November 15, 2012

Anonymous use of the Internet

Why the anonymity?

There are different reasons to evade identification. Governments, employers and teachers of educational institutions often limit access to information and undermine the freedom of expression subject people under various pretexts. Examples of such cases can be found below. There is a tendency to strengthen surveillance in the web and all. In addition, many people just like the feeling of privacy and can not spy on them via the Web, it is their right.

Software for the Internet
Programs that work with the Internet (browsers, file managers, Bittorent-customers, etc.) to ensure reliability of breaches of confidentiality should be made open source.


Open Browser:
- Mozilla Firefox
- Flock
- Lolifox
- Mozilla Suite
- SeaMonkey
- K-meleon
- Chromium (not to be confused with the closed Google Chrome).
- SRWare Iron
- Lynx
- Konqueror
- Html Viewer 3
Do not use for anonymous surfing Google Chrome, because it sends a variety of information Google. SRWare Iron, Base on Chromium, this deficiency deprived.
It is strongly recommended that you use Mozilla Firefox browser as the most common, reliable and widely customizable to the needs of any user, in particular, to ensure maximum safety and privacy of all of the above.

November 14, 2012

Technical


Client computer has a setting (specific program or operating system), according to which all network connections on a single protocol are performed not by IP-address of the server (a resource), extracted from DNS-name of a resource, or directly specified, and the ip-address ( and other ports) proxy.
If necessary, refer to any resource on this protocol, the client opens a network connection to the proxy server (on the right port) and provides regular query, as if he was referring directly to the resource.
Recognize the data request by checking its accuracy and resolution of the client computer, the proxy server, without breaking the connection, he opens up a new network connection directly to the resource and makes the same request. After receiving the data (or error), the proxy server sends it to the client computer.
Thus a proxy server is a full-featured client and server for each supported protocol, and has full control over all the details of the implementation of this protocol has the ability to use administrator-defined access policies for each stage of the protocol.
Proxy servers are the most popular way of accessing the Internet from a network of enterprises and organizations. This is facilitated by the following facts:
- The main protocol used on the Internet - HTTP, a standard which describes the support of a proxy;
- Proxy support all major browsers and / or operating systems;
- Access control and traffic by users;
- Traffic filtering (integration with antivirus proxy);
- Proxy server - can work with minimal rights on any OS with network support (stack TCP / IP);
- Many applications that use their own custom protocols can use HTTP as an alternative transport or SOCKS-proxy as a generic proxy, suitable for almost any protocol;
- Lack of access to the Internet on the other (non-standard) protocols can increase security in corporate networks.
At present, despite the growing role of other network protocols, the transition to charging Internet service access speed, as well as the advent of cheap hardware router with NAT, proxies are still widely used in enterprises, as NAT can not provide a sufficient level of control over the Internet (user authentication, content filtering).

November 13, 2012

Types of proxy servers

Transparent Proxy - coupling scheme in which the traffic, or part of it, is redirected to the proxy implicitly (by means of a router). The client can take advantage of a proxy server out of the box browser (or other application for the Internet.)
Reverse proxy - a proxy server, which in contrast to the direct relays client requests from the external network to one or more servers that are logically located on the internal network. Often used for network load balancing across multiple web servers and increase their safety, playing the role of a firewall at the application level.

For the purpose of anonymization used Web proxy. Web Proxy - a proxy server and anonymizing special form, which is a web application (mostly PHP or Perl script) is installed on the web server, acting as a mediator to download the content of various Web sites.
Web proxies can be used for the following purposes:
speed up the loading of web sites;
testing online services;
circumvention network administrator to access certain web site address;
hide the real IP-addresses and anonymous access to web sites;
access to Web sites to view private users of certain countries;
and many other purposes.

Using a web proxy Web proxy is installed on a Web server and enables its users to upload arbitrary Web resources from the IP address of the server that provides anonymous web surfing. To use a web proxy, you must enter the web address of the resource and, if desired, specify additional settings to enable the transition. Additional settings include:
Disable / enable the processing of JavaScript;
Use Cookie;
coding a web address and page;
replacement or cleaning of the title;
and others, depending on the application.
When coding a web address downloadable resource algorithms used Base64 and Rot13. For coding web pages are converted to HEX code of the text content of the web page. Application of these methods allows access to pages with inappropriate content and go to the web address has been blocked by Administrator. Administrative methods to counteract the use in local area networks web proxy may be: increased content filtering and blocking addresses public Web proxies. It should be noted that most hosters Do not install on cheap fares shared hosting web proxy due to the high server load and active consumption of incoming traffic. Despite this limitation, the Internet is widespread creation of entire networks from a Web proxy, they represent a large number of different domain names hosted on one or more IP-addresses of dedicated servers. These networks are used by their owners to profit from advertising placed on these resources.


November 11, 2012

What is a proxy server and how to use it?

Proxy server - service (set of programs) in computer networks, allowing customers to indirect requests to other network services. First, the client connects to the proxy server and requests a resource (for example, e-mail), located on another server. Then, the proxy server either connects to the specified server and obtains the resource from it, or returns the resource from its own cache (in case if the proxy has a cache). In some cases, the client's request or response may be modified by the proxy server for specific purposes. As a proxy server can protect a client computer from some network attacks and helps keep client's anonymity.

Most often, proxy servers are used for the following purposes: Providing access to computers on the local network to the Internet. Data caching: If frequent access to the same external resources, it is possible to keep a copy on the proxy server and produce on demand, thus reducing the load on the channel to the external network and accelerating client receives the requested information. Data compression: a proxy server to download information from the Internet and transmits the information to the end user in a compressed form. These proxy servers are used primarily to save the external network traffic or internal client - a company in which a proxy server. Protects the local network from outside access, for example, you can configure a proxy server so that local computers will access external resources only through him, and the external computers can not access local general (they "see" the proxy server). See also NAT. Restricting access from the LAN to the outside, for example, you can block access to certain websites, restrict the use of some local Internet users, set quotas on traffic or bandwidth, filter ads and viruses. Anonymization access to various resources. A proxy server can hide the source from a query or user. In this case, the target server can see only information about the proxy server, for example, IP-address, but has no way to determine the true source of the request. There are also distorting the proxy server to which the target server false information about the true user. Bypass restrictions. Proxy servers are popular among users of countries where access to certain resources is limited by law and filtered. A proxy server that can be accessed by any user of the Internet, called open.