yi destekler<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\"><b>G\u00fcvenlik<\/b><\/td>\n<td style=\"text-align: left;\">A\u011f paketlerinin kimli\u011fini do\u011frulamad\u0131\u011f\u0131 i\u00e7in g\u00fcvenli olmayan g\u00fcvenlik duvar\u0131 ge\u00e7i\u015fi sa\u011flar<\/td>\n<td style=\"text-align: left;\">Kullan\u0131c\u0131 ad\u0131 ve \u015fifre gereksinimleri gibi g\u00fc\u00e7l\u00fc kimlik do\u011frulama \u015femalar\u0131n\u0131 destekler, b\u00f6ylece g\u00fcvenli g\u00fcvenlik duvar\u0131 ge\u00e7i\u015fini destekler<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\"><b>Desteklenen Protokoller<\/b><\/td>\n<td style=\"text-align: left;\">FTP, SMTP, TELNET, HTTP ve GOPHER&#039;\u0131 (yani uygulama katman\u0131 protokollerini) destekler<\/td>\n<td style=\"text-align: left;\">FTP, SMTP, TELNET, HTTP ve GOPHER&#039;\u0131n yan\u0131 s\u0131ra NTP, DHCP, BOOTP, NNP, TFTP, RTSP, RIP ve DNS&#039;yi (yani uygulama ve aktar\u0131m katman\u0131 protokollerini) destekler.<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\"><b>IP adresi<\/b><\/td>\n<td style=\"text-align: left;\">Yaln\u0131zca IPv4 adreslerini destekler<\/td>\n<td style=\"text-align: left;\">IPv4 ve IPv6 adreslerini destekler<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\"><b>Alan ad\u0131<\/b><\/td>\n<td style=\"text-align: left;\">T\u00fcm alan adlar\u0131n\u0131 \u00e7\u00f6zemez ve bu nedenle IP adreslerini bulamaz.<\/td>\n<td style=\"text-align: left;\">IP adreslerini bulmak i\u00e7in t\u00fcm sunucular\u0131n alan adlar\u0131n\u0131 \u00e7\u00f6zebilir<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\"><b>Adresleme<\/b><\/td>\n<td style=\"text-align: left;\">Alan ad\u0131 adreslemeyi desteklemiyor<\/td>\n<td style=\"text-align: left;\">Alan ad\u0131 adreslemeyi destekler<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2><b>SOCKS Proxy Ba\u011flant\u0131s\u0131 Ne Kadar G\u00fcvenli?<\/b><\/h2>\n<p>SOCKS ba\u011flant\u0131s\u0131, HTTPS ba\u011flant\u0131s\u0131n\u0131n aksine \u015fifrelenmez. Ancak d\u0131\u015far\u0131dan tamamen eri\u015filemeyen herhangi bir SOCKS ba\u011flant\u0131s\u0131 \u00fczerinden (ba\u011flant\u0131 i\u00e7inde) \u015fifreli bir HTTPS ba\u011flant\u0131s\u0131 kurulabilir:<\/p>\n<figure id=\"attachment_469565\" aria-describedby=\"caption-attachment-469565\" style=\"width: 1200px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/proxycompass.com\/wp-content\/uploads\/2020\/11\/scheme_3_2_2_2_eng.png\"><img decoding=\"async\" class=\"size-full wp-image-469565\" src=\"https:\/\/proxycompass.com\/wp-content\/uploads\/2020\/11\/scheme_3_2_2_2_eng.png\" alt=\"SOCKS ba\u011flant\u0131s\u0131 i\u00e7indeki HTTP, UDP ve di\u011fer ba\u011flant\u0131lar\" width=\"1200\" height=\"800\" srcset=\"https:\/\/proxycompass.com\/wp-content\/uploads\/2020\/11\/scheme_3_2_2_2_eng.png 1200w, https:\/\/proxycompass.com\/wp-content\/uploads\/2020\/11\/scheme_3_2_2_2_eng-768x512.png 768w, https:\/\/proxycompass.com\/wp-content\/uploads\/2020\/11\/scheme_3_2_2_2_eng-18x12.png 18w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><\/a><figcaption id=\"caption-attachment-469565\" class=\"wp-caption-text\">SOCKS ba\u011flant\u0131s\u0131 i\u00e7indeki HTTP, UDP ve di\u011fer ba\u011flant\u0131lar<\/figcaption><\/figure>\n<p>Bu karma\u015f\u0131k g\u00f6r\u00fcnebilir, ancak ger\u00e7ekte \u00e7ok basittir ve b\u00f6yle bir ba\u011flant\u0131, kullan\u0131c\u0131 ilk kez bir SOCKS ba\u011flant\u0131s\u0131 kurdu\u011funda (\u00f6rn. <a href=\"https:\/\/proxycompass.com\/tr\/knowledge-base\/proxifier-proxy-setup-a-quick-guide\/\">Proxifier<\/a> ya da <a href=\"https:\/\/proxycompass.com\/tr\/knowledge-base\/foxyproxy-standard-extension-for-google-chrome\/\">taray\u0131c\u0131 eklentisi Foxyproxy<\/a>) ve ard\u0131ndan SSL sertifikas\u0131 kullanan bir web sayfas\u0131na gider (adres \u00e7ubu\u011funun solundaki \u201ckilit\u201d).<\/p>\n<p><b>Taray\u0131c\u0131 <\/b>&lt;- &gt; <b>SOCKS (HTTPS) SOCKS<\/b> &lt;-&gt; <b>hedef web sitesi<\/b><\/p>\n<p>Bu, ba\u011flant\u0131n\u0131n tamamen g\u00fcvenli oldu\u011fu ve proxy sa\u011flay\u0131c\u0131s\u0131 dahil hi\u00e7 kimsenin kullan\u0131c\u0131n\u0131n web sitesinde ne yapt\u0131\u011f\u0131n\u0131, ne yazd\u0131rd\u0131\u011f\u0131n\u0131, hangi resim veya videolar\u0131 g\u00f6r\u00fcnt\u00fcledi\u011fini veya y\u00fckledi\u011fini tam olarak \u00f6\u011frenemeyece\u011fi anlam\u0131na gelir.<\/p>\n<h2>SOCKS Proxy Sunucular\u0131n\u0131n Avantajlar\u0131 ve Dezavantajlar\u0131<\/h2>\n<h3>SOCKS Proxy&#039;lerin Avantajlar\u0131<\/h3>\n<p>SOCKS proxy&#039;lerinin avantajlar\u0131 \u015funlard\u0131r:<\/p>\n<ul>\n<li><b>Daha az hata<\/b>: SOCKS proxy&#039;leri, HTTP proxy&#039;lerinden farkl\u0131 olarak ba\u015fl\u0131klar gibi veri paketlerini yorumlamaz veya yeniden yazmaz. Bu nedenle yanl\u0131\u015f etiketlemeye veya di\u011fer hatalara e\u011filimli de\u011fildirler.<\/li>\n<li><b>\u00c7oklu protokol deste\u011fi<\/b> uygulama ve aktar\u0131m katmanlar\u0131nda: SOCKS4 proxy&#039;leri FTP, SMTP, TELNET, HTTP ve GOPHER protokollerini destekler. Buna kar\u015f\u0131l\u0131k, SOCKS5 proxy&#039;leri FTP, SMTP, TELNET, HTTP ve GOPHER protokollerinin yan\u0131 s\u0131ra NTP, DHCP, BOOTP, NNP, TFTP, RTSP, RIP ve DNS&#039;yi destekler. Bunun aksine, HTTP proxy&#039;leri yaln\u0131zca HTTP ve HTTPS protokollerini destekler.<\/li>\n<li><b>Daha iyi g\u00fcvenlik<\/b>: \u00d6zellikle SOCKS5 proxy&#039;leri \u00e7e\u015fitli a\u015famalarda kimlik do\u011frulama ger\u00e7ekle\u015ftirir. Bu g\u00fcvenli\u011fi art\u0131r\u0131r. Ancak genel olarak t\u00fcm SOCKS proxy&#039;lerinin verileri yorumlamad\u0131\u011f\u0131 veya yeniden yazmad\u0131\u011f\u0131 g\u00f6z \u00f6n\u00fcne al\u0131nd\u0131\u011f\u0131nda, ki\u015fisel bilgilerinizi i\u00e7eren veri paketlerini ortaya \u00e7\u0131karamazlar.<\/li>\n<li><b>Geli\u015fmi\u015f gizlilik<\/b>: SOCKS5 proxy&#039;leri IP adresinizi de\u011fi\u015ftirebilir, b\u00f6ylece ger\u00e7ek konumunuz gibi bilgileri gizleyebilir, \u00f6zellikle de IP adreslerinin bu t\u00fcr verileri saklad\u0131\u011f\u0131 g\u00f6z \u00f6n\u00fcne al\u0131nd\u0131\u011f\u0131nda.<\/li>\n<\/ul>\n<h3>SOCKS Proxy&#039;lerin Dezavantajlar\u0131<\/h3>\n<p>SOCKS proxy&#039;lerin dezavantajlar\u0131 a\u015fa\u011f\u0131dakileri i\u00e7erir:<\/p>\n<ul>\n<li><b>Ba\u011flant\u0131 gecikmesi\/yava\u015f h\u0131z<\/b>: \u00d6zellikle SOCKS5 proxy&#039;lerinin farkl\u0131 i\u015flem a\u015famalar\u0131nda bir dizi kimlik do\u011frulama i\u015flemi ger\u00e7ekle\u015ftirmesi gerekir, bu da daha d\u00fc\u015f\u00fck h\u0131z anlam\u0131na gelir.<\/li>\n<li><b>S\u0131n\u0131rl\u0131 arka ba\u011flant\u0131<\/b>: SOCKS5&#039;in ba\u011flama komutu, sunucunun istemciye birden \u00e7ok kez ba\u011flanmas\u0131n\u0131 (geri ba\u011flanma) gerektiren protokolleri yeterince kapsam\u0131yor; bunun yerine, \u00f6ncelikle yaln\u0131zca tek bir arka ba\u011flant\u0131 gerektiren FTP gibi protokoller i\u00e7in uygundur.<\/li>\n<li><b>Desteklenen UDP&#039;nin s\u0131n\u0131rl\u0131 yetenekleri<\/b>: SOCKS5&#039;in ilk UDP deste\u011finin yetenekleri s\u0131n\u0131rl\u0131yd\u0131. \u00d6rne\u011fin protokol, UDP uygulamalar\u0131n\u0131n veri g\u00f6ndermesi ve yan\u0131t almas\u0131 gerekti\u011fini \u00f6ng\u00f6r\u00fcyordu. Ancak bir\u00e7ok UDP uygulamas\u0131, IP adresi bilgisi gerektirmeden, veri g\u00f6ndermeden veya belirli bir ba\u011flant\u0131 noktas\u0131n\u0131 kullanmadan UDP verilerini alabilir. Bu nedenle, SOCKS5 proxy&#039;lerinin UDP yetenekleri s\u0131n\u0131rl\u0131d\u0131r.<\/li>\n<li><b>Geriye d\u00f6n\u00fck uyumsuzluk<\/b>: SOCKS5 proxy&#039;leri, SOCKS4a gibi SOCKS protokol\u00fcn\u00fcn \u00f6nceki s\u00fcr\u00fcmleriyle geriye d\u00f6n\u00fck olarak uyumlu de\u011fildir<\/li>\n<\/ul>\n<h2>SOCKS Proxy&#039;leri Nas\u0131l Kullan\u0131l\u0131r?<\/h2>\n<p>SOCKS proxy&#039;leri a\u015fa\u011f\u0131daki \u015fekillerde kullan\u0131l\u0131r:<\/p>\n<ul>\n<li>Kullan\u0131c\u0131lar\u0131n co\u011frafi engellemeyi a\u015fmas\u0131na olanak tan\u0131r. Bu \u015fekilde SOCKS proxy&#039;leri, \u00f6zellikle SOCKS5 proxy&#039;leri, di\u011fer konumlardan i\u00e7eri\u011fe eri\u015fmelerini sa\u011flar. (<a href=\"https:\/\/theconversation.com\/explainer-what-is-geoblocking-13057\" target=\"_blank\" rel=\"noopener\">Co\u011frafi engelleme veya co\u011frafi k\u0131s\u0131tlama<\/a> web sitelerinin yaln\u0131zca belirli bir konumdan gelen ziyaret\u00e7ilere i\u00e7erik g\u00f6stermesi uygulamas\u0131d\u0131r.)<\/li>\n<li>SOCKS proxy sunucular\u0131, sadece birka\u00e7\u0131n\u0131 saymak gerekirse, okullar, i\u015fyerleri ve h\u00fck\u00fcmetler taraf\u0131ndan yap\u0131lan internet filtrelemesinin a\u015f\u0131lmas\u0131na yard\u0131mc\u0131 olur<\/li>\n<li>Messenger&#039;lar\u0131n anonim kullan\u0131m\u0131, \u00f6rne\u011fin <a href=\"https:\/\/proxycompass.com\/tr\/knowledge-base\/setting-up-a-proxy-in-telegram-on-windows-macos-android-and-ios\/\">Telgraf<\/a><\/li>\n<li>Video ak\u0131\u015f\u0131 ve canl\u0131 aramalar<\/li>\n<li><a href=\"https:\/\/proxycompass.com\/tr\/knowledge-base\/how-to-anonymize-the-usage-of-torrent-clients\/\">Torrent<\/a> veya e\u015fler aras\u0131 payla\u015f\u0131m ve indirme<\/li>\n<li>SMTP deste\u011fi sayesinde toplu ve g\u00fcvenli e-posta g\u00f6nderimi<\/li>\n<li>SOCKS5 bir dizi uygulama d\u00fczeyindeki protokol\u00fc destekledi\u011finden genel web taramas\u0131<\/li>\n<li>\u0130\u015f a\u011flar\u0131na yetkisiz eri\u015fimin engellenmesi: SOCKS proxy&#039;leri, istenmeyen davetsiz misafirlerin yerel a\u011f i\u00e7indeki sunucuya veya bilgisayarlara eri\u015fmesini engellerken, i\u015f g\u00fcvenlik duvar\u0131 \u00fczerinden g\u00fcvenli internet eri\u015fimi sa\u011flayan ge\u00e7ici bir arac\u0131 g\u00f6revi g\u00f6r\u00fcr.<\/li>\n<\/ul>\n<h2>SOCKS Proxy&#039;ler ve HTTP Proxy&#039;ler<\/h2>\n<p>Daha \u00f6nce ayr\u0131nt\u0131l\u0131 olarak a\u00e7\u0131kland\u0131\u011f\u0131 gibi, SOCKS proxy&#039;leri ve HTTP proxy&#039;leri protokol tabanl\u0131 proxy sunuculard\u0131r. HTTP ve HTTPS proxy&#039;lerinin neler ba\u015farabilece\u011fine ili\u015fkin ayr\u0131nt\u0131l\u0131 bir tart\u0131\u015fma i\u00e7in \u015fu makalemize bak\u0131n: <a href=\"https:\/\/proxycompass.com\/tr\/knowledge-base\/what-are-http-and-https-proxies\/\">HTTP ve HTTPS proxy&#039;leri<\/a>.<\/p>\n<h3>SOCKS Proxy&#039;leri ve HTTP Proxy&#039;leri Nas\u0131l Kar\u015f\u0131la\u015ft\u0131r\u0131l\u0131r?<\/h3>\n<p>Bu b\u00f6l\u00fcmde SOCKS ile HTTP proxy&#039;leri aras\u0131ndaki benzerlikler ve farkl\u0131l\u0131klar ayr\u0131nt\u0131lar\u0131yla anlat\u0131lmaktad\u0131r.<\/p>\n<h4>SOCKS Proxy&#039;leri ve HTTP Proxy&#039;leri aras\u0131ndaki benzerlikler<\/h4>\n<p>SOCKS ve HTTP proxy&#039;leri a\u015fa\u011f\u0131daki y\u00f6nlerden benzerdir:<\/p>\n<ul>\n<li>\u0130kisi de internet protokollerini temel al\u0131yor<\/li>\n<\/ul>\n<h4>SOCKS Proxy&#039;leri ve HTTP Proxy&#039;leri aras\u0131ndaki farklar<\/h4>\n<p>SOCKS ve HTTP proxy&#039;leri a\u015fa\u011f\u0131daki a\u00e7\u0131lardan farkl\u0131l\u0131k g\u00f6sterir:<\/p>\n<table>\n<tbody>\n<tr>\n<td style=\"text-align: left;\"><b>\u00a0<\/b><\/td>\n<td style=\"text-align: left;\"><b>SOCKS Proxy&#039;leri<\/b><\/td>\n<td style=\"text-align: left;\"><b>HTTP Proxy&#039;leri<\/b><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\"><b>Protokoller<\/b><\/td>\n<td style=\"text-align: left;\">UDP protokollerinin yan\u0131 s\u0131ra \u00e7ok say\u0131da TCP protokol\u00fcn\u00fc de desteklerler<\/td>\n<td style=\"text-align: left;\">Yaln\u0131zca HTTP ve HTTPS protokollerini desteklerler<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\"><b>G\u00fcvenlik<\/b><\/td>\n<td style=\"text-align: left;\">Verileri \u015fifrelemezler<\/td>\n<td style=\"text-align: left;\">HTTPS proxy&#039;leri verileri \u015fifreler<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\"><b>G\u00fcvenlik Duvar\u0131 Eri\u015fimi<\/b><\/td>\n<td style=\"text-align: left;\">SOCKS proxy&#039;leri bir a\u011f g\u00fcvenlik duvar\u0131 \u00fczerinden internet eri\u015fimi sa\u011flar<\/td>\n<td style=\"text-align: left;\">G\u00fcvenlik duvarlar\u0131 \u00fczerinden ba\u011flant\u0131 sa\u011flamazlar<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\"><b>Veri Yorumlama<\/b><\/td>\n<td style=\"text-align: left;\">Verileri yorumlamaz, analiz etmez veya yeniden yazmazlar<\/td>\n<td style=\"text-align: left;\">Verileri yorumlarlar ve baz\u0131 durumlarda ba\u015fl\u0131k paketlerini yeniden yazarlar.<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\"><b>Birlikte \u00e7al\u0131\u015fabilirlik<\/b><\/td>\n<td style=\"text-align: left;\">SOCKS proxy&#039;leri HTTP ve HTTPS protokol\u00fcn\u00fc kullanabilir<\/td>\n<td style=\"text-align: left;\">HTTP ve HTTPS proxy&#039;leri SOCKS protokol\u00fcn\u00fc kullanamaz<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\"><b>OSI S\u0131n\u0131fland\u0131rmas\u0131<\/b><\/td>\n<td style=\"text-align: left;\">SOCKS proxy&#039;leri daha d\u00fc\u015f\u00fck bir seviyede (katman 5) bulunur. <a href=\"https:\/\/en.wikipedia.org\/wiki\/OSI_model\" target=\"_blank\" rel=\"noopener\">OSI s\u0131n\u0131fland\u0131rmas\u0131<\/a>yani oturum katman\u0131<\/td>\n<td style=\"text-align: left;\">HTTP proxy&#039;leri, OSI s\u0131n\u0131fland\u0131rmas\u0131n\u0131n daha y\u00fcksek bir d\u00fczeyinde (katman 4), yani ta\u015f\u0131ma katman\u0131nda bulunur.<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\"><b>Configuration<\/b><\/td>\n<td style=\"text-align: left;\">SOCKS proxy&#039;leri yaln\u0131zca web sunucusu olmayan bir web istemcisine veya makineye entegre edilebilir<\/td>\n<td style=\"text-align: left;\">HTTP proxy&#039;leri web istemcisinde veya sunucuda yap\u0131land\u0131r\u0131labilir<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\"><b>Liman<\/b><\/td>\n<td style=\"text-align: left;\">SOCKS hizmetleri, SOCKS proxy ba\u011flant\u0131 noktalar\u0131 1080 ve 1085 arac\u0131l\u0131\u011f\u0131yla kullan\u0131labilir<\/td>\n<td style=\"text-align: left;\">HTTP proxy&#039;leri 80, 8080, 8085, 3128 ve 3129 numaral\u0131 ba\u011flant\u0131 noktalar\u0131n\u0131 kullan\u0131rken, HTTPS proxy&#039;leri 443 numaral\u0131 ba\u011flant\u0131 noktas\u0131n\u0131 kullan\u0131r<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>SOCKS Proxy ve VPN&#039;ler<\/h2>\n<p>Kabul edilirse, SOCKS proxy&#039;leri g\u00fcvenlik duvar\u0131 \u00fczerinden g\u00fcvenli bir t\u00fcnel olu\u015fturabilir. Ancak bir g\u00fcvenlik anahtar\u0131 kullanarak g\u00fcvenli bir t\u00fcnel olu\u015fturabilece\u011finizi de biliyor muydunuz? <a href=\"https:\/\/www.techtarget.com\/searchnetworking\/definition\/virtual-private-network\" target=\"_blank\" rel=\"noopener\">sanal \u00f6zel a\u011f veya VPN<\/a>? VPN, iki a\u011f aras\u0131nda g\u00fcvenli bir ileti\u015fim yolu olu\u015fturur: yerel a\u011f ve harici a\u011flar. Bunu, t\u00fcm internet trafi\u011fini bir t\u00fcnel \u00fczerinden y\u00f6nlendirerek ba\u015far\u0131r, ancak bunu giri\u015f noktas\u0131nda (\u00f6rne\u011fin bilgisayar\u0131n\u0131z) verileri \u015fifrelemeden \u00f6nce yapmaz. T\u00fcnel, kullan\u0131c\u0131n\u0131n yerel a\u011f\u0131ndan veya bilgisayar\u0131ndan giden isteklere yeni bir IP adresi atayan ve ger\u00e7ek IP adresini etkili bir \u015fekilde gizleyen bir \u00e7\u0131k\u0131\u015f d\u00fc\u011f\u00fcm\u00fcnde (VPN&#039;in \u00e7\u0131k\u0131\u015f sunucusu) sona erer.<\/p>\n<p>VPN kullan\u0131rken t\u00fcm isteklerin \u00e7\u0131k\u0131\u015f notundan kaynakland\u0131\u011f\u0131 g\u00f6r\u00fcl\u00fcyor. Ayn\u0131 zamanda, bir web sunucusundan gelen t\u00fcm yan\u0131tlar\u0131n bu VPN sunucusunda sona erdi\u011fi g\u00f6r\u00fclmektedir. Bu d\u00fczenleme sayesinde, VPN sa\u011flay\u0131c\u0131s\u0131n\u0131n sunucusunun bulundu\u011fu herhangi bir konumun co\u011frafi olarak engellenen i\u00e7eri\u011fine eri\u015fmek i\u00e7in bir VPN kullanabilirsiniz.<\/p>\n<p>\u00d6rne\u011fin, Almanya&#039;da bulunuyorsan\u0131z ve yaln\u0131zca Amerika Birle\u015fik Devletleri&#039;nde ikamet edenlerin g\u00f6r\u00fcnt\u00fcleyebildi\u011fi web i\u00e7eri\u011fine eri\u015fmek istiyorsan\u0131z, ABD merkezli bir VPN sunucusunu kullanabilirsiniz.<\/p>\n<p>Bunu yapmak i\u00e7in \u00f6ncelikle makinenizi bir giri\u015f d\u00fc\u011f\u00fcm\u00fcne d\u00f6n\u00fc\u015ft\u00fcrecek VPN yaz\u0131l\u0131m\u0131n\u0131 bilgisayar\u0131n\u0131za y\u00fcklemelisiniz. Yaz\u0131l\u0131m, verilerin \u015fifrelenmesinden sorumludur. Daha sonra \u00e7\u0131k\u0131\u015f d\u00fc\u011f\u00fcm\u00fcn\u00fc se\u00e7meniz gerekecek ve VPN bu \u00e7\u0131k\u0131\u015f sunucusuna ba\u011fland\u0131\u011f\u0131nda iste\u011finizi g\u00f6ndermekte \u00f6zg\u00fcrs\u00fcn\u00fcz.<\/p>\n<h3>VPN&#039;lerin avantajlar\u0131<\/h3>\n<p>Sanal \u00f6zel a\u011flar\u0131n avantajlar\u0131 \u015funlar\u0131 i\u00e7erir:<\/p>\n<ul>\n<li><b>\u015eifreleme ve g\u00fcvenlik<\/b>: VPN&#039;ler t\u00fcm istekleri ve sunucu yan\u0131tlar\u0131n\u0131 \u015fifreler, b\u00f6ylece e\u015fsiz g\u00fcvenli\u011fi garanti eder. Bu nedenle, halka a\u00e7\u0131k Wi-Fi \u00fczerinden internete eri\u015fti\u011finizde bir VPN kullanman\u0131z tavsiye edilir.<\/li>\n<li><b>Co\u011frafi olarak engellenen i\u00e7eri\u011fe eri\u015fim sa\u011flay\u0131n<\/b>: VPN, trafi\u011fi farkl\u0131 bir \u00fclkedeki bir \u00e7\u0131k\u0131\u015f d\u00fc\u011f\u00fcm\u00fc \u00fczerinden y\u00f6nlendirerek sizi sanal olarak o konuma ta\u015f\u0131r. Sonu\u00e7 olarak, VPN olmadan kendi \u00fclkenizde eri\u015femeyece\u011finiz web i\u00e7eri\u011fine eri\u015febilirsiniz.<\/li>\n<li><b>\u00c7evrimi\u00e7i gizlilik<\/b>: VPN&#039;ler ger\u00e7ek IP adresinizi gizler ve ard\u0131ndan farkl\u0131 bir adres atar. Bu \u015fekilde konumunuz (eyalet, \u015fehir, \u00fclke ve yakla\u015f\u0131k koordinatlar) gibi sizinle ilgili belirli verileri gizleyerek \u00e7evrimi\u00e7i gizlili\u011finizi korurlar.<\/li>\n<\/ul>\n<h3>VPN&#039;lerin dezavantajlar\u0131<\/h3>\n<p>Sanal \u00f6zel a\u011flar\u0131n dezavantajlar\u0131 \u015funlar\u0131 i\u00e7erir:<\/p>\n<ul>\n<li><b>Yava\u015f ba\u011flant\u0131 h\u0131zlar\u0131<\/b>: Bu \u00e7\u00f6z\u00fcm\u00fcn t\u00fcm giden istekleri ve gelen yan\u0131tlar\u0131 \u015fifrelemesi gerekti\u011finden genellikle daha yava\u015ft\u0131r.<\/li>\n<li><b>Kullan\u0131c\u0131 verilerini g\u00fcnl\u00fc\u011fe kaydetme<\/b>: VPN kullan\u0131c\u0131lar\u0131 aras\u0131nda karga\u015faya yol a\u00e7an bir di\u011fer yayg\u0131n dezavantaj, baz\u0131 VPN sa\u011flay\u0131c\u0131lar\u0131n\u0131n s\u0131kl\u0131kla kullan\u0131c\u0131 verilerini g\u00fcnl\u00fc\u011fe kaydetmesidir. Bunu, istendi\u011finde kolluk kuvvetlerine s\u00f6z konusu verileri daha sonra sa\u011flamak i\u00e7in yaparlar. Asl\u0131nda bir\u00e7ok sa\u011flay\u0131c\u0131, ara\u015ft\u0131rma kurumlar\u0131na kullan\u0131c\u0131 verilerini sa\u011flayarak man\u015fetlere \u00e7\u0131kt\u0131. Ayr\u0131ca baz\u0131 \u00fclkeler gibi <a href=\"https:\/\/timesofindia.indiatimes.com\/business\/india-business\/explained-what-the-new-vpn-rules-means-for-internet-users-in-india\/articleshow\/91510719.cms\" target=\"_blank\" rel=\"noopener\">Hindistan<\/a>, VPN sa\u011flay\u0131c\u0131lar\u0131n\u0131n kullan\u0131c\u0131 verilerini kaydetmesini zorunlu k\u0131lan yasalara sahiptir. Bu \u00e7er\u00e7evede g\u00f6zlemciler <a href=\"https:\/\/www.cnet.com\/tech\/services-and-software\/why-you-should-be-skeptical-about-a-vpns-no-logs-claims\/\" target=\"_blank\" rel=\"noopener\">\u00f6nceden tavsiye edilmi\u015f<\/a> kullan\u0131c\u0131lar\u0131n sa\u011flay\u0131c\u0131lar\u0131n &#039;G\u00fcnl\u00fck yok&#039; politikas\u0131n\u0131 ger\u00e7ek de\u011feriyle kabul etmeleri.<\/li>\n<li><b>\u00dccretsiz VPN&#039;ler genellikle g\u00fcvenli de\u011fildir<\/b>: Bu t\u00fcr VPN&#039;ler genellikle birden fazla kullan\u0131c\u0131 aras\u0131nda ayn\u0131 g\u00fcvenli t\u00fcneli payla\u015f\u0131r, bu da &#039;koklama&#039; veya gizlice dinleme olas\u0131l\u0131\u011f\u0131n\u0131 art\u0131rabilir.<\/li>\n<li><b>VPN&#039;ler baz\u0131 \u00fclkelerde yasaklanm\u0131\u015ft\u0131r<\/b>: Baz\u0131 \u00fclkeler VPN kullan\u0131m\u0131n\u0131 tamamen yasa d\u0131\u015f\u0131 hale getirmi\u015ftir. Di\u011fer \u00fclkelerde yaln\u0131zca devlet lisansl\u0131 VPN&#039;ler kullan\u0131labilir.<\/li>\n<\/ul>\n<h3>VPN&#039;lerin kullan\u0131m alanlar\u0131<\/h3>\n<p>Sanal \u00f6zel a\u011flar a\u015fa\u011f\u0131daki \u015fekillerde kullan\u0131l\u0131r:<\/p>\n<ul>\n<li>VPN&#039;ler internete genel eri\u015fim noktalar\u0131 \u00fczerinden eri\u015firken g\u00fcvenlik sa\u011flar<\/li>\n<li>Co\u011frafi olarak engellenen i\u00e7eri\u011fe eri\u015fim: Belirtildi\u011fi gibi, SOCKS5 proxy&#039;leri gibi VPN&#039;ler herhangi bir yerden herhangi bir i\u00e7eri\u011fe eri\u015fmenize olanak tan\u0131r<\/li>\n<li>Uzaktan \u00e7al\u0131\u015fmay\u0131 kolayla\u015ft\u0131r\u0131n: \u015eirketler, uzaktan \u00e7al\u0131\u015fanlar\u0131n\u0131n \u00f6zel VPN&#039;ler arac\u0131l\u0131\u011f\u0131yla sistemlerine veya sunucular\u0131na giri\u015f yapmalar\u0131n\u0131 zorunlu k\u0131larak verilerini korur<\/li>\n<\/ul>\n<h3>SOCKS Proxy&#039;leri VPN&#039;lerle Nas\u0131l Kar\u015f\u0131la\u015ft\u0131r\u0131l\u0131r?<\/h3>\n<p>SOCKS proxy&#039;lerin yukar\u0131da belirtilen \u00f6zelliklerini, avantajlar\u0131n\u0131 ve dezavantajlar\u0131n\u0131 hat\u0131rlayacak olursak, SOCKS proxy&#039;ler ile VPN&#039;ler nas\u0131l kar\u015f\u0131la\u015ft\u0131r\u0131l\u0131r?<\/p>\n<h4><b>SOCKS Proxy&#039;ler ve VPN&#039;ler aras\u0131ndaki benzerlikler<\/b><\/h4>\n<p>SOCKS proxy&#039;leri ve VPN&#039;ler a\u015fa\u011f\u0131dakiler de dahil olmak \u00fczere belirli benzerliklere sahiptir:<\/p>\n<ul>\n<li>\u00c7evrimi\u00e7i gizlilik: SOCKS5 proxy&#039;leri ve VPN&#039;ler ger\u00e7ek IP adreslerini gizleyerek \u00e7evrimi\u00e7i gizlilik sunar<\/li>\n<li>G\u00fcvenlik: Her iki \u00e7\u00f6z\u00fcm de farkl\u0131 \u015fekillerde de olsa g\u00fcvenli\u011fi art\u0131r\u0131r. SOCKS5 proxy&#039;leri kimlik do\u011frulama ger\u00e7ekle\u015ftirirken VPN&#039;ler verileri \u015fifreler.<\/li>\n<li>Desteklenen protokoller: baz\u0131lar\u0131 <a href=\"https:\/\/cybernews.com\/what-is-vpn\/vpn-protocols\/\" target=\"_blank\" rel=\"noopener\">VPN protokolleri<\/a>OpenVPN gibi TCP ve UDP&#039;yi desteklerken SOCKS5 proxy&#039;leri de TCP ve UDP&#039;yi destekler.<\/li>\n<li>Co\u011frafi k\u0131s\u0131tlamalar\u0131n a\u015f\u0131lmas\u0131: SOCKS5 proxy&#039;leri ve VPN&#039;ler, co\u011frafi olarak engellenen i\u00e7eri\u011fe eri\u015fmek i\u00e7in kullan\u0131labilir.<\/li>\n<\/ul>\n<h4><b>SOCKS Proxy&#039;ler ve VPN&#039;ler aras\u0131ndaki farklar<\/b><\/h4>\n<p>SOCKS proxy sunucular\u0131 ve VPN&#039;ler birka\u00e7 a\u00e7\u0131dan farkl\u0131l\u0131k g\u00f6sterir. A\u015fa\u011f\u0131daki tablo bu farkl\u0131l\u0131klar\u0131 \u00f6zetlemektedir:<\/p>\n<table>\n<tbody>\n<tr>\n<td style=\"text-align: left;\"><b>\u00a0<\/b><\/td>\n<td style=\"text-align: left;\"><b>SOCKS Proxy&#039;leri<\/b><\/td>\n<td style=\"text-align: left;\"><b>VPN&#039;ler<\/b><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\"><b>Protokoller<\/b><\/td>\n<td style=\"text-align: left;\">SOCKS proxy&#039;leri, \u00f6zellikle SOCKS5 proxy&#039;leri, FTP, SMTP, TELNET, HTTP, GOPHER, NTP, DHCP, BOOTP, NNP, TFTP, RTSP, RIP ve DNS dahil olmak \u00fczere ta\u015f\u0131ma ve uygulama katman\u0131 proxy&#039;lerini destekler<\/td>\n<td style=\"text-align: left;\">VPN&#039;ler genellikle IKEv2, OpenVPN, L2TP\/IPSec, WireGuard, SSTP ve PPTP gibi VPN protokollerini kullan\u0131r<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\"><b>Ba\u011flant\u0131 h\u0131z\u0131<\/b><\/td>\n<td style=\"text-align: left;\">SOCKS proxy&#039;leri \u015fifreleme yapmad\u0131klar\u0131 i\u00e7in genellikle daha h\u0131zl\u0131d\u0131r<\/td>\n<td style=\"text-align: left;\">VPN&#039;ler yava\u015ft\u0131r \u00e7\u00fcnk\u00fc verileri \u015fifrelerler<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\"><b>Sunucu Say\u0131s\u0131<\/b><\/td>\n<td style=\"text-align: left;\">SOCKS proxy servis sa\u011flay\u0131c\u0131lar\u0131 genellikle y\u00fczbinlerce, hatta birka\u00e7 milyon proxy sunucusu sa\u011flar<\/td>\n<td style=\"text-align: left;\">VPN sa\u011flay\u0131c\u0131lar\u0131n\u0131n genellikle daha az sunucusu vard\u0131r<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\"><b>\u00dclkeler<\/b><\/td>\n<td style=\"text-align: left;\">Baz\u0131 SOCKS sa\u011flay\u0131c\u0131lar\u0131n\u0131n 150&#039;den fazla \u00fclkede proxy sunucular\u0131 vard\u0131r<\/td>\n<td style=\"text-align: left;\">VPN sa\u011flay\u0131c\u0131lar\u0131n\u0131n genellikle daha az \u00fclkede, genellikle 100&#039;den az \u00fclkede VPN sunucular\u0131 vard\u0131r<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>\u00c7\u00f6z\u00fcm<\/h2>\n<p>SOCKS proxy, bir a\u011f g\u00fcvenlik duvar\u0131 arac\u0131l\u0131\u011f\u0131yla kullan\u0131c\u0131lar\u0131n bilgisayarlar\u0131 aras\u0131nda ve web istemcileri ile web sunucular\u0131 aras\u0131nda ileti\u015fimi sa\u011flar. SOCKS protokol\u00fcn\u00fc temel alan bu proxy t\u00fcr\u00fc, davetsiz misafirlerin \u00e7e\u015fitli taraflar aras\u0131ndaki ileti\u015fime eri\u015fmesini engeller. Y\u0131llar ge\u00e7tik\u00e7e, SOCKS protokol\u00fc geli\u015ftirildi ve SOCKS4, SOCKS4a ve SOCKS5 olmak \u00fczere \u00e7e\u015fitli versiyonlar ortaya \u00e7\u0131kt\u0131. Sonu\u00e7 olarak, SOCKS4 proxy&#039;ler ve SOCKS5 proxy&#039;ler olmak \u00fczere \u00e7e\u015fitli SOCKS proxy t\u00fcrleri vard\u0131r; ikincisi \u00fcst\u00fcn yetenekler sunar. SOCKS proxy&#039;leri torrent, e-posta g\u00f6nderme, video ak\u0131\u015f\u0131, canl\u0131 aramalar ve genel tarama dahil olmak \u00fczere \u00e7e\u015fitli \u015fekillerde kullan\u0131l\u0131r. Ayr\u0131ca \u00e7evrimi\u00e7i anonimlik de sa\u011flarlar. Bu makalede SOCKS proxy&#039;lerini VPN&#039;ler ve HTTP proxy&#039;leriyle kar\u015f\u0131la\u015ft\u0131rd\u0131k ve benzersiz ihtiya\u00e7lar\u0131n\u0131z i\u00e7in hangisini se\u00e7ece\u011finiz konusunda daha iyi bilgi sahibi oldu\u011funuzu umuyoruz.<\/p>","protected":false},"excerpt":{"rendered":"<p>You have likely heard about proxies and perhaps even SOCKS proxies. At their core, proxy servers or proxies are hardware- or software-based intermediaries that sit on a local or remote machine. In this intermediate role, they route all traffic between web browsers (web clients) and web servers through themselves, thus blocking or preventing direct communication. [&hellip;]<\/p>\n","protected":false},"featured_media":469575,"menu_order":0,"template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"kb-categories":[69,71],"class_list":["post-468697","knowledge-base","type-knowledge-base","status-publish","has-post-thumbnail","hentry","kb-categories-proxy-types","kb-categories-proxies-by-protocol"],"acf":[],"_links":{"self":[{"href":"https:\/\/proxycompass.com\/tr\/wp-json\/wp\/v2\/knowledge-base\/468697","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/proxycompass.com\/tr\/wp-json\/wp\/v2\/knowledge-base"}],"about":[{"href":"https:\/\/proxycompass.com\/tr\/wp-json\/wp\/v2\/types\/knowledge-base"}],"version-history":[{"count":3,"href":"https:\/\/proxycompass.com\/tr\/wp-json\/wp\/v2\/knowledge-base\/468697\/revisions"}],"predecessor-version":[{"id":469593,"href":"https:\/\/proxycompass.com\/tr\/wp-json\/wp\/v2\/knowledge-base\/468697\/revisions\/469593"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/proxycompass.com\/tr\/wp-json\/wp\/v2\/media\/469575"}],"wp:attachment":[{"href":"https:\/\/proxycompass.com\/tr\/wp-json\/wp\/v2\/media?parent=468697"}],"wp:term":[{"taxonomy":"kb-categories","embeddable":true,"href":"https:\/\/proxycompass.com\/tr\/wp-json\/wp\/v2\/kb-categories?post=468697"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}