What to Do if You are Banned From a Site

Early or later some of Internet users meet the problem when they simply can’t enter this or that web site. It happens if its owner doesn’t want you to do it because of your posts. May be you’ve posted too much or one of your posts was not very nice. Anyway the result will be the same: you are banned that’s all. It doesn’t matter even if you don’t agree with such a decision and are sure it is not justified. However you shouldn’t get upset and give up as the solution does exist. It is here and we’re going to prove it.

Some users try to delete all cookies and create a new account but still fail. It happens because site banned not only their name and password but also IP Address. Never mind and continue to struggle.

Mind there are some options to overcome the following problem very quickly. To begin with you can go out and find any Wi-Fi zone but mind it can be not very convenient. Moreover it is not very safe as security is low. Next you can get a new Internet provider but it will of course cost some money. One more option is using a proxy service that can suggest a wide range of various servers. It is a great solution for your problem as you will be able to change IP Address any time when it will be necessary.

You need to do several easy steps to continue surfing favourite web sites. First of all you should delete cookies and then sign in using a proxy server. Next you must create a new account from proxy IP address. It means you need to make a new username as well as a password. After that you’ll receive an access to the site. You can even repeat these actions in case you will be unlucky again. Just use another proxy server for getting a new address.

It should be also mentioned that there is one more benefit of bypassing banned sites. All your information is coded when using a reputable proxy service so you will be protected for 100 % even if you use a public hot spot. You’ll be also safe from other people who use some free proxies as communication lines are never controlled.

Finally you can see a proxy server is a wonderful solution in case someone has banned you from this or that site. Just follow mentioned above simple steps and you’ll get and access to the whole world. Try and check it is not difficult at all.

Learn Functions of a Proxy Server

It is difficult to overestimate the importance of proxy servers these days. They act like some link between the web and the user so it can be installed on a computer or network. Originally they were used for hastening web browsing. However a person can use proxies for a wide range of other different functions. They are:

Security

One of the most important functions of proxies is security. A proxy server can easily hide password before passing it into the site. It is also a great solution for parental control.

Anonymity

One more nice function of proxy server is its ability to make your surfing Internet absolutely anonymous. It is a great opportunity for you to hide some pages you have visited in case you don’t want your boss or any other people to find out about that.

Content filtration

A content filtering proxy is usually used in offices and schools in order to restrict access to some sites and web pages with help of flagging websites or a database of blacklisted sites containing certain keywords.

Interception

Here we deal with “hostile” proxies which are able to overhear user’s browsing. In other words both visited pages and submitted forms can be first captured and then analyzed by a proxy operator.

Caching

We are talking about catching proxy servers which can store frequently-accessed sited or some sort of information such as videos or pictures. They hasten loading time.

Circumvention

Last but not least are circumventing proxies. Such type of proxy tries to get an access to a blocked site by overriding instructions of content-filtering proxy. It also should be mentioned that each type of a proxy has its own opportunities but all of them can be easily used in everyday life in different aspects of our life.

Find Out How to Change Proxy Settings in Internet Explorer 9

It happens these days workers and students can’t get access to the necessary information. It is because a principle, a boss or even a government won’t like you to visit this or that web-page. Of course such a situation can annoy very much. Fortunately there are many ways to destroy these restrictions and go to any recourse you need. The solution is here. Follow the simple Step-by-Step instruction and find out how to change proxy settings in Internet Explorer 9 right now. But before mind some useful tips!

Be careful and don’t use a proxy server if you aren’t sure your computer has a strong virus protection. Remember that there are sites that contain IP addresses working too slowly. It sometimes happens they can’t operate at all. Moreover, some lists can be spoiled by spammers that’s why IP address won’t be able to work because this or that site has the banned the IP.

Step 1

Launch Internet Explorer from the Start menu in Windows or click on the icon of the application on the desktop.

Step 2

Find and choose ‘Tools’ from the top of the screen. Next click on ‘Internet Options’ (it is the last option in the contextual menu).

Step 3

Select ‘Connections’ tab at the top of the window ‘Internet Options’. Then choose ‘Settings’ or ‘LAN settings’ button.

Step 4

Pay attention to the box near ‘Use a proxy server for your LA’ in case you want to use a custom proxy server. You will be able to add a port number with help of the following option. Mind it is often very important while using a proxy from a free list.

Step 5

Copy and then paste a server IP address in the box near the button ‘Address’. Next paste the Port number from a corresponding IP.

Step 6

Press ‘OK’. Congratulations! Your proxy settings have been already modified. In other words you can start surfing the Internet right now. Load a necessary page to check if the proxy server works properly.

In case you have followed the mentioned above steps but a new proxy server isn’t still remembered, check these things:

While entering URL or any other Internet address for a proxy server, make sure you are using the slashes (/) but not backslashes (\).

If you are trying to enter a universal naming convention or local network address, be sure you use backslashes (\) but not slashes (/).

Learn How to Use Proxy in Backtrack 5

It is very common for people nowadays to hide their identity in order to keep in a secret the pages they visit. It’s a great opportunity to look for any sort of information at home or especially at work. There are several ways to do this. Some users prefer single proxy while others choose multiple proxies. However those who have Backtrack shouldn’t worry at all as in this case using proxy is very easily. They can even use multilple proxies also. In fact it is called proxychains. What is proxychains

To begin with proxychains is a kind of inbuilt tool in backtrack which lets people to use proxy very easily. First of all it uses a proxy according to configuration file that should be configured. Then it will take the user to any necessary address or page thanks to multiple proxies.

Let’s look at proxychains more closely

Actually there is a is a configuration file(.conf) in a folder . It is called proxychains.conf. It’s very important as exactly in this file the user can hide his or her identity. So a person can type a command and disappear for other users. To check how it works, go to terminal, type gedit /etc/proxychains.conf and press button Enter. If you do everything right you will see the window with text. Well, it is configuration file.

What are types of proxychains

In fact there are 3 types (modes) of proxychains:

  1. 1) Dynamic_chain uses the list of proxies in the same order as you have placed;
  2. 2) Random_chain chooses and uses proxies at random;
  3. 3)Strict_chain is very similar to the first one with exception it won’t work if gets dead proxy server.

Configuration of the file

In case you have opened the file which gives a privilege to edit, enter the first command sudo su then the command gedit /etc/proxychains.conf. Next follow such steps as:

  1. Comment out the mode which you want to use;
  2. Search for any proxy server list in the Net and copy some IPs and port no. After that paste it in the line ‘add proxy here’.

Finally the configuration is done.

Learn to use proxychains

Mind the following commands for using proxychains:

  1. proxyresolv [the site you want to open]
  2. proxychains firefox [the necessary site ] (for firefox)

Follow the mentioned above instructions and you won’t have any problems with Use Proxy in Backtrack 5 anymore.

Learn how to configure Squid Proxy Server in Redhat Linux 5

Linux is an Networking OS out of the box. Now you can Learn how to configure Squid Proxy Server in Redhat Linux 5, a Linux Distribution which is being used for networking primarily in corporate segment.

As such, it provides multiple users with Internet access so that they can surf simultaneously, or establish flawless data exchange with the World Wide Web.

Squid is available in Redhat repositories; it supports HTTP, FTP, Gopher and the likes. Among other goodies we see native support for SSL, access controls, caching of DNS.

Are you ready for Squid?

Squid can be downloaded on your system by using these simple instructions:

wget http://www2.de.squid-cache.org/Versions/v2/2.7/squid-2.7.STABLE7.tar.gz

Then you have to extract the .gz archive:

tar xvfz squid 2.7.STABLE7.tar.gz

Now you have to switch to the directory in which you unpacked Squid:

cd squid-2.7.STABLE7

Now you have to go to the folder where Squid is installed. In our example we have installed it to:

/usr/local/squid/.

./configure –prefix = /usr/local/squid

We compile with the application with the command:

make

The installation is ready to be finished, run the command:

make install

Then you have to create another system user for Squid:

useradd -g nogroup -d /usr/local/squid -c “proxy Squid” -s /bin/bash squid

Now a cache folder should be created:

mkdir /usr/local/squid/var/cache

Configuring Squid

But now we can not yet use the Squid proxy. We have to configure the server, so that it would be possible to modify the configuration settings either via the config file or to make it more comfortable using the web interface of Webmin.

But now we have to download Webmin first:

wget http://prdownloads.sourceforge.net/webadmin/webmin-1.490.tar.gz

Then you have to unzip this archive:

tar xvfz webmin-1.490.tar.gz

Then we need to switch back to the directory where we have extracted Webmin:

cd webmin-1.490

Webmin will be installed by the following command:

./setup.sh

To finish the installation we will be prompted to enter a few parameters, inter alia where we want to save the configuration file of Webmin. We would recommend to save it at:

/etc/webmin

Then you must specify the folder in which Perl is saved. This is usually the following folder:

/usr /bin/perl

Then you can choose the port on which Webmin is run. It is by default port 10000. However, you can set this to any port such as:

29381

Now you have to enter the Administrator Name. We take for example here as username:

Administrator

Then you can enter his desired Fits word. It is important that one is not as easy as password like 123456 or so. Then we are asked if SSL should be used. We would recommend to activate this. Code:

y

Next we are asked whether Webmin is to start at boot or not. The whole routine we confirm again with “Yes”.

Now we can call Webmin via our browser by entering the Server’s IP address and the port of our choice. For example, https://169.178.1.1:29381/

The Squid server is up and running now. Well, now in the web interface you can log in with the username and password easily.

If you want to know how to use VPN/HTTP Proxy effectively

Using VPN/HTTP tools you can protect not only your IP address, but encrypt the entire data traffic. Does it sound good, right?

First of all, to VPN: VPN stands for Virtual Private Network and it is, as the name implies, a private network. Therefore, it is treated as every local network, but it only exists virtually.

For example: If you are, for example, a student and you want to access internal data at your university, you need to log in via VPN only, as for example your professor allows access to certain lecture notes from the IPs of your university only. So you take a so-called VPN client and must authenticate yourself, ie prove that you are an authorized user of the service.

For the most part this data is controlled via username and password. Since we are dealing with sensitive data, the VPN connection is encrypted. Therefore, the data packets are encrypted (SSL) and delivery over the Internet as SSL blocks of information. When you join the VPN, you are recognized as part of the network, and you can access the site of your professor just as every user on this network.

As for the proxies: proxy is really a kind of a messenger, with the messages being send out and back. If you use a proxy to forward all your requests, the frequently accessed data is stored in cache, so that pages are loaded faster.

For example: If you call example.com, your request will be sent to the proxy, which acts as a middleman between you and example.com, sending data back and forth. You know that the proxy is in-between connection, but example.com “thinks” that it communicates with the proxy only.

Therefore, it is important to understand that proxy sites do not guarante anonymity or security, whereas VPN, however, requires an encrypted connection so that the data can not be intercepted and read by the third parties.

While VPNs are considered ideal way for anonymous surfing, they also are said to be too complicated and too expensive. Can you forget it? At least if you want to use a VPN in Firefox, use ZenMate and everything will be fine. There is no traffic limit and the handling is very easy. Just click on the icon, select the desired location and start surfing via VPN.

More than just Proxies

In simple proxy and VPNs scenarios one is actually have to go with a different IP address, so that the tracing is not simple, yet possible. The situation is different in proxy cascade, ie when multiple cascaded proxies are used.

In order to surf the web anonymously, it is a good idea to deploy “multiple cascaded” scenarios. Gate is the best possible example of this type of anonymity surfing. Anyone who wants to use Tor Network can use the Tor Browser Bundle.

But this kind of anonymity has its drawbacks: In practice, the decisive argument against the gate is that the surfing speed falls off dramatically. A compromise can be reached by using Tor Button extension on Firefox. Alternatively, you can install and run Tor Browser.

JonDoFox: Speed for cash

An alternative to the gate technology is based on Firefox extension named JonDoFox. It integrates seamlessly with multiple proxies, thus ensuring anonymity while surfing the Internet. But here is the problem you might face – it is high traffic caused by the anonymization techniques.

Hence, the free version of the service offers very slow connection, limited to a maximum of 50 kilobits per second. It is unlikely you want to surf the net that fast. If only you buy premium access, you get the full speed. Strings attached: Even with highest rate possible (100 € for 6 months) the volume of data is limited to 5 GB per month. Hence, it is up to you budget and needs how to use VPN/HTTP Proxy.

Learn now how proxy firewall works in general, and more

When it comes to question “how proxy firewall works” there are situations, when the activation of security suites represent a temporary workaround for connection problems.

Most firewalls, proxies (or other methods to share the Internet connection) can limit the access to PC ports. Operating according to your configuration can block packets you receive from an unknown source.

There are different techniques and implementation of this process, which will be explained and discussed briefly here.

How proxy firewall works: Firewall techniques (filtering method)

One distinguishes between:

  1. Packet filters
  2. Application level firewalls
  3. Stateful Inspection

For use on a PC directly connected to the Internet there’s also the desktop firewalls.

Packet filter

Packet filter (also port filter) are the simplest version of a firewall, even if in its core it is nothing but a firewall.

Here, the header of each protocol (IP header, ICMP header, TCP header, UDP header) is verified and processed according to the configured filter rules.

Benefits:

    1. good performance, due to the relatively low functionality
    2. simple configuration

Cons:

      1. sophisticated attacks won’t be blocked most likely (eg Fragmentation Attack, in which the TCP header is divided between the first and the second packet)
      2. Exploitation of vulnerabilities (buffer overflow WinNuke)
      3. limited opportunities for logging
      4. no content filtering (eg Active-X, cookies, FTP PUT)
      5. hard to handle large number of filter rules (source of error!)

Application level firewalls (ALF) / proxy server

The Application Level Firewall is switched into the data stream between the client and server, and flow in the direction of the client server. For any TCP service, therefore, a separate program (the so-called proxy) is essential.

Benefits:

      1. proxy works depending on the direction of the data stream
      2. malfunction of the proxy is largely a security breach
      3. IP address remains invisible
      4. good / diverse logging options

Cons:

      1. due to machining on OSI Layer 7 – lower performance
      2. not all firewalls and applications are proxy-friendly

Stateful Inspection

Introduced by Checkpoint filter technology, Stateful Inspection is capable of checking the current status and context information to remember or take them into account when filtering.

Given this, though the firewall operates mainly at Layer 3, or 4 – eg averted the fragmentation attack or manipulated in progress / response are thoroughly detected. Thus, Stateful Inspection Firewalls represent a mishmash between a pure filtering and application level firewalls that combine the best of both worlds.

SPI (Staful Packet Inspection) firewalls are now the group / Technology firewalls that are most widely used and have kept even feed on (cheap) DSL routers.

Structure of a (safe) firewall system

When you are low on your budget, it can suffice, to protect your machine with a single firewall. In this case, the Intranet is still protected, even if the outer firewall should have been compromised. In addition, computers / servers can be placed in this DMZ without the need to provide equal access to the entire internal network.

It is also recommended, that you implement an Intrusion Detection System (IDS) and Intrusion Prevention System (IPS).

Personal firewalls / Desktop Firewalls

Personal firewalls (also known as desktop firewalls), as the name implies, are used on the PC. A related issue is the use of proxy servers, such as Wingate. If you have further questions about this topic, then please post them in our forum.

Useful articles about proxies and anonymity

Surf anonymously, can it make your day? Here is the answer, and it is of course only partly true… just because by the IP one can usually track who was the author of an undesirable action. Insofar this method is suitable only to circumvent barriers or to disguise the actual terminal, and it definitely remains questionable from legal point of view.

In any case, you can hide the current IP with which you are surfing the web, while Proxy settings are automatically recognized by Windows Internet Explorer. Older NAS systems support proxies and Windows 7 allegedly not automatically can switch to correct proxy setting. In the following tutorial we show you how you can disable the proxy service in Windows 7 or enable it, and how to get proxy settings on windows 7 run. Follow these instructions:

  1. Go to the Connections tab, where you click LAN Settings
  2. Enter the address of your proxy server
  3. When you see the Port field, you should enter the number of the port used by proxy server.

If you install 7, so be Service Pack 1 of Windows by default, backups of the overwritten files. These files can take up to 1.5 GB of disk space. If the computer after you install Windows Service Pack 1 is stable and not to a state before their installation would like to return, so you can remove them with the help of Disk Cleanup these backup files. In the following article we will show you step-by-step instruction on how to do this all.

Here are a few points that you can check:

servername instead of http: \\ server name field.

If you enter a UNC (Universal Naming Convention) or local network address for the proxy server, make sure that you instead reverse Schrag characters (\) from Schrag slashes (/) use. Enter z. B. \\ servername instead of // server name field.

It can happen, that in Windows 7 problems occur that make change of the allocation of network locations impossible, and users may experience problems in the definitions of their network locations. “Treat Future networks as public networks. Do not ask again.”

This function is changeable, but there is no change between the sites any more. According to Microsoft, this error may occur on Windows 7, if this function has been activated before. What’s more, various types of malware change the settings of your Internet connection. This makes access to the Internet impossible.

In most cases, a proxy server is created which guides you through the IP address 127.0.0.1. This IP address corresponds to the local host and is your own PC. Should not you be able to connect to the Internet, then please check your connection settings.

Learn how to configure squid proxy server in Centos 6

Squid is a free proxy server that supports the network protocols you may need for a worry free Internet experience, including HTTP, HTTPS, FTP over HTTP, or Gopher. Want to learn how to configure squid proxy server in Centos 6? With ease.

If you want to set up Squid on your Linux box, proceed as follows. For example, your system has two Network Interfaces, these are 10.0.0.1/8 (eth0), which connects to the Internet via a router, and 192.168.10.1/24 (eth1) which connects to the internal network.

The firewall is configured so, that all ports of the interface eth0 are closed, and TCP port 3128 on the eth1 interface is opened for Squid. Please check necessarily whether the name resolution and access to the WWW work on all the future proxy servers.

Since you run a large number of servers (primarily in the development/test domains) and consequently have to manage a certain number of IP addresses, it was clear, that you could consolidate these by installing proxy server.

When it comes to surfing anonymously, you can hide your IP quite well with the Hola Unblocker, and make occasional purchases under circumvent restrictions on certain regions such as the USA or Brazil.

Benefits

If you already run server or virtual server that have a fast enough connection (which should be really easy to set up these days – in particular from 100+ Mbit/s – to be able to even watch movies through a proxy), you will come to the idea, that adding of sufficient traffic permission to the connection speed is an option – in order to have the ability to enjoy the hidden server’s identity.

Here we show you how an anonymous proxy can be placed and how you can authenticate yourself – from anywhere in the world, just via login.

Squid Installation

Setting up Squid proxy means that you have to define necessary iptables rules. Proceed as follows:

# iptables -t nat -A POSTROUTING -o eth1 -j MASQUERADE

# iptables -t nat -A PREROUTING -i eth0 -p tcp –dport 80 -j REDIRECT –to-port 3128

A transparent proxy based on Squid is up and running when you define the LAN subnet (eg 10.10.10.0/24) as a valid client network. Any traffic originating from the other subnet than LAN will be denied access. When you are ready, start Squid service and make sure you have added it to “Start Up Applications”

# service squid start

# chkconfig squid on

And subsequently you will install squid3 and, if needed, for htpasswd the http-utils:

apt-get install squid3

apt-get install http-utils

Now we can register for a user proxy user password in the password file.

htpasswd -bc squid_passwd proxyuser

We need more users, you have to look at the options of htpasswd even more accurate, omit the c. Whether that will b really needed, I do not know – especially since here the number of characters in the password to 8 is limited, which reduces the security.

Now we can secure the squid.conf (z. B. copy or move), I moved it because that file is still extremely long, and can so easily lose track.

Then you code:

nano /etc/squid3/squid.conf

and copy and paste the text below (paste it in Putty with the right mouse button) the Squid config file.

Voila. Now you are ready to rock. But before you launch your Squid Server, make a test run and check the log file thereafter:

# tailf /var/log/squid/access.log

According to the log, the machine with IP 10.10.10.10 has successfully reached for the google.com, and you newly installed server has processed the request as expected, which means that the most basic form of Squid proxy server is now up and running on your Centos 6 PC.

Want to know how to disable proxy settings in Windows 8?

In large networks, the proxy settings often take control over the connection to the Internet. But if there is need for a direct connection to the network, you should turn off the proxy. So, how to disable proxy settings in Windows 8? Here are the answers.

Especially in large enterprise networks, the proxy is used to connect your computer to the Internet provides. All incoming and outgoing requests are running through it. If you want the Internet connection on your PC, using a different connection will only work if you disable the Windows 8 proxy all in one. Typically, you can do this under your browser settings.

Turn off the proxy in Internet Explorer

If you use Internet Explorer to surf the net, you can disable the proxy in the browser settings as follows:

  1. Open the program and go to Internet Options by clicking in the menu under “Extras”.
  2. Then click on the tab for the connections by clicking on “LAN Settings” options for your connection.
  3. Uncheck the box in the following window for the proxy server
  4. Click the “OK” button, the proxy now is turned off on your computer.

Disable the proxy in Firefox

Using the Firefox browser, you can easily disable the proxy in the System settings.

  1. Open the settings in the menu “Edit” and then “Settings”.
  2. The browser options are on front of you. Click in the right part of the settings menu and click “Advanced” then.
  3. From there on you can go to the tab “Network”, it is to find directly in the connections settings.
  4. The first option you can choose here is how your browser connects to the network.
  5. Click the “Settings” button to modify the connection.
  6. Activate the “No Proxy” option in the window to follow, and save the new settings by clicking the “OK” button.

It can happen, that your network requires a number of proxy addresses, that are used by different services. To set different protocols such as HTTP, HTTPS, or FTP run on you machine, click the Advanced button. In the pop up window you can set proxy server addresses individually, for each and every service you need.

When you are finished with this, confirm the changes, and the choices you opted for with OK. After you reboot your system, the new settings are activated or disabled all together. Yes, it is as simple as that.

If you want just to disable proxy, do not dig that deep. The first part of the article where we describehow to disable proxy settings in Windows 8 will suffice. The procedure is almost identical, no matter whether you are running IE, Firefox, Safari or Opera browser.