HOW TO BYPASS INTERNET CENSORSHIP (Edition 2009)

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Author(s): FLOSS Manuals Community Members

Language: English
Pages: 160

Table of Contents......Page 2
Not everyone wants to let the whole world in......Page 9
When is it censorship?......Page 10
What are the risks of using circumvention tools?......Page 11
1. Register......Page 12
4. Mailing List......Page 13
Circumvention Users......Page 14
Am I Being Blocked or Filtered?......Page 15
An important warning......Page 16
Visiting a Web site......Page 18
Why This Matters......Page 20
Why This Matters......Page 21
DNS Filtering......Page 22
Port blocking......Page 23
Why This Matters......Page 24
RSS Aggregators......Page 25
Translators......Page 26
Using Alternative Domain Servers or Names......Page 27
Accessing web pages through e-mail......Page 28
Advantages and Risks......Page 29
What is a Web Proxy?......Page 30
Advantages and Risks......Page 31
How does it work?......Page 32
Advanced options......Page 33
Adding an SSL Exception......Page 35
If you're concerned about privacy......Page 36
Browsing via the Proxy......Page 37
Using psiphon 2......Page 39
SSL-Error with Internet Explorer 7......Page 40
SSL-Error with Firefox 3......Page 41
Create your own account......Page 43
Use the psiphon2 node......Page 45
Invite a user......Page 46
Send invitations......Page 47
Report a blocked website......Page 48
Send messages......Page 49
Read Messages......Page 50
More resources......Page 51
Advertising, viruses and malware......Page 52
The proxy operator can see everything......Page 53
The layered networking model......Page 54
Port Blocking ......Page 55
TCP/IP Content Filtering......Page 56
Denial of Service......Page 57
Cryptography......Page 58
Social Techniques......Page 59
HTTP Proxy settings......Page 60
Microsoft Internet Explorer......Page 64
Pidgin Instant Messaging Client......Page 66
When you're done with the proxy......Page 68
Installing SwitchProxy......Page 69
SwitchProxy configuration......Page 72
Adding a Basic Proxy......Page 73
Standard Proxy Settings......Page 74
Adding a list of proxies for automated switching......Page 75
Using SwitchProxy......Page 77
Disadvantages and Risks......Page 78
With what software is Tor compatible?......Page 79
Advantages and Risks......Page 80
 Installing from a single file......Page 81
 Installing from split files......Page 82
Using Tor Browser......Page 84
If this does not work......Page 85
Alternatives......Page 86
Download Tor IM Browser Bundle......Page 87
Auto-extract the archive......Page 88
Using Tor IM Browser Bundle......Page 89
BookmarkTitle:......Page 90
Exit Tor IM Browser......Page 91
Where do I find bridges?......Page 93
 Turn on bridging and enter bridge information......Page 94
Configuration and Usage......Page 96
Tunneling......Page 100
VPN......Page 101
Disadvantages and Risks......Page 102
Server......Page 103
Advantages and Risks......Page 104
Linux/Unix and MacOS command-line (with OpenSSH)......Page 105
Windows graphical user interface (with PuTTY)......Page 106
Configuring applications to use the proxy......Page 108
Configuring Your Applications......Page 109
Mozilla Firefox......Page 110
Microsoft Internet Explorer......Page 112
Configuring a SOCKS proxy for other applications......Page 114
DNS leaks......Page 116
Installing a Web Proxy......Page 118
Installing PHProxy......Page 119
Installing psiphon......Page 121
Downloading Tor......Page 123
Installing Tor......Page 124
Configuring Tor to be a bridge......Page 125
Sharing your bridge with friends ......Page 127
Risks of operating a Tor node (Tor relay)......Page 128
Data retention laws might regulate proxy operation......Page 129
Organizations that work on documenting, fighting or circumventing Internet restrictions......Page 130
A list of commercial VPN providers......Page 131
PdftkEmptyString......Page 132
bandwidth......Page 133
censorware......Page 134
decryption......Page 135
eavesdropping......Page 136
forum......Page 137
IANA (Internet Assigned Numbers Authority)......Page 138
log file......Page 139
node......Page 140
privacy......Page 141
remailer......Page 142
spam......Page 143
TCP/IP (Transmission Control Protocol over Internet Protocol)......Page 144
VPN (virtual private network)......Page 145
Web proxy......Page 146
License......Page 147
Authors......Page 148
General Public License......Page 156