2006/01/10

Como evitar la censura en Internet




English - Español - Deutsch (translations welcome!) HOWTO bypass Internet Censorship Freerk <freerk@gmx.net> (write in English, German or Spanish), last updated 2005-12-13 A tutorial on how to bypass Internet Censorship using Proxies, Shells, JAP e.t.c. Different ways to beat the filtering in schools, countries or companies (blocked ports e.t.c). This is the original and so newer than the translations because I'm still working on it.

1. Introduction



2. Possible weaknesses


3. Different kinds of censorship


4. Different ways to bypass censorship



5. Howto publish information

6. Appendix




1. Introduction


  • 1.1 About Internet censorship


  • In the last 10 years the Internet grew very, very fast. It is a bunch of thousands of little networks put together. Billion computers are connected and it is basically not controlled or even owned by a government or company. There are no laws, everybody can put his webpages online which can be accessed by everybody on the world who is sitting in front of a computer with Internet access. I believe that this can and will change the world as we know it today.

    But there are several governments who think that this unlimited access to information is dangerous for their citizens. These are for example Saudi Arabia, Bahrain, Cuba, Jordan, Tunisia, Burma, Singapore, Uzbekistan, Yemen, Kuwait, Vietnam, Syria, Iran, United Arab Emirates and parts of Africa. and even in countries like Australia, Switzerland and in some parts of Germany they censor websites. This ranks from a very easy to circumvent DNS blocking of only 2 Nazi sites in parts of Germany to a government office with 30.000 employees only working in blocking thousands of websites, services and ports in China.

    Though the blocking methods are different there are also different ways to bypass them. I will try to show you how to access the website of Amnesty International, BBC, Google and other blocked sites in your country. I made this website in very basic HTML, so that you can even view it with a very old computer. Please share this information, link the site, copy it, mirror it, print it (I didn't "hide" any links, so that no link is lost when you print it) and teach your friends and relatives!

    More info:

    http://www.encyclopedia-online.info/Censorship_in_cyberspace


  • 1.2 My reasons for writing this


  • Well, I'm living in Germany, which is not very famous for it's censoring. But the local government from one of the 16 German states (NRW) tries to introduce censorship by blocking 2 US Nazi sites. Sure, I really don't like those guys but in my opinion no government or even a system administrator got the right to choose which information a individual have access to. What websites are next? Who chooses which websites will be blocked? Additionally, my school blocks some websites and so I became interesting in this topic.


  • 1.3 How to get this file


  • As you are reading this you actually found this file somewhere. The most updated version you can get here:

    European mirror: http://www.zensur.freerk.com/ - (Lambdanet - Erfurt, Germany)


    American mirror: http://nocensor.citizenlab.org/ - (University of Toronto - Toronto, Canada)


    Asian/Pacific mirror: http://blocks.orcon.net.nz/ - (Orcon ISP - Auckland, New Zealand)

    SSL mirror: https://secure.sslpowered.com/bpass/ (Netfirms, Toronto, Canada) and https://ssl-account.com/zensur.freerk.com/

    Dynamic IP mirror: http://maybe-yours.dyndns.org/ (please email me!)

    eMail autoresponder: index.htm@zensur.freerk.com (just send an empty email, you will instantly get this text as plain HTML in return)


    Google Cache: http://www.google.com/search?q=cache:www.zensur.freerk.com/ - (maybe some days old)


  • 1.4 License

    Permission is hereby granted, free of charge, to any person obtaining a copy of this document, to deal with this document without restriction, including without limitation the rights to use, copy, modify, translate, merge, publish, distribute, and/or sell copies of the document, and to permit persons to whom the document is furnished to do so, provided that the author (Freerk) and at least two mirror server of the original text (see: 1.3 How to get this file) appear in all copies of the document.

    Basicaly this means that you can do anything with this text as long as you mention my name and a way to obtain this original file. First I wanted to publish this paper under the GNU Free Documentation License (http://www.gnu.org/licenses/fdl.html)

    but I think the licence is to restrictive and complicated (see also: Why You Shouldn't Use the GNU FDL - http://home.twcny.rr.com/nerode/neroden/fdl.html).

    So I made up my own one based on the X11 licence (http://www.x.org/Downloads_terms.html).




  • 2. Possible weaknesses

    You have to choose to bypass the Internet censorship or not. I only show you how to do it, I can't take any responsibility. In several censor countries you will go to jail if they catch you, in a lot of companies you will get fired and some schools will ban you.

    Of course the censors not only block Internet traffic, they are also looking at it (in countries/companies with a little Internet population) and try to find out who is bypassing their firewall how. An easy way to find out who (and how) is bypassing the firewall is by just looking for some identicators in the logfiles:

    • Right after the Internet connection is established the user is connecting to only one server and remains connected to it all the time he's online.


    • What a user do right after he gets an "access denied" message from his censor. (open a special website, go to a chatroom, connect to a special server...)


    Try to avoid getting caught this way! Please note that the proxies on my website are not checked/verified. It could be that a censoring government run those proxies just to check who is accessing which blocked information. Maybe some of them are also maintained by hackers that can look on every information that passes their servers (your credit card information, for example). So carefuly choose the server you connect to and even think twice if you use them for the transfer of private data. More infos:

    http://www.peacefire.org/circumventor/list-of-possible. weaknesses.html

    http://peek-a-booty.org/pbhtml/downloads/ResponseToLopwistcic.htm



    3. Different kinds of censorship

    There are many different solutions to censor Internet traffic. Sometimes there are 2 or more combined. Please write me to freerk@gmx.net which blocking methods are used in your country, which ISP are you using and the ways that work for you to bypass it, it would be very useful for other users!

    More info:

    http://www.encyclopedia-online.info/Censorship_in_cyberspace


  • 3.1 Blocked URL's via the DNS-server


  • This is used for example from some German providers. It is a very cheap and easy censoring method and the same is true for bypassing it. First, I will explain what the Domain Name System is: Every computer on the Internet has an unique address, a little bit like a telephone number. These are 4 numbers from 0 to 255 separated with a dot. For example: 62.141.48.209 is the IP address for www.freerk.com. Because of remembering such a number is very difficult, the DNS was invented. This service maps an URL to it's IP address. If you type www.freerk.com into your browser, the request is send to the DNS-server that was automatically given to you by your ISP on dialing into the Internet. A lot of addresses are already cached, so the DNS-server sends the IP address for the URL back to you. If the DNS-server has no cached information on the site requested by you, he asks on of the 13 root servers, which know all addresses. If the DNS-server from your provider is censoring, he just refuse to send you the real IP-address. He sends you nothing or an IP from a "sorry" website.

    More info:

    http://www.encyclopedia-online.info/DNS


  • 3.2 Forced proxy server / transparent proxy


  • You have to specify a proxy server in your 'Internet Explorer' settings in order to get a connection to the Internet. Sometimes, the ISP is using a transparent proxy. With these you can't see easily if there is a proxy or not. Every request you send to or receive from the Internet is checked at this server and redirected to you (well, or not...).


  • 3.3 Keyword filter


  • This means that all Internet traffic goes through the servers of the censor, who is scanning the content for 'bad words'. This dynamic filtering is true for most filters in schools, libraries and companies. If the site contains bad words it is blocked. The person who is offering the blocked information could prevent the censoring by "hide" the content inside of images. For the user there is almost no difference, but it is difficult for a computer program to "read" the text inside an image. Also SSL encrypted traffic (a URL starting with https://...) can't be scanned easily. You can test which keywords are blocked on your connection on http://www.zensur.freerk.com/kword/ there you can enter the keyword(s) you want to test an click on "send" when you get the message "You entered [your word here]" in return everything is fine, but if you get an error message you know which words are blocked.


  • 3.4 Blocked ports


  • Ports are like doors for a special service to a server or PC. They rank from 0 to 65535. The standard ports are from 0 to 1024, these are the well known ports. The official list you can get under http://www.iana.org/assignments/port-numbers and a description on http://www.encyclopedia-online.info/Port_(computing).

    If a censor blocks a port, every traffic on this port is dropped, so its useless for you. Most censors blocks the ports 80, 1080, 3128 and 8080, because these are the common proxy ports. Because all of the proxies on common ports are useless for you, you have to find proxies that are listening on an uncommon port. These are very difficult to find.

    You can easily test which ports are blocked on your connection. Just open the DOS-prompt, type telnet login.icq.com 80 and hit enter. The number is the port you want to test. If you get some wired symbols in return everything is ok, if it says "timeout" or something similar, that port is blocked by your ISP. Here are the most important ports for us:

    20+21 - FTP (file transfer)

    22 - SSH (secure remote access)

    23 - telnet (remote access) and also Wingates (special kind of proxies)

    25 - SMTP (send email)

    53 - DNS (resolves an URL to an IP)

    80 - HTTP (normal web browsing) and also a proxy

    110 - POP3 (receive email)

    443 - SSL (secure HTTPS connections)

    1080 - Socks proxy

    3128 - Squid proxy

    8000 - Junkbuster proxy

    8080 - a proxy


  • 3.5 Censorware on the client (child protection e.t.c)


  • Normally the censorship is implemented on servers from the ISP or government, but in some schools, private homes and some companies the blocking software is installed on every PC.

    More info:

    http://www.peacefire.org/
    http://www.encyclopedia-online.info/Censorware
    http://www.cexx.org/censware.htm
    http://www.epinions.com/cmsw-Kids-Topics-2
    http://www.securiteam.com/securityreviews/Web_blocking_software_can_be_easily_bypassed.html


  • 3.5.1 NetNanny


  • More info:

    http://www.netnanny.com/index.html
    http://peacefire.org/censorware/Net_Nanny/


  • 3.5.2 CyberSitter


  • More info:

    http://www.cybersitter.com/
    http://www.spectacle.org/alert/peace.html
    http://www.peacefire.org/censorware/CYBERsitter/


  • 3.5.3 AOL Parental Control


  • More info:

    http://www.aol.com/info/parentcontrol.html


  • 3.5.4 CyberPatrol


  • More info:

    http://www.cyberpatrol.com/
    http://www.peacefire.org/censorware/Cyber_Patrol/


  • 3.5.5. SurfControl


  • More info:

    http://www.surfcontrol.com/http://peacefire.org/censorware/SurfWatch/


  • 3.6 Censorware on the server (inside of networks) This are programs that are mostly installed on servers in schools, libraries, companies or countries with a little Internet population.


  • 3.6.1 Bess/N2H2

    Bess is a proxy filter that is often used in schools/universities and companies. It can easily bypassed with

    Webproxies.

    More info:

    http://www.n2h2.com/products/bess_home.php
    http://www.peacefire.org/censorware/BESS/


  • 3.6.2 DansGuardian

    It's a Open Source Webfilter. Free for non-commercial use and thus it is
    widely spread in universities, schools and libraries. It works as a Proxy

    with URL and keyword filtering (and also with the PICS-Standard). It's often
    used on a IPCop machine, however, the author from DansGuardian doesn't like

    it.
    More Info: http://dansguardian.org/


  • 3.6.3 WebSense
    More Info: http://www.websense.com/

    http://www.peacefire.org/censorware/WebSENSE/


  • 3.6.4 WebWasher
    More Info: http://www.webwasher.com/


  • 3.6.5 SmartFilter


  • More Info: http://www.securecomputing.com/index.cfm?skey=85

    http://www.peacefire.org/censorware/SmartFilter/



  • 3.6.6 squidGuard
    More Info: http://www.squidguard.org/




  • 3.6.7 new_new



  • 3.7 Whitelist


  • Most Internet filters works with a blacklist, which means that access to all
    sites is allowed, except some special sites (well, sometimes there are
    a lot exceptions...). A whitelist works the other way around: Access to all
    sites is blocked, except some special ones. For a normal ISP it is almost
    impossible to offer, because the Internet is nearly worthless. The whitelist
    scheme is used by free Internet terminals that are sponsored by a company which
    allows users the free access to their e-commerce site. This filter scheme is
    the most difficult to circumvent.


    Some time ago, there was a German ISP who had a completely free 0800-dial in
    number. Once you dialed in, you only could surf to amazon.de and about 10 more
    e-commerce sites. But you could also connect to the other customers of the ISP.
    So somebody with a flatrate connected to both his normal ISP and the 0800-free
    ISP and set up a proxy. So all the users of the free ISP could use that proxy
    to connect to other sites.
    More info: http://www.encyclopedia-online.info/White_list

  • 3.8 IP blocking on the routers





  • 4. Different ways to bypass censorship
    Since you can't directly access a server that is blocked you have to send the
    request to a non blocked server which redirects the traffic to the real site
    you want to visit. There are different types of these "gatekeepers".

  • 4.1 Using a different ISP


  • Well, it's as easy as it sounds: Just change your Internet Service
    Provider! For example only in 'Nordrhein-Westfalen' (a state of Germany)
    there is a censoring firewall, you can just subscribe to an ISP outside that

    state. But normally the censorship counts for all the country. One possibility
    is to try out an ISP outside the country. That costs a lot, but that way you

    do have a normal Internet access and don't have to worry about getting around
    filters. This could be a normal dialup provider in an neighbor country or
    better
    a 2-way Internet access via satellite like http://www.europeonline.com/, http://www.remoteworkcentral.com/,
    http://registrierung.tiscali.de/produkte/1400_satellit.php,
    http://www.gilat.de/, http://www.hns.com/,
    http://www.vsatnet.com/, http://www.starband.com/,
    http://www.wildblue.com/,
    http://www.directduo.com/, http://www.orbitsat.com/,
    http://www.ottawaonline.com/ and
    so on, just search with a search engine for '2-way Internet via satellite
    [your
    country or neighbor country]' or something like that.



  • 4.2 Using a not censoring DNS-server

  • Normally, you automatically would use the DNS-server of your ISP to resolve
    domain names like www.freerk.com to 62.141.48.209. Internally, only these
    IP-addresses are used to send/receive data in the Internet. If your DNS-server
    is censoring, you simply can use another DNS-server. Under Windows, just right-click
    in your system panel on the 'network' icon and select properties of the TCP/IP-protocol.
    In Linux you have to edit the '/etc/resolv.conf' file. Use the server that
    is (virtual) your nearest. If you want to setup your own DNS-server use Bind
    (http://www.isc.org/products/BIND/).
    The list of the 13 official root servers is located here: ftp://ftp.rs.internic.net/domain/named.root
    for redundancy it would be good to ad the alternative root servers located
    in Europe from ORSN: ftp://ftp.orsn.org/orsn/orsn.hint.

    Non censoring DNS-Servers:
    dns2.de.net - 194.246.96.49 (Frankfurt, Germany)

    ns1.de.eu.orsn.net - 217.146.139.5 (Hildesheim, Germany)


    resolver.netteam.de - 193.155.207.61 (Alfter-Impekoven, Germany)

    sunic.sunet.se - 192.36.125.2 (Stockholm, Sweden)

    master.ns.dns.be - 193.109.126.140 (Leuven, Belgium)


    ns1.lu.eu.orsn.net - 195.206.104.98 (Belvaux, Luxembourg)

    merapi.switch.ch - 130.59.211.10 (Zurich, Switzerland)

    prades.cesca.es - 192.94.163.152 (Barcelona, Spain)


    michael.vatican.va - 212.77.0.2 (Vatican City, Italy)

    dns.inria.fr - 193.51.208.13 (Nice, France)

    ns0.ja.net - 128.86.1.20 (London, UK)


    nic.aix.gr - 195.130.89.210 (Athens, Greece)

    ns.ati.tn - 193.95.66.10 (Tunis, Tunisia)

    ns1.relcom.ru - 193.125.152.3 (Moscow, Russia)


    trantor.umd.edu - 128.8.10.14 (College Park, MD, USA)

    ns1.berkeley.edu - 128.32.136.9 (Berkeley, CA, USA)

    merle.cira.ca - 64.26.149.98 (Ottawa, Canada)


    ns2.dns.br - 200.19.119.99 (Sao Paulo, Brasil)

    ns2.gisc.cl - 200.10.237.14 (Santiago, Chile)

    ns.uvg.edu.gt - 168.234.68.2 (Guatemala, Guatemala)


    ns1.retina.ar - 200.10.202.3 (Buenos Aires, Argentina)

    ns.unam.mx - 132.248.253.1 (Mexico City, Mexico)

    ns.wide.ad.jp - 203.178.136.63 (Osaka, Japan)


    ns.twnic.net - 192.83.166.11 (Taipei, Taiwan)

    ns3.dns.net.nz - 203.97.8.250 (Wellington, New Zealand)

    box2.aunic.net - 203.202.150.20 (Melbourne, Australia)


    It's also possible to act as a manual DNS server by yourself. Just use the
    ping or traceroute service on a non censoring machine to get the IP of your
    desired server. Then use the IP instead of the URL in your browser. You will
    always get an IP, but it won't work every time to access the website via the
    IP, because a lot of webhosters host up to 500 or more websites on one server
    with one IP. But it will work fine with bigger websites.


    http://195.193.168.164/ - Rotterdam,
    Netherlands (JAVA VISUALROUTE)
    https://www.velia.net/tools/traceroute.php
    - Hanau, Germany (HTTPS encrypted)


    http://www.traceroute.org/ - About
    1000 public ping/traceroute gateways sorted by country
    More info: http://www.encyclopedia-online.info/DNS

    http://www.encyclopedia-online.info/Root_nameserver
  • 4.3 Using a non censoring proxy server


  • You can put a proxy server between your Internet connection and the site you
    want to visit. You send your request for a special website to that proxy server,
    which request the page from the Internet and deliver it to you. Normally, those
    servers cache the requested pages, so that on the next request he can deliver
    the page directly from the cache. That would be faster and cheaper. We use those
    servers to bypass censorship. For the eyes/computers of our ISP/Government we
    are only connecting to the proxy, they can't easily see, that we are connecting
    to a "bad site". But sometimes the standard proxy ports (80, 1080,
    3128 and 8080) are blocked. In that case you have to use the proxies that are
    listening on an uncommon port.



    More info: http://www.encyclopedia-online.info/Proxy_server
  • 4.3.1 Standard proxy


  • Standard Proxies you can find everywhere on the net. Almost every provider
    offer a proxy for their customers. Here are a few, its in the widely spread "hostname:port"

    format. These proxies are mostly not anonymous!
    pdns.nd-shokusan.co.jp:80

    proxy.ia2.marketscore.com:80

    proxy.or3.marketscore.com:80

    ce420f8a.gw209.dsl.airmail.net:80

    www-proxy.HB1.srv.t-online.de:80


    gas90.gas.cz:3128

    kupl1.ittc.ku.edu:3128

    mail.jobclub-ps.de:3128

    mail.libreriaregional.com:3128

    mail.pegasus-sewing.com.hk:3128

    pl1.cs.utk.edu:3128


    proxy.telcel.net.ve:3128

    vn1.cse.wustl.edu:3128


    Planetlab CoDeeN Project (http://codeen.cs.princeton.edu/ -
    Very fast, you can also use them on port 3127. No POST allowed, so you only
    can
    view/download webpages and use simple forms that
    use the GET
    method
    (like search engines) but you can not use bigger forms that use POST (like
    buy stuff at Amazon)).

    planlab1.cs.caltech.edu:3128

    planetlab2.cse.msu.edu:3128


    planetlab2.cs.purdue.edu:3128

    planetlab2.cs.nwu.edu:3128

    planetlab1.ucsd.edu:3128

    planetlab-1.Stanford.EDU:3128

    planetlab1.lcs.mit.edu:3128

    planetlab1.eecs.umich.edu:3128


    planetlab1.csres.utexas.edu:3128

    planetlab1.cs.wayne.edu:3128

    planetlab1.cs.Virginia.EDU:3128

    planetlab1.cs.umass.edu:3128

    planetlab1.cs.uiuc.edu:3128

    Planetlab1.CS.UCLA.EDU:3128


    planetlab1.cs.ubc.ca:3128

    planetlab-1.CS.Princeton.EDU:3128

    planetlab1.cs.duke.edu:3128

    planetlab1.cs.cornell.edu:3128

    planetlab1.cs.arizona.edu:3128

    planetlab1.comet.columbia.edu:3128


    PLANETLAB-1.CMCL.CS.CMU.EDU:3128

    planetlab1.cis.upenn.edu:3128

    planetlab-02.bu.edu:3128

    planetlab01.cs.washington.edu:3128

    planet2.cs.rochester.edu:3128

    planet1.scs.cs.nyu.edu:3128


    planet1.cs.ucsb.edu:3128

    planet1.cc.gt.atl.ga.us:3128

    lefthand.eecs.harvard.edu:3128


  • 4.3.2 Uncommon port proxy


  • Due to the fact that several censors block the common proxy ports (80, 1080,
    3128 and 8080) to prevent circumvention you have to use proxies that are listening

    on a uncommon port. For example 8000 for the Junkbuster proxy or 6588 for the
    AnalogX proxy. You get a weekly updated list of Proxies that are listening
    on
    a non standard port here: http://www.web.freerk.com/proxylist.htm

  • 4.3.3 Socks proxy


  • More info: http://www.ufasoft.com/socks/

    http://proxylabs.netwu.com/


  • 4.3.4 Set up an own proxy server


  • More info: http://www.gcd.org/sengoku/stone/


    http://www.junkbusters.com/ijb.html

    http://www.boutell.com/rinetd/



  • 4.3.5 Special proxy / tunnel tools



  • 4.3.5.1 JAP


  • JAP is an free and open source anonymity tool invented by a German university.
    It sends your traffic encrypted through different mixes, so that absolutely

    nobody, not even the owner of on of the mixes know who is accessing which
    site. This is also on of the best tools to circumvent censorship. Just follow

    the installation instructions on http://anon.inf.tu-dresden.de/index_en.html
    or http://www.anon-online.org/index_en.html on installing the Java client
    (available for Windows, Unix, Linux, OS/2, Macintosh and others). Here is
    a list of the included servers and on which
    port they are connecting to:
    The InfoService - infoservice.inf.tu-dresden.de:6543



    Dresden-Dresden - mix.inf.tu-dresden.de:6544


    Dresden-ULD -
    mix.inf.tu-dresden.de:26544

    New
    York-Berlin-Dresden
    - class25.scs.cs.nyu.edu:6544

    Regensburg-HU/IWI -
    in: 132.199.134.2:3000 --- out: dali.wiwi.hu-berlin.de [141.20.103.68]


    Not working at the moment:


    Dresden-Luebeck - xx:9544

    Luebeck-Berlin-Dresden -
    fddi-passat.mesh.de:6544
  • 4.3.5.2 Httport

  • http://www.htthost.com/

  • 4.3.5.3 Localproxy

  • http://proxytools.sourceforge.net/

  • 4.3.5.4 HttpTunnel


  • http://www.http-tunnel.com/

    http://www.nocrew.org/software/httptunnel.html

    http://www.infoanarchy.org/wiki/wiki.pl?Httptunnel
  • 4.3.5.5 Hopster
    Hopster is a commercial tool to circumvent firewalls in schools, companies
    e.t.c. The free version is only limited to a 4kb/s transfer rate (speed of
    a 56k modem). Just download the <1 MB Setup file and install it. It will
    test your connection/firewall and than configure everything automatically.
    Unlimited version costs 2 or 5 dollar a month.

    More info: http://www.hopster.com/

  • 4.3.6 Wingates

  • More info: http://www.deerfield.com/products/wingate/

    http://www.encyclopedia-online.info/Wingate

  • 4.3.7 Using a Shell

    More info: http://www.encyclopedia-online.info/Unix_shell

    http://www.chiark.greenend.org.uk/~sgtatham/putty/

    http://directory.google.com/Top/Computers/Internet/Access_Providers/Unix_Shell_Providers/

    http://www.panix.com/shell.html

    http://www.shellux.net/




  • 4.4 Using a Web-2-phone service
    This are services which you dial with a normal telephone. Then you say the
    website you want to visit and the operator/computer voice is reading the
    content to you.
    More info: http://w2p.odem.org/ (a german
    Satire project. It is not working!)

    http://www.internetspeech.com/


    http://www.ecommercetimes.com/perl/story/3380.html


  • 4.5 Using a webproxy


  • Webproxies are CGI-scripts that you call with your browser and open a different
    URL (Internetaddress) with. So your firewall thinks you are only connecting
    to
    the server with the CGI-script. The addresses under 4.5.4
    are not really meant as proxies. They act as translators, html-checkers or
    as a web archive. You can use them as a kind of proxy anyway. These webproxies
    are
    a good thing for "quick 'n dirty" bypassing. You don't have to configure
    your browser or something, but it's kind of slow and won't work with all webpages.

    Only the proxies that are going over a secure connection can be used for phrase
    filtering, but the others a perfect for URL/IP filtering. Use them in your
    school,
    company or library when you have no privileges to install/change something
    on the machine. These links points to google.de because the site is very small,

    useful, always on and does not contain the ".com" extension of DOS-Files
    that are filtered by some proxies. If you do have webspace with cgi ability

    you can download the CGIProxy from James Marshall and install it on that webspace
    (there is a easy installer which does everything for you: http://install.xav.com/?p=cgiproxy).
    Or you can install it on your PC at home and access it at work. How to do
    so you can read here: http://www.peacefire.org/circumventor/simple-circumventor-instructions.html.
    To find new working proxies search for "nph-proxy.cgi", "nph-proxy.pl",
    "Start Using CGIProxy", "Start browsing through this CGI-based
    proxy"
    , "WARNING: Entering non-anonymous area" or something
    like that with Google, Alltheweb, Wisenut or another search engine.





  • 4.5.1 Standard Webproxies (mostly CGIProxies: http://www.jmarshall.com/tools/cgiproxy/)


  • http://68.46.95.96:81/cgi-bin/proxy/nph-proxy.cgi/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)

    http://69.93.153.42/poxy/index.php?url=http%3A%2F%2Fwww.web.freerk.com%2Fc%2F&ops%5B%5D=on&ops%5B%5D=on&ops%5B%5D=on&browse=Browse (Poxy 0.3, no form)


    http://anon.free.anonymizer.com/http://www.web.freerk.com/c/ (Restricted access, proxy version unknown)

    http://darwin.servehttp.com/cgi-bin/cgiproxy/nph-proxy.cgi/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)

    http://invis.free.anonymizer.com/http://www.web.freerk.com/c/ (Restricted access, proxy version unknown, without form)

    http://gnor.net/cgi/nph-proxy.cgi/010110A/http/www.google.com/ (CGIProxy, only Google)







    http://proxify.com/p/000010A/http/www.web.freerk.com/c/ (Ads, CGIProxy version unknown)

    http://pr2.proxify.com/p/011110A/http/www.web.freerk.com/c/ (Ads, CGIProxy version unknown)

    http://proxy.premoweb.com/nph-proxy.cgi/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)


    http://proxy.youcan.us/nph-proxy.cgi/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1, no images)

    http://ramon.cantele.net/cgi-bin/cgiproxy/nph-proxy.pl/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)

    http://resistance.s57.xrea.com/proxy/x/nph-proxy.cgi/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)

    http://userpages.umbc.edu/~kvalen2/cgiproxy/nph-proxy.cgi/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)

    http://www.aboody.glwb.info/cgi-bin/76_dh9kdkuud_ww/nph-proxy.pl/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)


    http://www.adivinecomedy.com/cgi-bin/nph-proxy.cgi/000010A/http/www.web.freerk.com/c/ (CGIProxy 1.5.1)

    http://www.anonymouse.ws/cgi-bin/anon-www_de.cgi/http://www.web.freerk.com/c/ (Ads, without form, proxy version unknown)

    http://www.aznjoj.5gigs.com/cgiproxy/nph-proxy.pl/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)

    http://www.bbg2.com/koop/cgiproxy/nph-proxy.pl/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)


    http://www.browseatwork.com/nph-proxy.cgi/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)

    http://www.bsa76.net/cgi-bin/nph-ih4x.cgi/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)

    http://www.chadparker.com/proxy/nph-proxy.cgi/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1, no images)

    http://www.crealogica.glwb.info/cgi-bin/nph-proxy.pl/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)


    http://www.dwayneg.com/cgiproxy/nph-proxy.pl/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)

    http://www.e-ronin.com/cgi-bin/shared/nph-proxy.cgi/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)

    http://www.floon.com/cgiproxy/nph-proxy.pl/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1, no images)

    http://www.gezcem.com/nph-proxy.pl/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)


    http://www.ghostproxy.com/cgi/nph-remote.cgi/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)

    http://www.gouc.fr/cgi-bin/nph-proxy.cgi/000010A/http/www.web.freerk.com/c/ (CGIProxy)

    http://www.greenlion.info/cgi-bin/nph-gl-proxy.cgi/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)

    http://www.groothuijsen.nl/cgiproxy/nph-proxy.pl/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)


    http://www.headchopper.com/cgi-bin/cgiproxy/nph-proxy.pl/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)

    http://www.hugohadlow.co.uk/cgi-bin/moresense/nph-moresense.pl/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)

    http://www.internetmag.info/cgi-bin/f/nph-proxy.cgi/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)

    http://www.kevindproductions.com/bypass/nph-proxy.cgi/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)


    http://www.m3bullet.5gigs.com/cgiproxy/nph-proxy.pl/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)

    http://www.maxximumconsulting.com.ua/img/nph-proxy.cgi/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)

    http://www.mazeofmoments.com/cgi-bin/nph-proxy.cgi/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)

    http://www.mayhemn.net/juice/nph-proxy.cgi/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)


    http://www.mereed.com/cgiproxy/nph-proxy.pl/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)

    http://www.microsoftfanboy.com/cgiproxy/nph-proxy.pl/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)

    http://www.monkeysigns.com/cgiproxy/nph-proxy.pl/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)

    http://www.nethider.com/cgi-bin/nph-proxy.cgi/010110A/http/www.web.freerk.com/c/ (CGIProxy Big Ads)

    http://www.nettportalen.net/misc/proxy/nph-proxy.cgi/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)


    http://www.netshaq.com/cgiproxy/nph-proxy.cgi/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1, no form)

    http://www.netwerkpc.nl/fdcgi/cgiproxy/nph-proxy.pl/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)

    http://www.ocramc.com/cgiproxy/nph-proxy.pl/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)

    http://www.outburst8.com/cgiproxy/nph-proxy.pl/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)


    http://www.pbkill.com/scgi-bin/nph-proxy.cgi/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)

    http://www.pgo.glwb.info/cgi-bin/cgiproxy/nph-proxy.pl/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)

    http://www.pole.ws/nph-proxy.pl/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)

    http://www.poolsaz.glwb.info/cgi-bin/nph-proxy.pl/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.1beta7)


    http://www.prigot.com/cgi-bin/nph-info/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)

    http://www.proudiacom.com/cgi-bin/proxy/nph-proxy.cgi/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)

    http://www.proxy.requeny.com/nph-one.pl/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)

    http://www.proxy-surf.com/nph-proxy.pl/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)


    http://www.proxymouse.com/nph-proxy.cgi/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1, Ads)

    http://www.proxytype.de/cgi-bin/nph-psurf.cgi/000010A/http/www.web.freerk.com/c/ (CGIProxy, no images)

    http://www.q2r.net/pc/nph-proxy.cgi/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)

    http://www.querydns.org/cgiproxy/nph-teste.cgi/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)


    http://www.sindibad.glwb.info/cgi-bin/1qa2ws3ed/nph-proxy.pl/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)

    http://www.sch57.msk.ru/~d03belozerov/cgi/nph-proxy.cgi/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)

    http://www.shroudofdarkness.co.uk/cgiproxy/nph-proxy.pl/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)

    http://www.sourcecodesworld.com/web/default.pl/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)


    http://www.sneakysurf.com/index.php?go2url=http%3A%2F%2Fwww.web.freerk.com%2Fc%2F (unknown Proxy, Ads)

    http://www.statspro.net/cgi-bin/pxy/nph-proxy.cgi/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)

    http://www.stupidcensorship.com/cgi-bin/nph-surf.cgi/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)

    http://www.swd-hosting.co.uk/cgiproxy/nph-proxy.pl/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)


    http://www.thesmallclub.org/cgi-bin/cgiproxy/nph-proxy.pl/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)

    http://www.tnc-vn.com/cgi-bin/nph-proxy.cgi/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)

    http://www.uhingoknights.com/nph-proxy.cgi/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)

    http://www.unitedmercenaries.com/umsite/download/nph-proxy.cgi/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)


    http://www.usagi.natsu.gs/ginsuzu/nph/nph-proxy.cgi/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)

    http://www.usbm.de/cgi-bin/userbeam.pl/000000A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1, Ads, no images)

    http://www.userbeam.de/cgi-bin/nph-userbeam.cgi/000000A/http/www.web.freerk.com/c/ (Many ads, sites look wired, proxy version unknown)

    http://www.vanstra.nl/cgi-bin/nph-proxy.cgi/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)


    http://www.wadmaster.com.ua/ip/nph-proxy.cgi/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)

    http://www.willowwind.spacefree.de/cgi-bin/cgiproxy/nph-proxy.pl/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)

    http://www.withislam.com/cgiproxy/nph-proxy.pl/000010A/http/www.web.freerk.com/c/ (CGIProxy 2.0.1)






    http://www.flyingdragon.org/ - http://www.zienhong03.com/ - http://sixa.no-ip.info/proxyreg.html

  • 4.5.2 Webproxies with encrypted URL's

  • http://ahoraian.t35.com/pp/index.php?url=uggc%2Fjjj.jro.serrex.pbz%2Fp%2F&flags=10111 (Poxy 0.3)


    http://freesee.k9host.com/index.php?url=uggc%2Fjjj.jro.serrex.pbz%2Fp%2F&flags=10111
    (Poxy 0.3, Ads)

    http://hasanagha.t35.com/pp/index.php?url=uggc%2Fjjj.jro.serrex.pbz%2Fp%2F&flags=10111 (Poxy 0.3, without images)

    http://mdweiss.ods.org/cgi-bin/nph-pro.pl/000010A/687474703a2f2f7777772e7765622e66726565726b2e636f6d2f632f
    (CGIProxy version unknown)


    http://tools2.razorthought.com/cgi-bin/surfsafe/nph-proxy-free.cgi/000010A/687474702s7777772r7765622r66726565726o2r636s6q2s632s (CGIProxy 2.0.1, Ads)

    http://www.anonproxy.info/index.php?q=aHR0cDovL3d3dy53ZWIuZnJlZXJrLmNvbS9jLw--&hl=1011101001 (Poxy 0.4, no form)

    http://www.arnit.net/utilities/webproxy/2/index.php?url=uggc%2Fjjj.jro.serrex.pbz%2Fp%2F&flags=10111 (Poxy 0.3, Ads)


    http://www.bywhat.com/index.php?url=uggc%2Fjjj.jro.serrex.pbz%2Fp%2F&flags=10111 (Poxy)

    http://www.chemikaze.com/phproxy/index.php?url=uggc%2Fjjj.jro.serrex.pbz%2Fp%2F&flags=10111 (Poxy 0.3)

    http://www.computersteroids.com/poxy/index.php?q=aHR0cDovL3d3dy53ZWIuZnJlZXJrLmNvbS9jLw--&hl=1011101001 (Poxy 0.4, no form)


    http://www.demos.scriptdownloads.com/1638/index.php?url=uggc%2Fjjj.jro.serrex.pbz%2Fp%2F&flags=10111 (Poxy 0.3, without images)

    http://www.esigholi.wspace-service.de/index.php?url=uggc%2Fjjj.jro.serrex.pbz%2Fp%2F&flags=10111 (Poxy 0.3, no images, Ads)

    http://www.fosco.com/cgi-bin/nph-vv.cgi/000010A/687474702s7777772r7765622r66726565726o2r636s6q2s632s (CGIProxy 2.0.1)


    http://www.freedomdown.net/fd/proxies/phproxy/index.php?url=uggc%2Fjjj.jro.serrex.pbz%2Fp%2F&flags=10111 (Poxy 0.3)

    http://www.freeproxy.us/index.php?q=aHR0cDovL3d3dy53ZWIuZnJlZXJrLmNvbS9jLw--&hl=1011101001 (Poxy 0.4)

    http://www.fsurf.com/index.php?q=aHR0cDovL3d3dy53ZWIuZnJlZXJrLmNvbS9jLw--&hl=0011101001 (Poxy 0.4, no form)


    http://www.ftopro.com/phproxy/phproxy/index.php?url=uggc%2Fjjj.jro.serrex.pbz%2Fp%2F&flags=10111 (Poxy 0.3, no images)

    http://www.high2sky.com/go/nph-proxy.pl/000010A/687474702s7777772r7765622r66726565726o2r636s6q2s632s (CGIProxy 2.0.1)

    http://www.ip-privacy.com/free_anonymous_proxy_search/index.php?url=uggc%2Fjjj.jro.serrex.pbz%2Fp%2F&flags=10111 (Poxy 0.3, Ads)


    http://www.jakesweb.net/proxy/index.php?q=aHR0cDovL3d3dy53ZWIuZnJlZXJrLmNvbS9jLw--&hl=1011101001 (Poxy 0.4, no form)

    http://www.kampen.org/kcc/proxy/index.php?url=uggc%2Fjjj.jro.serrex.pbz%2Fp%2F&flags=10111 (Poxy 0.3, without images)

    http://www.khalij.114jb.com/index.php?q=aHR0cDovL3d3dy53ZWIuZnJlZXJrLmNvbS9jLw--&hl=1011101001 (Poxy 0.4, Ads, no images)


    http://www.manoma.org/proxy/index.php?url=uggc%2Fjjj.jro.serrex.pbz%2Fp%2F&flags=10111 (Poxy 0.3, without images)

    http://www.mirkoreich.de/cgi-bin/nph-proxy.cgi/000010A/687474703a2f2f7777772e7765622e66726565726b2e636f6d2f632f (CGIProxy 2.0.1)

    http://www.momyaz.com/xxxx/index.php?url=uggc%2Fjjj.jro.serrex.pbz%2Fp%2F&flags=10111 (Poxy 0.3)


    http://www.mpvbrao.com/phproxy/index.php?url=uggc%2Fjjj.jro.serrex.pbz%2Fp%2F&flags=10111 (Poxy 0.3)

    http://www.musicir.com/proxy/index.php?url=uggc%2Fjjj.jro.serrex.pbz%2Fp%2F&flags=10111 (Poxy 0.3)

    http://www.mylan.nl/karina/lightinthedark/Web-proxy/index.php?q=aHR0cDovL3d3dy53ZWIuZnJlZXJrLmNvbS9jLw--&hl=1011101001 (Poxy 0.4, no form)


    http://www.mysticproxy.com/index.php?url=uggc%2Fjjj.jro.serrex.pbz%2Fp%2F&flags=10011 (Poxy 0.3)

    http://www.nomorelimits.net/index.php?url=uggc%2Fjjj.jro.serrex.pbz%2Fp%2F&flags=10111 (Poxy 0.3)

    http://www.parsproxy.com/index.php?q=aHR0cDovL3d3dy53ZWIuZnJlZXJrLmNvbS9jLw--&hl=1011101001 (Poxy 0.4, no images, no form)


    http://www.pc-portal.at/phpproxy/proxy/index.php?q=aHR0cDovL3d3dy53ZWIuZnJlZXJrLmNvbS9jLw--&hl=1011101001 (Poxy 0.4, no form)

    http://www.phpproxy.glwb.info/index.php?url=uggc%2Fjjj.jro.serrex.pbz%2Fp%2F&flags=10111 (Poxy 0.3)

    http://www.proxifyme.com/index.php?q=aHR0cDovL3d3dy53ZWIuZnJlZXJrLmNvbS9jLw--&hl=1011101001 (Poxy 0.4, no form)


    http://www.proxy.hackingtruths.org/index.php?url=uggc%2Fjjj.jro.serrex.pbz%2Fp%2F&flags=10111 (Poxy 0.3)

    http://www.proxysafe.com/index.php?url=uggc%2Fjjj.jro.serrex.pbz%2Fp%2F&flags=10111 (Poxy 0.3)

    http://www.proxysurfing.net/index.php?q=aHR0cDovL3d3dy53ZWIuZnJlZXJrLmNvbS9jLw--&hl=1011101001 (Poxy 0.4, no form)


    http://www.proxytastic.com/index.php?q=aHR0cDovL3d3dy53ZWIuZnJlZXJrLmNvbS9jLw--&hl=1011101001 (Poxy 0.4, no form)

    http://www.routersync.com/websense.pl/555544A/687474702s7777772r7765622r66726565726o2r636s6q2s632s (CGIProxy version unknown, without form)

    http://www.sahmafarin.com/proxy/index.php?url=uggc%2Fjjj.jro.serrex.pbz%2Fp%2F&flags=10111 (Poxy 0.3)


    http://www.saothang8.net/proxy/index.php?url=uggc%2Fjjj.jro.serrex.pbz%2Fp%2F&flags=10111 (Poxy 0.3)

    http://www.suppau.myasiahost.com/cgiproxy/nph-proxy.pl/000010A/687474703a2f2f7777772e7765622e66726565726b2e636f6d2f632f (CGIProxy 2.0.1)

    http://www.teh-best.co.uk/cgiproxy/nph-proxy.pl/000010A/uggc://jjj.jro.serrex.pbz/p/ (CGIProxy 2.0.1, ads)

    http://www.tel9.com/index.php?url=uggc%2Fjjj.jro.serrex.pbz%2Fp%2F&flags=10111 (Poxy 0.3)


    http://www.troist.glwb.info/PHProxy/index.php?url=uggc%2Fjjj.jro.serrex.pbz%2Fp%2F&flags=10111 (Poxy 0.3)

    http://www.u-soft.info/nph-cgi.cgi/000010A/687474702s7777772r7765622r66726565726o2r636s6q2s632s (CGIProxy 2.0.1)

    http://www.unipeak.com/gethtml.php?_u_r_l_=aHR0cDovL3d3dy53ZWIuZnJlZXJrLmNvbS9jLw== (Proxy version unknown, no form)

    http://www.usd.fatal.ru/nph-cgi.cgi/000010A/687474702s7777772r7765622r66726565726o2r636s6q2s632s (CGIProxy 2.0.1)


    http://www.worldwideproxy.com/index.php?q=aHR0cDovL3d3dy53ZWIuZnJlZXJrLmNvbS9jLw--&hl=1011101001 (Poxy 0.4, no form)

    http://www.zhaodaola.org/web/index.php?q=aHR0cDovL3d3dy53ZWIuZnJlZXJrLmNvbS9jLw--&hl=1011101001 (Poxy 0.4, no form)





    http://www.fastbot.de/ - A german searchengine with anonymizer


  • 4.5.3 Webproxies on a secure SSL-connection


  • https://nhuanet.com/cgi-bin/nph-proxyb.cgi/000010A/http/www.web.freerk.com/c/ (Without form, CGIProxy 2.0.1)


    https://proxify.com/p/000010A/http/www.web.freerk.com/c/ (Ads, CGIProxy version unknown)



    https://vip.megaproxy.com/go/http://www.web.freerk.com/c/ (Ads, special form, Proxy version unknown)

    https://www1.6lishi.com/dmirror/http/www.web.freerk.com/c/ (Proxy version unknown)

    https://www2.6lishi.com/dmirror/http/www.web.freerk.com/c/ (Proxy version unknown)

    https://www3.6lishi.com/dmirror/http/www.web.freerk.com/c/ (Proxy version unknown)


    https://www1.beijing999.com/cgi-bin/nph-proxyb.cgi/000010A/http/www.web.freerk.com/c/ (Without form, CGIProxy 2.0.1)

    https://www2.beijing999.com/cgi-bin/nph-proxyb.cgi/000010A/http/www.web.freerk.com/c/ (Without form, CGIProxy 2.0.1)

    https://www3.beijing999.com/cgi-bin/nph-proxyb.cgi/000010A/http/www.web.freerk.com/c/ (Without form, CGIProxy 2.0.1)

    https://www1.dongtaiwang.com/cgi-bin/nph-proxyb.cgi/000010A/http/www.web.freerk.com/c/ (Proxy version unknown)


    https://www2.dongtaiwang.com/cgi-bin/nph-proxyb.cgi/000010A/http/www.web.freerk.com/c/ (Proxy version unknown)

    https://www3.dongtaiwang.com/cgi-bin/nph-proxyb.cgi/000010A/http/www.web.freerk.com/c/ (Proxy version unknown)

    https://www4.dongtaiwang.com/cgi-bin/nph-proxyb.cgi/000010A/http/www.web.freerk.com/c/ (Proxy version unknown)

    https://www1.ft888.net/cgi-bin/nph-proxyb.cgi/000010A/http/www.web.freerk.com/c/ (Without form, CGIProxy 2.0.1)

    https://www2.ft888.net/cgi-bin/nph-proxyb.cgi/000010A/http/www.web.freerk.com/c/ (Without form, CGIProxy 2.0.1)

    https://www1.ft888.net/cgi-bin/nph-proxy.cgi/000010A/uggc/jjj.jro.serrex.com/c/

    https://www3.ft888.net/cgi-bin/nph-proxyb.cgi/000010A/http/www.web.freerk.com/c/ (Without form, CGIProxy 2.0.1)

    https://www1.zhonghua999.com/dmirror/http/www.web.freerk.com/c/ (Proxy version unknown)

    https://www2.zhonghua999.com/dmirror/http/www.web.freerk.com/c/ (Proxy version unknown)


    https://www3.zhonghua999.com/dmirror/http/www.web.freerk.com/c/ (Proxy version unknown)


    https://www.anonymisierungsdienst.de/proxy/http://www.web.freerk.com/c/ (Proxy version unknown)


    https://www.heshan18.com/cgi-bin/nph-proxyb.cgi/000010A/http/www.web.freerk.com/c/ (Without form, CGIProxy 2.0.1)




    Webproxies from AAEX (Ads): https://www.nopath.com/ - https://www.proxyweb.net/ - https://www.snoopblocker.com/ - http://www.snoopblock.com/ - http://www.antitrace.com/


    Chinese webproxies: https://lj.unusualperson.com/ -

  • 4.5.4 Standard CECID proxies (http://cecid.sf.net/)

    http://www.zensur.freerk.com/nada/index.php (v0.7)

    http://dewijk.csam.nl/csp/cecid-php/cecid.php (v1.0.1, with form, images enabled)


    http://willswonders.myip.org:8090/php/cecid.php (v1.0.1, with form, images enabled)


    http://rsw-db.no-ip.org/cecid2/cecid.php (v1.0.1, with form, images enabled)

    http://web.freerk.com/cecid/cecid.php (v1.0.1, with form, images enabled)

    http://www.deck3.de/subdomains/migge/cecid.php (v1.0.1, with form, images enabled)


    http://www.giblee.info/omghax/index.php (v1.0.1, with form, images enabled)

    http://www.freerk.ath.cx/c/index.php (v1.0.1, with form, images enabled)






  • 4.5.5 CECID proxies on a secure SSL-connection
    https://arkadiy.myip.org/cecid/cecid.php (v0.7b)


    https://ssl-account.com/zensur.freerk.com/nada/index.php (v0.7b, without images)




  • 4.5.5 Translators, warpers, e.t.c that can be
    used as a proxy


  • http://www.delorie.com/web/purify.cgi?purity=html40l&url=http%3A%2F%2Fwww.web.freerk.com/c/ (Ads, proxy version unknown)

    http://www.dejavu.org/ (Browser Emulator)


    http://paranormal.about.com/gi/dynamic/offsite.htm?site=http%3A%2F%2Fwww.web.freerk.com/c/

    http://bobby.cast.org/bobby/bobbyServlet?URL=http://www.web.freerk.com/c/
    (Websitechecker)

    http://www.vischeck.com/vischeck/vischeckURL.php
    (Websitechecker)

    http://spireproject.com/cgi-bin/footnote.pl?form=2&page=http://www.web.freerk.com/c/

    (Footnote?)

    http://cyber.law.harvard.edu/cite/annotate.cgi?view=http://www.web.freerk.com/c/
    (kind of a footnote)

    http://webwarper.net/ww/~GZ/www.web.freerk.com/c/?*
    (Warper)

    http://imode.csx.jp/~airh-mode/cgi-bin/nph-zephyrus.cgi/p504is@http/web.freerk.com/c/ (modified
    CGIProxy for iMode mobile phones)


    http://babelfish.altavista.com/
    (Translator)

    http://www.freetranslation.com/web.htm
    (Translator)

    http://translation.langenberg.com/
    (Translator)


    http://www.systransoft.com/ (Translator)

    http://www.translate.ru/srvurl.asp?lang=de
    (Translator)

    http://translator.abacho.de/ (Translator)

    http://www.t-mail.com/cgi-bin/tsail

    (Translator)

    http://www.google.com/language_tools?hl=de
    (Translator)

    http://tarjim.ajeeb.com/ajeeb/default.asp?lang=1
    (Translator)

    http://www.sdlintl.com/enterprise-systems/enterprise-translation-server/ets-demo/ets-demo-web-translator.htm

    (Translator)

    http://rinkworks.com/dialect/ (Fun Translator)

    http://www.brunching.com/drugslanger.html
    (Fun Translator)

    http://www.pornolize.com/cgi-bin/pornolize2/pornolize2.cgi?lang=en&url=http%3A%2F%2Fwww.web.freerk.com/c/&submit=submit

    (Fun-Translator)

    http://unimut.fsk.uni-heidelberg.de/schwob.html
    (Fun Translator)

    http://www.giantflounderpenis.com/cgi-bin/translator.cgi?LANGUAGE=Quaker&URL=http%3A%2F%2Fwww.web.freerk.com%2Fc%2F&.submit=Translate

    http://www.asksnoop.com/shizzolator.php?url=http%3A%2F%2Fweb.freerk.com%2Fc%2F (Fun Translator)


    http://www.csse.monash.edu.au/cgi-bin/cgiwrap/~ssb/access?Aesu=1&Au=http%3A%2F%2Fwww.web.freerk.com%2Fc%2F (Web Access Gateway)

    http://www.flatline.org.uk/~silas/access.cgi?Aesu=1&Au=http%3A%2F%2Fwww.web.freerk.com%2Fc%2F (Web Access Gateway)

    http://www.accu.org/cgi-bin/accu/access/access?Aesu=1&Au=http%3A%2F%2Fwww.web.freerk.com%2Fc%2F (Web Access Gateway)


    http://kangzhuang.ucam.org/cgi-bin/access/access.cgi?Aesu=1&Au=http%3A%2F%2Fwww.web.freerk.com%2Fc%2F (Web Access Gateway)

    http://www.google.com/ .de/
    .fr/ (the Google Cache)

    http://web.archive.org/web/*/http://www.web.freerk.com/c/

    (Archive of the Internet since 1996)

    http://archive.bibalex.org/web/*/http://www.web.freerk.com/c/ (a
    mirror of archive.org)

    http://www.marzie.com/webtools/proxybuster/ (get
    files)

    http://alltooflat.com/geeky/elgoog/ (a
    Google fun mirror mirror)

    http://www.guhgel.de/ (another Google
    fun mirror)


    http://www.assoziations-blaster.de/www.web.freerk.com/c/


    http://mirror.sytes.org/ (a fun
    mirror mirror *gg*)

    http://hispeed.rogers.com/search/google.jsp (a
    Google mirror)

    http://www.gogole.com/ (a Google mirror)


    http://www.g00gle.de/ (a German Google mirror)

    http://google.icq.com/search/ (a
    Google mirror)

    http://www.googlesyndication.com/ (a official Googe "mirror")


    http://www.zensur.freerk.com/google/ (a
    mirror for the Google mirror...)

    http://google.ainex.net/ (another
    mirror for the Google mirror)

    http://google.666.cc/ (Google,
    again)

    http://www.google-watch.org/cgi-bin/proxy.htm (another
    Google and Alltheweb mirror)


    http://gritechnologies.com/tools/diagnostic.go?www.web.freerk.com/c/ (see
    as a search engine)

    http://www.accu.org/cgi-bin/accu/access/access?Au=http%3A%2F%2Fwww.web.freerk.com/c/ (a
    gateway/browser emulator)



    http://www.xdx3.com/proxy.php?action=get_url&url=http%3A%2F%2Fwww.web.freerk.com%2Fc%2F (very simple proxy)


    http://sbp.sufferingfools.net/?url=http://www.web.freerk.com/c/



    http://bilal.revolutionhosting.net/proxy.php?url=http%3A%2F%2Fwww.web.freerk.com%2Fc%2F

  • 4.6 Get webpages via eMail


  • Several years ago when the Internet connections where slow and the "www"
    just invented, many people just got a to email restricted access to the Internet.
    That's the origin of the "Agora" and "www4email" software.
    Some of these email robots are still available and we can use them to bypass

    Internet censorship. The best thing would be to subscribe to a free email provider
    which allows SSL-connections (like https://www.fastmail.fm/,
    https://www.ziplip.com/, https://www.hushmail.com/,
    https://www.safe-mail.net/, https://www.mail2world.com/,
    https://www.webmails.com/

    e.t.c) and use that account with the email addresses below. I put the field
    where you have to input the URL in brackets. It still works great for text.

    But sure there are big problems with images or even DHTML, JavaScript, Java,
    Flash e.t.c. Also other services besides www are possible, for a very good
    tutorial
    on this see ftp://rtfm.mit.edu/pub/usenet/news.answers/internet-services/access-via-email.
    There is also a web based service under http://www.web2mail.com/.
    I again used www.web.freerk.com/c/ as an example because the URL is all time accessible

    and the '.com' in the original Google address is often considered as a .com
    DOS-file by some computers and censorship systems. The www4mail software
    (http://www.www4mail.org/)
    is newer than the Agora software.

    A eMail with just "help" in the subject line will get you a
    tutorial on howto use the service properly.
    agora@dna.affrc.go.jp

    [BODY] send http://www.web.freerk.com/c/

    page@grabpage.org

    [SUBJECT] url: http://www.web.freerk.com/c/

    info: http://www.grabpage.org/

    frames@pagegetter.com


    [BODY] http://www.web.freerk.com/c/

    info: http://www.pagegetter.com/

    web@pagegetter.com

    [BODY] http://www.web.freerk.com/c/


    info: http://www.pagegetter.com/


    webgate@vancouver-webpages.com

    [BODY] get http://www.web.freerk.com/c/

    info: http://vancouver-webpages.com/webgate/

    webgate@vancouver-webpages.com

    [BODY] mail http://www.web.freerk.com/c/

    info: http://vancouver-webpages.com/webgate/

    www4mail@wm.ictp.trieste.it


    [BODY] http://www.web.freerk.com/c/

    info: http://www.ictp.trieste.it/~www4mail/

    www4mail@access.bellanet.org

    [BODY] http://www.web.freerk.com/c/


    info: http://www.bellanet.org/email.html

    www4mail@kabissa.org

    [BODY] http://www.web.freerk.com/c/

    info: http://www.kabissa.org/members/www4mail/

    www4mail@ftp.uni-stuttgart.de

    [BODY] http://www.web.freerk.com/c/

    www4mail@collaborium.org

    [BODY] http://www.web.freerk.com/c/


    info: http://www.collaborium.org/~www4mail/


    binky@junoaccmail.org

    [BODY] url http://www.web.freerk.com/c/

    info: http://boas.anthro.mnsu.edu/


    iliad@prime.jsc.nasa.gov

    [SUBJECT] GET URL

    [BODY] url:http://www.web.freerk.com/c/

    info: http://prime.jsc.nasa.gov/iliad/

    Google Search via eMail:

    google@capeclear.com

    [Subject] search keywords

    info: http://www.capeclear.com/google/


    More info: http://www.cix.co.uk/~net-services/mrcool/stats.htm


    ftp://rtfm.mit.edu/pub/usenet/news.answers/internet-services/access-via-email


  • 4.7 Using steganography


  • Hide content inside of images.
    More Info: http://www.encyclopedia-online.info/Steganography
  • 4.7.1 Camera/Shy
    Camera/Shy is the only steganographic tool that automatically scans for and
    delivers decrypted content straight from the Web. It is a stand-alone, Internet
    Explorer-based browser that leaves no trace on the user's system and has enhanced
    security.

    Camera/Shy is an application that enables stealth communications, such software
    can be useful in countries where Email communications are regularly monitored
    and censored, such as happens in China.
    More info: http://hacktivismo.com/news/modules.php?name=Content&pa=showpage&pid=12/

    http://sourceforge.net/projects/camerashy/
     

  • 4.8 Using a special proxy like p2p program

  • There are different projects of peer-2-peer programs to bypass censorship.
    They work like Napster, Kazaa and eDonkey, which means that you have to download
    a little tool that contains a server and a client part.

  • 4.8.1 Peek a Booty
    The goal of the Peekabooty Project is to create a product that can bypass
    the nationwide censorship of the World Wide Web practiced by many countries.
    Peekabooty uses a complicated communications system to allow users to share
    information while revealing little about their identity. When a node receives
    a request for a web page it randomly decides whether to pass this on or access
    the page itself. It also only knows the address of its nearest partner. This
    makes it difficult to determine who requested what information and is designed
    to protect users from anyone trying to infiltrate the system from inside.

  • More info: http://www.peek-a-booty.org/

  • 4.8.2 Freenet

  • Freenet is the oldest and most widely spread P2P-program to beat censorship,
    so a lot of people use it and its actually working since several years quite

    well. There is no access to the Internet possible through the Freenet client.
    You can only view/download stuff from the 'free net'. You install the client

    as a local proxy which is listening on port 8888 and can access links like
    'http://localhost:8888/SSK@fjfkHAbxdwMyTMFgtZjcP2ge-AYPAgM/sites/fwhh/index.html'
    It looks like a kind of normal URL. The 'localhost:8888' addresses the
    proxy
    server on port 8888 that is running on your local machine the rest is something
    like an encrypted file name. It is not possible to determine who put some
    information
    into the network or who is downloading it.

    More info: http://freenetproject.org/

    http://www.freenet-china.org/

    http://www.encyclopedia-online.info/Freenet

  • 4.8.3 MojoNation

  • More info: http://www.mojonation.net/

  • 4.8.4 TriangleBoy
    Safeweb, a company that received funding from In-Q-Tel, the CIS's centure
    fund, released software called "Triangle Boy". The software is a peer-to-peer
    application that volunteers download onto their PC's. A User that has been
    denied access to any website by a censor can use the Triangle Boy software
    to circumvent the censorship. Currently the Triangle Boy software only provides
    access to the Voice of America, because this service is blocked by the Chinese
    government.

  • More info: http://www.safeweb.com/tboy_service.html

  • 4.8.5 Six/Four


  • More info: http://www.hacktivismo.com/


  • 4.8.6 Entropy


  • More info: http://entropy.stop1984.com/




  • 4.9 Special Services


  • Other services than the www.

  • 4.9.1 Usenet

  • The normal port for newsservers 119 is usually blocked, so you have to access
    the Usenet via a different port. If you only sometimes want to read some very

    common newsgroups you can easily visit them via free web-based newsservers
    like
    http://groups.google.com/, http://news.spaceports.com/,
    http://wnews.easyusenet.com/wnews-free.cgi and http://www.news2web.com/.
    A lot of newsserver companies offer their services on a non standard port.
    Just
    ask them before signup. If you need access to a newsserver with your newsclient
    you have to subscribe to one of these newsserver-companies which allow access

    to their newsservers on an uncommon port:

    Giganews
    Usenet
    Newsgroups
    - (news.giganews.com
    on ports 23 and 80)
    http://www.teranews.com/ - (news.teranews.com on ports 23, 25 and 7501)
    http://www.easynews.com/ - (proxy.news.easynews.com
    on 22, 23, 53, 80, 110 and 443, or try their web-based service at members.easynews.com port 81)

    http://www.newscene.com/ - (proxy.newscene.com
    on ports 20, 21, 22, 23, 25, 53, 80, 81, 110, 443 and 8080)
    http://www.supernews.com/ - (news.supernews.com
    on any port
    you like)
    http://www.octanews.com/ - (news.octanews.com on any port you like)

    http://www.readfreenews.com/ - (news.readfreenews.net and allnews.readfreenews.net at port 80 and 120
    Note: all traffic is unencrypted, so you can access these
    newsservers, but the censors can easily monitor all your traffic! It would
    be more secure to use a SSH port forwarding.



  • 4.9.2 Games




  • 4.9.3 FTP
    More info: http://www.encyclopedia-online.info/FTP

    http://inebria.com/phpftp/

    http://www.angehrn.com/index.php?cat=28

    http://www2ftp.de/


    http://webftp.host.sk/


  • 4.9.4 Instant Messenger
    Instant Messenger are very popular. You have to register your nickname at
    one of the companies and download their software. Then when you are in the

    Internet you can start the software and log onto their servers. Since then
    you are marked as "online" and all your friends who know your
    nickname and get the same Instant Messenger can see that you are online
    and easily
    chat with you. Every of the 4 big players has its own software client which
    contain advertisement, spyware and is not compatible with other IM protocols.

    I recommend you to download Miranda, which is a open source Instant Messenger
    which is very small, without ads or spyware and working without installation.

    It works great with every IM protocol, even at the same time. http://miranda-im.org/
    More info: http://www.encyclopedia-online.info/Instant_messenger


    http://www.infoanarchy.org/wiki/wiki.pl?Instant_Messenger
    http://nscsysop.hypermart.net/no_chat.html


  • 4.9.4.1 ICQ
    Users: 7 million

    Login server: login.icq.com or login.oscar.aol.com


    Used ports: tcp at any port you choose in the settings (default is 5190)

    Used protocol: Oscar

    Supports proxy: http, https, socks 4 and socks 5

    Online version: http://go.icq.com/ (connects
    to iht-d01.icq.com at any port you choose, default is 80) or http://www.odigo.org/features/express.html (The
    Odigo client online, supports all 4 services)
    More info: http://www.encyclopedia-online.info/ICQ


    http://www.rejetto.com/icq/


  • 4.9.4.2 MSN Messenger
    Users: 23 million

    Login server:
    messenger.hotmail.com

    Used ports: tcp at 1863 which you can not change, but if connection failes, MSN
    tries
    port 80. (voice/video/webcam is tcp 13324 and 13325, application sharing/whiteboard
    is
    tcp
    1503
    and file transfer tcp 6891)


    Used protocol: .NET Messenger Service

    Supports proxy:
    http, socks 4 and socks 5

    Online version: none official, but several inofficial. Be careful to give them
    your password! http://www.odigo.org/features/express.html (The
    Odigo client online, supports all 4 services), http://messenger.lycos.co.uk/messenger/ (Lycos
    Messenger, works also with Yahoo) and maybe you can try http://www.mister-i.com/i-mode/messenger.jsp (i-mode,
    after 3 days it costs $) or http://kickme.to/msnmessenger2go (he's
    still working on it).

    More info: http://www.encyclopedia-online.info/.NET_Messenger_Service


  • 4.9.4.3 AIM
    Users: 60 million

    Login server: login.oscar.aol.com, toc.oscar.aol.com and login.icq.com

    Used ports: tcp at any port you choose in the settings (default is 5190), for
    the IM images the software uses port 4443 (?)


    Used protocol: Oscar

    Supports proxy: http, https, socks 4 and socks 5

    Online Version: http://toc.oscar.aol.com/ (The
    old QuickBuddy, port 80) and http://toc.oscar.aol.com/aimexpress/index.html (the
    newer AIM Express, port 80) or http://www.odigo.org/features/express.html (The
    Odigo client online, supports all 4 services)

    More info: http://www.encyclopedia-online.info/AOL_Instant_Messenger


  • 4.9.4.6 Yahoo Messenger
    Users: 20 million

    Login server: cs.yahoo.com or cs.yahoo.co.jp (maybe different)

    Used ports: tcp 5050 and 80 for file transfer, which can be changed in the
    settings


    Used protocol:

    Supports proxy: http, socks 4 and socks 5


    Online Version: http://messenger.yahoo.com/ (The
    official Web Messenger) or http://messenger.lycos.co.uk/messenger/ (Lycos
    Messenger, which also supports MSN) or http://www.odigo.org/features/express.html (The
    Odigo client online, supports all 4 services)

    More info: http://www.encyclopedia-online.info/Yahoo!_Messenger


  • 4.9.5 Filesharing (Peer-to-Peer) Programs
    Gnutella (decentralized) - BearShare, Gnucleus, LimeWire, new Morpheus,
    Shareaza - More info: http://www.encyclopedia-online.info/Gnutella
    FastTrack (commercial, with Server) - KaZaA, KaZaA Lite, Grokster, old Morpheus,
    iMesh - More info: http://www.encyclopedia-online.info/FastTrack

    eDonkey (lots of servers, uses mainly port 4662) - eDonkey2000,
    Overnet, eMule, mlDonkey - More info: http://www.encyclopedia-online.info/EDonkey
    Napster (lots of servers) - OpenNap, Napigator, FileNavigatior, WinMX -
    More info: http://www.encyclopedia-online.info/Napster
    Other networks - Audiogalaxy, BitTorrent, Hotwire, Direct
    Connect, Evernet, SoulSeek

    More info: http://www.encyclopedia-online.info/Peer-to-peer




  • 5. Howto publish information
    The one think is to access information that is already censored, but the other
    challenge is to publish own information that can't easily be censored. Here

    you can see my ideas on how to avoid censorship:

    • Publish with a lot of mirrors. Especially dynamic IP's with a dyndns.org
      redirector are useful. Put your pages on so much different servers that the
      censors can't get along with blocking al the servers.


    • Fax Polling. You can either use a service in the Internet or provide that
      service on your own computer with a fax modem.

    • Use one-time-addresses. These are links/URL's that are only valid
      for 1 visit or 1 hour, they are often used for payed downloads.

    • Hide the 'dangerous' content. For example save text as images. The
      users won't notice it, but its difficult for the censor-spiders to 'read'
      the content.

    • Host on a secure server in another country. For example with http://www.havenco.com/

      which is located at Sealand, an independent country on a little island in
      the north sea near England.

    • Encrypt the content. Use .htaccess and/or SSL for your website and
      AES, Twofish or Rijndael for files.

    • Offer your data in P2P-Programs. Filesharing programs like Kazaa
      or eDonkey are very difficult to censor (see the problems of the music companies...)

    • Send content via eMail. Create a autoresponder from which everybody
      with a hotmail account can receive your content from.

    • Martus. It's a encrypted bulletin service to post and view
      informations. See: http://www.martus.org/


    More info: http://www.wired.com/news/technology/0,1282,5778,00.html



    6. Appendix

  • 6.1 Links



  • 6.1.1 Other bypass tutorials

  • http://galileo.spaceports.com/~simeon/censorship-evasion.html

    http://www.angelfire.com/my/6waynes/

    http://www.ijs.co.nz/proxies.htm

    http://sethf.com/anticensorware/

    http://www.flurnet.org/archive/papers/ProxyBypass.pdf


    http://neworder.box.sk/newsread.php?newsid=8650

  • 6.1.2 Other sites about Internet censorship

  • http://cyber.law.harvard.edu/filtering/

    http://www.opennetinitiative.net/oni/ice/

    http://peacefire.org/circumventor/

    http://www.free-market.net/directorybytopic/censorship/


    http://www.stop1984.info/

    http://www.encyclopedia-online.info/Internet_censorship_in_China

    http://www.cmis.csiro.au/projects+sectors/blocking.pdf

    http://www.topology.org/net/censor.html

    Mailinglist: http://lists.efa.org.au/mailman/listinfo/stop-censorship

    - (Discussions about censorship in Australia, English)

    Mailinglist: http://www.freelists.org/webpage/nocensorship
    - (How to beat censorship and proxies. Very good!)

    http://www.vicnet.net.au/community/issues/censorship/

    http://ch.dmoz.org/Society/Issues/Human_Rights_and_Liberties/Free_Speech/The_Censorship_Debate/Internet_Censorship/


    http://ch.dmoz.org/Computers/Software/Internet/Servers/Proxy/Filtering/Getting_Around_Filters/

    http://ch.dmoz.org/Computers/Software/Internet/Servers/Proxy/Filtering/Censorware/

    http://ch.dmoz.org/Computers/Software/Internet/Clients/Filtering/

    http://ch.dmoz.org/Reference/Libraries/Library_and_Information_Science/Intellectual_Freedom/Filtering_Software/
  • 6.1.3 Where to get proxies

  • http://tools.rosinstrument.com/proxy/

    http://www.samair.ru/proxy/


    http://www.atomintersoft.com/products/alive-proxy/proxy-list/

    http://www.steganos.com/software/anonproxylist.sia

    http://www.web.freerk.com/proxylist.htm (updated
    weekly, uncommon port proxies)

    Via autoresponder from proxylist.htm@web.freerk.com

    http://www.proxyblind.org/phpBB2/

    (Very good!)

    http://www.samair.ru/f/ (Very good!)




    TO-DO-LIST (I could need some help on this...):
    Voice-over-IP
    VPN
    Bildung von Untergrund-(Inter)Netzen in Deutschland (GAMEnet etc.) http://www.personaltelco.net/ WLAN

    dIRC (ChaosComputerCongress 1997) und Abwandlungen
    http://www.guardianet.net/
    http://www.w3.org/PICS/

    http://www.peacefire.org/bypass/Proxy/akamai.html
    ssh as a redirection server

    rinetd as a redirection server

    junkbuster

    http-gw

    VPNs

    stone as both a redirector and a proxy


    running a Perl proxy
    The secret new version of this site, so that google can already find it: psssst, don't tell anyone :-) http://nocensor.freerk.com/about/sitemap.html and http://nocensor.nfshost.com/about/sitemap.html
    often used non standard ports: 20, 21, 22, 23, 24, 25, 81, 82, 83, 84, 443,
    1979, 1128, 2000, 5000, 6000,

    6588, , 7070, 7531, 7532, 7533, 8000, 8001, 8002, 8003, 8040, 8081, 8082, 8084, 8090, 8888, 8965,
    9080, 9081, 10001, 10080, 22788, 39999
    web.de answering machine ++49-(0)1212-552489659
    softhome.net: free email with smtp server mail.softhome.net:2500 and mail.softhome.net:25000

    http://www.stunnel.org/ -
    http://www.infoanarchy.org/wiki/wiki.pl?Stunnel
    url hiding with ascii, hex, oktal e.t.c codes.
    http://www.lexikon-online.info/q/Internetzensur
    Webproxies by the IBB (Voice of America and Radio Farda)

    For people in Iran (please read http://www.opennetinitiative.net/advisories/001/): http://www.azadsho.com/ - http://www.azadro.com/ - http://www.azadegi.com/ - http://www.jaamjam.com/ - http://www.zendegan.com/ - http://www.sedayema.com/ - http://www.bazeshkon.com/ - http://www.barandaz.com

    For people in China: http://www.wanshiruyi.com/


    MSN - messenger.hotmail.com:1863 afterwards port 80 (gateway.messenger.hotmail.com,
    login.gateway.hotmail.com, msgr.hotmail.com?)

    www.e-messenger.net - qmsn2.qartis.com

    Yahoo! - cs.yahoo.com:505 or cs.yahoo.com:5050 (msg.edit.yahoo.com, http.pager.yahoo.com,
    messenger.yahoo.com, scs.yahoo.com?)
    port 80
    ftp server that show the user IP in the welcome message (test for anonymity): ftp.rz.uni-wuerzburg.de, ftp.gui.uva.es,
    sunsite.tus.ac.jp, ftp.matrix.com.br, ftp.cis.ohio-state.edu, ftp.gnupilgrims.org, ftp.stardiv.de

    mail: www.neurozen.com/popart - www.friendscircle.net/pop - www.mail-inspector.de -

    hotmail: www.hailware.com/code/dev

    gmail: http://www.theplaceforitall.com/gmail-lite/ - gmail-lite.sf.net

    servers that listen on any port (test it with telnet server.com PORT ): login.icq.com,
    news.supernews.com, login.oscar.aol.com
    final dot after domains like described in: http://www.encyclopedia-online.info/Root_nameserver
    http://www.gray-world.net/

    http://webmessenger.msn.com/
    http://www.offbyone.com/ob1_download.htm [complete Webbrowser in 1,2MB]
    http://www.466453.com
    http://board.planetpeer.de/index.php
    Other mirror server maintained by me: http://tokyo.cool.ne.jp/cship/ (Infoseek
    - Tokyo, Japan)

    This link is for bad machines only, uninteresting for humans: You
    are not supposed to click here



    No hay comentarios: