Tuesday, April 1, 2008

"Big Bang"

bigbang.jpg

Here is one great piece of idea which is designed to increase links. This one is called the Big Bang and the author, Mel over at Monday Morning Power wants to see if we can set a record and get to 1000 sites. Anyone can take part

If you would like to join in please do, even if you haven’t been tagged! Just follow the instructions below.





*Start Copy Here*

You do not have to be tagged to play along. This game is simple and so are the rules.

1. Copy from *Start Copy Here* through *End Copy Here*

2. Add your site(s) to the list. Just be sure to post the "Big Bang" at each site you add.

3. Tag or don’t tag, your choice, however, the more tags you create the longer the list will grow.

4. Let me know your blog’s name and url by leaving me a comment HERE. I will add you to the master list. (If you would like a scroll box code, leave me your email address and I will email it to you.) Scroll Box Example. (I decided not to use the box for the Big Bang for ease of copying.)

5. Come back and copy the master list back to your site, often. This process will allow late-comers to get as much link benefit as the first ones in. Once you are on the master list people who have participated earlier will update their bookmarks and help everyone lower than them out on the list.

1-Attitude, the Ultimate Power 2-Juliana's Site 3-Rusin Roundup 4-Grow Rich Along With Me 5-Comedy Plus 6-lynda's loft 7-Amel's Realm 8-MAX 9-Speedcat Hollydale 10-Mariuca 11-Complain Complain Complain 12-Mariuca's Perfume Gallery 13-Life Is A Roller Coaster 14-Sugar Queen's Dream 15-First Time Dad 16-Life 17-My Life 18-The Painted Veil 19-My Thoughts 20-DatCurious.com 21-Little Aussie Cynic 22-A Nice Place in the Sun 23-DatMoney.com 24-The Down Side OF Up 25-Ladyjava's Lounge 26-Cat Tales 27-moms.....check nyo 28-Colorado Baby 29-It's a Woman's World 30-ENLIGHTENED BITS 31-My View of "It" 32-My Reviews and Finds Along the Way 33-Our Hep Chat 34-Rantings of a Woman 35-The Callalily Space 36-Mom Knows Everything 37-Hazel 38-Chronicles and Tales Unlimited (RED) 39-From the Mouth of Jabber Jaws 40-Sunny Side Up Foodie & Lifestyle 41-Carmel Corn 42-Daily Stock Picks 43-The Whole New World 44-Wifespeak 45-Slavery Bliss 46-Rooms of My Heart 47-Unpredictable Life 48-My Life, My World 49-At Your Service 50-All About Ebay 51-Everything Amazon 52-Turn On, Tune In, Drop Out 53-My So-Called Site 54-New Wife Blog 55-Tendre Poison 323 56-Nick's Bytes 57-My Scratch Pad 58-Choc Mint Girl 59-Life Is Just Around the Corner... 60-Amori, poseia, art... virtuali by Hanna 61-Maryannaville 62-monaco - monaco's 63-Nyumix's Blog 64-read my mind - my keyboard monologues 65-Shower You Children With Love - The Right Way 66-Secret Agent Mama 67-Pinaymama's Diary 68-Answers to the Questions 69-Work of the Poet 70-A Total Blog 71-My life, my hope, my future 72-NORTE 73-A Window to Our World 74-Life as a Mom 75-FIELD OF DREAMS 76-lisgold 77-See Me for What You 78-Caught in The Stream 79-Pinay Mommy Online - My Home 80-foster me up 81-CRUEL VIRGIN 82-Garden of Moments in Blog 83-So Cute 84-Love Everlasting 85-WeLcOmE To My CriB 86-WELCOM TO PINAYSMILE'S JOURNEY 87-Ice's Icelog 88-Jenny's Wandering Thoughts 89-Hobbies and Such 90-Sweet Paradise 91-Mommy's Gibble Gabbles 92-Rusin Review's 93-My Small World 94-Little Peanut 95-Online Ramblings 96-My Mood My Feeling 97-BLOG it with ALLEN 98-Entertainment World 99-Let's Go Singapore 100-Firelynx 101-Catsy Carpe Diem 102-Every Beat Of My Heart 103-Always Da Fresh Princess 104-Listening.. Learning..Living 105-All About Mars 106-Syii From Afar 107-Some Thoughts I Have 108-From Here and Beyond 109-My Paid To Blog 110-Scholarship Corner 111-Cell Phone Review 112-"Apples of the Eyes" 113-It's All About Play 114-The Luttrull Journey 115-RennyBA's Terella 116-Unchained Melody 117-Out of the Blue 118-The Lure Of the Unknown 119-Maricel's 120-my blog 121-Spiff, the Spaceman 122-Living Well 123-The Dog Log 124-Catnip Corner 125-A Piece of Idea 126-Observations From the Back 40 127-Poetry by The Redneck Gypsy 128-Odd Facts 129-Juliana's Lair 130-My life is murphy's law 131-lisgoldsmemoirs 132-My memories, as time goes by 133-Somewhere over the rainbow 134-Blogging by Sandee 135-Our Journey to this so called life 136-Idaho Daily Photo 137-Memories that Never Fades.. 138-Anything goes 139-Your Caring Angels 140-Little Paces 141-Laketrees 142-PoeARTica 143-fracas 144-Just FraCas 145-Archies Archive 146-Growing Up Together 147-A Woman's Diary 148-Mother's Got A Dot Com 149-Close To You 150-Hot Shit Form Here 151-Astro Galaxy 152-Detector 153-Beauty is in the eye of the beholder 154-My Life is Peachy 155-The Down Side of Up 156-Magical Milestones 157-In Search of Life 158-RebelationsdotNet 159-Jen Jen's Place 160-Mimi Writes... 161-Strange but true 162-Depois de minha viagem 163-Your Perfect Wedding: 164-Make Money Online 165-Primitive Ornies and Bowl Fillers 166-Vegetarian Diet Lifestyle 167-Looking Out For You 168-BENOLSATUEM 169-OtherSide 170-Hacko's Site 171-where was I 172-Making Money Resources 173-text's Site 174-Movie Corner 175-Rahasia Bisnis Internet 176-Online Dating Tips 177-Beauty Kissing Tips 178-Forex Trading Tips 179-Singapore Tour Guide 180-PPC vs PTR 181-Indonesian Film 182-Adsense Success Stories 2008 183-Bali Tour 184-Paypal Indonesia 185-Review Bisnis Internet 186-Blog Daniel Scardua 187-Much of a muchness 188-Gagiers Amazing World 189-Clumsy Mommy 190-Leaotheblogger 191-PBDesigns Reading and Crochet Blog 192-Gagiers Striking Zone 193-DrowseyMonkey 194-Yesterday Today n Tomorrow 195-Auntie Dar's Life 196-Sky Windows... 197-Filippino Life Abroad 198-Leao the Blogger 199-Zoop's Rantings on Life 200-My Journey 201-A Sweet Taste of Life 202-This is a Miracle 203-Lavanderia Virtual 204-Nancies's Web - Family Life 205-Dating Profile of the Day 206-my wooden robot 207-Juliana's World 208-urban : trendy : lifestyle 209-Lucel Juliana's Library 210-Cooking Momster - My Life Journal 211-Anggie & Jeremy boy Online Journal 212-'Doc Doc Doc' 213-Transforming My Life 214-Gratitude Journal 215-Simplydunn.net 216-emila's illustrated blog 217-AZZY'S BLOG-A-ROONIE! 218-MAMABLISS' TREASURED MOMENTS 219-The Sky's the Limit 220-PROJECT HEAVY TRAFFIC 221-just another ordinary story.. 222-Samuel Rolo 223-The end mission! 224-R S S Submissions 225-Laice's Pics 226-Health and Fitness 227-Brainybimbo 228-Journey with WaterLearner 229-Zoop's Rantings on Life (at Blogspot) 230-Dear Me (Ivan) 231-Tour the Tabon Caves 232-Book Calendar 233-Love me. Hate me 234-Everyday health and beauty 235-BLOGANDO & ANDANDO 236-Memoirs.:*CRoSs mY hEARt*:. 237-The Chic Shopaholic 238-CK Go Places 239-Red Empress: Hell Flavored, Taste like Valentine 240-QUEENBEE 241-Le bric a brac de Cherie 242-jaqqq in the blogs 243-Bijoux & Banter 244-When Silence Speaks 245-MadTomatoe's Blogging Tools and Widgets 246-Conceptis addict 247-Madamoiselle 248-My Wooden Robot Blog 249-A Simple Life 250-It's a dog's life 251-A Technocrat's Blog 252-Misty's Words 253-My Dogs Keep Me Sane 254-New England Lighthouse Treasures 255-NoDirectOn (not: NoDirection) 256-Additional BlogLOve 257-I am DZOI 258-Caroland's Breathtaking Adventure 259-Blur Ting 260-Rojoy's Daily Update 261-Down River Drivel 262-Momhood Moments 263-Real World Mom 264-REALWORLDMOMUNPLUGGED'S WEBLOG 265-Lucca D Jiwa 266-AngrianiWorld 267-Marketing•Review 268-sejuk sesangat 269-Everything and then Some..... 270-Gbex...reachingOut 271-Heart of Rachel 272-The working mom / Finding balance... 273-Madamoiselle ver.2 274-Latest Keyword 275-Tanny's Blog 276-Pay to Review 277-Happy Life 278-Pet Haven 279-Teratak Nurani 280-A Melhor Novela de Todos os Tempos do Último Verão 281-TYNIE World 282-Wanmus's Blog-get cheapest web hosting 283-mokkikunta 284-BLOGHIT, POLIBLOG, TOP TOPICS 285-none of your business 286-Expat Travels 287-The Poor Mouth 288-GIRLIEGEEK.ORG 289-Tau Tau 290-Points of View 291-kimf3's Blog 292-Bing-My Treasures 293-Everything Green 294-The Pipeline Fixation 295-~Menempuh Arus Masa-Life-Photography~ 296-Pea in a Pod 297-{Me and Mine} 298-Beblan Anak Tukang Jahit 299-How Bourgeois 300-Julie's Blog 301-Emphbone 302-Simply the Best 303-Euroangel Graffiti 304-My Daily Nourishment 305-the worldwideweb addict 306-(¯`•._.• PalavraS ArticuladaS •._.•´¯) 307-The Big Life 308-Wild Borneo 309-Failure is the Key to Success 310-The muxic box's memories 311-What Goes Under the Sun 312-Cronaca di Gatteo 313-Angelika's other blog 314-So Real 315-Jaque 18 316-Overtime 317-When Life Becomes a Book 318-On the Bricks 319-Central Perk New York 320-The Simple Life of a Baghag 321-BlogBlast For Peace: The Official Site 322-Miss Cellania 323-Miss C Recommends 324-homeschooling.teacherjulie.com 325-belolats.com 326-The Original Blue Ribbon Bloggers 327-No nonsense Internet Tips 328-Its Not a Weekend; Its a Lifestyle 329-myfavehangout.com (Rich Valla) 330-Blog District 331-Official Travel Guide 332-EMJEI SAYS 333-www dot project rasso dot org 334-Work At Home Opportunities 335-VirusHead 336-Gracie de Guzman 337-Jollyjo 338-Jollyjo.tv 339-Ev Nucci's THE CAREER STRATEGIST 340-Ev Nucci's Resource Economics..Grease your brain 341-MARKETING MYSELF 342-NORTE 343-ACROSS THIS BRIDGE 344-STRUGGLING PARENTS 345-Read Between the Lines 346-Internet Lifestyle 347-THE SLEEPING TURTLE ART GALLERY 348-HIDUP BIAR SEDAP 349-BLOG ABOUT RICH 350-7101 Islands 351-Binding Ink III by Ndp the Poetress 352-mutiara hati 353-GreenBucks 354-Istilo Pinoy 355-Sweet and Complex Living 356-Angelika 357-my thoughts in writing 358-sharingplatform 359-Just the way it is... 360-LUCID CREATIVITY (Nelle-MyVirtualWorld) 361-TEACHERJULIE.COM 362-Bits and Pieces 363-Confessions Of A Breathing Tote Bag 364-My Joys 365-Fiction Earth 366-... My Precious ... 367-MY VIEWS ON MY SO CALLED LIFE 368-A Reality Bite 369-Cobb Community 370-Angelea's Blog 371-Janeth Vicy's Life Journey 372-NinaRepublic 373-Peaceful Mind 374-ME, MYSELF + 2 375-Mommy Jane and Little Sophia's Fasion misADVENTURES 376-ONKNEES - ITS NOT WHAT YOU THINK..... 377-SHEENISM 378-SAILIN' THRU LIFE (ASecretPlace) 379-Project Management Tutorial 380-Labindalawang Piraso ng Kokomban 381-Gorgeous Traveller 382-Sharing Gifts and Ideas 383-MUMBLINGS 384-Because Life Is Fun 385-PsychPatient MD 386-Everything Is Free 387-BRAINY MOMMY 388-Simply Unique 389-precious moments 390-Pearly Scripts 391-LIGHTNING AND THUNDER 392-Rayani Friends 393-WORK CULTURE 394-Psychology 395-Gold News 396-Applied Psychology 397-Scientific Psychology 398-Backwoods Drifter 399-New Beginning 400-Life in General 401-Life Is Like That (That's Life) 402-Life With Roxxymetal 403-SEXY MOMMA 404-The Z Files 405-I'll Never Forget the Day I Read a Book! 406-DOODLE PAGE 407-Escape Hatch 408-The Official Afterslaughter Weblog 409-Mommy's Little Corner 410-MALTED MONKEY 411-MOM AND THE CITY 412-Life with the Two Crazy Dogs 413-the joys (and pains) of being a woman (My Untamed World) 414-Making Cents-Sense of Technology 415-USER GAME REVIEWS 416-Write Shy 417-DOMANTYS.net 418-ZWANG 419-ANYTHING GOES! (my world, my place, my views...!) 420-Matt's blog (World of Insanity) 421-Lifestyle chronicles 422-The Alien Next Door 423-CMAQUEST 424-The Mascot 425-NARUTO ADDICT MANIA 426-Friendster Layouts 427-borneo tatoo...the original body ink 428-DOMANTIX 429-CULTURED SHOCK 430-EuWorx 431-HUBPRIME 432-STAR SURFACE 433-MY KALEIDOSCOPE WORLD 434-luckycharms 435-John's Blog - Maybe I Am Joking? 436-NEW WORDPRESS THEMES 437-WEB VIDEO HITS 438-TOP MUSIC VIDEOS 439-TEXT MESSAGES 440-Homemade Haven 441-TAGMEMEAWARD CAT 442-Coriander Dreams 443-BrainLoops 444-Soul Meets World 445-Speak The Speech 446-The Tall Poppy 447-My Day Off 448-Internet Business Promotions and Opportunities 449-Gage's World 450-PIXY ROSE 451-John's Cynical Blog 452-Poliblog 453-Techcheck 454-RoseateMarketingTips.com 455-RUSTYGANGSTER 456-Napaboaniya's Music Videos 457-EZINE PRIME 458-Prime Scrolls 459-FactMundo: World of Facts 460-CHAE 461-GOLDFINGER 462-OnlineBiz and Resources 463-ASTRO GALAXY TRAVEL 464-The Singapore Housewife 465-Climate of Our Future 466-Anorexic Queen 467-Eleanoreblog 468-Turnip of Power 469-Old Life 470-Shiphire Dustbin 471-POSTCARD HEADLINES 472-crazyblog 473-V.Col 474-Simple Life, Simply Me 475-Rasso Photoblog 476-Bagwine Ruminations 477-The Travel Bug 478-Short Stories 479-OPENGIGA TECH 480-Yogatta Dot Com 481-Net Diary of Rasal 482-WORDPRESS MEME 483-divaness 484-Thinking Tunnel 485-My decisions, my mistakes, my feelings, my LIFE 486-E-News (Gossip, Scandals, Movies, Music, etc) 487-FRAPPUCINO JOWN 488-MAYBELLE DOODLES 489-And the Legend Lives 490-In His Time - Endless Frontier 491-Travels in Time 492-Money Making Reports 493-MY HAPPY PLACE 494-The M&M Online BloG 495-Carol's Corner 496-http://individualathome.blogspot.com/ 497-Confessions of a Social Climber 498-Moderately-Confused Pinay In Deutschland 499-BLOGSILOG 500-DigiScrapz: Captured Memories 501-Cherry’s Comfort Zone 502-Thinking Out Loud 503-Wishing and Hoping 504-Jobs for Davao 505-Jobs for Abroad 506-PRC Exam Results 507-Wish Washy 508-Captains bridge 509 Colourrain 510 Modus Vivendi 511-Our Hep Chat 512-I forgot where I was going with this... 513-MRS FANCYPANTS LIVE 514-Real Estate News and Tips 515-MY.........STORIES 516-Garaphernalia 5.0 517-Everything Everywhere Travel Blog 518-lane of memories 519-Avee's Adeventures 520-Celebrating Life 521-Me and the World 522-Paul, Toni and Lance ----- Bridging The Distance 523-Paul and Toni 524-This is My New Chapter of Life 525-Online Competitions 526-posh lifestyle 527-Creative In Me 528-Life's Lessons 529-KERSLYN'S COMFORT ZONE 530-Piece of Mine 531-One World One Dream 532-HUMBLE HOME OF OURS 533-Life Is Beautiful; Life Is Love 534-Journey of Two 535-Tutiger's Blog 536-JORDAN CREEK 537-NEURO PATCH 538-Tour and Travel 539-Musings of a Daydreamer 540-DELICIOUS YOUNG BOI 541-SugarMagnolias 542-Heart and Style Woman 543-SURREAL-GEORGIA 544-Girls Do It All 545-OgenDicht/EyesClosed 546-Christy DeKoning; Travels in Watercolor 547-living life to the fullest 548-Holy Cuteness 549-FILIPINOLIFEABROA 550-Filipina Love stories 551-Interracial Marriages 552-SWEETHEART ALLEN 553-Living laughing and loving 554-A Day to Savor and Relish 555-Catsy's Pet Blog 556-SimplyCatsy's BLogs 557-Catsy's Out of the Blue 558-Mohanitguy 559-ItBuddy 560-alanzain 561-3 Sides of Crazy 562-Life abroad wifey 563-My Life's Rollercoaster Ride 564-ONLINE ENTREPRENEUR 565-Verb 566-Laptop Tip 567-US GIRLS 568-Our Journey as a Family 569-Let's talk....everything... in one space 570-http://oscar-vg.blogspot.com/ 571-BENOLSATUEM 572-blockbuster movie trailers 573-Bodybuilding & Fitness 574-Lemon Iced Tea and Me 575-GloboGeek 576-butterfly chewables 577-The SuperStar John Blog 578-CultCase 579-Allen's-collections 580-lyrics 581-fil-amstories 582-allen-library 583-Ad Hoc Doctor 584-In The Life Of...Mne 585-The Social Network Blog 586-T-CRIB 587-The iSurfer 588-Review dan informasi bisnis internet 589-A Place of Being 590-Medicinet 591-Make Money Blogging 592-LONG TERM STOCK PICKS 593-Pet Monologues 594-fingers dot crossed 595-Simple Life 596-Small Business Guru 597-Life's a journey, not a destination 598-Blog Portfolio 599-Nurse's Dose 600-ONE STOP GAMES 601-DianeCA's Metamorphoses 602-Sultana's Blog 603-Joze's Crap 604-landscaping 605-Geng's Journal - Wonderful Thoughts On line 606-ananda 607-Moneyonlinemasterz 608-Pamp's Blog Corner 609-Photography & Morphology of SheenaEdillie 610-Almanac Queen 611-G0c3nG Dot Com 612-World News Dotcom 613-Berbagi Tips Hidup dan Kehidupan 614-Windows App Warez 615-Most Keyword 616-Music Download 617-eBooks & Tutorials 618-Web Developments 619-Non-Windows Warez 620-Hackers Lounge 621-Movie Download 622-Day Tippers 623-Alamak Oi Oi 624-PEACE GLOBE GALLERY 625-Dona Nobis Pacem: The Peace Globe Posts 626-Fertility Challenged 627-A new kid in town...Japanese fastfood 628-The Cafe at the End of the Universe 629-The Manic Bookworm's Ballroom 630-All World Insurance 631-WTIT Tape Radio: The Blog 632-Mama Pajama 633-bobbarama dot com 634-Polliwog's Pond 635-Six4Paula 636-Beth & Cory's Mom 637-Luz de Luma, yes party! 638-The Rising Blogger 639-Saturday 9 640-haekal-bloger 641-The World Through My Eyes 642-Blog Income Project 643-Nelle - EmpressReviews 644-home for business 645-Kaleidoscope 646-Intrepid Ideas 647-Life in the United States 648-Napaboaniya APAD 649-Solo-Flight 650-BlackNickel 651-Anything Under The Sun 652-Buy Blog Review 653-Are You Grateful? 654-ezvancouver.com 655-Vancouver Sky 656-Bodybuilding, Health, and Human Growth Hormone 657-5 minute foods for you 658-LUNA.LUNA.LUNATIC 659-..just ME being RANDOM 660-Cebu Lands and Homes 661-Skylle's D' Limit 662-iqbal blog 663-Tech 5.0 664-Saje Jek 665-Sehening Kalbu 666-Di Sini Berhenti 667-LADYJAVA LIFE'S PAGES 668-Shopping Fashion Style 669-Nonsense 670-Pinaywifespeaks 671-Pinaywifeatbp 672-Daily Tipper 673-I said what You Thought 674-Adventure Journey World 675-Candid Yammering 676-Prove Me Wrong 677-Torra Mirror 678-Memoirs on a Rainy Day 679-Affiliate Crunch 680-Feel Free To Express Yourself 681-Hugoscafe 682-Sri Kebakat 683-justmeNus 684-Gregorio Art Studio 685-REFERENSI BISNIS INTERNET FREE JOIN 686-Heaven's Garden 687-Bangkingaroo 688-PinayJade's Life is Beautiful 689-Comunique by Ivanhoe 690-Reviews 691-The Mind, The Heart, The Lines 692-anna's cofeenchocolate 693-Submit Feed 694-Genelle 695-Scholarship For You 696-Take Care Baby 697-The Popular Gadget Info & Review 698-Indonesian Automotive Information 699-The Road to Semarang Jawa Tengah Indonesia 700-Wanita dan Dunianya 701-Earn Cash From Reviews 702-World Football On The Net 703-Tech 100 704-Caboodle 705-mikefolan.com 706-REFERENSI BISNIS INTERNET FREE JOIN 707-Greatest Reviews 708-Mad Blog 709-One Stop Shopping 710-Tacky Me 711-Down Home Kitchen 712-Rajesh Rana Dot Net 713-Self Discovery 714-Jasmin's Heart 715- Veerublog 716- SaCreD MatriX 717- Collective Hacks !! 718- Do Bato 719- Complete Guide for SSB 720- Ultimate way of Surfing 721- Life@Army Institute 722- The Chosen One 723-INSERT YOURSELF HERE
*End Copy Here*


Enjoy :)

Wednesday, February 20, 2008

Ultra Surf - Best way to Unblock blocked sites like Orkut, youtube, Myspace, Facebook

It is the flagship software product from UltraReach Internet Corp. for Internet anti-censorship. It enables users inside countries with heavy Internet censorship to visit any public web sites in the world safely and freely. it enables users to browse any website freely just the same as using the regular IE browser while it automatically searches the highest speed proxy servers in the background.


UltraReach provides a client download for Windows that the user in the censored country downloads (installation is not required) on his or her own computer. It is free software and is available in English and Chinese. Once started, the application opens an Internet Explorer application that is automatically configured to allow the user to browse web sites through UltraSurf. Other browsers must be manually configured. By default, the connection is encrypted and various techniques are used to find an unblocked IP address.

UltraSurf is an excellent choice for non-technical users who are willing to trust a third-party and require free web browsing at reasonable speeds. Since the UltraReach website is often already blocked in some countries, a user in a censored jurisdiction may have to acquire the software through a third party. Even though the site may be blocked, the service could still be accessible as measures are taken to acquire unblocked IP addresses in a variety of ways. However, even these could be blocked by a very determined censor.

Some Useful tips:

  • Check your net connection remember that it needs certain level of net speed to run Ultra Surf smoothly.
  • check proxy settings of Ultra Surf, when u download fresh version u need to tweak proxy settings of Ultra Surf. do that manually, also sometimes proxy setting of Ultra Surf get vanished automatically.. do check for proxy setting and feed it manually. For any kind of browser Proxy IP address is 127.0.0.1 with port :9666 and For Ultra Surf it depends upon your network.
  • 8.8 is the latest one and it is the best coz when there is no net connectivity it automatically flashes a message…. it won’t hang u there for retry
  • also last tip is that when net slows down or ain’t working at all, just exit Ultra Surf and re start it. instead of retry.. try exit and re start it…trust me retry is bad idea. just restart the whole thing.

For Firefox browser: If you are using browser other than IE, then you have to manually change your proxy IP address to 127.0.0.1 with port :9666 of Firefox browser.

For Mac Users: change your proxy IP address to 127.0.0.1 with port :9666 of Safari browser.


UltraReach
Link: http://www.ultrareach.com/
Price: Free

Also Read-

Downloads Links

Tunneling software for circumventing/unblocking internet censorship


Tunneling encapsulates one form of traffic inside of other forms of traffic. Typically, insecure, unencrypted traffic is tunelled within an encrypted connection. The normal services on the user’s computer are available, but run through the tunnel to the nonfiltered computer which forwards the user’s requests and their responses transparently.

Users with contacts in a non-filtered country can set up private tunneling services while those without contacts can purchase commercial tunneling services. “Web” tunneling software restricts the tunneling to web traffic so that web browsers will function but not other applications. “Application” tunneling software allows one to tunnel multiple Internet applications, such as email clients and instant messengers.

Peacefire Circumventor

Peacefire/Circumventor is a circumvention system nearly identical in principle and method to psiphon. However, It can be difficult to install. Three different software packages must be downloaded and installed, and if your computer is behind a home router it may require additional configuration. Although Peacefire/Circumventor provides some setup help, there is not a detailed user guide as there is with psiphon. Otherwise, Peacefire/Circumventor works along the same principles as psiphon.

http://peacefire.org/

How to disable your blocking software

If you're in a setting where your actions cannot be traced back to you personally -- for example, if you're using a school or cybercafe computer where you don't have to sign in individually, or you're using a home computer where the administrator never checks the logs of what you accessed -- you can try using this site:

http://www.StupidCensorship.com/


That site is of course well known (having been publicized on this page), which is why you should not use it if you are being individually tracked. And of course since the site is well known, it may be blocked already, but there are lots of computers with blocking software installed where the admins are not bothering to update the blocked-site lists any more, so it might work.

If that does not work, then:

Ask a friend to install a "circumventor" Web site on their home machine, using these instructions. The instructions can be followed by most people with a reasonable amount of computer experience (i.e. if they have installed and uninstalled software before).

Once they have completed the instructions, they can give you a URL that you can connect to, which will disable the blocking software on your computer.

Additional instructions for specific programs (currently nothing specific, but more info will be added as necessary) :

How to install the Circumventor program, which gets around all Web-blocking software

Please Note!! You don't actually install the Circumventor on the computer that is blocked from accessing Web sites. You, or a friend of yours, has to install the Circumventor on some other

machine which is not censored.

For example, if you want to get around Web blocking at work, don't install the Circumventor on your work computer. Install the Circumventor on your home computer. When the installer is done, it will give you the URL for your new Circumventor, and then you write that URL down and take it in with you to work, where you can use that URL to bypass the Web blocking there. Similarly, if you're in China and blocked from accessing certain sites, don't install the Circumventor on a machine in China; instead, get a friend to install it outside China, and then they can send you the URL that you can use to access banned sites.

If you want to, please enter your email address below if you would like to receive updates about the Circumventor software. This will include announcements about new versions and improvements. We will never share your email address with any third party.

How to install the Circumventor

The machine where you install the Circumventor must have a fast Internet connection (not dial-up), and it must be running Windows XP or 2000 (this includes most computers these days). Also, once you install the Circumventor on your machine, the Circumventor will only work as long as you have your machine turned on and connected to the Internet, so you should only install it on machines that are online more or less all the time.


NOTE: By installing this software, you will be joining an interconnected Web of Circumventor machines, so just as you can surf the Web via other people's machines (at sites like StupidCensorship.com), at times other users will be surfing the Web through your machine. However, they will not have access to any files or programs on your machine.

To install:

  1. Download ActivePerl from this link and install it. It must be installed to C:\Perl (this should be the default). Accept all of the default options.
  2. Download OpenSA 2.0.2 beta from this link (FireFox users -- please right-click and pick "Save Link As") and install it. Accept all of the default options. (If you get to a screen titled "Server Information" and it doesn't have values filled in for "Network Domain", "Server Name" and "Administrator's Email Address", just fill in these boxes with made-up random values -- the Circumventor doesn't use them.)
  3. Download the circumventor-setup.exe program from this link and pick "Save" -- then once you have saved it on your computer, run the circumventor-setup.exe file that you saved.

If the circumventor-setup.exe program succeeds, it will display an "It's ready!" page at the end of the install. If it fails, it will create a file circumventor-setup-log.txt -- send that file to bennett@peacefire.org and we will try to figure out what went wrong.


To get around your blocking software:
  • 1. First, try a circumvention site like https://www.StupidCensorship.com/. Be sure to type https at the beginning of the URL, not 'http'. Even though this site has been widely known for months, many networks have their blocking software set up incorrectly so that sites beginning with https:// are not blocked, and https://www.StupidCensorship.com/ will still be accessible.

  • 2. If that doesn't work, you can join our e-mail list where we mail out new Circumventor sites every 3 or 4 days. Of course, employees of blocking software companies have gotten on this list as well, so they add our sites to their blocked-site database as soon as we mail them out, but in most places it takes 3-4 days for the blocked-site list to be updated. So the latest one that we mail out, should usually still work.

  • 3. If you have a computer with an uncensored Internet connection, you can follow these easy steps to set up your own Circumventor site. For example, if you want to get around blocking software at work, and you have a home computer with an uncensored Internet connection, you can install the Circumventor on your home computer. Then it will give you a new URL, and you can take that URL in with you to work and type it into your browser to get around the network blocking software.

  • 4. If you're trying to get around blocking software that's installed on the local computer, and not on the network, use these instructions to boot from the Ubuntu Live CD. (These instructions include tips on how to tell the difference between blocking software that's installed "on the local computer" and software that's installed "on the network".)

Source: http://www.peacefire.org/circumventor/simple-circumventor-instructions.html

Monday, February 18, 2008

psiphon

Researchers at University of Toronto introduced a software tool on Friday, December 1, 2006 that aims to help people in countries that censor the World Wide Web. Psiphon (pronounced sigh-fawn), a web-based utility, lets individuals in a country that censors the internet sign on to a server that gives them secure access to web pages anywhere, bypassing government restrictions.

Psiphon turns a regular home computer into a personal, encrypted server capable of retrieving and displaying web pages anywhere. The user in the uncensored country downloads the software and installs it on his/her home computer. psiphon is free and open source, and comes in Linux and Windows versions. It is easy to install, and comes with a very detailed and easy-to-follow user guide.

If your computer is behind a home router it may require some configuration. Once installed, the psiphon provider sends the connection information to users in censored jurisdictions by the most secure means available. The censored user does not have to install any software but simply types a URL into the psiphon “blue bar.” This means that the psiphon circumvention system can be accessed from anywhere. Since the locations of psiphon-enabled computers are private, they are difficult for censors to find and block.

Official Site - http://psiphon.civisec.org

Download Links-

CGIProxy

CGIProxy is the engine that most web-based circumvention systems use. Private web-based circumvention systems turn a computer into a personal, encrypted server capable of retrieving and displaying web pages to users of the server connecting remotely. Private web-based circumventors include providers, who install and run circumvention software in an uncensored jurisdiction, and users, who access the service from a jurisdiction that censors the Internet. The circumvention provider grows his/her private network based on social relations of trust and private communications making it difficult for censors to find and block.

http://www.jmarshall.com/

Proxify and StupidCensorship

Proxify
https://proxify.com/

StupidCensorship
https://stupidcensorship.com/

Proxify and Stupid Censorship are encrypted, public, web-based circumvention systems. A user in a censored country simply visits one of the web sites and then inputs their destination. Since these web services are public, however, they are blocked in many countries and by most filtering applications.

WEB-BASED CIRCUMVENTION SYSTEMS

Web-based circumvention systems are special web pages that allow users to submit a URL and have the web-based circumventor retrieve the requested web page. There is no connection between the user and the requested website as the circumventor transparently proxies the request allowing the user to browse blocked websites seamlessly. Since the web addresses of public circumventors are widely known, most Internet filtering applications already have these services on their block lists, as do many countries that filter at the national level. Web-based circumvention systems could be a good choice for the users connecting with no trusted out of country contacts, assuming the pages are not yet blocked.

NOTE: Although some may advertise themselves as “anonymous” many web-based circumvention are not. Some may not even be encrypted. It is important to remember that encrypted websites begin with “https” and are signified by the open lock icon in your web
browser moving to the locked position. If you send your web requests unencrypted, they can be easily intercepted any step along the way of transmission, from your home or office router to your ISP.

How to choose a circumvention technology

Considerations For The Circumvention User

a) What, Where, How

Do you want to access or publish information on the Internet?

Although closely related, accessing banned content, as opposed to publishing it, can involve different risks, strategies and technologies for the user. We have created a separate guide for those who want to circumvent Internet censorship to publish information online.

Are you accessing the Internet from a private or public computer?

Accessing the Internet from either your home or a public computer at an Internet cafe or public library involves a different set of considerations, and presents a range of possibilities for circumvention. For example, users who access the Internet from public computers or Internet
cafés may not be able to install any software and will be restricted to web-based solutions.

Others may want to use applications besides Web browsing (HTTP), such as e-mail (SMTP) and file transfers (FTP), and thus may want to install software on their computer workstation and to 6tweak their computer’s settings. With your own private computer, you can install any software of your own choosing that you may not be able to install on a public Internet terminal. However doing so can impose additional risks, as there is now evidence on your computer of the use of circumvention technologies which, if seized by authorities, could lead to liabilities.

Public Internet access can offer anonymity that private computers cannot, although some require visitors to present personal identification and/or monitor visitors’ usage. Whether you circumvent censorship through your home or a public terminal, it is always important to understand as fully as possible the terms and conditions of the service that is being provided.

b) Who Do You Know?

Do you have any connections to or availability of trusted out-of-country contacts (e.g., friends, family members, colleagues)?

Since circumventing Internet censorship involves making connections to a computer outside of the jurisdiction in which the censorship takes place, an important factor for consideration is whether you know and trust someone or group outside of the country who is willing to provide circumvention services for you. Many users who circumvent censorship do so by connecting to open public proxy computers whose connection information is advertised in some manner.

Users should be aware that these are the least secure by definition, since a user can never be certain that an adversary has not set up a trap, or "honey pot", to entice dissidents. Having someone you know and trust set up a connection instead is a better option, but it is not without its own set of risks and considerations. Providers can monitor everything you do online, including all of the sites you visit. That is why it is essential that you fully trust the person or organization that is providing the circumvention service for you. Successful, long-term and stable circumvention is greatly enhanced by having a trusted contact in a non-filtered location.

Are you willing to pay and put your trust into a third party organization to access or publish information on the Internet?

If you do not have access to trusted friends and family members outside of your jurisdiction then you may have to put your trust into a third party. There are many commercial providers that offer circumvention services for a fee. If you are able to afford this option, be careful to explore the terms and conditions of the service and the privacy policy. Commercial services may offer anonymity to surf the Internet, but not anonymity from the commercial provider itself. If compelled by law, the commercial service may turn over all of their records, and your personal information.

c) What Do You Know?

What is your level of technical expertise? Do you consider yourself a beginner, intermediate, or expert computer user?

The greater your level of technical expertise the more your circumvention options increase. Some users may find the installation, set-up process, and use of circumvention technologies to be too onerous or beyond their level of expertise. Although it is always possible to invest time and learn how to use even the most seemingly complex software, be careful: the incorrect installation and use of circumvention technologies may put you at considerable risk.

What language of use is acceptable/preferable to you? Do you require technologies that operate other than English?

Most circumvention technologies are designed with user interfaces and instructions in English, although many also offer versions of their systems and user guides in other languages. If you are consulting a translated user’s manual, be sure that the translations you use match the version of the software you are employing as the two may not necessarily match.

d) Safety & Security

Are you accessing content that is highly critical of and is considered a security threat to the country in which you live?

Is there a precedent for arrests for the practice of circumventing Internet censorship in your country?

Do you have any affiliations with high profile groups that are known to be on your government’s watch list?

Accessing banned content can be a serious violation of the law, especially if the information you are visiting is considered a national security threat. If you are consistently accessing this type of content, you should choose circumvention technologies that offer the greatest anonymity and security. However, there is usually a trade-off between ease-of-use and security so be prepared to spend extra time and effort in order to minimize risks.

If you are associated with a high profile rights organization or dissident group, then you may be on
your government’s watch list and you should take extra precautions in carefully choosing your circumvention technologies. You may want to assume that you are being monitored and that your computer could be seized at any time. Avoid circumvention technologies that require installation on your computer. If possible, access the Internet from a range of different anonymous public terminals instead.

e) Identity

Is protecting your identity online of paramount importance to you?

Do you want to surf and/or publish anonymously?

Circumvention and anonymity are different. Anonymous systems protect your identity from the website you are connecting to and from the anonymity system itself. They can be used for circumvention, but are not designed for this purpose and thus can easily be blocked. Circumvention systems are designed to get around blocking but do not protect your identity from the circumvention provider.

Do not mistake open public proxies for anonymous systems - they are not. Although they may not ask for personal information, they can view and record the location of the computer from which you are connecting and all of the websites you visit through them. Commercial services which advertize anonymous surfing may still record your connection information and the web sites you visit. Make sure you fully understand the terms and conditions of their use.

There are a number of strategies that you can follow if you want to publish online anonymously. The Citizen Lab has created a separate guide on circumvention for publishing online that includes a section on anonymous publishing.

Consideration For The Circumvention Provider

a) Safety First

Setting up a circumvention technology for someone is a great way to give a helping hand to others to exercise their basic human rights of access to information and freedom of speech. However, it is a choice that carries with it a heavy responsibility and several considerations. Above all else, the safety of your users must be your primary concern.

What is your level of technical expertise?

Do you consider yourself a beginner, intermediate, or expert computer user?

Setting up and hosting a circumvention technology server can be a time-consuming and complex task depending on the circumvention system. Some require the download and installation of several different pieces of software. Almost all of them will entail some configuration to accommodate your own particular network environment. If you are running your Internet connection through a home router or firewall, for example, there may be some customization of your circumvention system.

Some circumvention technologies have very clear and helpful documentation and user guides while others do not. Be sure that you choose a technology that matches your skill level and abilities, as setting up a system improperly could jeopardize the security of your user(s). Make sure that you are also comfortable maintaining your system, as an outdated or constantly interrupted technology can frustrate and needlessly endanger users in censored locations.

b) Your Users

What is the number of users you expect or want to accommodate and what is your available bandwidth?

The number of users you allow to surf through your computer will affect your computer’s processing capabilities and your connection speeds, affecting not only what you do but what circumvention users can do. The more users you have, the more complicated it will be to monitor their usage (if necessary) and manage their accounts. Make sure that you offer circumvention services only to the number of users you and your computer can comfortably handle.

What will you allow your users to do through your connection?

Would you want to know what information they are accessing or publishing?

What are you going to do with their surfing records?

Setting up a circumvention service means that you will be able to monitor all of the usage that runs through it. Having this capability means that you can decide what information you will allow users to retrieve or publish. Some circumvention systems make this feature easier to employ than others, but even those that do not still leave traces on your computer of the user’s activity.

You must decide for yourself what information you will choose to view, archive, and/or discard. If you choose to discard this information, make sure that you do it properly as even deleted information can leave traces. Above all, make sure that you let your users know what your standard operating procedure will be concerning the information they leave on your computer and what they can do through your circumvention system. Communicate a clear policy to your users.

c) Risks

What are your potential security and legal risks of hosting circumvention technologies?

Does your ISP or government restrict this type of service?

The risks of hosting circumvention technologies are not as great as they are for users of circumvention technologies, but they are not zero. You are almost certainly responsible for everything that is done through your computer using your Internet connection. If someone visits websites or posts information through your circumvention service that is illegal you may be held liable. A less likely but nonetheless significant risk concerns the possibility of you becoming a target of foreign agents of the country in which your service is offered. Make sure that you understand the potential security and legal risks of hosting circumvention technologies from the perspective of both your ISP and your own government.

circumvention technologies - Solution to Internet censorship

In the face of this growing global problem, citizens around the world have sought solutions to evade government filters and exercise their basic human rights to access information of their own choosing.

The tools, methods, and strategies that are used to by-pass Internet
content filtering are referred to as circumvention technologies..

There are numerous circumvention technologies that can be used under a variety
of different circumstances by a wide range of potential users. No one technology
fits all of the different potential users and the circumstances within which they find
themselves. Our view is that it is much better to think of circumvention technologies
pragmatically as tools in a toolkit. Just as some tools are better for some jobs and
not others, or require different levels of skill to employ responsibly, each circumvention
technology should be approached in terms of how best it fits each user’s unique
problems, circumstances, and skillset.

Internet content fi ltering practices vary widely by country.

In China, the government controls access to Internet content and
online publishing by a combination of technical fi ltering methods
and extensive regulations and guidelines. The technical fi ltering
is implemented primarily at the national backbone level, with
requests for information fi ltered for both banned Internet Protocol
(IP) addresses and keywords. Although sometimes inconsistent,
China’s centralized system of content fi ltering ensures uniform
blocking of access throughout the country to human rights, opposition
political movements, Taiwanese and Tibetan independence,
international news, and other web sites. There is very little transparency
about Internet fi ltering, and no public accountability process.

In Iran, there is no nationwide uniform fi ltering system. Instead,
Internet Service Providers (ISPs) are responsible for implementing
censorship following explicit guidelines stipulated by the state.
Individual ISPs choose how they fi lter, with some using American
commercial fi ltering software while others use more manual
methods. Users accessing the Internet on different ISPs can experience
signifi cant variation of accessIbility to web sites. Iran uses this
system to fi lter Iran-related and Persian/Farsi language content
critical of the regime, including politically sensitive sites, gay and
lesbian content, women’s rights sites, streaming media, and blogs.
While there are debates within government that openly acknowledge
and discuss Internet content fi ltering policies, there is very little
transparency about the specifi c content that is targeted for fi ltering.

In the United States, public institutions (e.g., schools and libraries)
are required by law (the Children’s Internet Protection Act
- CIPA) to use fi ltering software to block access to obscene,
pornographic and other materials related to the sexual exploitation
of children. Most implement the fi ltering policy by using
commercial fi ltering technologies, which are prone to miscategorization
and error. Researchers have found that commercial
fi ltering technologies mistakenly block access to content related
to women’s health, gay and lesbian rights groups, and sexual
education for teenagers.

reference-
Citizen Lab

Internet censorship - a major global problem.

Whereas once it was assumed that states could not control Internet communications,
according to research by the OpenNet Initiative (http://opennet.net) more than 25
countries now engage in Internet censorship practices. Those with the most pervasive
filtering policies have been found to routinely block access to human rights organizations,
news, blogs, and web services that challenge the status quo or are deemed
threatening or undesirable. Others block access to single categories of Internet
content, or intermittently to specific websites or network services to coincide with
strategic events, such as elections or public demonstrations.

Although some states enact Internet filtering legislation, most do so with little or no
transparency and public accountability. Most states do not reveal what information
is being blocked, and rarely are there review or grievance mechanisms for affected
citizens or content publishers. Compounding the problem is the increasing use of
commercial filtering software, which is prone to over-blocking due to faulty categorization.
Commercial filters block access to categorized lists of websites that are kept
secret for proprietary reasons, even for customers. As a consequence, unaccountable
private companies determine censorship rules in political environments where there
is little public accountability or oversight. For example, commercial filtering software
is used to censor the Internet in Burma, Tunisia, Yemen, Saudi Arabia, and Iran.

Click on image to zoom in...

reference-

What is Circumvention Technologies?

Circumvention Technologies

Circumvention technologies are any tools, software, or methods used to bypass Internet
filtering. These can range from complex computer programs to relatively simple
manual steps, such as accessing a banned website stored on a search engine’s cache,
instead of trying to access it directly.

Circumvention Providers

Circumvention providers install software on a computer in a non-filtered location and
make connections to this computer available to those who access the Internet from a
censored location. Circumvention providers can range from large commercial organizations
offering circumvention services for a fee to individuals providing circumvention
services for free.

Circumvention Users

Circumvention users are individuals who use circumvention technologies to bypass
Internet content filtering.

reference-
Citizen Lab

Welcome to Ultra Surf - Ultimate way to Surf

Ever Since I posted on Ultra Surf I was asked for many help and write more on this topic I wanted to help every query but at the same time i don't want to categorize my site as Ultra surf site so i thought of launching this new blog entirely dedicated to ultra surf and internet circumvention related tools.

Happy Surfing