Introduction | |
More and more employers and universities are becoming aware of the amount of time their employees or students are spending using the Internet for personal reasons. Obviously employers want to discourage this behavior and may implement a number of different ways to do so. These can include;
Keep in mind that the method I discuss here will protected you from NETWORK monitoring, not actual computer or keystroke monitoring. So if your IT department has some security software installed on your PC, you probably shouldn't even be looking at this page. In addition to protecting you from network monitoring, this method can be used to get around a number of other security protections that may be in place;
Using this method will actually allow you to do more than just surf the web privately. You can bypass a firewall and encrypt the network traffic of any program that can use SOCKS proxy. This includes most instant messaging software like AIM, Yahoo!, MSN, IRC, mIRC and others. As MySpace.com is now so popular, many schools now comletely block MySpace to keep kids from socialzing online and to sidestep any controversy. Since MySpace is just a website like any other, this method should let you access MySpace freely around most firewalls. | |
Overview | |
The objective is to encrypt your network traffic so it can not be read as it passes through over employer or school's network. To do this, we will;
In essence, you are tricking Internet Explorer into thinking you have a proxy server running on your local machine, when in fact the proxy is running on your computer at home. Since all communication over your work network takes place through SSH, it can not be read. The SSH traffic CAN be seen or detected, but it will look like a garbled mess of letters and numbers. Other than being a little slower than usual, you shouldn't notice any difference when surfing the web when using the secure method. Some people that are familiar with SSH and may be asking, "How can Internet Explorer talk to SSH?". Well, SSH has a great little function called Connection Forwarding. You setup SSH to accept TCP connections on a port and forward them to a port on another computer. SSH takes ALL the network traffic on that port, wraps it in a secure package, and forwards it somewhere else. I refer to this as a "shunnel"; a secure tunnel. The other trick to this setup is the Dynamic Port Forwarding. Newer versions of SSH can emulate a SOCKS proxy server. A SOCKS Proxy server is a server that acts like a "middleman." It accepts requests from a client, and connects to the target server on your behalf. Take a look at these links on Webopedia for a little more information; SOCKS Proxy | |
Audience | |
This guide is written for a moderately skilled computer user. You MUST know how to install programs on your computer, how to navigate file systems, and how to edit configuration files. A knowledge of "how the Internet works", like TCP, sockets, ports, HTTP, and other network protocols would be extremely helpful. | |
Prerequisites | |
To use this method, you need the following;
| |
When won't this work? | |
Please notice the title of this page starts "How To Bypass Most Firewall Restrictions... I say most because the method I describe here will not work for everyone, even if you meet the pre-requisites above. If any of the following are true for you, you probably can't use this method successfully;
The method I describe on this page will not work with a pessimistic blocking strategy because it depends on being able to access your home computer from work. 9 times of 10, if you can't get to www.amazon.com, you won't be able to your home computer either. If for some reason you CAN access your home computer, then great.. proceed If not, you may want to talk to your network administrator. Ask him if they would punch a hole in the firewall so you can SSH to your computer at home. Or come up with some excuse to get access to 1 port on your home computer, then run the SSH server on that port. Or... maybe you ARE the network administrator and are just curious about how this works. :) | |
Addresses | |
Before we start installing and configuring software, you need to find out the following things;
| |
Software | |
We're going to be using 2 fairly simple pieces of software; an SSH Server and an SSH Client. There are a few flavors of SSH Server's out there, but we're going to be using OpenSSH because it's free. The website for OpenSSH is http://www.openssh.com . But wait! OpenSSH doesn't run on Windows unfortunately... But there is a site that converted OpenSSH to run on Windows, which is what we want! http://sshwindows.sourceforge.net/ . Download OpenSSH for Windows from http://sshwindows.sourceforge.net . The version I wrote this document using was 3.7.1p1-1. The latest version should work for you, plus it will have less security holes. For the SSH Client I recommend using Putty. Putty is a small single executable SSH client with the ability to setup a tunnel. The newer version also support Dynamic Forwarding, which is essential. It's possible to use OpenSSH as your client as well as your server, but Putty is much easier to setup and use. Download putty.exe from http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html . | |
Install the SSH Server | |
The OpenSSH installer comes in a zip file. Unzip the file, then run setupssh.exe. Choose to install both the Client and the Server. It will ask you to install into C:\Program Files\OpenSSH. If you choose to install into a different location, that fine, but be aware I will use the above path in this document. | |
Configure Windows | |
OpenSSH for Windows uses Windows' user database for login authentication. That mean you must have a User name and Password setup to login to your home computer. If you don't, you have 2 choices. 1, set a password on your Windows account, or 2, create a new local account that you will use to login from SSH. I know a lot of people out there don't use logins or passwords on their home computer, but if you're using NT, 2000, or XP, the functionality is there, even if you don't use it. There are many different flavors of Windows, with different methods of creating a local user. There's no way I can cover all of them, but here are a few examples; To create a new account on your home machine (Windows XP):
| |
Configure the SSH Server | |
We want to configure your SSH server to allow access using User name and Passwords, and to listen on port 443 instead of port 22. Why port 443 instead of port 22? In most cases your employer will block almost all outgoing network ports except for port 80 and port 443, which are the 2 ports that webservers run on. I used to tell people to run SSH on port 80 because that's the standard webserver port, but now I recommend you run it on 443. Port 443 is used for encrypted websites, which is what your shunnel traffic will look like as it passes through the firewall. If you have trouble on port 443, try it on port 80 instead. If neither work, you're probably out of luck. Open Windows Explorer, navigate to C:\Program Files\OpenSSH\etc. Open the file sshd_config using Wordpad. (That's sshd_config not ssh_config!)
mkgroup -l > ..\etc\group Then mkpasswd -l > ..\etc\passwd These 2 commands will create group and password files at C:\Program File\OpenSSH\etc | |
Start/Stoping the SSH Server | |
On your home computer, open a command prompt. To start your SSH server, type the following: net start opensshd To stop your SSH server, type the following: net stop opensshd To make it easy, you can create a .bat file that will this command. If you make a shortcut to the .bat file in your Windows Startup program group, then when you turn on your home computer in the morning, the servers will startup automatically, and be ready for you when you get to work. | |
If you have a wired or wireless router at home (Linksys, D-Link, Netgear, etc) | |
Some routers call it port forwarding and others call it virtual servers, but the setup is very similar no matter what brand you use. You will need to configure your router to route port 443 to the computer where you're running the SSH server. I not going to go into details, but there is usually a browser based interface directly to the router, which will have a page to setup virtual servers. Configure it to forward port 443 to your SSH server computer, port 443. | |
Setup Putty at Work/School | |
Copy putty.exe to somewhere on your hard drive at work. c:\ will do fine, or anywhere else you want. Your desktop is convenient but kind of obvious. If you don't have permissions to write files to your hard drive, just copy putty.exe and shunnel.bat to a floppy disk or burn them onto a CD. Take the disk to work and run Putty from the appropriate drive. Open Notepad and copy the following into it, change the bold part where necessary; putty -D 8080 -P 443 -ssh homeIP
Note for advanced users: If your computer at work is already configured to use a proxy server, you need to configure Putty a little differently, but this may still work. Open Putty in graphical mode, input your connection setting, and also copy the proxy settings from Internet Explorer to Putty's proxy configuration screen. Putty should now create a secure tunnel through the proxy at work to your computer at home... pretty neat trick. | |
Create your tunnel | |
At work, simply double click shunnel.bat to initiate the shunnel. A Putty window will popup asking for a login name and password. Type the user name and password you created above on the Windows account. If it works, you will be presented with a DOS prompt waiting for a command. This is actually a command prompt to your HOME machine. You can use it if you want, but as long as this command prompt is open, your tunnel is alive. To close the tunnel, type exit or close the window. | |
For Advanced Users | |
If you are very familiar with SSH and know what you are doing, you can set this up so you don't have to enter a password each time you create the shunnel. You have to install OpenSSH as your SSH client and then setup key based authentication by creating a public and private key on your work computer. Install the public key on the SSH server on your home computer. Thanks to Robert W. for this suggestion. I may go into more detail on how do set this up in the future. | |
Configure Internet Explorer | |
Now we have to configure Internet Explorer at work to use a SOCKS proxy server. First, at school/work, go to http://www.whatismyip.com . Write down the number. This is your IP address WITHOUT your shunnel enabled. In Internet Explorer;
First go to http://www.whatismyip.com again. If everything worked correctly, the page should have changed to show your HOME IP address, NOT your work IP address. If it shows your home IP Address, congratulation, your surfing the web securely and privately from work. If your intent is to access MySpace, and MySpace was blocked before, try it now. | |
Configuring other applications to use the private connection | |
Most applications that access the Internet can be configure to use the shunnel. For it to work, they have to support a SOCKS 4 or SOCKS 5 proxy connection. Instant messaging programs like AIM, ICQ, Yahoo IM, and mIRC all support this. Setup is different for all application, but the settings will be the same. You want to configure the application to use a SOCKS 4 or SOCKS 5 proxy server, Host should be 127.0.0.1, and Port should be 8080. | |
Protect yourself from someone looking over your shoulder | |
Here's a great application that fits in perfectly with the theme of this page. It's called Ghostzilla. The idea is that you want to surf the web, but have it look like you are doing normal work to people walking by your computer. Ghostzilla is a browser that hides itself in your normal work applications, like Excel, or Word, or Visual Studio... anything. With a swish of the mouse, Ghostzilla pops up and you can surf the web. If you see someone coming, simply move the mouse away, and it disappears, leaving no trace. Plus, you can easily configure it to use the shunnel as described here, for total privacy! | |
A Simpler Solution | |
Buzzsurf has teamed up with HTTP-Tunnel Corp to encourage users to try the HTTP-Tunnel Client as a simplier alterntive to the procedure described here. Using HTTP-Tunnel , you don't need a computer at home to leave turned on all day. And you don't need to know how to install SSH or Putty. All the network communication is encrypted and sent over standard webserver ports, just like I describe, so it offers just as much protection without the hassle. Try it for free at HTTP-Tunnel.com. | |
Copyright 2010-2011 www.best4hackingnews.blogspot.com- All rights reserved. Please do not repost or retransmit the content of this page. You are welcome and encourged to link to the page. www.best4hackingnews.blogspot.com BY VIEWING THIS PAGE, YOU EXPRESSLY AGREE THAT ALL RISKS ASSOCIATED WITH THE METHOD DESCRIBED ABOVE IS ASSUMED SOLELY BY YOU. THE AUTHOR SHALL NOT BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF USE OF THE METHOD. THE METHOD IS MADE AVAILABLE BY THE AUTHOR "AS IS" AND "WITH ALL FAULTS". THE AUTHOR MAKES NO REPRESENTATIONS OR WARRANTIES AS TO THE TRUTH, ACCURACY OR COMPLETENESS OF ANY INFORMATION ON THIS PAGE. | |
Notes: 11/21/2002 - The page is starting to pickup in popularity. I'm interested to know if anyone else has been successfully in getting it to work. Drop me an email. Thanks. 11/21/2002 - Please email me if anyone notices errors or security holes! 01/17/2003 - Changed to use Putty as an SSH Client instead of OpenSSH. Thanks to James.Q.L for this suggestion. 01/22/2003 - Added Ghostzilla blurb. 03/05/2003 - Added Amazon Honor System links to ask for donations. Check it out! 03/19/2003 - Changed theme a bit to highlight ability to bypass a firewall. Based on google searches, getting around a firewall is actually more popular than protecting privacy. 05/22/2003 - Changed recommended SSH port from 80 to 443. Should work just as well on 443 and set off less alarms because traffic on port 443 is encrypted anyway. 06/02/2003 - Chopped page up into "concept" and "description" pages. Now asking for donations to access the description page. 09/11/2003 - Added link to Amazon Wish List 09/13/2003 - Updated Apache instructions to version 2.0.47 09/25/2003 - Updated OpenSSh instructions to version 3.7.1. A security flaw was found in version 3.4 that I was previously using! All users whould upgrade to 3.7.1 or higher. 01/14/2004 - Page resurrected after being down for a few months... Server died, sorry! On temporary hosting until new server is ready. 01/22/2004 - Hosting on rebuilt server. 08/03/2004 - Updated some broken links and changed a few minor wording issues. 08/12/2004 - Major Update! New versions of Putty that support Dynamic Forwarding make Apache unnecessary! I am now calling this page Version 2, which details using Putty and OpenSSH for a SOCKS Proxy via Dynamic Forwarding. The older version, Version 1, that used Putty, OpenSSH, and Apache for an HTTP Proxy can still be found here . 09/26/2004 - Update the "When won't this work?" section to remove mention of proxy server. Turns out Putty can be setup to create a secure tunnel through a pre-configured proxy server. Also updated the "Setup Putty at Work/School" section to mention the Putty proxy setup option. 03/03/2005 - Added possible security issue note about SOCKS and DNS lookups. 03/06/2006 - Added notes about blocked MySpace since that is such a popular search item. |
6/11/2011 How to Bypass Most Firewall Restrictions and Access the Internet Privately
Free Operating System Downloads
Free Operating System Downloads
HI every body these are the operating systems which I found for free to download. If any other operating system required please post me.
Mona Os -----------------------> http://monaos.org/
Labels:
Free Operating System Downloads
How to create a FTP server in ur PC
How to create a FTP server in ur PC
Need a a static ip-address for ur FTP Server.Necessity for getting this static ip-address is ur not suppose to use ur own IP-Address.The main reason is u dont want to show ur IP-Address to everyone , there are many other reasons too but leave them aside..
1.Goto no-ip & create urself a free account.
2.Now ur account been created & ll receive ur account password via mail to ur email address.
3.After getting ur password login to ur account of no-ip.com
4.After getting logged in, click upon add a HOST its on the left menu.
4.After getting logged in, click upon add a HOST its on the left menu.
5.Type any hostname u want (eg:-saien) & select any domain from da given list (eg:-ftpserve.com) Click on Submit.
6.Now u have owned ur own static address (example: saien.serveftp.com)
7.Now click downloads button which is present above on the page & click on which operating system ur using & den download DNS update client or u can download it from here directly, this is for microsoft window users..
8.After getting downloaded, u have to install this software & login here with ur email addresss & p/w wen asked for it.
9.At last tick on da check box present at the static address.
10.U have ur own static web address.
Process 2:
Process 2:
Installation & setting of the FTP-Server 1.You have to install Serv-U 4.1.03 , download this software from here
2. Run Serv-U & use da wizard to setup ur FTP.
3.Click on next until u have been asked for IP-Address, leave it as it is & click upon next.
4.Enter ur domain name u have registered (example: rkchoolie.serveftp.com) it above in da domain field & click upon next.
5.U ll be asked for anonymous access, select No & click upon next.
6.Next u ll be asked for creating a named account, select yes & click upon next.
7.Choose any user name u wish (eg:-saien) & clcik upon next.
8.Enter password for dis account (eg:-@1254Rwn) for security purpose choose difficult password.
9.U ll be asked for da home directory for the account which u have created above.Select directory & click upon next.
10.Click on yes for locking dis account to da home directory, doing dis da user cannot further move up into home directory, click upon next.
11.At last ur account has been created click finish.
Process 3:
Process 3:
1.On the left tree-menu, select da account which u have been created above & den click upon General Tab.
2.Goto Hide 'Hidden' Files.
3. Check Allow only and enter the number one in the box.
4.Set da maximum downloading speed upto wat extent u want.As this is an account so many ll be using so set it low(eg:-10-20) to save ur bandwidth.Don't leave it blank as uers can download with full bandwidth.
5.choose how many users u want to login at on time.It depends on ur connection speed try these (56 - 1, ISDN - 3, ADSL or cable - 5-6 users.)
6.Click upon Dir Access Tab.
7.Now u can c home folder here.Highlight it & make ur permission.
8.If u want only users to download check only these Read,List & Inherit.
9.If u want ur users to upload into ur server & bu tto only 1 particular folder but not to downlaod, click upon dat add button & then select dat folder, Now u have to highlight dat folder & set these permissions on dat folder.Check,Write,Appened,List,Create & Inherit after setting these permissions click on the arrow which is present at the bottom right-hand corner.U want dis upload folder 2 be list first, before da home folder.
10.If der is any folder which u dont want anyone to access it, & it is present in the home folder, den click da add button & den select da folder.Now u have to highlight dat folder & see dat no all da checkboxes are left.After doing this click upon upper arrow which is present at bottom right hand corner.
11.There r many things u can do, These are only the basics....
12. Ur server is now ready to be connected..
13. Login with ur username & password...
Cell phones - Hackers Next Target!
Cell phones - Hackers Next Target!
It was bound to happen - they have hacked just about everything else. Now it's the cell phones. Cellphone hacking has just recently surfaced and been made public ever since some one did some cellular phone hacking on Paris Hilton's cell phone.What Does It Involve
The fact of someone hacking cell phone became public knowledge when Paris Hilton's cell phone, along with her information was recently hacked. Unfortunately for her, all her celebrity friends and their phone numbers were also placed on the Internet - resulting in a barrage of calls to each of them.Cell phone hackers have apparently found a glitch in the way the chips are manufactured. The good news, though, is that it only applies to the first generation models of cell phones that use the Global System for Mobile communications (GSM). Another requirement is that the hacker must have physical access to the cell phone for at least three minutes - which is a real good reason not to let it out of your sight. Currently, although the problem has been remedied (at least for now) in the second and third generation phones, it seems that about 70% of existing cell phones fall within the first generation category.
Another way that mobile phone hacking can take place is for a hacker to walk around an area with people that have cell phones and a laptop that has cellphone hacker programs on it. Through an antenna, and a little patience, his computer can literally pick up your cell phone data - if it is turned on. This is more applicable to cell phones that use Bluetooth technology.
What Can A Hacker Do?
Surprisingly, there are quite a number of things that can be accomplished by the hacker. Depending on their intent here are a few of them.Steal Your Number
Your phone number can be accessed and obtained by cellphone hacking. This allows them to make calls and have it charged to your account.Take Your Information
Mobile hacking allows a hacker to contact your cell phone, without your knowledge, and to download your addresses and other information you might have on your phone. Many hackers are not content to only get your information. Some will even change all your phone numbers! Be sure to keep a backup of your information somewhere. This particular technique is called Bluesnarfing.
6/08/2011 From Where I can Download Keygens Patchs Cracks and Serials
From Where I can Download Keygens Patchs Cracks and Serials
This is the Best List of Websites for Downloading Keygens cracks patches and Serials
@Atulplayer
Labels:
Get Free Serials Keys
Subscribe to:
Posts (Atom)
Recent Posts
Popular Posts
-
Latest Wallpapers for Latest Operating System Windows 8:- Power of Windows 8:-
-
Step 1 : Install CommView for WiFi . It doesnt matter whether you install it in VoIP mode or Standard mode . I used VoIP . ...
-
Anonymous Hackers attacked websites of Brazil's federal district and Tangara da Serra city on Sunday as well as one belonging to ...
-
An interesting new report from Sanford Bernstein analyst Toni Sacconaghi suggests that Apple might be on the cusp of seeing...
-
Here’s some good news for those who enjoy a spot of super-speedy mobile surfing – Tesco Mobile has decided that from now on, i...
-
Hey friends, I come with new version of AOE 1.0c conquerors Multiplayer hack v4 that works on Game Ranger , i have modified my old versio...
-
As expected, Microsoft has handed out a Samsung tablet to BUILD attendees. So, what was the mysterious tablet teased last week? It wa...
-
Windows 8 Consumer Preview: Frequently asked questions Here are answers to some common questions about Windows 8 Consumer Previe...