Just how secure are the various reverse proxy options? Specifically from the standpoint of protecting against common and not-so-common exploits....