SlideShare una empresa de Scribd logo
1 de 36
Descargar para leer sin conexión
http://www.technolawgyx.blogspot.com
TABLE OF INDEX
ACKNOWLEDGMENTS .............................................................................................1

PREFACE......................................................................................................................2

CHAPTER 1 – MISCELLANEOUS METHODS.........................................................4

SSL Connection .........................................................................................................4

IP Address Method ....................................................................................................4

SSL + IP Address.......................................................................................................5

GetIP Method.............................................................................................................5

Google Translate Method ..........................................................................................6

Mobile Simulator Method..........................................................................................7

Webpage in email ......................................................................................................7

Screenshot Method.....................................................................................................7

Alternate Domain Method .........................................................................................8

Change DNS Server...................................................................................................8

Coral CDN Method....................................................................................................8

CHAPTER 2 – SETTING UP TOOLS..........................................................................9

Setting Up Proxy........................................................................................................9

Safe Testing Environment........................................................................................10

Changing MAC Address..........................................................................................10

CHAPTER 3 – BROWSER BASED METHODS.......................................................11

Opera Turbo Mode...................................................................................................11

Yandex Turbo Mode................................................................................................11

Conventional Proxies...............................................................................................11

TinyProxy ................................................................................................................12

Web Freer.................................................................................................................13

i
http://www.technolawgyx.blogspot.com
UseJump...................................................................................................................13

xBrowser..................................................................................................................14

Jondo........................................................................................................................14

Firefox Extensions ...................................................................................................15

i) AutoProxy...................................................................................................................................15

ii) Best Proxy Switcher ..................................................................................................................15

iii) One Click Proxy IP.....................................................................................................................15

Chrome Extensions..................................................................................................15

i) Zenmate for Google Chrome .....................................................................................................15

ii) Hola ...........................................................................................................................................16

CHAPTER 4 – CLIENT BASED TOOLS..................................................................18

Freegate....................................................................................................................18

Tor............................................................................................................................18

Ultrasurf...................................................................................................................19

Hotspot Shield..........................................................................................................19

Psiphon.....................................................................................................................20

GPass........................................................................................................................20

Your Freedom..........................................................................................................21

Spotflux....................................................................................................................21

Proxpn......................................................................................................................22

VPNium ...................................................................................................................22

CyberGhost VPN .....................................................................................................23

Sam Proxy................................................................................................................23

SecurityKiss.............................................................................................................24

Open VPN................................................................................................................24

PD Proxy..................................................................................................................25

AutoHide IP .............................................................................................................25

GTunnel ...................................................................................................................25

ii
http://www.technolawgyx.blogspot.com
CHAPTER 4 – MAKING YOUR OWN PROXIES ...................................................26

PHProxy...................................................................................................................26

Wordpress Proxy Method ........................................................................................27

Proxy using Google App Engine .............................................................................31

iii
http://www.technolawgyx.blogspot.com
Text Copyright © 2014 Mohit Yadav

All Rights Reserved

Cover Design by: Pitamber Yadav

iv
http://www.technolawgyx.blogspot.com
ACKNOWLEDGMENTS
This book has been made possible only due to the following people:­
1) Typical IT administrators who block YouTube to reduce load on network so that their
UltraHD (4096 pixels) porn gets buffered faster
2)	 College Administrators, who do not understand the idea that it’s much more
economical to provide unrestricted internet with one IT guy rather than investing in a
bunch of fools (known as IT Support) and an expensive UTM (Unified threat
management such as Cyberoam, Fortiguard, Sophos, Watchguard etc.)
3)	 Anakata for creating The Piratebay! Vive La Liberté ! Vive La Internet!
4) My parents for not buying me a dongle when I asked them to do so.
5)	 All those a**holes who make a living by making UTMs
6) All those lowly creatures often called batch mates or colleagues who constantly pest
me to ‘sort their internet’ so they could satisfy their ‘other needs’.
As far as the acknowledgments goes I have no one to thank for and I did it all by
myself.
Note:
1)	 If you find the language of this book disrespectful, hurtful blah, blah, its Gaurav’s
fault. He is the editor of the book. Any fault you may find in the book in all
probability is his.
2)	 If you find the cover disrespectful, hurtful blah, blah it’s not Pitamber’s fault. If you
think it’s not appropriate, why don’t you make us a nice cover for free and then we
will talk.
1
http://www.technolawgyx.blogspot.com
PREFACE
Let me begin with the usual.
This book is for educational or information purposes purpose only, and by reading it
any further, you agree that the author cannot be held liable for any misuse of the
information provided or any kind of damage caused to any person directly or indirectly.
This book’s sole purpose is to make ethical use of Internet and this information can be used
in cases say where say your ISP receives an order to block certain videos on YouTube and it
blocks the website YouTube altogether (Blocking a website is so much easier than blocking a
video, dumbasses!). Or in cases where you may want to visit a website anonymously for the
reasons best known to you.
In plain words this simply means that if you do anything wrong making use of information
given in this book it will be you who will go to jail and any person concerned with this book
in whatsoever manner CANNOT be held liable. In case you disagree please don’t proceed
ahead and delete this book right now.
This book is being provided completely free of cost and in case you bought it you
were just duped. This book has been written in overly simplistic manner and in case you still
face any such difficulty in using it. You should probably not read it. However irrespective
whether you get anything in your head or not, don’t you dare contact me with emails saying
“How to do this and how to do that and blah blah”. Remember that I do have a life.
Problem? Google it! Or wait. We have more options for you …
For the reader’s convenience, this book makes extensive use of hyperlinks. They are
meant to be used  with time, the hyperlink may become dead, though I will try to update
them as and when I get time, but if I don’t, you can always check it out yourself. Spoon-
feeding is bad.
I have intentionally ignored certain tools due to them being paid and expensive.
In case after going through the book you have suggestions, feedback, do feel free to
contact me at the blog here but I repeat don’t you dare shoot a mail on how to do stuff. If you
don’t get it after reading the book, chances are high you I won’t be able to explain it to you
anyway. Who said I will be!
2
http://www.technolawgyx.blogspot.com
In case you want to be an expert on how to Google stuff don’t forget to read our
article ‘Power Searching with Google’.
After going through the book please do fill up this survey form here. This will
help me provide you with better content in the next edition.
3
http://www.technolawgyx.blogspot.com
CHAPTER 1 – MISCELLANEOUS METHODS
So let’s begin with easy to do methods. In this chapter we will only use method which
requires little or no external aid. So there you go
SSL Connection – Often you will find this case, the website you are trying to open
is not opening up. Sometimes the biggest problems have the simplest solutions. In the address
bar of your browser type ‘https://’ (without quotes) before the URL. In case you get a
warning click on proceed anyway. See if that works.
Example:
In case it does use this userscript to automatically redirect to SSL connection. To
know how to use scripts and more such stuff read our article ‘Setting Up Your Browser’.
IP Address Method – In this method we will try to access the website by its IP
address rather than its domain name. Windows user, go to run and type ‘cmd’ without quotes
and press enter. Mac users open your terminal.
In the terminal/command box type ‘ping’ without quotes and then name of your
website without ‘www.’ And press enter. E.g.:
Now after the text ‘Reply from’ in the above image the number that comes is your IP
address. So IP address of saavn.com is 54.251.246.179 and if you will type this IP address in
address bar of your browser and press enter, the site may open, depending on the way the
website is being blocked.
4
http://www.technolawgyx.blogspot.com
SSL + IP Address - In this method see if you could access the website by inserting
‘https://’ (without quotes) in front of website’s IP address. Press continue or select proceed
anyway if you get any warning. E.g.:
Don’t be bothered with the red line or the cross as long as it works its fine.
GetIP Method – I have made a small python script which may make the life a bit
easier. Download the zip file from here. Extract the contents of the file. Run the getip.exe
file. Enter the url of the desired website. Don’t write ‘http://’ before the name of the website;
using ‘www.’ is optional. Press enter and then press enter one more time to exit the program.
Now where you have extracted the content of zip file you will find a newly created file
‘link.txt’ Open it and you will find a link which will be ‘http://’ and then followed by a
number. Use this link if it doesn’t work try using ‘https://’link. Do not open the link.txt file
till you exit the program.
Link.txt file with its content:
5
http://www.technolawgyx.blogspot.com
Google Translate Method – This method is pretty easy to go. Go to Google
translate. In the box where you enter text to be translated select any language other than
English and in the box where you get the translated text select English. Then enter the URL
of the website you intend to visit where you type the text to be translated and press Translate.
E.g.:
This is the end result.
6
http://www.technolawgyx.blogspot.com
Mobile Simulator Method – Go to any mobile simulator like this and in its
browser type the URL address of the website you intend to visit. E.g.:
Webpage in email – Running behind that timeline, and the webpage you want
access to is blocked? Go to emailtheweb and enter the URL and you will get the webpage in
your mail. Since the webpage loses its formatting in the email the email also gives you an
option to view the page as it is. You must have a Gmail account to use this website. E.g.:
Screenshot Method – Go to URL2PNG and enter the URL address of the
website. You will get the screenshot of the entire webpage in its all glory. To extract text
7
http://www.technolawgyx.blogspot.com
automatically out of this image rather than typing it manually. Read our series on ‘Art of
Copying and Pasting’ and refer to OCR part. E.g.:
Alternate Domain Method – There might be times when the real domain is
blocked but its alternate versions such as mobile version of the website are not. So no harm in
giving it a shot.
For example Facebook could be accessed by
using https://m.facebook.com/, https://touch.facebook.com/ and https://blog.facebook.com/.
Similarly Twitter could be used by this link https://mobile.twitter.com. Torrentz could be
accessed by http://www.torrentz.li. Don’t forget to try SSL.
Change DNS Server – Well your IT administrator may be using simple filtering
tools so changing the DNS server might do the trick for you. Google Public DNS
nameservers (8.8.8.8 and 8.8.4.4) are good enough. To configure them see the guide here.
Using this guide you could also try changing the nameservers to Open DNS (208.67.222.222
and 208.67.220.220). In order to determine the fastest DNS nameserver use this easy to
use software.
Coral CDN Method - Just append ‘.nyud.net’ without quotes to any website. Say
for example you want to visit cnn.com then the new url becomes ‘cnn.com.nyud.net’ (without
quotes).
8
http://www.technolawgyx.blogspot.com
CHAPTER 2 – SETTING UP TOOLS
Setting Up Proxy - This is an optional chapter and only helps you in setting up
your tools which will be used ahead in other chapters. This chapter is useful if you need to
connect to some sort of proxy (Such as 127.0.0.1:4444 or proxy.abc.com with port 8080)
before connecting it to the internet.
Now most of the software this book uses have some sort of option to configure proxy
settings. Something like this
But if they don’t know worries. We need to use a Proxifier then. A proxifier is a
software program which can make other programs pass through a proxy server1
. So my
personal favourite is Proxifier but unfortunately it’s paid. So use Freecap as it’s free.
Since I haven’t used it myself I am willing to assume it must be pretty
straightforward. Anyway it’s your headache now to learn how to configure it to set up your
proxy settings with other programs. Go to Google and try to search how to do it.
1
http://en.wikipedia.org/wiki/Comparison_of_proxifiers

9
http://www.technolawgyx.blogspot.com
You still didn’t get it did you? Ok here’s a guide to use Freecap with Your Freedom.
Using this guide I hope you could configure Freecap to be used with other software which do
not have an inbuilt proxy setting option.
Safe Testing Environment – This book will often ask you to install software.
The author has most used most of the software recommended in the book but not all. As a
result, it is recommended that you test the software in a safe manner so that no harm is made
to your computer. Precaution can save you from a lot many things, including AIDS.
In order to do so that you may either set up a virtual machine. Here is an excellent
guide by Lifehacker which tells you how to do so. The other method is to use Sandboxie.
Here are the two guides on how to use Sandboxie and what it is all about.
• Guide 1 (Official Guide)
• Guide 2
Changing MAC Address – If you want even more privacy and anonymity you
might also want to change your MAC address. MAC address is a unique identifier assigned to
your LAN card and Wi-Fi Adapter. Technitium MAC address changer is free, easy to use
software for the job. Download it from here. Don’t change your MAC address if your
internet connectivity is restricted to your MAC address.
10
http://www.technolawgyx.blogspot.com
CHAPTER 3 – BROWSER BASED METHODS
Opera Turbo Mode – Yes, Opera has an inbuilt proxy. All you need to do is
enable the Opera Turbo mode and you are good to go. Opera Turbo Mode option is available
at the bottom left corner of the browser.
The blue icon in the above image looks like this when zoomed upon.
Yandex Turbo Mode – Similar to Opera, Yandex also features Turbo Mode.
Even if Opera turbo mode doesn’t work then also there is no harm in trying out Yandex.
Download Yandex from here.
Conventional Proxies – Old is gold. Nothing beats the good old conventional
proxies. You open a link in it you type the URL address and voila it runs. The problem is that
most of them are blocked by default and don’t work. So here’s a list of some of the lesser
known proxies:
11
http://www.technolawgyx.blogspot.com
• http://mirrorrr.appspot.com/
• http://air-proxy.us/
• https://www.kproxy.com/
• http://www.ipcamouflage.com/
• http://www.forwardproxy.org/
• www.youtubeproxy.pk/
• www.youtubeproxyfree.com/
• http://mousematrix.com/
• http://www.peacefire.org/circumventor/ (Proxy Lists)
• http://www.azproxies.com/proxy-lists/zelune-web-proxies.html (Proxy Lists)
• https://groups.google.com/forum/#!forum/zelune (Proxy Lists)
• https://launchwebs.org/ (Proxy Lists)
Sharing is caring but enough usage of these will ensure that they get blocked
too! Don’t worry, we will come up with more.
TinyProxy - It is a light-weight HTTP/HTTPS proxy daemon for UNIX based
operating systems. Instructions to run it on Ubuntu are available here. There seems to be a
Windows version too. I am not sure if Windows’s version is the same TinyProxy ported to
Windows or something completely different. No harm in trying as long as you try it out in
Sandboxie or in a virtual machine. Here is the link for the windows version.
12
http://www.technolawgyx.blogspot.com
Web Freer - It is a 2048 bit encrypted https web browser providing absolute online
security and privacy. Additionally, it also opens blocked sites. It is built with the open-source
Chromium models on which Google Chrome is built. It is almost as fast as Google Chrome
and layout is also almost identical. Download it via CNET from here.
UseJump – It is a WebKit (the rendering engine used by Chrome) based browser. It
was designed to stand against censorship and content filtering. It uses P2P (Peer to Peer the
protocol used by torrent clients such as uTorrent) and encryption technologies based on open
standards. Download it via softpedia from here.
13
http://www.technolawgyx.blogspot.com
xBrowser – It is a web browser designed to run on both the Tor and XeroBank
anonymity networks. It is a portable browser and could be used on a pen drive as well as on a
portable hard disk. XBrowser upon exit clears all the data that was created during surfing.
The surfing in this browser is bit slower than normal but secure and anonymous. Download it
via CNET or Softpedia.
Jondo – It is an IP changer proxy tool. It can be used for anonymous surfing,
anonymous e-mail, chats and other purposes. It is open source and can be downloaded for
free. The best way to use Jondo is by using it with Firefox. Here is an interactive guide on
how to use Jondo with Firefox.
14
http://www.technolawgyx.blogspot.com
Firefox Extensions – Following are some useful Firefox extensions which might
do the job:­
i) AutoProxy – With this addon user can visit a website via proxy by adding it's
domain to AutoProxy's preference. After that, whenever user is surfing, specified websites
they will be automatically connected through proxy while leaving others connect directly.
Available here.
ii) Best Proxy Switcher – It lets user set their own proxy servers or let the addon
download most recently checked list from developer’s web site automatically for free.
Available here.
iii) One Click Proxy IP – It let’s user activate the addon with one click and then
lets user browse the web with random HTTP or Socks proxy from several countries in the
world. It is ad free and does not require restart of Firefox upon installation. Available here.
Chrome Extensions - Following are some useful Google Chrome extensions
which might do the job:­
i) Zenmate for Google Chrome – It is a simple to use one click VPN solution.
Its fast, it’s secure and best of all its free. It offers IP address from different countries such as
Germany, US and UK. Available here.
15
http://www.technolawgyx.blogspot.com
ii) Hola – It is another no nonsense one click fast VPN proxy service. It’s fast and
durable. It started as an addon which allowed users outside US to access Hulu but now works
on every website. Available Here.
16
http://www.technolawgyx.blogspot.com
.

17
http://www.technolawgyx.blogspot.com
CHAPTER 4 – CLIENT BASED TOOLS
Freegate – Freegate is click to run software which bypasses Internet firewalls by
using proprietary P2P-like proxy network system. It uses a unique encryption and
compression algorithm in its newer builds which further enhance its capabilities. It can be
downloaded from here or here.
Tor - Tor (The Onion Router) anonymizes internet traffic through “onion routing”.
It is the best tool if you want anonymity and is actively used by the hacktivist group
‘Anonymous’. Through Tor you could also access onion sites and the hidden web such as the
famous ‘hidden wiki’ page which cannot be accessed without using Tor traffic. Best way to
download and use Tor is by downloading the Tor Browser Bundle from here. Author also
recommends that in case you are using Tor at a place where your internet is being monitored
to check if you are using Tor you must use bridges. To know more about bridges and how to
use them read more over here.
18
http://www.technolawgyx.blogspot.com
Ultrasurf – Ultrasurf is also one more click to run software. It is completely free
and bypasses censorship and firewalls using an HTTP proxy. It employs encryption protocols
for privacy. On a personal note, author has found Freegate to be bit faster than Ultrasurf in
Delhi NCR area of India and Lucknow, Uttar Pradesh, India. However, the speed may vary in
different places depending upon the nearest server. Also, the difference in speed between
Ultrasurf and Freegate is marginal and both the software are much faster than Tor. It could be
downloaded from here and here.
Hotspot Shield – It is a VPN software which has both free and paid versions. The
free version gives a generous limit of 10 GB which is way more than required for casual
surfing and could easily accommodate few downloads too. It is very easy to setup but prior
to running the software you need to create a free account at the official site. It encrypts your
entire traffic and is not limited to your browser. The only con is that it bombards user with
ads but considering it’s a free software it shouldn’t be an issue.
19
http://www.technolawgyx.blogspot.com
Psiphon – It is another click to run circumvention system developed by Psiphon
Inc. The best thing about Psiphon is that it uses all three methods VPN, SSH and HTTP
Proxy to bypass firewall and thereby maximizing user’s chances of bypassing censorship. It
is also available for Mac OS X apart from windows. It could be downloaded from here.
GPass – It is yet another click to run software providing for free anonymous web
surfing. It protects user’s identity during web surfing and encrypts internet communications.
It is pretty fast for a proxy tunnelling software. Once installed to launch an application using
the proxy simply double-click the app from inside the GPass interface. Download it
from here or here.
20
http://www.technolawgyx.blogspot.com
Your Freedom – Your Freedom is another tunnelling solution for Windows, Mac
OSX and Linux. It could be used to bypass proxies and access the Internet anonymously. It
is completely free but in order to use it you must create an account at its official website.
After creating the account, download the client software and log in using your account
credentials. Then set up any proxy if your internet connection use one and search for server.
After that put following proxy setting in your browser. (IP:127.0.0.1, Port:8080) In case you
don’t know how to change proxy in your browser read it from here.
Spotflux – It is another free encrypted VPN client. It is quite easy to install, but
beware, as it tries to install third party software during installation so skip them. Running it is
as easy as clicking enable and disable. Download it from here or here.
21
http://www.technolawgyx.blogspot.com
Proxpn – It is free VPN software. It provides a maximum bandwidth of 300kbps in
the free account. It is quite easy to configure and you must create an online account to use it.
One of its disadvantages is that it changes your browser’s home page address to its website
and doesn’t let you change it back to something else. However that being said it’s free and
pretty easy to use. Download it from here.
VPNium – It is another free VPN software and best part about it is that it doesn’t
require registration. The normal mode lets you take IP address from Germany but if you post
a comment on VPNium’s Facebook page about the software they activate the ‘Boooost’
mode for free which allows you to have IP address from countries other than Germany. It
works completely from your tray icon. Download it from here.
22
http://www.technolawgyx.blogspot.com
CyberGhost VPN – It is another free VPN service. Post installation it could be
directly used without creating an account. The connection takes some time to establish but it
is pretty fast once established. Free account’s downside is ads and restriction of three hours
per session. To sum it up its free, fast and secure and definitely worth your time. Download it
from here.
Sam Proxy – This is an open source project hosted on sourceforge. Author has used
it personally and it works just fine. It’s easy to use and all it needs a double click on the
executable file (exe). Download it from here.
23
http://www.technolawgyx.blogspot.com
SecurityKiss – SecurityKiss is another free to use VPN software. They use 128-bit
Blowfish algorithm for session encryption. The free version allows 300MB data transfer
every day which is more than sufficient for casual surfing though downloading may be an
issue. For a VPN software it takes little time to establish the connection to its server.
Download it from here.
Open VPN – It is an open source VPN and it’s free. A free account needs to be
created post installation to access the facility. Mac OS X Version is also available.
Download it from here.
24
http://www.technolawgyx.blogspot.com
PD Proxy – Another free proxy tunnelling software. You need to create an account
first before using the software. User interface is intuitive and using the software will be a
cakewalk for you. After running the software when it asks permission to install some drivers
allow that. Download it from here.
AutoHide IP – Another easy to use IP changing software which bypass censorship
and help user surf internet safely and anonymously. The trial limitation is that it only allows
US IP addresses while the full version offers IP address from several countries. Also it has a
nifty feature that the program can be set to automatically change the IP address after a certain
amount of time which is quite handy. Download it from here.
GTunnel – Another click to run proxy tunnelling software. It’s completely free, fast,
secure and reliable. It uses 128-bit encryption. It could be downloaded from here.
25
http://www.technolawgyx.blogspot.com
CHAPTER 4 – MAKING YOUR OWN PROXIES
Well you could use plethora of software and they will be eventually blocked but what
if we could make our own proxies. Won’t that be cool because every time your proxy gets
blocked you could make one more. So before we roll, you need to know a few basic things:­
a)	 Domain – It is the name of website. Simple so Google’s domain is
www.google.com. If you want, you could get a free co.nr domain from here.
b)	 Hosting – So websites don’t work from thin air they are kept on server from
where you can access them. So in order to have your own you either buy a hosting
plan or free hosting. Few free web host are 000webhost, freewebhosting, 5gbfree,
and host-ed.
So in order to host a proxy online you need a domain and hosting. They both may be
paid or free. Free hosting is likely to be slower than paid but then who cares as long it’s free.
For all the below mentioned tutorials I am using 000webhost you are free to use
whatever host you like.
PHProxy –
1) So first of all go and register account at http://www.000webhost.com/.

2) Now login in your account from here.

3) After login, got to the file manager.

4) There you will see a file manager like one below. Click on upload.
26
http://www.technolawgyx.blogspot.com
5)	 Now download this zip file from here.
6)	 Now click the choose file button in the Archives section (Panel on left) and upload
the zip file you just downloaded. Then press the green tick button.
7) Now once everything is over go to the domain of your website and you will see
something like this. All done enjoy your newly made proxy.
Wordpress Proxy Method –

In this method I will tell you how to make a wordpress based proxy. 

1) Follow step 1 & 2 of PHProxy method.

2) After login, go to MySQL. 

27
http://www.technolawgyx.blogspot.com
3) Fill in the information.
4) Click on Create Database.

5) Now save this information we will use it soon.

6) Now download the Wordpress setup from here.

7) Unzip the Wordpress zip file and open the “wp-config-sample.php” in notepad. 

8) Now change ‘database_name_here’ to name of your database, ‘username_here’ to

the username you just used and ‘password_here’ to password of your database.
9) Now download WinSCP from here and install it with the default options. If
somebody tells you that Filezilla is better, ignore them.
10) Now open the WinSCP client.
11) Go to sessions section.
28
http://www.technolawgyx.blogspot.com
12) Now fill in the information required and set your protocol to FTP with no ‘no
encryption’ and change port to 21.
13) In case you don’t know what to fill in host name and user name. Go to your
cPanel and click on view details. In the FTP section of ‘view details’ you will get
all the details except password which you should know yourself.
14) Now press login.
29
http://www.technolawgyx.blogspot.com
15) If you have filled all the blanks correctly a screen like this will appear (Image
taken from here) except that you will see a bunch of php and other random files on
right hand side in ‘public_html’ folder.
16) Delete all the files on right hand side except for ‘.htaccess’ file. I repeat, don’t
delete the ‘.htaccess’ file.
17) Now on the left hand side scroll to the folder where you have all the wordpress
files. Now copy paste all the files and folders in the ‘public_html’ folder just like
the guy has done in the above diagram.
18) Now go to your website and wordpress will ask you to set a password. Do it.
19) Now after login, click on plugins and then click on ‘add new’.
20) Now search for ‘Repress’ and click on install and then activate the plugin.
21) Now go to settings where you will find a new entry ‘repress’ click on it.
30
http://www.technolawgyx.blogspot.com
22) Now add any domain say torrentz.com in the ‘adddomain name’ field and click on
uncensor.
23) Now say your website is xyz.freeweb.com then you could access torrentz.com by
using the URL http://xyz.freeweb.com/proxy/torrentz.com
24) That’s all folks it’s done.
Proxy using Google App Engine –
Yes, you could create a proxy using the Google App Engine. The best part is that you
get fast Google hosting for free and downside is this proxy doesn’t support videos and sites
which uses login.
Here is a quick guide to do so. The instructions are also available in form of a video
on YouTube.
31

Más contenido relacionado

Último

CALL ON ➥8923113531 🔝Call Girls Mahanagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Mahanagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Mahanagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Mahanagar Lucknow best sexual serviceanilsa9823
 
LC_YouSaidYes_NewBelieverBookletDone.pdf
LC_YouSaidYes_NewBelieverBookletDone.pdfLC_YouSaidYes_NewBelieverBookletDone.pdf
LC_YouSaidYes_NewBelieverBookletDone.pdfpastor83
 
Understanding Relationship Anarchy: A Guide to Liberating Love | CIO Women Ma...
Understanding Relationship Anarchy: A Guide to Liberating Love | CIO Women Ma...Understanding Relationship Anarchy: A Guide to Liberating Love | CIO Women Ma...
Understanding Relationship Anarchy: A Guide to Liberating Love | CIO Women Ma...CIOWomenMagazine
 
9892124323, Call Girls in mumbai, Vashi Call Girls , Kurla Call girls
9892124323, Call Girls in mumbai, Vashi Call Girls , Kurla Call girls9892124323, Call Girls in mumbai, Vashi Call Girls , Kurla Call girls
9892124323, Call Girls in mumbai, Vashi Call Girls , Kurla Call girlsPooja Nehwal
 
《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...
《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...
《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...ur8mqw8e
 
8377087607 Full Enjoy @24/7-CLEAN-Call Girls In Chhatarpur,
8377087607 Full Enjoy @24/7-CLEAN-Call Girls In Chhatarpur,8377087607 Full Enjoy @24/7-CLEAN-Call Girls In Chhatarpur,
8377087607 Full Enjoy @24/7-CLEAN-Call Girls In Chhatarpur,dollysharma2066
 
REFLECTIONS Newsletter Jan-Jul 2024.pdf.pdf
REFLECTIONS Newsletter Jan-Jul 2024.pdf.pdfREFLECTIONS Newsletter Jan-Jul 2024.pdf.pdf
REFLECTIONS Newsletter Jan-Jul 2024.pdf.pdfssusere8ea60
 
call girls in candolim beach 9870370636] NORTH GOA ..
call girls in candolim beach 9870370636] NORTH GOA ..call girls in candolim beach 9870370636] NORTH GOA ..
call girls in candolim beach 9870370636] NORTH GOA ..nishakur201
 
Independent Escorts in Lucknow (Adult Only) 👩🏽‍❤️‍💋‍👩🏼 8923113531 ♛ Escort S...
Independent Escorts in Lucknow  (Adult Only) 👩🏽‍❤️‍💋‍👩🏼 8923113531 ♛ Escort S...Independent Escorts in Lucknow  (Adult Only) 👩🏽‍❤️‍💋‍👩🏼 8923113531 ♛ Escort S...
Independent Escorts in Lucknow (Adult Only) 👩🏽‍❤️‍💋‍👩🏼 8923113531 ♛ Escort S...gurkirankumar98700
 
Lucknow 💋 High Class Call Girls Lucknow 10k @ I'm VIP Independent Escorts Gir...
Lucknow 💋 High Class Call Girls Lucknow 10k @ I'm VIP Independent Escorts Gir...Lucknow 💋 High Class Call Girls Lucknow 10k @ I'm VIP Independent Escorts Gir...
Lucknow 💋 High Class Call Girls Lucknow 10k @ I'm VIP Independent Escorts Gir...anilsa9823
 
Call Girls In Andheri East Call US Pooja📞 9892124323 Book Hot And
Call Girls In Andheri East Call US Pooja📞 9892124323 Book Hot AndCall Girls In Andheri East Call US Pooja📞 9892124323 Book Hot And
Call Girls In Andheri East Call US Pooja📞 9892124323 Book Hot AndPooja Nehwal
 
Breath, Brain & Beyond_A Holistic Approach to Peak Performance.pdf
Breath, Brain & Beyond_A Holistic Approach to Peak Performance.pdfBreath, Brain & Beyond_A Holistic Approach to Peak Performance.pdf
Breath, Brain & Beyond_A Holistic Approach to Peak Performance.pdfJess Walker
 
办理国外毕业证学位证《原版美国montana文凭》蒙大拿州立大学毕业证制作成绩单修改
办理国外毕业证学位证《原版美国montana文凭》蒙大拿州立大学毕业证制作成绩单修改办理国外毕业证学位证《原版美国montana文凭》蒙大拿州立大学毕业证制作成绩单修改
办理国外毕业证学位证《原版美国montana文凭》蒙大拿州立大学毕业证制作成绩单修改atducpo
 
The Selfspace Journal Preview by Mindbrush
The Selfspace Journal Preview by MindbrushThe Selfspace Journal Preview by Mindbrush
The Selfspace Journal Preview by MindbrushShivain97
 
$ Love Spells^ 💎 (310) 882-6330 in West Virginia, WV | Psychic Reading Best B...
$ Love Spells^ 💎 (310) 882-6330 in West Virginia, WV | Psychic Reading Best B...$ Love Spells^ 💎 (310) 882-6330 in West Virginia, WV | Psychic Reading Best B...
$ Love Spells^ 💎 (310) 882-6330 in West Virginia, WV | Psychic Reading Best B...PsychicRuben LoveSpells
 
Reinventing Corporate Philanthropy_ Strategies for Meaningful Impact by Leko ...
Reinventing Corporate Philanthropy_ Strategies for Meaningful Impact by Leko ...Reinventing Corporate Philanthropy_ Strategies for Meaningful Impact by Leko ...
Reinventing Corporate Philanthropy_ Strategies for Meaningful Impact by Leko ...Leko Durda
 
CALL ON ➥8923113531 🔝Call Girls Aliganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Aliganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Aliganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Aliganj Lucknow best sexual serviceanilsa9823
 
Call Girls Anjuna beach Mariott Resort ₰8588052666
Call Girls Anjuna beach Mariott Resort ₰8588052666Call Girls Anjuna beach Mariott Resort ₰8588052666
Call Girls Anjuna beach Mariott Resort ₰8588052666nishakur201
 
文凭办理《原版美国USU学位证书》犹他州立大学毕业证制作成绩单修改
文凭办理《原版美国USU学位证书》犹他州立大学毕业证制作成绩单修改文凭办理《原版美国USU学位证书》犹他州立大学毕业证制作成绩单修改
文凭办理《原版美国USU学位证书》犹他州立大学毕业证制作成绩单修改atducpo
 

Último (20)

escort service sasti (*~Call Girls in Paschim Vihar Metro❤️9953056974
escort service  sasti (*~Call Girls in Paschim Vihar Metro❤️9953056974escort service  sasti (*~Call Girls in Paschim Vihar Metro❤️9953056974
escort service sasti (*~Call Girls in Paschim Vihar Metro❤️9953056974
 
CALL ON ➥8923113531 🔝Call Girls Mahanagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Mahanagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Mahanagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Mahanagar Lucknow best sexual service
 
LC_YouSaidYes_NewBelieverBookletDone.pdf
LC_YouSaidYes_NewBelieverBookletDone.pdfLC_YouSaidYes_NewBelieverBookletDone.pdf
LC_YouSaidYes_NewBelieverBookletDone.pdf
 
Understanding Relationship Anarchy: A Guide to Liberating Love | CIO Women Ma...
Understanding Relationship Anarchy: A Guide to Liberating Love | CIO Women Ma...Understanding Relationship Anarchy: A Guide to Liberating Love | CIO Women Ma...
Understanding Relationship Anarchy: A Guide to Liberating Love | CIO Women Ma...
 
9892124323, Call Girls in mumbai, Vashi Call Girls , Kurla Call girls
9892124323, Call Girls in mumbai, Vashi Call Girls , Kurla Call girls9892124323, Call Girls in mumbai, Vashi Call Girls , Kurla Call girls
9892124323, Call Girls in mumbai, Vashi Call Girls , Kurla Call girls
 
《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...
《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...
《塔夫斯大学毕业证成绩单购买》做Tufts文凭毕业证成绩单/伪造美国假文凭假毕业证书图片Q微信741003700《塔夫斯大学毕业证购买》《Tufts毕业文...
 
8377087607 Full Enjoy @24/7-CLEAN-Call Girls In Chhatarpur,
8377087607 Full Enjoy @24/7-CLEAN-Call Girls In Chhatarpur,8377087607 Full Enjoy @24/7-CLEAN-Call Girls In Chhatarpur,
8377087607 Full Enjoy @24/7-CLEAN-Call Girls In Chhatarpur,
 
REFLECTIONS Newsletter Jan-Jul 2024.pdf.pdf
REFLECTIONS Newsletter Jan-Jul 2024.pdf.pdfREFLECTIONS Newsletter Jan-Jul 2024.pdf.pdf
REFLECTIONS Newsletter Jan-Jul 2024.pdf.pdf
 
call girls in candolim beach 9870370636] NORTH GOA ..
call girls in candolim beach 9870370636] NORTH GOA ..call girls in candolim beach 9870370636] NORTH GOA ..
call girls in candolim beach 9870370636] NORTH GOA ..
 
Independent Escorts in Lucknow (Adult Only) 👩🏽‍❤️‍💋‍👩🏼 8923113531 ♛ Escort S...
Independent Escorts in Lucknow  (Adult Only) 👩🏽‍❤️‍💋‍👩🏼 8923113531 ♛ Escort S...Independent Escorts in Lucknow  (Adult Only) 👩🏽‍❤️‍💋‍👩🏼 8923113531 ♛ Escort S...
Independent Escorts in Lucknow (Adult Only) 👩🏽‍❤️‍💋‍👩🏼 8923113531 ♛ Escort S...
 
Lucknow 💋 High Class Call Girls Lucknow 10k @ I'm VIP Independent Escorts Gir...
Lucknow 💋 High Class Call Girls Lucknow 10k @ I'm VIP Independent Escorts Gir...Lucknow 💋 High Class Call Girls Lucknow 10k @ I'm VIP Independent Escorts Gir...
Lucknow 💋 High Class Call Girls Lucknow 10k @ I'm VIP Independent Escorts Gir...
 
Call Girls In Andheri East Call US Pooja📞 9892124323 Book Hot And
Call Girls In Andheri East Call US Pooja📞 9892124323 Book Hot AndCall Girls In Andheri East Call US Pooja📞 9892124323 Book Hot And
Call Girls In Andheri East Call US Pooja📞 9892124323 Book Hot And
 
Breath, Brain & Beyond_A Holistic Approach to Peak Performance.pdf
Breath, Brain & Beyond_A Holistic Approach to Peak Performance.pdfBreath, Brain & Beyond_A Holistic Approach to Peak Performance.pdf
Breath, Brain & Beyond_A Holistic Approach to Peak Performance.pdf
 
办理国外毕业证学位证《原版美国montana文凭》蒙大拿州立大学毕业证制作成绩单修改
办理国外毕业证学位证《原版美国montana文凭》蒙大拿州立大学毕业证制作成绩单修改办理国外毕业证学位证《原版美国montana文凭》蒙大拿州立大学毕业证制作成绩单修改
办理国外毕业证学位证《原版美国montana文凭》蒙大拿州立大学毕业证制作成绩单修改
 
The Selfspace Journal Preview by Mindbrush
The Selfspace Journal Preview by MindbrushThe Selfspace Journal Preview by Mindbrush
The Selfspace Journal Preview by Mindbrush
 
$ Love Spells^ 💎 (310) 882-6330 in West Virginia, WV | Psychic Reading Best B...
$ Love Spells^ 💎 (310) 882-6330 in West Virginia, WV | Psychic Reading Best B...$ Love Spells^ 💎 (310) 882-6330 in West Virginia, WV | Psychic Reading Best B...
$ Love Spells^ 💎 (310) 882-6330 in West Virginia, WV | Psychic Reading Best B...
 
Reinventing Corporate Philanthropy_ Strategies for Meaningful Impact by Leko ...
Reinventing Corporate Philanthropy_ Strategies for Meaningful Impact by Leko ...Reinventing Corporate Philanthropy_ Strategies for Meaningful Impact by Leko ...
Reinventing Corporate Philanthropy_ Strategies for Meaningful Impact by Leko ...
 
CALL ON ➥8923113531 🔝Call Girls Aliganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Aliganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Aliganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Aliganj Lucknow best sexual service
 
Call Girls Anjuna beach Mariott Resort ₰8588052666
Call Girls Anjuna beach Mariott Resort ₰8588052666Call Girls Anjuna beach Mariott Resort ₰8588052666
Call Girls Anjuna beach Mariott Resort ₰8588052666
 
文凭办理《原版美国USU学位证书》犹他州立大学毕业证制作成绩单修改
文凭办理《原版美国USU学位证书》犹他州立大学毕业证制作成绩单修改文凭办理《原版美国USU学位证书》犹他州立大学毕业证制作成绩单修改
文凭办理《原版美国USU学位证书》犹他州立大学毕业证制作成绩单修改
 

Destacado

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 

Destacado (20)

AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 

Libre internet bypassing internet censorship

  • 1.
  • 2. http://www.technolawgyx.blogspot.com TABLE OF INDEX ACKNOWLEDGMENTS .............................................................................................1 PREFACE......................................................................................................................2 CHAPTER 1 – MISCELLANEOUS METHODS.........................................................4 SSL Connection .........................................................................................................4 IP Address Method ....................................................................................................4 SSL + IP Address.......................................................................................................5 GetIP Method.............................................................................................................5 Google Translate Method ..........................................................................................6 Mobile Simulator Method..........................................................................................7 Webpage in email ......................................................................................................7 Screenshot Method.....................................................................................................7 Alternate Domain Method .........................................................................................8 Change DNS Server...................................................................................................8 Coral CDN Method....................................................................................................8 CHAPTER 2 – SETTING UP TOOLS..........................................................................9 Setting Up Proxy........................................................................................................9 Safe Testing Environment........................................................................................10 Changing MAC Address..........................................................................................10 CHAPTER 3 – BROWSER BASED METHODS.......................................................11 Opera Turbo Mode...................................................................................................11 Yandex Turbo Mode................................................................................................11 Conventional Proxies...............................................................................................11 TinyProxy ................................................................................................................12 Web Freer.................................................................................................................13 i
  • 3. http://www.technolawgyx.blogspot.com UseJump...................................................................................................................13 xBrowser..................................................................................................................14 Jondo........................................................................................................................14 Firefox Extensions ...................................................................................................15 i) AutoProxy...................................................................................................................................15 ii) Best Proxy Switcher ..................................................................................................................15 iii) One Click Proxy IP.....................................................................................................................15 Chrome Extensions..................................................................................................15 i) Zenmate for Google Chrome .....................................................................................................15 ii) Hola ...........................................................................................................................................16 CHAPTER 4 – CLIENT BASED TOOLS..................................................................18 Freegate....................................................................................................................18 Tor............................................................................................................................18 Ultrasurf...................................................................................................................19 Hotspot Shield..........................................................................................................19 Psiphon.....................................................................................................................20 GPass........................................................................................................................20 Your Freedom..........................................................................................................21 Spotflux....................................................................................................................21 Proxpn......................................................................................................................22 VPNium ...................................................................................................................22 CyberGhost VPN .....................................................................................................23 Sam Proxy................................................................................................................23 SecurityKiss.............................................................................................................24 Open VPN................................................................................................................24 PD Proxy..................................................................................................................25 AutoHide IP .............................................................................................................25 GTunnel ...................................................................................................................25 ii
  • 4. http://www.technolawgyx.blogspot.com CHAPTER 4 – MAKING YOUR OWN PROXIES ...................................................26 PHProxy...................................................................................................................26 Wordpress Proxy Method ........................................................................................27 Proxy using Google App Engine .............................................................................31 iii
  • 5. http://www.technolawgyx.blogspot.com Text Copyright © 2014 Mohit Yadav All Rights Reserved Cover Design by: Pitamber Yadav iv
  • 6. http://www.technolawgyx.blogspot.com ACKNOWLEDGMENTS This book has been made possible only due to the following people:­ 1) Typical IT administrators who block YouTube to reduce load on network so that their UltraHD (4096 pixels) porn gets buffered faster 2) College Administrators, who do not understand the idea that it’s much more economical to provide unrestricted internet with one IT guy rather than investing in a bunch of fools (known as IT Support) and an expensive UTM (Unified threat management such as Cyberoam, Fortiguard, Sophos, Watchguard etc.) 3) Anakata for creating The Piratebay! Vive La Liberté ! Vive La Internet! 4) My parents for not buying me a dongle when I asked them to do so. 5) All those a**holes who make a living by making UTMs 6) All those lowly creatures often called batch mates or colleagues who constantly pest me to ‘sort their internet’ so they could satisfy their ‘other needs’. As far as the acknowledgments goes I have no one to thank for and I did it all by myself. Note: 1) If you find the language of this book disrespectful, hurtful blah, blah, its Gaurav’s fault. He is the editor of the book. Any fault you may find in the book in all probability is his. 2) If you find the cover disrespectful, hurtful blah, blah it’s not Pitamber’s fault. If you think it’s not appropriate, why don’t you make us a nice cover for free and then we will talk. 1
  • 7. http://www.technolawgyx.blogspot.com PREFACE Let me begin with the usual. This book is for educational or information purposes purpose only, and by reading it any further, you agree that the author cannot be held liable for any misuse of the information provided or any kind of damage caused to any person directly or indirectly. This book’s sole purpose is to make ethical use of Internet and this information can be used in cases say where say your ISP receives an order to block certain videos on YouTube and it blocks the website YouTube altogether (Blocking a website is so much easier than blocking a video, dumbasses!). Or in cases where you may want to visit a website anonymously for the reasons best known to you. In plain words this simply means that if you do anything wrong making use of information given in this book it will be you who will go to jail and any person concerned with this book in whatsoever manner CANNOT be held liable. In case you disagree please don’t proceed ahead and delete this book right now. This book is being provided completely free of cost and in case you bought it you were just duped. This book has been written in overly simplistic manner and in case you still face any such difficulty in using it. You should probably not read it. However irrespective whether you get anything in your head or not, don’t you dare contact me with emails saying “How to do this and how to do that and blah blah”. Remember that I do have a life. Problem? Google it! Or wait. We have more options for you … For the reader’s convenience, this book makes extensive use of hyperlinks. They are meant to be used  with time, the hyperlink may become dead, though I will try to update them as and when I get time, but if I don’t, you can always check it out yourself. Spoon- feeding is bad. I have intentionally ignored certain tools due to them being paid and expensive. In case after going through the book you have suggestions, feedback, do feel free to contact me at the blog here but I repeat don’t you dare shoot a mail on how to do stuff. If you don’t get it after reading the book, chances are high you I won’t be able to explain it to you anyway. Who said I will be! 2
  • 8. http://www.technolawgyx.blogspot.com In case you want to be an expert on how to Google stuff don’t forget to read our article ‘Power Searching with Google’. After going through the book please do fill up this survey form here. This will help me provide you with better content in the next edition. 3
  • 9. http://www.technolawgyx.blogspot.com CHAPTER 1 – MISCELLANEOUS METHODS So let’s begin with easy to do methods. In this chapter we will only use method which requires little or no external aid. So there you go SSL Connection – Often you will find this case, the website you are trying to open is not opening up. Sometimes the biggest problems have the simplest solutions. In the address bar of your browser type ‘https://’ (without quotes) before the URL. In case you get a warning click on proceed anyway. See if that works. Example: In case it does use this userscript to automatically redirect to SSL connection. To know how to use scripts and more such stuff read our article ‘Setting Up Your Browser’. IP Address Method – In this method we will try to access the website by its IP address rather than its domain name. Windows user, go to run and type ‘cmd’ without quotes and press enter. Mac users open your terminal. In the terminal/command box type ‘ping’ without quotes and then name of your website without ‘www.’ And press enter. E.g.: Now after the text ‘Reply from’ in the above image the number that comes is your IP address. So IP address of saavn.com is 54.251.246.179 and if you will type this IP address in address bar of your browser and press enter, the site may open, depending on the way the website is being blocked. 4
  • 10. http://www.technolawgyx.blogspot.com SSL + IP Address - In this method see if you could access the website by inserting ‘https://’ (without quotes) in front of website’s IP address. Press continue or select proceed anyway if you get any warning. E.g.: Don’t be bothered with the red line or the cross as long as it works its fine. GetIP Method – I have made a small python script which may make the life a bit easier. Download the zip file from here. Extract the contents of the file. Run the getip.exe file. Enter the url of the desired website. Don’t write ‘http://’ before the name of the website; using ‘www.’ is optional. Press enter and then press enter one more time to exit the program. Now where you have extracted the content of zip file you will find a newly created file ‘link.txt’ Open it and you will find a link which will be ‘http://’ and then followed by a number. Use this link if it doesn’t work try using ‘https://’link. Do not open the link.txt file till you exit the program. Link.txt file with its content: 5
  • 11. http://www.technolawgyx.blogspot.com Google Translate Method – This method is pretty easy to go. Go to Google translate. In the box where you enter text to be translated select any language other than English and in the box where you get the translated text select English. Then enter the URL of the website you intend to visit where you type the text to be translated and press Translate. E.g.: This is the end result. 6
  • 12. http://www.technolawgyx.blogspot.com Mobile Simulator Method – Go to any mobile simulator like this and in its browser type the URL address of the website you intend to visit. E.g.: Webpage in email – Running behind that timeline, and the webpage you want access to is blocked? Go to emailtheweb and enter the URL and you will get the webpage in your mail. Since the webpage loses its formatting in the email the email also gives you an option to view the page as it is. You must have a Gmail account to use this website. E.g.: Screenshot Method – Go to URL2PNG and enter the URL address of the website. You will get the screenshot of the entire webpage in its all glory. To extract text 7
  • 13. http://www.technolawgyx.blogspot.com automatically out of this image rather than typing it manually. Read our series on ‘Art of Copying and Pasting’ and refer to OCR part. E.g.: Alternate Domain Method – There might be times when the real domain is blocked but its alternate versions such as mobile version of the website are not. So no harm in giving it a shot. For example Facebook could be accessed by using https://m.facebook.com/, https://touch.facebook.com/ and https://blog.facebook.com/. Similarly Twitter could be used by this link https://mobile.twitter.com. Torrentz could be accessed by http://www.torrentz.li. Don’t forget to try SSL. Change DNS Server – Well your IT administrator may be using simple filtering tools so changing the DNS server might do the trick for you. Google Public DNS nameservers (8.8.8.8 and 8.8.4.4) are good enough. To configure them see the guide here. Using this guide you could also try changing the nameservers to Open DNS (208.67.222.222 and 208.67.220.220). In order to determine the fastest DNS nameserver use this easy to use software. Coral CDN Method - Just append ‘.nyud.net’ without quotes to any website. Say for example you want to visit cnn.com then the new url becomes ‘cnn.com.nyud.net’ (without quotes). 8
  • 14. http://www.technolawgyx.blogspot.com CHAPTER 2 – SETTING UP TOOLS Setting Up Proxy - This is an optional chapter and only helps you in setting up your tools which will be used ahead in other chapters. This chapter is useful if you need to connect to some sort of proxy (Such as 127.0.0.1:4444 or proxy.abc.com with port 8080) before connecting it to the internet. Now most of the software this book uses have some sort of option to configure proxy settings. Something like this But if they don’t know worries. We need to use a Proxifier then. A proxifier is a software program which can make other programs pass through a proxy server1 . So my personal favourite is Proxifier but unfortunately it’s paid. So use Freecap as it’s free. Since I haven’t used it myself I am willing to assume it must be pretty straightforward. Anyway it’s your headache now to learn how to configure it to set up your proxy settings with other programs. Go to Google and try to search how to do it. 1 http://en.wikipedia.org/wiki/Comparison_of_proxifiers 9
  • 15. http://www.technolawgyx.blogspot.com You still didn’t get it did you? Ok here’s a guide to use Freecap with Your Freedom. Using this guide I hope you could configure Freecap to be used with other software which do not have an inbuilt proxy setting option. Safe Testing Environment – This book will often ask you to install software. The author has most used most of the software recommended in the book but not all. As a result, it is recommended that you test the software in a safe manner so that no harm is made to your computer. Precaution can save you from a lot many things, including AIDS. In order to do so that you may either set up a virtual machine. Here is an excellent guide by Lifehacker which tells you how to do so. The other method is to use Sandboxie. Here are the two guides on how to use Sandboxie and what it is all about. • Guide 1 (Official Guide) • Guide 2 Changing MAC Address – If you want even more privacy and anonymity you might also want to change your MAC address. MAC address is a unique identifier assigned to your LAN card and Wi-Fi Adapter. Technitium MAC address changer is free, easy to use software for the job. Download it from here. Don’t change your MAC address if your internet connectivity is restricted to your MAC address. 10
  • 16. http://www.technolawgyx.blogspot.com CHAPTER 3 – BROWSER BASED METHODS Opera Turbo Mode – Yes, Opera has an inbuilt proxy. All you need to do is enable the Opera Turbo mode and you are good to go. Opera Turbo Mode option is available at the bottom left corner of the browser. The blue icon in the above image looks like this when zoomed upon. Yandex Turbo Mode – Similar to Opera, Yandex also features Turbo Mode. Even if Opera turbo mode doesn’t work then also there is no harm in trying out Yandex. Download Yandex from here. Conventional Proxies – Old is gold. Nothing beats the good old conventional proxies. You open a link in it you type the URL address and voila it runs. The problem is that most of them are blocked by default and don’t work. So here’s a list of some of the lesser known proxies: 11
  • 17. http://www.technolawgyx.blogspot.com • http://mirrorrr.appspot.com/ • http://air-proxy.us/ • https://www.kproxy.com/ • http://www.ipcamouflage.com/ • http://www.forwardproxy.org/ • www.youtubeproxy.pk/ • www.youtubeproxyfree.com/ • http://mousematrix.com/ • http://www.peacefire.org/circumventor/ (Proxy Lists) • http://www.azproxies.com/proxy-lists/zelune-web-proxies.html (Proxy Lists) • https://groups.google.com/forum/#!forum/zelune (Proxy Lists) • https://launchwebs.org/ (Proxy Lists) Sharing is caring but enough usage of these will ensure that they get blocked too! Don’t worry, we will come up with more. TinyProxy - It is a light-weight HTTP/HTTPS proxy daemon for UNIX based operating systems. Instructions to run it on Ubuntu are available here. There seems to be a Windows version too. I am not sure if Windows’s version is the same TinyProxy ported to Windows or something completely different. No harm in trying as long as you try it out in Sandboxie or in a virtual machine. Here is the link for the windows version. 12
  • 18. http://www.technolawgyx.blogspot.com Web Freer - It is a 2048 bit encrypted https web browser providing absolute online security and privacy. Additionally, it also opens blocked sites. It is built with the open-source Chromium models on which Google Chrome is built. It is almost as fast as Google Chrome and layout is also almost identical. Download it via CNET from here. UseJump – It is a WebKit (the rendering engine used by Chrome) based browser. It was designed to stand against censorship and content filtering. It uses P2P (Peer to Peer the protocol used by torrent clients such as uTorrent) and encryption technologies based on open standards. Download it via softpedia from here. 13
  • 19. http://www.technolawgyx.blogspot.com xBrowser – It is a web browser designed to run on both the Tor and XeroBank anonymity networks. It is a portable browser and could be used on a pen drive as well as on a portable hard disk. XBrowser upon exit clears all the data that was created during surfing. The surfing in this browser is bit slower than normal but secure and anonymous. Download it via CNET or Softpedia. Jondo – It is an IP changer proxy tool. It can be used for anonymous surfing, anonymous e-mail, chats and other purposes. It is open source and can be downloaded for free. The best way to use Jondo is by using it with Firefox. Here is an interactive guide on how to use Jondo with Firefox. 14
  • 20. http://www.technolawgyx.blogspot.com Firefox Extensions – Following are some useful Firefox extensions which might do the job:­ i) AutoProxy – With this addon user can visit a website via proxy by adding it's domain to AutoProxy's preference. After that, whenever user is surfing, specified websites they will be automatically connected through proxy while leaving others connect directly. Available here. ii) Best Proxy Switcher – It lets user set their own proxy servers or let the addon download most recently checked list from developer’s web site automatically for free. Available here. iii) One Click Proxy IP – It let’s user activate the addon with one click and then lets user browse the web with random HTTP or Socks proxy from several countries in the world. It is ad free and does not require restart of Firefox upon installation. Available here. Chrome Extensions - Following are some useful Google Chrome extensions which might do the job:­ i) Zenmate for Google Chrome – It is a simple to use one click VPN solution. Its fast, it’s secure and best of all its free. It offers IP address from different countries such as Germany, US and UK. Available here. 15
  • 21. http://www.technolawgyx.blogspot.com ii) Hola – It is another no nonsense one click fast VPN proxy service. It’s fast and durable. It started as an addon which allowed users outside US to access Hulu but now works on every website. Available Here. 16
  • 23. http://www.technolawgyx.blogspot.com CHAPTER 4 – CLIENT BASED TOOLS Freegate – Freegate is click to run software which bypasses Internet firewalls by using proprietary P2P-like proxy network system. It uses a unique encryption and compression algorithm in its newer builds which further enhance its capabilities. It can be downloaded from here or here. Tor - Tor (The Onion Router) anonymizes internet traffic through “onion routing”. It is the best tool if you want anonymity and is actively used by the hacktivist group ‘Anonymous’. Through Tor you could also access onion sites and the hidden web such as the famous ‘hidden wiki’ page which cannot be accessed without using Tor traffic. Best way to download and use Tor is by downloading the Tor Browser Bundle from here. Author also recommends that in case you are using Tor at a place where your internet is being monitored to check if you are using Tor you must use bridges. To know more about bridges and how to use them read more over here. 18
  • 24. http://www.technolawgyx.blogspot.com Ultrasurf – Ultrasurf is also one more click to run software. It is completely free and bypasses censorship and firewalls using an HTTP proxy. It employs encryption protocols for privacy. On a personal note, author has found Freegate to be bit faster than Ultrasurf in Delhi NCR area of India and Lucknow, Uttar Pradesh, India. However, the speed may vary in different places depending upon the nearest server. Also, the difference in speed between Ultrasurf and Freegate is marginal and both the software are much faster than Tor. It could be downloaded from here and here. Hotspot Shield – It is a VPN software which has both free and paid versions. The free version gives a generous limit of 10 GB which is way more than required for casual surfing and could easily accommodate few downloads too. It is very easy to setup but prior to running the software you need to create a free account at the official site. It encrypts your entire traffic and is not limited to your browser. The only con is that it bombards user with ads but considering it’s a free software it shouldn’t be an issue. 19
  • 25. http://www.technolawgyx.blogspot.com Psiphon – It is another click to run circumvention system developed by Psiphon Inc. The best thing about Psiphon is that it uses all three methods VPN, SSH and HTTP Proxy to bypass firewall and thereby maximizing user’s chances of bypassing censorship. It is also available for Mac OS X apart from windows. It could be downloaded from here. GPass – It is yet another click to run software providing for free anonymous web surfing. It protects user’s identity during web surfing and encrypts internet communications. It is pretty fast for a proxy tunnelling software. Once installed to launch an application using the proxy simply double-click the app from inside the GPass interface. Download it from here or here. 20
  • 26. http://www.technolawgyx.blogspot.com Your Freedom – Your Freedom is another tunnelling solution for Windows, Mac OSX and Linux. It could be used to bypass proxies and access the Internet anonymously. It is completely free but in order to use it you must create an account at its official website. After creating the account, download the client software and log in using your account credentials. Then set up any proxy if your internet connection use one and search for server. After that put following proxy setting in your browser. (IP:127.0.0.1, Port:8080) In case you don’t know how to change proxy in your browser read it from here. Spotflux – It is another free encrypted VPN client. It is quite easy to install, but beware, as it tries to install third party software during installation so skip them. Running it is as easy as clicking enable and disable. Download it from here or here. 21
  • 27. http://www.technolawgyx.blogspot.com Proxpn – It is free VPN software. It provides a maximum bandwidth of 300kbps in the free account. It is quite easy to configure and you must create an online account to use it. One of its disadvantages is that it changes your browser’s home page address to its website and doesn’t let you change it back to something else. However that being said it’s free and pretty easy to use. Download it from here. VPNium – It is another free VPN software and best part about it is that it doesn’t require registration. The normal mode lets you take IP address from Germany but if you post a comment on VPNium’s Facebook page about the software they activate the ‘Boooost’ mode for free which allows you to have IP address from countries other than Germany. It works completely from your tray icon. Download it from here. 22
  • 28. http://www.technolawgyx.blogspot.com CyberGhost VPN – It is another free VPN service. Post installation it could be directly used without creating an account. The connection takes some time to establish but it is pretty fast once established. Free account’s downside is ads and restriction of three hours per session. To sum it up its free, fast and secure and definitely worth your time. Download it from here. Sam Proxy – This is an open source project hosted on sourceforge. Author has used it personally and it works just fine. It’s easy to use and all it needs a double click on the executable file (exe). Download it from here. 23
  • 29. http://www.technolawgyx.blogspot.com SecurityKiss – SecurityKiss is another free to use VPN software. They use 128-bit Blowfish algorithm for session encryption. The free version allows 300MB data transfer every day which is more than sufficient for casual surfing though downloading may be an issue. For a VPN software it takes little time to establish the connection to its server. Download it from here. Open VPN – It is an open source VPN and it’s free. A free account needs to be created post installation to access the facility. Mac OS X Version is also available. Download it from here. 24
  • 30. http://www.technolawgyx.blogspot.com PD Proxy – Another free proxy tunnelling software. You need to create an account first before using the software. User interface is intuitive and using the software will be a cakewalk for you. After running the software when it asks permission to install some drivers allow that. Download it from here. AutoHide IP – Another easy to use IP changing software which bypass censorship and help user surf internet safely and anonymously. The trial limitation is that it only allows US IP addresses while the full version offers IP address from several countries. Also it has a nifty feature that the program can be set to automatically change the IP address after a certain amount of time which is quite handy. Download it from here. GTunnel – Another click to run proxy tunnelling software. It’s completely free, fast, secure and reliable. It uses 128-bit encryption. It could be downloaded from here. 25
  • 31. http://www.technolawgyx.blogspot.com CHAPTER 4 – MAKING YOUR OWN PROXIES Well you could use plethora of software and they will be eventually blocked but what if we could make our own proxies. Won’t that be cool because every time your proxy gets blocked you could make one more. So before we roll, you need to know a few basic things:­ a) Domain – It is the name of website. Simple so Google’s domain is www.google.com. If you want, you could get a free co.nr domain from here. b) Hosting – So websites don’t work from thin air they are kept on server from where you can access them. So in order to have your own you either buy a hosting plan or free hosting. Few free web host are 000webhost, freewebhosting, 5gbfree, and host-ed. So in order to host a proxy online you need a domain and hosting. They both may be paid or free. Free hosting is likely to be slower than paid but then who cares as long it’s free. For all the below mentioned tutorials I am using 000webhost you are free to use whatever host you like. PHProxy – 1) So first of all go and register account at http://www.000webhost.com/. 2) Now login in your account from here. 3) After login, got to the file manager. 4) There you will see a file manager like one below. Click on upload. 26
  • 32. http://www.technolawgyx.blogspot.com 5) Now download this zip file from here. 6) Now click the choose file button in the Archives section (Panel on left) and upload the zip file you just downloaded. Then press the green tick button. 7) Now once everything is over go to the domain of your website and you will see something like this. All done enjoy your newly made proxy. Wordpress Proxy Method – In this method I will tell you how to make a wordpress based proxy. 1) Follow step 1 & 2 of PHProxy method. 2) After login, go to MySQL. 27
  • 33. http://www.technolawgyx.blogspot.com 3) Fill in the information. 4) Click on Create Database. 5) Now save this information we will use it soon. 6) Now download the Wordpress setup from here. 7) Unzip the Wordpress zip file and open the “wp-config-sample.php” in notepad. 8) Now change ‘database_name_here’ to name of your database, ‘username_here’ to the username you just used and ‘password_here’ to password of your database. 9) Now download WinSCP from here and install it with the default options. If somebody tells you that Filezilla is better, ignore them. 10) Now open the WinSCP client. 11) Go to sessions section. 28
  • 34. http://www.technolawgyx.blogspot.com 12) Now fill in the information required and set your protocol to FTP with no ‘no encryption’ and change port to 21. 13) In case you don’t know what to fill in host name and user name. Go to your cPanel and click on view details. In the FTP section of ‘view details’ you will get all the details except password which you should know yourself. 14) Now press login. 29
  • 35. http://www.technolawgyx.blogspot.com 15) If you have filled all the blanks correctly a screen like this will appear (Image taken from here) except that you will see a bunch of php and other random files on right hand side in ‘public_html’ folder. 16) Delete all the files on right hand side except for ‘.htaccess’ file. I repeat, don’t delete the ‘.htaccess’ file. 17) Now on the left hand side scroll to the folder where you have all the wordpress files. Now copy paste all the files and folders in the ‘public_html’ folder just like the guy has done in the above diagram. 18) Now go to your website and wordpress will ask you to set a password. Do it. 19) Now after login, click on plugins and then click on ‘add new’. 20) Now search for ‘Repress’ and click on install and then activate the plugin. 21) Now go to settings where you will find a new entry ‘repress’ click on it. 30
  • 36. http://www.technolawgyx.blogspot.com 22) Now add any domain say torrentz.com in the ‘adddomain name’ field and click on uncensor. 23) Now say your website is xyz.freeweb.com then you could access torrentz.com by using the URL http://xyz.freeweb.com/proxy/torrentz.com 24) That’s all folks it’s done. Proxy using Google App Engine – Yes, you could create a proxy using the Google App Engine. The best part is that you get fast Google hosting for free and downside is this proxy doesn’t support videos and sites which uses login. Here is a quick guide to do so. The instructions are also available in form of a video on YouTube. 31