RESTRICTED SITE ACCESSED , PAGE BLOCKED BY ADMINISTRATOR , ACCOUNT LOCKED UNAUTHORISED ACCESS etc
Have you ever been annoyed by your organisation,workplaces, etc while trying to access certain sites.Well !! there are lot many ways to overcome this issue. Generally the organisation,workplaces have filters to block you from accessing some sites from their network . When users try to access a web page, the filtering software checks its list database and blocks access to any web page on that list. If keyword blocking is enabled, the software will check each web page (the domain, URL path and/or body content of the requested page) and dynamically block access to the web page if any of the banned keywords are present.
The following is the solution which change from scenario to scenario. Choose accordingly and act stealthly... ;)
PROXY SERVERS :
Proxy servers are those which act inbetween your web browser and the server and acts as a buffer. It can carry out many requests such as HTTP ,FTP and SSL Service too.
here are some proxy servers and softwares...
Squid is free proxy server software and can be secured with Stunnel server.
- www.squid-cache.org
www.stunnel.org
ice.citizenlab.org/projects/aardvark - Privoxy is a proxy with advanced filtering capabilities for protecting privacy.
www.privoxy.org - Secure Shell (SSH) has a built-in socks proxy ($ ssh -D port secure.host.com)
www.openssh.com - HTTPport/HTTPhost allows you to bypass your HTTP proxy, which is blocking you from the Internet.
Here are some open proxies which are left open for connections from remote servers...
- [www.samair.ru/proxy]->http://www.samair.ru/proxy]
www.antiproxy.com
tools.rosinstrument.com/proxy
www.multiproxy.org
www.publicproxyservers.com _ - Software: ProxyTools/LocalProxy
proxytools.sourceforge.net - http://vtunnel.com
www.kproxy.com
www.safelizard.com
www.worldwant.com
www.rapidproxy.com
TUNNELLING
Tunneling, also known as port forwarding, allows one to encapsulate insecure, unencrypted traffic within an encrypted protocol. The user in a censored location must download client software that creates a tunnel to a computer in a non-filtered location. The normal services on the user’s computer are available, but run through the encrypted tunnel to the non-filtered computer which forward the user’s requests and their responses transparently.
When using free tunneling services users should note that they often include advertisements. Requests for the advertisements are conducted through plain text HTTP requests which can be intercepted by any intermediary who can then determine that the user is using a tunneling service. Moreover, many tunneling services rely on the use of socks proxies which may leak domain name requests.
www.http-tunnel.com
www.hopster.com
www.htthost.com
- Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy.
- JAP makes it possible to surf the Internet anonymously. Instead of connecting directly to a web server, users take a detour, connecting with encryption through several intermediaries, so-called mixes.
- Freenet is free software which lets you publish and obtain information on the Internet without fear of censorship. It is entirely decentralized and publishers and consumers of information are anonymous.
CIRCUMVENTORS :
circumvention technologies work by routing a user’s request from a country that implemented filtering through an intermediary machine that is not blocked by the filtering regime. This computer then retrieves the requested content for the censored user and transmits the content back to the use.
Following are some public web-based circumventor. People with low security can make use of it and High profile organisation have these sites in their blocked list already. Using these sites doesn't require much expertise.
http://www.anonymizer.com
http://www.unipeak.com
http://www.anonymouse.ws
http://www.proxyweb.net
http://www.guardster.com
http://www.webwarper.net
http://www.proxify.com
http://www.the-cloak.com
Always the circumventors with SSL is recommended as your session will be encrypted. There are some circumventors web based softwares which require some expertise to configure them..
Some sites like peacefire do have a email list when subscribed will send you list of new circumventing sites.. If your employer too subscribes this.. All your works are then castles in the air. [:)]
some WEB BASED CIRCUMVENTING SOFTWARES
CGIProxy: A CGI script acts as an HTTP or FTP proxy.
Peacefire’s Circumventor: An automated installer program that makes it much easier for non-technical users to install and configure CGIProxy.
pHproxy: An experimental, highly configurable web-based circumventor.
Psiphon: An SSL-enabled webserver with built-in web-based circumventor.
Hope you enjoyed your stay . Do have your say in comments......
If you like my blog u can subscribe here
No comments:
Post a Comment