Thursday, July 10, 2008

My 3 solutions to open orkut if its blocked in your college

This is a bit off topic. I am posting this as some of my friends have stated that they are unable to open some secured sites. This is a refresher for them and who have same kind of probs.

FIRST

The easiest way to bypass internet restrictions that are implemented by your school/work/any other facility is through a proxy.

For example:
www.safeforwork.net
www.hideus.com

Simply put, through a proxy site you will be able to access orkut.com and any other site without being stopped in your tracks


SECOND

Sometimes, you can bypass the firewall without a proxy:
If you have windows os or similar, go to start>run, to open command prompt, and type: ping , and type that ip address into the browser rather than a specific url, and it may work.

Otherwise, a proxy might work.


THIRD

orkut can'nt be opened when using a winproxy or when ip based filters are used but u can cope up with it by following following steps. :

goto : "www.calculatepie.com" and enter the address "www.orkut.com" in the textbox below it

uncheck 'show this form' and 'show url entry form' and 'block ads' check boxes and click "BEGIN BROWSING" button

now even the toughest cases should cope up without problem...
hoping a good time !:-)

The Above are the steps to follaw if its blocked. Keep changing proxies so that you can become extramely unpredictable. The below is the description of what happens or how this actually help you browse those sites in a secure network
What are proxies or how do I protect my anonymity?

From the Latin word "proximus" which means "close". A proxy is actually a server which helps you have anonymity on the Internet. It is like a wall between you and the net. When you use a proxy, the webpage on the other side won't be able to see you, but just the wall (proxy), thus making you anonymous.

When you want to use a proxy all you need is the Internet address of that proxy (an IP) and the port through which you can use it. The advantages of proxies versus other methods are many. First of all almost all programs these days which can connect to the internet, can use proxies, so this makes them a very popular protection method. Another positive element of a proxy can be that it sometimes removes cookies, banners, ads thus making your web surfing much faster.

Of course it can have downsides, like the fact that most public proxies are not very reliable, and that the proxy administrator can spy on your traffic.

If you want to get a proxy address try this page http://www.aliveproxy.com, and look for highly anonymous proxies. The transparent proxies and the anonymous proxies can still give out informations about you.


proxy server

A server that sits between a client application, such as a Web browser, and a real server. It intercepts all requests to the real server to see if it can fulfill the requests itself. If not, it forwards the request to the real server.

Proxy servers have two main purposes:

Improve Performance: Proxy servers can dramatically improve performance for groups of users. This is because it saves the results of all requests for a certain amount of time. Consider the case where both user X and user Y access the World Wide Web through a proxy server. First user X requests a certain Web page, which we'll call Page 1. Sometime later, user Y requests the same page. Instead of forwarding the request to the Web server where Page 1 resides, which can be a time-consuming operation, the proxy server simply returns the Page 1 that it already fetched for user X. Since the proxy server is often on the same network as the user, this is a much faster operation. Real proxy servers support hundreds or thousands of users. The major online services such as America Online, MSN and Yahoo, for example, employ an array of proxy servers.

Filter Requests: Proxy servers can also be used to filter requests. For example, a company might use a proxy server to prevent its employees from accessing a specific set of Web sites.

What is a Proxy Server?

A proxy server is a computer that offers a computer network service to allow clients to make indirect network connections to other network services. A client connects to the proxy server, then requests a connection, file, or other resource available on a different server. The proxy provides the resource either by connecting to the specified server or by serving it from a cache. In some cases, the proxy may alter the client's request or the server's response for various purposes.
Web proxies

A common proxy application is a caching Web proxy. This provides a nearby cache of Web pages and files available on remote Web servers, allowing local network clients to access them more quickly or reliably.

When it receives a request for a Web resource (specified by a URL), a caching proxy looks for the resulting URL in its local cache. If found, it returns the document immediately. Otherwise it fetches it from the remote server, returns it to the requester and saves a copy in the cache. The cache usually uses an expiry algorithm to remove documents from the cache, according to their age, size, and access history. Two simple cache algorithms are Least Recently Used (LRU) and Least Frequently Used (LFU). LRU removes the least-recently used documents, and LFU removes the least-frequently used documents.

Web proxies can also filter the content of Web pages served. Some censorware applications — which attempt to block offensive Web content — are implemented as Web proxies. Other web proxies reformat web pages for a specific purpose or audience; for example, Skweezer reformats web pages for cell phones and PDAs. Network operators can also deploy proxies to intercept computer viruses and other hostile content served from remote Web pages.

A special case of web proxies are "CGI proxies." These are web sites which allow a user to access a site through them. They generally use PHP or CGI to implement the proxying functionality. CGI proxies are frequently used to gain access to web sites blocked by corporate or school proxies. Since they also hide the user's own IP address from the web sites they access through the proxy, they are sometimes also used to gain a degree of anonymity.

You may see references to four different types of proxy servers:

Transparent Proxy - This type of proxy server identifies itself as a proxy server and also makes the original IP address available through the http headers. These are generally used for their ability to cache websites and do not effectively provide any anonymity to those who use them. However, the use of a transparent proxy will get you around simple IP bans. They are transparent in the terms that your IP address is exposed, not transparent in the terms that you do not know that you are using it (your system is not specifically configured to use it.)

Anonymous Proxy - This type of proxy server identifies itself as a proxy server, but does not make the original IP address available. This type of proxy server is detectable, but provides reasonable anonymity for most users.

Distorting Proxy - This type of proxy server identifies itself as a proxy server, but make an incorrect original IP address available through the http headers.

High Anonymity Proxy - This type of proxy server does not identify itself as a proxy server and does not make available the original IP address

No comments: