Bypass Internet yang di Blokir

Tentu kamu akan merasa kesal jika sebuah site kamu cari atau yang kamu suka di blok oleh profidernya, baik kamu yang berinternet di kantor,rumah atau tempat warnet bahkan sekolah. Pada dasarnya internet tersebut diblok karna si admin takut kalo si user membuka situs-situ yang dikategorikan porno (berisikan konten-konten dewasa) atau yang berisi virus, pada hal setiap user belum tentu membuka objek-objek tersebut.

Nah untuk kali ini aku mencoba membagi pengalaman ku untuk mengatasi internet yang diblok tersebut. Trick cukup tergolong simpel koq kumu cuma menggunakan aplikasi-aplikasi yang telah kusediakan listnya, bahkan dari aplikasi ini bisa kamu gunakan untuk berinternet gratis dengan hanya bermodalkan modem dan kartu GSM:


ULTRASURF
  • Protect Internet privacy with anonymous surfing and browsing -- hide IP addresses and locations, clean browsing history, cookies & more ... 
  • Completely transparent data transfer and high level encryption of the content allow you to surf the web with high security. 
  • UltraSurf allows you to overcome the censorship and blockage on the Internet. You can browse any website freely, so as to obtain true information from the free world.

TOONEL

Tunneling technique
Toonel.net exploits a tunneling technique combined with data compression. It runs compressed data frames from toonel client to one of the toonel servers and then these are forwarded to the target host. Reducing the size of resources that are transferred between the server and the client makes more efficient use of the user's bandwidth.

Virtually any TCP traffic
HTTP, E-mail, FTP and other TCP/IP data traffic can be tunneled through Toonel.net thereby having the advantage of been compressed.
In addition to HTTP content compression toonel.net also contracts HTTP negotiation process by compressing http headers. Same advantage is valid for POP3, SMTP and IMAP protocols.

Open source components
We use lossless compression provided by JZlib library which is re-implementation of zlib in pure java.
We also run Squid proxy on our tunnel servers.
These two major components are open source projects and are secure and reliable.
Unlike other Internet boosters toonel.net does not use caching technology. We admit caching conserves the bandwidth but doesn't actually increase throughput. In addition we believe reserving content caching to browser makes toonel.net more secure service.

100% Java
There are number of client solutions which deliver the technique. All solutions are 100% Java code therefore this service can be used on any platform where Java Runtime Environment is installed including Symbian’s Personal Java.

What is it good for?
We recommend our solution for those who are paying a fee based on traffic consumption; have monthly download limit or using narrowband connection.
Please go to the downloads page and chose the client package which mostly suits your platform and just give it a try!

YOUR_FREEDOM
Are you trapped behind a firewall or a filtering web proxy and cannot access some or many web pages or use an application you would like to use or play a game you would like to play? Is your Internet connection being censored and you would like to stick censorship where the sun doesn't shine? Would you prefer to stay anonymous, that your IP address is not logged with every access to someone's web page? Then look no further, you've found the solution!
The Your Freedom services makes accessible what is unaccessible to you, and it hides your network address from those who don't need to know. Just download our client application and install or just run it on your PC; it turns your own PC into an uncensored, anonymous web proxy and an uncensored, anonymous SOCKS proxy that your applications can use, and if that's not enough it can even get you connected to the Internet just as if you were using an unrestricted DSL or cable connection -- just like the firewall suddenly went boom! You can even make your PC accessible from the Internet if you like. Nearly all applications work with Your Freedom, and so far no-one has managed to block our service completely and permanently without blocking your Internet access entirely.
Every day, more than 30,000 people in over 160 countries use our service, some because their government would rather not have them exercise their human rights, some because their school or university feels they are not mature enough to decide for themselves whether playing the odd game interferes with their studies or not, others because they don't want traceable IP addresses in every logfile. There are probably as many good reasons to use Your Freedom as there are restrictive firewalls in the world!
Your first step to an unrestricted Internet access is to register on this web page -- all you need to provide is a contactable email address and a username and a password, nothing else is required. Then download the client application (available for Windows, Mac OS X, Linux and everything else that can run Java apps) and run it -- the wizard will guide you through configuring it properly. Then configure your applications to use your own PC as web or SOCKS proxy or use our transparent OpenVPN mode.

GPASS
  • Free anonymouse web surfing
  • Protect your identity during web surfing
  • Encrypt your internet communication
  • Bypass network censorship

GTunnel
GTunnel protects Internet users' privacy and freedom of speech in these ways:
  • User's IP address is hidden and user's Internet privacy protected. The destination servers see GTunnel server addresses instead.
  • Traffic content is encrypted with industry-strength algorithms between the user's PC and GTunnel servers so the local filtering/censorship systems will not see the content in clear-text format.
  • Blockade of target servers circumvented.

VIDALIA
Tor is free software and an open network that helps you defend against a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security known as traffic analysis.
Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location. Tor works with many of your existing applications, including web browsers, instant messaging clients, remote login, and other applications based on the TCP protocol.
Hundreds of thousands of people around the world use Tor for a wide variety of reasons: journalists and bloggers, human rights workers, law enforcement officers, soldiers, corporations, citizens of repressive regimes, and just ordinary citizens. See the Who Uses Tor? page for examples of typical Tor users. See the overview page for a more detailed explanation of what Tor does, and why this diversity of users is important.
Tor doesn't magically encrypt all of your Internet activities, though. You should understand what Tor does and does not do for you.
Tor's security improves as its user base grows and as more people volunteer to run relays. (It isn't nearly as hard to set up as you might think, and can significantly enhance your own security.) If running a relay isn't for you, we need help with many other aspects of the project, and we need funds to continue making the Tor network faster and easier to use while maintaining good security.
Tor is a registered 501(c)(3) U.S. non-profit whose mission is to allow you to protect your Internet traffic from analysis. Please make a tax-deductible donation.

JonDonym anonymous proxy servers

JAP (called JonDo in the scope of the commercial JonDonym anonymous proxy servers - AN.ON remains free of charge) makes it possible to surf the internet anonymously and unobservably.
Without Anonymization, every computer in the internet communicates using a traceable Address. That means:
  • the website visited,
  • the internet service provider (ISP),
  • and any eavesdropper on the internet connection
can determine which websites the user of a specific computer visits. Even the information which the user calls up can be intercepted and seen if encryption is not used. JAP uses a single static address which is shared by many JAP users. That way neither the visited website, nor an eavesdropper can determine which user visited which website.

How it works

Instead of connecting directly to a webserver, users take a detour, connecting with encryption through several intermediaries, so-called Mixes. JAP uses a predetermined sequence for the mixes. Such a sequence of linked mixes is called a Mix Cascade. Users can choose between different mix cascades.
Since many users use these intermediaries at the same time, the internet connection of any one single user is hidden among the connections of all the other users. No one, not anyone from outside, not any of the other users, not even the provider of the intermediary service can determine which connection belongs to which user. A relationship between a connection and its user could only be determined if all intermediaries worked together to sabotage the anonymization. more...
The intermediaries (mix providers) are generally provided by independent institutions which officially declare, that they do not keep connection log files or exchange such data with other mix providers. JAP shows the identity and number of organisations in each Mix cascade in detail, and verifies this information by cryptographic means. The users are thus able to selectively choose trustable mix cascades.

Outages and maintenance times

We cannot guarantee our services (mixes, infoservice, website, download, etc.) and would like to apologize for any inconvenience caused due to system down time.
  • Because JAP is a research project, it is continuously being further developed. Nevertheless, we attempt to offer a stable, downloadable version at all times, and to keep the service available.
  • At the moment, the web servers and infoservices are run by universities and other public infrastructures and are free of charge for the user (even though a lot of extra data traffic is produced). Unfortunately, power supplies or data networks sometimes fail or are switched off for maintenance. We will try to keep you informed in the 'News' column on this website about planned maintenance but in case of an unforeseen failure in the university network, we are powerless.
  • Mixes and Mix Cascades, respectively, are operated by external organisations, which are independent from the project itself. We may inform the operators about outages, but we are unable to correct Mix failures ourselves, and typically cannot find the cause, either.

0 comments:

Post a Comment