SOCKS4

GPTKB entity

Statements (58)
Predicate Object
gptkbp:instance_of gptkb:protocol
gptkbp:can_be_used_with email clients
web browsers
instant messaging clients
gptkbp:developed_by gptkb:David_Koblas
gptkbp:first_released gptkb:1998
gptkbp:has_limitations 4-byte IP addresses
https://www.w3.org/2000/01/rdf-schema#label SOCKS4
gptkbp:is_available_in various programming libraries
gptkbp:is_commonly_configured_in firewalls
gptkbp:is_compatible_with gptkb:SOCKS5
gptkb:IPv6
gptkbp:is_considered legacy protocol
gptkbp:is_defined_by gptkb:RFC_1928
gptkbp:is_effective_against VPNs
HTTP proxies
gptkbp:is_implemented_in various software applications
gptkbp:is_less_commonly_used_than gptkb:SOCKS5
gptkbp:is_less_flexible_than gptkb:SOCKS5
gptkbp:is_often_accompanied_by VPNs
gptkbp:is_often_configured_for specific applications
gptkbp:is_often_misconfigured_in network setups
gptkbp:is_often_seen_in corporate networks
gptkbp:is_often_used_in gptkb:cloud_services
web scraping
peer-to-peer applications
privacy advocates
circumventing censorship
torrent clients
access blocked content
gptkbp:is_part_of gptkb:SOCKS_protocol_family
internet privacy tools
gptkbp:is_popular_in HTTP proxies
gptkbp:is_recommended_for anonymity
gptkbp:is_supported_by various routers
many operating systems
some firewalls
gptkbp:is_used_by gptkb:Espionage
gptkbp:is_used_for bypassing geo-restrictions
proxying internet traffic
gptkbp:is_used_in VPN services
data scraping
gptkbp:is_used_to mask IP address
gptkbp:is_utilized_by security professionals
gptkbp:is_utilized_in online gaming
gptkbp:provides firewall traversal
gptkbp:reliability direct connections
gptkbp:security gptkb:SOCKS5
gptkbp:successor gptkb:SOCKS5
gptkbp:suitable_for real-time applications
secure communications
high-security applications
gptkbp:supported authentication
gptkbp:supports gptkb:IPv4
gptkbp:uses gptkb:TCP
gptkb:UDP
gptkbp:bfsParent gptkb:Socket_5
gptkbp:bfsLayer 6