Wednesday, February 20, 2008

Ultra Surf - Best way to Unblock blocked sites like Orkut, youtube, Myspace, Facebook

It is the flagship software product from UltraReach Internet Corp. for Internet anti-censorship. It enables users inside countries with heavy Internet censorship to visit any public web sites in the world safely and freely. it enables users to browse any website freely just the same as using the regular IE browser while it automatically searches the highest speed proxy servers in the background.


UltraReach provides a client download for Windows that the user in the censored country downloads (installation is not required) on his or her own computer. It is free software and is available in English and Chinese. Once started, the application opens an Internet Explorer application that is automatically configured to allow the user to browse web sites through UltraSurf. Other browsers must be manually configured. By default, the connection is encrypted and various techniques are used to find an unblocked IP address.

UltraSurf is an excellent choice for non-technical users who are willing to trust a third-party and require free web browsing at reasonable speeds. Since the UltraReach website is often already blocked in some countries, a user in a censored jurisdiction may have to acquire the software through a third party. Even though the site may be blocked, the service could still be accessible as measures are taken to acquire unblocked IP addresses in a variety of ways. However, even these could be blocked by a very determined censor.

Some Useful tips:

  • Check your net connection remember that it needs certain level of net speed to run Ultra Surf smoothly.
  • check proxy settings of Ultra Surf, when u download fresh version u need to tweak proxy settings of Ultra Surf. do that manually, also sometimes proxy setting of Ultra Surf get vanished automatically.. do check for proxy setting and feed it manually. For any kind of browser Proxy IP address is 127.0.0.1 with port :9666 and For Ultra Surf it depends upon your network.
  • 8.8 is the latest one and it is the best coz when there is no net connectivity it automatically flashes a message…. it won’t hang u there for retry
  • also last tip is that when net slows down or ain’t working at all, just exit Ultra Surf and re start it. instead of retry.. try exit and re start it…trust me retry is bad idea. just restart the whole thing.

For Firefox browser: If you are using browser other than IE, then you have to manually change your proxy IP address to 127.0.0.1 with port :9666 of Firefox browser.

For Mac Users: change your proxy IP address to 127.0.0.1 with port :9666 of Safari browser.


UltraReach
Link: http://www.ultrareach.com/
Price: Free

Also Read-

Downloads Links

Tunneling software for circumventing/unblocking internet censorship


Tunneling encapsulates one form of traffic inside of other forms of traffic. Typically, insecure, unencrypted traffic is tunelled within an encrypted connection. The normal services on the user’s computer are available, but run through the tunnel to the nonfiltered computer which forwards the user’s requests and their responses transparently.

Users with contacts in a non-filtered country can set up private tunneling services while those without contacts can purchase commercial tunneling services. “Web” tunneling software restricts the tunneling to web traffic so that web browsers will function but not other applications. “Application” tunneling software allows one to tunnel multiple Internet applications, such as email clients and instant messengers.

Peacefire Circumventor

Peacefire/Circumventor is a circumvention system nearly identical in principle and method to psiphon. However, It can be difficult to install. Three different software packages must be downloaded and installed, and if your computer is behind a home router it may require additional configuration. Although Peacefire/Circumventor provides some setup help, there is not a detailed user guide as there is with psiphon. Otherwise, Peacefire/Circumventor works along the same principles as psiphon.

http://peacefire.org/

How to disable your blocking software

If you're in a setting where your actions cannot be traced back to you personally -- for example, if you're using a school or cybercafe computer where you don't have to sign in individually, or you're using a home computer where the administrator never checks the logs of what you accessed -- you can try using this site:

http://www.StupidCensorship.com/


That site is of course well known (having been publicized on this page), which is why you should not use it if you are being individually tracked. And of course since the site is well known, it may be blocked already, but there are lots of computers with blocking software installed where the admins are not bothering to update the blocked-site lists any more, so it might work.

If that does not work, then:

Ask a friend to install a "circumventor" Web site on their home machine, using these instructions. The instructions can be followed by most people with a reasonable amount of computer experience (i.e. if they have installed and uninstalled software before).

Once they have completed the instructions, they can give you a URL that you can connect to, which will disable the blocking software on your computer.

Additional instructions for specific programs (currently nothing specific, but more info will be added as necessary) :

How to install the Circumventor program, which gets around all Web-blocking software

Please Note!! You don't actually install the Circumventor on the computer that is blocked from accessing Web sites. You, or a friend of yours, has to install the Circumventor on some other

machine which is not censored.

For example, if you want to get around Web blocking at work, don't install the Circumventor on your work computer. Install the Circumventor on your home computer. When the installer is done, it will give you the URL for your new Circumventor, and then you write that URL down and take it in with you to work, where you can use that URL to bypass the Web blocking there. Similarly, if you're in China and blocked from accessing certain sites, don't install the Circumventor on a machine in China; instead, get a friend to install it outside China, and then they can send you the URL that you can use to access banned sites.

If you want to, please enter your email address below if you would like to receive updates about the Circumventor software. This will include announcements about new versions and improvements. We will never share your email address with any third party.

How to install the Circumventor

The machine where you install the Circumventor must have a fast Internet connection (not dial-up), and it must be running Windows XP or 2000 (this includes most computers these days). Also, once you install the Circumventor on your machine, the Circumventor will only work as long as you have your machine turned on and connected to the Internet, so you should only install it on machines that are online more or less all the time.


NOTE: By installing this software, you will be joining an interconnected Web of Circumventor machines, so just as you can surf the Web via other people's machines (at sites like StupidCensorship.com), at times other users will be surfing the Web through your machine. However, they will not have access to any files or programs on your machine.

To install:

  1. Download ActivePerl from this link and install it. It must be installed to C:\Perl (this should be the default). Accept all of the default options.
  2. Download OpenSA 2.0.2 beta from this link (FireFox users -- please right-click and pick "Save Link As") and install it. Accept all of the default options. (If you get to a screen titled "Server Information" and it doesn't have values filled in for "Network Domain", "Server Name" and "Administrator's Email Address", just fill in these boxes with made-up random values -- the Circumventor doesn't use them.)
  3. Download the circumventor-setup.exe program from this link and pick "Save" -- then once you have saved it on your computer, run the circumventor-setup.exe file that you saved.

If the circumventor-setup.exe program succeeds, it will display an "It's ready!" page at the end of the install. If it fails, it will create a file circumventor-setup-log.txt -- send that file to bennett@peacefire.org and we will try to figure out what went wrong.


To get around your blocking software:
  • 1. First, try a circumvention site like https://www.StupidCensorship.com/. Be sure to type https at the beginning of the URL, not 'http'. Even though this site has been widely known for months, many networks have their blocking software set up incorrectly so that sites beginning with https:// are not blocked, and https://www.StupidCensorship.com/ will still be accessible.

  • 2. If that doesn't work, you can join our e-mail list where we mail out new Circumventor sites every 3 or 4 days. Of course, employees of blocking software companies have gotten on this list as well, so they add our sites to their blocked-site database as soon as we mail them out, but in most places it takes 3-4 days for the blocked-site list to be updated. So the latest one that we mail out, should usually still work.

  • 3. If you have a computer with an uncensored Internet connection, you can follow these easy steps to set up your own Circumventor site. For example, if you want to get around blocking software at work, and you have a home computer with an uncensored Internet connection, you can install the Circumventor on your home computer. Then it will give you a new URL, and you can take that URL in with you to work and type it into your browser to get around the network blocking software.

  • 4. If you're trying to get around blocking software that's installed on the local computer, and not on the network, use these instructions to boot from the Ubuntu Live CD. (These instructions include tips on how to tell the difference between blocking software that's installed "on the local computer" and software that's installed "on the network".)

Source: http://www.peacefire.org/circumventor/simple-circumventor-instructions.html

Monday, February 18, 2008

psiphon

Researchers at University of Toronto introduced a software tool on Friday, December 1, 2006 that aims to help people in countries that censor the World Wide Web. Psiphon (pronounced sigh-fawn), a web-based utility, lets individuals in a country that censors the internet sign on to a server that gives them secure access to web pages anywhere, bypassing government restrictions.

Psiphon turns a regular home computer into a personal, encrypted server capable of retrieving and displaying web pages anywhere. The user in the uncensored country downloads the software and installs it on his/her home computer. psiphon is free and open source, and comes in Linux and Windows versions. It is easy to install, and comes with a very detailed and easy-to-follow user guide.

If your computer is behind a home router it may require some configuration. Once installed, the psiphon provider sends the connection information to users in censored jurisdictions by the most secure means available. The censored user does not have to install any software but simply types a URL into the psiphon “blue bar.” This means that the psiphon circumvention system can be accessed from anywhere. Since the locations of psiphon-enabled computers are private, they are difficult for censors to find and block.

Official Site - http://psiphon.civisec.org

Download Links-

CGIProxy

CGIProxy is the engine that most web-based circumvention systems use. Private web-based circumvention systems turn a computer into a personal, encrypted server capable of retrieving and displaying web pages to users of the server connecting remotely. Private web-based circumventors include providers, who install and run circumvention software in an uncensored jurisdiction, and users, who access the service from a jurisdiction that censors the Internet. The circumvention provider grows his/her private network based on social relations of trust and private communications making it difficult for censors to find and block.

http://www.jmarshall.com/

Proxify and StupidCensorship

Proxify
https://proxify.com/

StupidCensorship
https://stupidcensorship.com/

Proxify and Stupid Censorship are encrypted, public, web-based circumvention systems. A user in a censored country simply visits one of the web sites and then inputs their destination. Since these web services are public, however, they are blocked in many countries and by most filtering applications.

WEB-BASED CIRCUMVENTION SYSTEMS

Web-based circumvention systems are special web pages that allow users to submit a URL and have the web-based circumventor retrieve the requested web page. There is no connection between the user and the requested website as the circumventor transparently proxies the request allowing the user to browse blocked websites seamlessly. Since the web addresses of public circumventors are widely known, most Internet filtering applications already have these services on their block lists, as do many countries that filter at the national level. Web-based circumvention systems could be a good choice for the users connecting with no trusted out of country contacts, assuming the pages are not yet blocked.

NOTE: Although some may advertise themselves as “anonymous” many web-based circumvention are not. Some may not even be encrypted. It is important to remember that encrypted websites begin with “https” and are signified by the open lock icon in your web
browser moving to the locked position. If you send your web requests unencrypted, they can be easily intercepted any step along the way of transmission, from your home or office router to your ISP.

How to choose a circumvention technology

Considerations For The Circumvention User

a) What, Where, How

Do you want to access or publish information on the Internet?

Although closely related, accessing banned content, as opposed to publishing it, can involve different risks, strategies and technologies for the user. We have created a separate guide for those who want to circumvent Internet censorship to publish information online.

Are you accessing the Internet from a private or public computer?

Accessing the Internet from either your home or a public computer at an Internet cafe or public library involves a different set of considerations, and presents a range of possibilities for circumvention. For example, users who access the Internet from public computers or Internet
caf├ęs may not be able to install any software and will be restricted to web-based solutions.

Others may want to use applications besides Web browsing (HTTP), such as e-mail (SMTP) and file transfers (FTP), and thus may want to install software on their computer workstation and to 6tweak their computer’s settings. With your own private computer, you can install any software of your own choosing that you may not be able to install on a public Internet terminal. However doing so can impose additional risks, as there is now evidence on your computer of the use of circumvention technologies which, if seized by authorities, could lead to liabilities.

Public Internet access can offer anonymity that private computers cannot, although some require visitors to present personal identification and/or monitor visitors’ usage. Whether you circumvent censorship through your home or a public terminal, it is always important to understand as fully as possible the terms and conditions of the service that is being provided.

b) Who Do You Know?

Do you have any connections to or availability of trusted out-of-country contacts (e.g., friends, family members, colleagues)?

Since circumventing Internet censorship involves making connections to a computer outside of the jurisdiction in which the censorship takes place, an important factor for consideration is whether you know and trust someone or group outside of the country who is willing to provide circumvention services for you. Many users who circumvent censorship do so by connecting to open public proxy computers whose connection information is advertised in some manner.

Users should be aware that these are the least secure by definition, since a user can never be certain that an adversary has not set up a trap, or "honey pot", to entice dissidents. Having someone you know and trust set up a connection instead is a better option, but it is not without its own set of risks and considerations. Providers can monitor everything you do online, including all of the sites you visit. That is why it is essential that you fully trust the person or organization that is providing the circumvention service for you. Successful, long-term and stable circumvention is greatly enhanced by having a trusted contact in a non-filtered location.

Are you willing to pay and put your trust into a third party organization to access or publish information on the Internet?

If you do not have access to trusted friends and family members outside of your jurisdiction then you may have to put your trust into a third party. There are many commercial providers that offer circumvention services for a fee. If you are able to afford this option, be careful to explore the terms and conditions of the service and the privacy policy. Commercial services may offer anonymity to surf the Internet, but not anonymity from the commercial provider itself. If compelled by law, the commercial service may turn over all of their records, and your personal information.

c) What Do You Know?

What is your level of technical expertise? Do you consider yourself a beginner, intermediate, or expert computer user?

The greater your level of technical expertise the more your circumvention options increase. Some users may find the installation, set-up process, and use of circumvention technologies to be too onerous or beyond their level of expertise. Although it is always possible to invest time and learn how to use even the most seemingly complex software, be careful: the incorrect installation and use of circumvention technologies may put you at considerable risk.

What language of use is acceptable/preferable to you? Do you require technologies that operate other than English?

Most circumvention technologies are designed with user interfaces and instructions in English, although many also offer versions of their systems and user guides in other languages. If you are consulting a translated user’s manual, be sure that the translations you use match the version of the software you are employing as the two may not necessarily match.

d) Safety & Security

Are you accessing content that is highly critical of and is considered a security threat to the country in which you live?

Is there a precedent for arrests for the practice of circumventing Internet censorship in your country?

Do you have any affiliations with high profile groups that are known to be on your government’s watch list?

Accessing banned content can be a serious violation of the law, especially if the information you are visiting is considered a national security threat. If you are consistently accessing this type of content, you should choose circumvention technologies that offer the greatest anonymity and security. However, there is usually a trade-off between ease-of-use and security so be prepared to spend extra time and effort in order to minimize risks.

If you are associated with a high profile rights organization or dissident group, then you may be on
your government’s watch list and you should take extra precautions in carefully choosing your circumvention technologies. You may want to assume that you are being monitored and that your computer could be seized at any time. Avoid circumvention technologies that require installation on your computer. If possible, access the Internet from a range of different anonymous public terminals instead.

e) Identity

Is protecting your identity online of paramount importance to you?

Do you want to surf and/or publish anonymously?

Circumvention and anonymity are different. Anonymous systems protect your identity from the website you are connecting to and from the anonymity system itself. They can be used for circumvention, but are not designed for this purpose and thus can easily be blocked. Circumvention systems are designed to get around blocking but do not protect your identity from the circumvention provider.

Do not mistake open public proxies for anonymous systems - they are not. Although they may not ask for personal information, they can view and record the location of the computer from which you are connecting and all of the websites you visit through them. Commercial services which advertize anonymous surfing may still record your connection information and the web sites you visit. Make sure you fully understand the terms and conditions of their use.

There are a number of strategies that you can follow if you want to publish online anonymously. The Citizen Lab has created a separate guide on circumvention for publishing online that includes a section on anonymous publishing.

Consideration For The Circumvention Provider

a) Safety First

Setting up a circumvention technology for someone is a great way to give a helping hand to others to exercise their basic human rights of access to information and freedom of speech. However, it is a choice that carries with it a heavy responsibility and several considerations. Above all else, the safety of your users must be your primary concern.

What is your level of technical expertise?

Do you consider yourself a beginner, intermediate, or expert computer user?

Setting up and hosting a circumvention technology server can be a time-consuming and complex task depending on the circumvention system. Some require the download and installation of several different pieces of software. Almost all of them will entail some configuration to accommodate your own particular network environment. If you are running your Internet connection through a home router or firewall, for example, there may be some customization of your circumvention system.

Some circumvention technologies have very clear and helpful documentation and user guides while others do not. Be sure that you choose a technology that matches your skill level and abilities, as setting up a system improperly could jeopardize the security of your user(s). Make sure that you are also comfortable maintaining your system, as an outdated or constantly interrupted technology can frustrate and needlessly endanger users in censored locations.

b) Your Users

What is the number of users you expect or want to accommodate and what is your available bandwidth?

The number of users you allow to surf through your computer will affect your computer’s processing capabilities and your connection speeds, affecting not only what you do but what circumvention users can do. The more users you have, the more complicated it will be to monitor their usage (if necessary) and manage their accounts. Make sure that you offer circumvention services only to the number of users you and your computer can comfortably handle.

What will you allow your users to do through your connection?

Would you want to know what information they are accessing or publishing?

What are you going to do with their surfing records?

Setting up a circumvention service means that you will be able to monitor all of the usage that runs through it. Having this capability means that you can decide what information you will allow users to retrieve or publish. Some circumvention systems make this feature easier to employ than others, but even those that do not still leave traces on your computer of the user’s activity.

You must decide for yourself what information you will choose to view, archive, and/or discard. If you choose to discard this information, make sure that you do it properly as even deleted information can leave traces. Above all, make sure that you let your users know what your standard operating procedure will be concerning the information they leave on your computer and what they can do through your circumvention system. Communicate a clear policy to your users.

c) Risks

What are your potential security and legal risks of hosting circumvention technologies?

Does your ISP or government restrict this type of service?

The risks of hosting circumvention technologies are not as great as they are for users of circumvention technologies, but they are not zero. You are almost certainly responsible for everything that is done through your computer using your Internet connection. If someone visits websites or posts information through your circumvention service that is illegal you may be held liable. A less likely but nonetheless significant risk concerns the possibility of you becoming a target of foreign agents of the country in which your service is offered. Make sure that you understand the potential security and legal risks of hosting circumvention technologies from the perspective of both your ISP and your own government.

circumvention technologies - Solution to Internet censorship

In the face of this growing global problem, citizens around the world have sought solutions to evade government filters and exercise their basic human rights to access information of their own choosing.

The tools, methods, and strategies that are used to by-pass Internet
content filtering are referred to as circumvention technologies..

There are numerous circumvention technologies that can be used under a variety
of different circumstances by a wide range of potential users. No one technology
fits all of the different potential users and the circumstances within which they find
themselves. Our view is that it is much better to think of circumvention technologies
pragmatically as tools in a toolkit. Just as some tools are better for some jobs and
not others, or require different levels of skill to employ responsibly, each circumvention
technology should be approached in terms of how best it fits each user’s unique
problems, circumstances, and skillset.

Internet content fi ltering practices vary widely by country.

In China, the government controls access to Internet content and
online publishing by a combination of technical fi ltering methods
and extensive regulations and guidelines. The technical fi ltering
is implemented primarily at the national backbone level, with
requests for information fi ltered for both banned Internet Protocol
(IP) addresses and keywords. Although sometimes inconsistent,
China’s centralized system of content fi ltering ensures uniform
blocking of access throughout the country to human rights, opposition
political movements, Taiwanese and Tibetan independence,
international news, and other web sites. There is very little transparency
about Internet fi ltering, and no public accountability process.

In Iran, there is no nationwide uniform fi ltering system. Instead,
Internet Service Providers (ISPs) are responsible for implementing
censorship following explicit guidelines stipulated by the state.
Individual ISPs choose how they fi lter, with some using American
commercial fi ltering software while others use more manual
methods. Users accessing the Internet on different ISPs can experience
signifi cant variation of accessIbility to web sites. Iran uses this
system to fi lter Iran-related and Persian/Farsi language content
critical of the regime, including politically sensitive sites, gay and
lesbian content, women’s rights sites, streaming media, and blogs.
While there are debates within government that openly acknowledge
and discuss Internet content fi ltering policies, there is very little
transparency about the specifi c content that is targeted for fi ltering.

In the United States, public institutions (e.g., schools and libraries)
are required by law (the Children’s Internet Protection Act
- CIPA) to use fi ltering software to block access to obscene,
pornographic and other materials related to the sexual exploitation
of children. Most implement the fi ltering policy by using
commercial fi ltering technologies, which are prone to miscategorization
and error. Researchers have found that commercial
fi ltering technologies mistakenly block access to content related
to women’s health, gay and lesbian rights groups, and sexual
education for teenagers.

reference-
Citizen Lab

Internet censorship - a major global problem.

Whereas once it was assumed that states could not control Internet communications,
according to research by the OpenNet Initiative (http://opennet.net) more than 25
countries now engage in Internet censorship practices. Those with the most pervasive
filtering policies have been found to routinely block access to human rights organizations,
news, blogs, and web services that challenge the status quo or are deemed
threatening or undesirable. Others block access to single categories of Internet
content, or intermittently to specific websites or network services to coincide with
strategic events, such as elections or public demonstrations.

Although some states enact Internet filtering legislation, most do so with little or no
transparency and public accountability. Most states do not reveal what information
is being blocked, and rarely are there review or grievance mechanisms for affected
citizens or content publishers. Compounding the problem is the increasing use of
commercial filtering software, which is prone to over-blocking due to faulty categorization.
Commercial filters block access to categorized lists of websites that are kept
secret for proprietary reasons, even for customers. As a consequence, unaccountable
private companies determine censorship rules in political environments where there
is little public accountability or oversight. For example, commercial filtering software
is used to censor the Internet in Burma, Tunisia, Yemen, Saudi Arabia, and Iran.

Click on image to zoom in...

reference-

What is Circumvention Technologies?

Circumvention Technologies

Circumvention technologies are any tools, software, or methods used to bypass Internet
filtering. These can range from complex computer programs to relatively simple
manual steps, such as accessing a banned website stored on a search engine’s cache,
instead of trying to access it directly.

Circumvention Providers

Circumvention providers install software on a computer in a non-filtered location and
make connections to this computer available to those who access the Internet from a
censored location. Circumvention providers can range from large commercial organizations
offering circumvention services for a fee to individuals providing circumvention
services for free.

Circumvention Users

Circumvention users are individuals who use circumvention technologies to bypass
Internet content filtering.

reference-
Citizen Lab

Welcome to Ultra Surf - Ultimate way to Surf

Ever Since I posted on Ultra Surf I was asked for many help and write more on this topic I wanted to help every query but at the same time i don't want to categorize my site as Ultra surf site so i thought of launching this new blog entirely dedicated to ultra surf and internet circumvention related tools.

Happy Surfing