libre internet - bypass internet censorship

36

Upload: mohit-yadav

Post on 30-Dec-2015

40 views

Category:

Documents


1 download

DESCRIPTION

Every college has that frustrated IT Admin. Beat yours, a must read.The book contains almost everything to circumvent censorship of the internet firewalls. We bring power to your clicks. You make us a strong community. http://technolawgyx.blogspot.in/ Tips and tricks. All for free. Absolutely!

TRANSCRIPT

  • http://www.technolawgyx.blogspot.com

    TABLE OF INDEX

    ACKNOWLEDGMENTS .............................................................................................1

    PREFACE......................................................................................................................2

    CHAPTER 1 MISCELLANEOUS METHODS.........................................................4

    SSL Connection .........................................................................................................4

    IP Address Method ....................................................................................................4

    SSL + IP Address.......................................................................................................5

    GetIP Method.............................................................................................................5

    Google Translate Method ..........................................................................................6

    Mobile Simulator Method..........................................................................................7

    Webpage in email ......................................................................................................7

    Screenshot Method.....................................................................................................7

    Alternate Domain Method .........................................................................................8

    Change DNS Server...................................................................................................8

    Coral CDN Method....................................................................................................8

    CHAPTER 2 SETTING UP TOOLS..........................................................................9

    Setting Up Proxy........................................................................................................9

    Safe Testing Environment........................................................................................10

    Changing MAC Address..........................................................................................10

    CHAPTER 3 BROWSER BASED METHODS.......................................................11

    Opera Turbo Mode...................................................................................................11

    Yandex Turbo Mode ................................................................................................11

    Conventional Proxies ...............................................................................................11

    TinyProxy ................................................................................................................12

    Web Freer.................................................................................................................13

    i

  • http://www.technolawgyx.blogspot.com

    UseJump...................................................................................................................13

    xBrowser ..................................................................................................................14

    Jondo........................................................................................................................14

    Firefox Extensions ...................................................................................................15

    i) AutoProxy................................................................................................................................... 15

    ii) Best Proxy Switcher .................................................................................................................. 15

    iii) One Click Proxy IP..................................................................................................................... 15

    Chrome Extensions ..................................................................................................15

    i) Zenmate for Google Chrome ..................................................................................................... 15

    ii) Hola ........................................................................................................................................... 16

    CHAPTER 4 CLIENT BASED TOOLS ..................................................................18

    Freegate....................................................................................................................18

    Tor............................................................................................................................18

    Ultrasurf ...................................................................................................................19

    Hotspot Shield..........................................................................................................19

    Psiphon.....................................................................................................................20

    GPass........................................................................................................................20

    Your Freedom ..........................................................................................................21

    Spotflux....................................................................................................................21

    Proxpn......................................................................................................................22

    VPNium ...................................................................................................................22

    CyberGhost VPN .....................................................................................................23

    Sam Proxy................................................................................................................23

    SecurityKiss .............................................................................................................24

    Open VPN................................................................................................................24

    PD Proxy..................................................................................................................25

    AutoHide IP .............................................................................................................25

    GTunnel ...................................................................................................................25

    ii

  • http://www.technolawgyx.blogspot.com

    CHAPTER 4 MAKING YOUR OWN PROXIES ...................................................26

    PHProxy...................................................................................................................26

    Wordpress Proxy Method ........................................................................................27

    Proxy using Google App Engine .............................................................................31

    iii

  • http://www.technolawgyx.blogspot.com

    Text Copyright 2014 Mohit Yadav

    All Rights Reserved

    Cover Design by: Pitamber Yadav

    iv

  • http://www.technolawgyx.blogspot.com

    ACKNOWLEDGMENTS

    This book has been made possible only due to the following people:

    1) Typical IT administrators who block YouTube to reduce load on network so that their UltraHD (4096 pixels) porn gets buffered faster

    2) College Administrators, who do not understand the idea that its much more economical to provide unrestricted internet with one IT guy rather than investing in a bunch of fools (known as IT Support) and an expensive UTM (Unified threat management such as Cyberoam, Fortiguard, Sophos, Watchguard etc.)

    3) Anakata for creating The Piratebay! Vive La Libert ! Vive La Internet!

    4) My parents for not buying me a dongle when I asked them to do so.

    5) All those a**holes who make a living by making UTMs

    6) All those lowly creatures often called batch mates or colleagues who constantly pest me to sort their internet so they could satisfy their other needs.

    As far as the acknowledgments goes I have no one to thank for and I did it all by myself.

    Note:

    1) If you find the language of this book disrespectful, hurtful blah, blah, its Gauravs

    fault. He is the editor of the book. Any fault you may find in the book in all

    probability is his.

    2) If you find the cover disrespectful, hurtful blah, blah its not Pitambers fault. If you

    think its not appropriate, why dont you make us a nice cover for free and then we

    will talk.

    1

  • http://www.technolawgyx.blogspot.com

    PREFACE

    Let me begin with the usual.

    This book is for educational or information purposes purpose only, and by reading it

    any further, you agree that the author cannot be held liable for any misuse of the

    information provided or any kind of damage caused to any person directly or indirectly.

    This books sole purpose is to make ethical use of Internet and this information can be used

    in cases say where say your ISP receives an order to block certain videos on YouTube and it

    blocks the website YouTube altogether (Blocking a website is so much easier than blocking a

    video, dumbasses!). Or in cases where you may want to visit a website anonymously for the

    reasons best known to you.

    In plain words this simply means that if you do anything wrong making use of information

    given in this book it will be you who will go to jail and any person concerned with this book

    in whatsoever manner CANNOT be held liable. In case you disagree please dont proceed

    ahead and delete this book right now.

    This book is being provided completely free of cost and in case you bought it you

    were just duped. This book has been written in overly simplistic manner and in case you still

    face any such difficulty in using it. You should probably not read it. However irrespective

    whether you get anything in your head or not, dont you dare contact me with emails saying

    How to do this and how to do that and blah blah. Remember that I do have a life.

    Problem? Google it! Or wait. We have more options for you

    For the readers convenience, this book makes extensive use of hyperlinks. They are

    meant to be used with time, the hyperlink may become dead, though I will try to update them as and when I get time, but if I dont, you can always check it out yourself. Spoon-

    feeding is bad.

    I have intentionally ignored certain tools due to them being paid and expensive.

    In case after going through the book you have suggestions, feedback, do feel free to

    contact me at the blog here but I repeat dont you dare shoot a mail on how to do stuff. If you

    dont get it after reading the book, chances are high you I wont be able to explain it to you

    anyway. Who said I will be!

    2

  • http://www.technolawgyx.blogspot.com

    In case you want to be an expert on how to Google stuff dont forget to read our

    article Power Searching with Google.

    After going through the book please do fill up this survey form here. This will

    help me provide you with better content in the next edition.

    3

  • http://www.technolawgyx.blogspot.com

    CHAPTER 1 MISCELLANEOUS METHODS

    So lets begin with easy to do methods. In this chapter we will only use method which

    requires little or no external aid. So there you go

    SSL Connection Often you will find this case, the website you are trying to open is not opening up. Sometimes the biggest problems have the simplest solutions. In the address

    bar of your browser type https:// (without quotes) before the URL. In case you get a

    warning click on proceed anyway. See if that works.

    Example:

    In case it does use this userscript to automatically redirect to SSL connection. To

    know how to use scripts and more such stuff read our article Setting Up Your Browser.

    IP Address Method In this method we will try to access the website by its IP address rather than its domain name. Windows user, go to run and type cmd without quotes

    and press enter. Mac users open your terminal.

    In the terminal/command box type ping without quotes and then name of your

    website without www. And press enter. E.g.:

    Now after the text Reply from in the above image the number that comes is your IP

    address. So IP address of saavn.com is 54.251.246.179 and if you will type this IP address in

    address bar of your browser and press enter, the site may open, depending on the way the

    website is being blocked.

    4

  • http://www.technolawgyx.blogspot.com

    SSL + IP Address - In this method see if you could access the website by inserting https:// (without quotes) in front of websites IP address. Press continue or select proceed

    anyway if you get any warning. E.g.:

    Dont be bothered with the red line or the cross as long as it works its fine.

    GetIP Method I have made a small python script which may make the life a bit easier. Download the zip file from here. Extract the contents of the file. Run the getip.exe

    file. Enter the url of the desired website. Dont write http:// before the name of the website;

    using www. is optional. Press enter and then press enter one more time to exit the program.

    Now where you have extracted the content of zip file you will find a newly created file

    link.txt Open it and you will find a link which will be http:// and then followed by a

    number. Use this link if it doesnt work try using https://link. Do not open the link.txt file

    till you exit the program.

    Link.txt file with its content:

    5

  • http://www.technolawgyx.blogspot.com

    Google Translate Method This method is pretty easy to go. Go to Google translate. In the box where you enter text to be translated select any language other than

    English and in the box where you get the translated text select English. Then enter the URL

    of the website you intend to visit where you type the text to be translated and press Translate.

    E.g.:

    This is the end result.

    6

  • http://www.technolawgyx.blogspot.com

    Mobile Simulator Method Go to any mobile simulator like this and in its browser type the URL address of the website you intend to visit. E.g.:

    Webpage in email Running behind that timeline, and the webpage you want access to is blocked? Go to emailtheweb and enter the URL and you will get the webpage in

    your mail. Since the webpage loses its formatting in the email the email also gives you an

    option to view the page as it is. You must have a Gmail account to use this website. E.g.:

    Screenshot Method Go to URL2PNG and enter the URL address of the website. You will get the screenshot of the entire webpage in its all glory. To extract text

    7

  • http://www.technolawgyx.blogspot.com

    automatically out of this image rather than typing it manually. Read our series on Art of

    Copying and Pasting and refer to OCR part. E.g.:

    Alternate Domain Method There might be times when the real domain is blocked but its alternate versions such as mobile version of the website are not. So no harm in

    giving it a shot.

    For example Facebook could be accessed by

    using https://m.facebook.com/, https://touch.facebook.com/ and https://blog.facebook.com/.

    Similarly Twitter could be used by this link https://mobile.twitter.com. Torrentz could be

    accessed by http://www.torrentz.li. Dont forget to try SSL.

    Change DNS Server Well your IT administrator may be using simple filtering tools so changing the DNS server might do the trick for you. Google Public DNS

    nameservers (8.8.8.8 and 8.8.4.4) are good enough. To configure them see the guide here.

    Using this guide you could also try changing the nameservers to Open DNS (208.67.222.222

    and 208.67.220.220). In order to determine the fastest DNS nameserver use this easy to

    use software.

    Coral CDN Method - Just append .nyud.net without quotes to any website. Say for example you want to visit cnn.com then the new url becomes cnn.com.nyud.net (without

    quotes).

    8

  • http://www.technolawgyx.blogspot.com

    CHAPTER 2 SETTING UP TOOLS

    Setting Up Proxy - This is an optional chapter and only helps you in setting up your tools which will be used ahead in other chapters. This chapter is useful if you need to

    connect to some sort of proxy (Such as 127.0.0.1:4444 or proxy.abc.com with port 8080)

    before connecting it to the internet.

    Now most of the software this book uses have some sort of option to configure proxy

    settings. Something like this

    But if they dont know worries. We need to use a Proxifier then. A proxifier is a

    software program which can make other programs pass through a proxy server1. So my

    personal favourite is Proxifier but unfortunately its paid. So use Freecap as its free.

    Since I havent used it myself I am willing to assume it must be pretty

    straightforward. Anyway its your headache now to learn how to configure it to set up your

    proxy settings with other programs. Go to Google and try to search how to do it.

    1 http://en.wikipedia.org/wiki/Comparison_of_proxifiers

    9

  • http://www.technolawgyx.blogspot.com

    You still didnt get it did you? Ok heres a guide to use Freecap with Your Freedom.

    Using this guide I hope you could configure Freecap to be used with other software which do

    not have an inbuilt proxy setting option.

    Safe Testing Environment This book will often ask you to install software. The author has most used most of the software recommended in the book but not all. As a

    result, it is recommended that you test the software in a safe manner so that no harm is made

    to your computer. Precaution can save you from a lot many things, including AIDS.

    In order to do so that you may either set up a virtual machine. Here is an excellent

    guide by Lifehacker which tells you how to do so. The other method is to use Sandboxie.

    Here are the two guides on how to use Sandboxie and what it is all about.

    Guide 1 (Official Guide)

    Guide 2

    Changing MAC Address If you want even more privacy and anonymity you might also want to change your MAC address. MAC address is a unique identifier assigned to

    your LAN card and Wi-Fi Adapter. Technitium MAC address changer is free, easy to use

    software for the job. Download it from here. Dont change your MAC address if your

    internet connectivity is restricted to your MAC address.

    10

  • http://www.technolawgyx.blogspot.com

    CHAPTER 3 BROWSER BASED METHODS

    Opera Turbo Mode Yes, Opera has an inbuilt proxy. All you need to do is enable the Opera Turbo mode and you are good to go. Opera Turbo Mode option is available

    at the bottom left corner of the browser.

    The blue icon in the above image looks like this when zoomed upon.

    Yandex Turbo Mode Similar to Opera, Yandex also features Turbo Mode. Even if Opera turbo mode doesnt work then also there is no harm in trying out Yandex.

    Download Yandex from here.

    Conventional Proxies Old is gold. Nothing beats the good old conventional proxies. You open a link in it you type the URL address and voila it runs. The problem is that

    most of them are blocked by default and dont work. So heres a list of some of the lesser

    known proxies:

    11

  • http://www.technolawgyx.blogspot.com

    http://mirrorrr.appspot.com/

    http://air-proxy.us/

    https://www.kproxy.com/

    http://www.ipcamouflage.com/

    http://www.forwardproxy.org/

    www.youtubeproxy.pk/

    www.youtubeproxyfree.com/

    http://mousematrix.com/

    http://www.peacefire.org/circumventor/ (Proxy Lists)

    http://www.azproxies.com/proxy-lists/zelune-web-proxies.html (Proxy Lists)

    https://groups.google.com/forum/#!forum/zelune (Proxy Lists)

    https://launchwebs.org/ (Proxy Lists)

    Sharing is caring but enough usage of these will ensure that they get blocked

    too! Dont worry, we will come up with more.

    TinyProxy - It is a light-weight HTTP/HTTPS proxy daemon for UNIX based operating systems. Instructions to run it on Ubuntu are available here. There seems to be a

    Windows version too. I am not sure if Windowss version is the same TinyProxy ported to

    Windows or something completely different. No harm in trying as long as you try it out in

    Sandboxie or in a virtual machine. Here is the link for the windows version.

    12

  • http://www.technolawgyx.blogspot.com

    Web Freer - It is a 2048 bit encrypted https web browser providing absolute online security and privacy. Additionally, it also opens blocked sites. It is built with the open-source

    Chromium models on which Google Chrome is built. It is almost as fast as Google Chrome

    and layout is also almost identical. Download it via CNET from here.

    UseJump It is a WebKit (the rendering engine used by Chrome) based browser. It was designed to stand against censorship and content filtering. It uses P2P (Peer to Peer the

    protocol used by torrent clients such as uTorrent) and encryption technologies based on open

    standards. Download it via softpedia from here.

    13

  • http://www.technolawgyx.blogspot.com

    xBrowser It is a web browser designed to run on both the Tor and XeroBank anonymity networks. It is a portable browser and could be used on a pen drive as well as on a

    portable hard disk. XBrowser upon exit clears all the data that was created during surfing.

    The surfing in this browser is bit slower than normal but secure and anonymous. Download it

    via CNET or Softpedia.

    Jondo It is an IP changer proxy tool. It can be used for anonymous surfing, anonymous e-mail, chats and other purposes. It is open source and can be downloaded for

    free. The best way to use Jondo is by using it with Firefox. Here is an interactive guide on

    how to use Jondo with Firefox.

    14

  • http://www.technolawgyx.blogspot.com

    Firefox Extensions Following are some useful Firefox extensions which might do the job:

    i) AutoProxy With this addon user can visit a website via proxy by adding it's domain to AutoProxy's preference. After that, whenever user is surfing, specified websites

    they will be automatically connected through proxy while leaving others connect directly.

    Available here.

    ii) Best Proxy Switcher It lets user set their own proxy servers or let the addon download most recently checked list from developers web site automatically for free.

    Available here.

    iii) One Click Proxy IP It lets user activate the addon with one click and then lets user browse the web with random HTTP or Socks proxy from several countries in the

    world. It is ad free and does not require restart of Firefox upon installation. Available here.

    Chrome Extensions - Following are some useful Google Chrome extensions which might do the job:

    i) Zenmate for Google Chrome It is a simple to use one click VPN solution. Its fast, its secure and best of all its free. It offers IP address from different countries such as

    Germany, US and UK. Available here.

    15

  • http://www.technolawgyx.blogspot.com

    ii) Hola It is another no nonsense one click fast VPN proxy service. Its fast and durable. It started as an addon which allowed users outside US to access Hulu but now works

    on every website. Available Here.

    16

  • http://www.technolawgyx.blogspot.com

    .

    17

  • http://www.technolawgyx.blogspot.com

    CHAPTER 4 CLIENT BASED TOOLS Freegate Freegate is click to run software which bypasses Internet firewalls by

    using proprietary P2P-like proxy network system. It uses a unique encryption and

    compression algorithm in its newer builds which further enhance its capabilities. It can be

    downloaded from here or here.

    Tor - Tor (The Onion Router) anonymizes internet traffic through onion routing. It is the best tool if you want anonymity and is actively used by the hacktivist group

    Anonymous. Through Tor you could also access onion sites and the hidden web such as the

    famous hidden wiki page which cannot be accessed without using Tor traffic. Best way to

    download and use Tor is by downloading the Tor Browser Bundle from here. Author also

    recommends that in case you are using Tor at a place where your internet is being monitored

    to check if you are using Tor you must use bridges. To know more about bridges and how to

    use them read more over here.

    18

  • http://www.technolawgyx.blogspot.com

    Ultrasurf Ultrasurf is also one more click to run software. It is completely free and bypasses censorship and firewalls using an HTTP proxy. It employs encryption protocols

    for privacy. On a personal note, author has found Freegate to be bit faster than Ultrasurf in

    Delhi NCR area of India and Lucknow, Uttar Pradesh, India. However, the speed may vary in

    different places depending upon the nearest server. Also, the difference in speed between

    Ultrasurf and Freegate is marginal and both the software are much faster than Tor. It could be

    downloaded from here and here.

    Hotspot Shield It is a VPN software which has both free and paid versions. The free version gives a generous limit of 10 GB which is way more than required for casual

    surfing and could easily accommodate few downloads too. It is very easy to setup but prior

    to running the software you need to create a free account at the official site. It encrypts your

    entire traffic and is not limited to your browser. The only con is that it bombards user with

    ads but considering its a free software it shouldnt be an issue.

    19

  • http://www.technolawgyx.blogspot.com

    Psiphon It is another click to run circumvention system developed by Psiphon Inc. The best thing about Psiphon is that it uses all three methods VPN, SSH and HTTP

    Proxy to bypass firewall and thereby maximizing users chances of bypassing censorship. It

    is also available for Mac OS X apart from windows. It could be downloaded from here.

    GPass It is yet another click to run software providing for free anonymous web surfing. It protects users identity during web surfing and encrypts internet communications.

    It is pretty fast for a proxy tunnelling software. Once installed to launch an application using

    the proxy simply double-click the app from inside the GPass interface. Download it

    from here or here.

    20

  • http://www.technolawgyx.blogspot.com

    Your Freedom Your Freedom is another tunnelling solution for Windows, Mac OSX and Linux. It could be used to bypass proxies and access the Internet anonymously. It

    is completely free but in order to use it you must create an account at its official website.

    After creating the account, download the client software and log in using your account

    credentials. Then set up any proxy if your internet connection use one and search for server.

    After that put following proxy setting in your browser. (IP:127.0.0.1, Port:8080) In case you

    dont know how to change proxy in your browser read it from here.

    Spotflux It is another free encrypted VPN client. It is quite easy to install, but beware, as it tries to install third party software during installation so skip them. Running it is

    as easy as clicking enable and disable. Download it from here or here.

    21

  • http://www.technolawgyx.blogspot.com

    Proxpn It is free VPN software. It provides a maximum bandwidth of 300kbps in the free account. It is quite easy to configure and you must create an online account to use it.

    One of its disadvantages is that it changes your browsers home page address to its website

    and doesnt let you change it back to something else. However that being said its free and

    pretty easy to use. Download it from here.

    VPNium It is another free VPN software and best part about it is that it doesnt require registration. The normal mode lets you take IP address from Germany but if you post

    a comment on VPNiums Facebook page about the software they activate the Boooost

    mode for free which allows you to have IP address from countries other than Germany. It

    works completely from your tray icon. Download it from here.

    22

  • http://www.technolawgyx.blogspot.com

    CyberGhost VPN It is another free VPN service. Post installation it could be directly used without creating an account. The connection takes some time to establish but it

    is pretty fast once established. Free accounts downside is ads and restriction of three hours

    per session. To sum it up its free, fast and secure and definitely worth your time. Download it

    from here.

    Sam Proxy This is an open source project hosted on sourceforge. Author has used it personally and it works just fine. Its easy to use and all it needs a double click on the

    executable file (exe). Download it from here.

    23

  • http://www.technolawgyx.blogspot.com

    SecurityKiss SecurityKiss is another free to use VPN software. They use 128-bit Blowfish algorithm for session encryption. The free version allows 300MB data transfer

    every day which is more than sufficient for casual surfing though downloading may be an

    issue. For a VPN software it takes little time to establish the connection to its server.

    Download it from here.

    Open VPN It is an open source VPN and its free. A free account needs to be created post installation to access the facility. Mac OS X Version is also available.

    Download it from here.

    24

  • http://www.technolawgyx.blogspot.com

    PD Proxy Another free proxy tunnelling software. You need to create an account first before using the software. User interface is intuitive and using the software will be a

    cakewalk for you. After running the software when it asks permission to install some drivers

    allow that. Download it from here.

    AutoHide IP Another easy to use IP changing software which bypass censorship and help user surf internet safely and anonymously. The trial limitation is that it only allows

    US IP addresses while the full version offers IP address from several countries. Also it has a

    nifty feature that the program can be set to automatically change the IP address after a certain

    amount of time which is quite handy. Download it from here.

    GTunnel Another click to run proxy tunnelling software. Its completely free, fast, secure and reliable. It uses 128-bit encryption. It could be downloaded from here.

    25

  • http://www.technolawgyx.blogspot.com

    CHAPTER 4 MAKING YOUR OWN PROXIES Well you could use plethora of software and they will be eventually blocked but what

    if we could make our own proxies. Wont that be cool because every time your proxy gets

    blocked you could make one more. So before we roll, you need to know a few basic things:

    a) Domain It is the name of website. Simple so Googles domain is

    www.google.com. If you want, you could get a free co.nr domain from here.

    b) Hosting So websites dont work from thin air they are kept on server from

    where you can access them. So in order to have your own you either buy a hosting

    plan or free hosting. Few free web host are 000webhost, freewebhosting, 5gbfree,

    and host-ed.

    So in order to host a proxy online you need a domain and hosting. They both may be

    paid or free. Free hosting is likely to be slower than paid but then who cares as long its free.

    For all the below mentioned tutorials I am using 000webhost you are free to use

    whatever host you like.

    PHProxy

    1) So first of all go and register account at http://www.000webhost.com/.

    2) Now login in your account from here.

    3) After login, got to the file manager.

    4) There you will see a file manager like one below. Click on upload.

    26

  • http://www.technolawgyx.blogspot.com

    5) Now download this zip file from here.

    6) Now click the choose file button in the Archives section (Panel on left) and upload

    the zip file you just downloaded. Then press the green tick button.

    7) Now once everything is over go to the domain of your website and you will see

    something like this. All done enjoy your newly made proxy.

    Wordpress Proxy Method In this method I will tell you how to make a wordpress based proxy.

    1) Follow step 1 & 2 of PHProxy method.

    2) After login, go to MySQL.

    27

  • http://www.technolawgyx.blogspot.com

    3) Fill in the information.

    4) Click on Create Database.

    5) Now save this information we will use it soon.

    6) Now download the Wordpress setup from here.

    7) Unzip the Wordpress zip file and open the wp-config-sample.php in notepad.

    8) Now change database_name_here to name of your database, username_here to

    the username you just used and password_here to password of your database.

    9) Now download WinSCP from here and install it with the default options. If

    somebody tells you that Filezilla is better, ignore them.

    10) Now open the WinSCP client.

    11) Go to sessions section.

    28

  • http://www.technolawgyx.blogspot.com

    12) Now fill in the information required and set your protocol to FTP with no no

    encryption and change port to 21.

    13) In case you dont know what to fill in host name and user name. Go to your

    cPanel and click on view details. In the FTP section of view details you will get

    all the details except password which you should know yourself.

    14) Now press login.

    29

  • http://www.technolawgyx.blogspot.com

    15) If you have filled all the blanks correctly a screen like this will appear (Image

    taken from here) except that you will see a bunch of php and other random files on

    right hand side in public_html folder.

    16) Delete all the files on right hand side except for .htaccess file. I repeat, dont

    delete the .htaccess file.

    17) Now on the left hand side scroll to the folder where you have all the wordpress

    files. Now copy paste all the files and folders in the public_html folder just like

    the guy has done in the above diagram.

    18) Now go to your website and wordpress will ask you to set a password. Do it.

    19) Now after login, click on plugins and then click on add new.

    20) Now search for Repress and click on install and then activate the plugin.

    21) Now go to settings where you will find a new entry repress click on it.

    30

  • http://www.technolawgyx.blogspot.com

    22) Now add any domain say torrentz.com in the adddomain name field and click on

    uncensor.

    23) Now say your website is xyz.freeweb.com then you could access torrentz.com by

    using the URL http://xyz.freeweb.com/proxy/torrentz.com

    24) Thats all folks its done.

    Proxy using Google App Engine

    Yes, you could create a proxy using the Google App Engine. The best part is that you

    get fast Google hosting for free and downside is this proxy doesnt support videos and sites

    which uses login.

    Here is a quick guide to do so. The instructions are also available in form of a video

    on YouTube.

    31

    ACKNOWLEDGMENTSPREFACECHAPTER 1 MISCELLANEOUS METHODSCHAPTER 2 SETTING UP TOOLSCHAPTER 3 BROWSER BASED METHODSCHAPTER 4 CLIENT BASED TOOLSCHAPTER 4 MAKING YOUR OWN PROXIES