• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content

Loading…

Flash Player 9 (or above) is needed to view presentations.
We have detected that you do not have it on your computer. To install it, go here.

Like this document? Why not share!

Libre internet bypassing internet censorship

on

  • 4,127 views

The book contains almost everything to circumvent censorship of the internet firewalls. We bring power to your clicks. ...

The book contains almost everything to circumvent censorship of the internet firewalls. We bring power to your clicks.
Every college has that frustrated IT Admin. Beat yours, a must read
We unite. We fight
You make us a strong community.
http://technolawgyx.blogspot.in/
Tips and tricks. All for free. Absolutely!

Statistics

Views

Total Views
4,127
Views on SlideShare
4,088
Embed Views
39

Actions

Likes
0
Downloads
9
Comments
0

2 Embeds 39

http://www.scoop.it 37
http://www.uhdtvmagazine.com 2

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Libre internet   bypassing internet censorship Libre internet bypassing internet censorship Document Transcript

    • http://www.technolawgyx.blogspot.com TABLE OF INDEX ACKNOWLEDGMENTS .............................................................................................1 PREFACE ......................................................................................................................2 CHAPTER 1 – MISCELLANEOUS METHODS.........................................................4 SSL Connection .........................................................................................................4 IP Address Method ....................................................................................................4 SSL + IP Address.......................................................................................................5 GetIP Method.............................................................................................................5 Google Translate Method ..........................................................................................6 Mobile Simulator Method..........................................................................................7 Webpage in email ......................................................................................................7 Screenshot Method.....................................................................................................7 Alternate Domain Method .........................................................................................8 Change DNS Server...................................................................................................8 Coral CDN Method....................................................................................................8 CHAPTER 2 – SETTING UP TOOLS..........................................................................9 Setting Up Proxy........................................................................................................9 Safe Testing Environment........................................................................................10 Changing MAC Address..........................................................................................10 CHAPTER 3 – BROWSER BASED METHODS.......................................................11 Opera Turbo Mode...................................................................................................11 Yandex Turbo Mode ................................................................................................11 Conventional Proxies ...............................................................................................11 TinyProxy ................................................................................................................12 Web Freer.................................................................................................................13 i
    • http://www.technolawgyx.blogspot.com UseJump...................................................................................................................13 xBrowser ..................................................................................................................14 Jondo ........................................................................................................................14 Firefox Extensions ...................................................................................................15 i) AutoProxy................................................................................................................................... 15 ii) Best Proxy Switcher .................................................................................................................. 15 iii) One Click Proxy IP..................................................................................................................... 15 Chrome Extensions ..................................................................................................15 i) Zenmate for Google Chrome ..................................................................................................... 15 ii) Hola ........................................................................................................................................... 16 CHAPTER 4 – CLIENT BASED TOOLS ..................................................................18 Freegate....................................................................................................................18 Tor............................................................................................................................18 Ultrasurf ...................................................................................................................19 Hotspot Shield..........................................................................................................19 Psiphon.....................................................................................................................20 GPass........................................................................................................................20 Your Freedom ..........................................................................................................21 Spotflux....................................................................................................................21 Proxpn ......................................................................................................................22 VPNium ...................................................................................................................22 CyberGhost VPN .....................................................................................................23 Sam Proxy................................................................................................................23 SecurityKiss .............................................................................................................24 Open VPN................................................................................................................24 PD Proxy..................................................................................................................25 AutoHide IP .............................................................................................................25 GTunnel ...................................................................................................................25 ii
    • http://www.technolawgyx.blogspot.com CHAPTER 4 – MAKING YOUR OWN PROXIES ...................................................26 PHProxy...................................................................................................................26 Wordpress Proxy Method ........................................................................................27 Proxy using Google App Engine .............................................................................31 iii
    • http://www.technolawgyx.blogspot.com Text Copyright © 2014 Mohit Yadav All Rights Reserved Cover Design by: Pitamber Yadav iv
    • http://www.technolawgyx.blogspot.com ACKNOWLEDGMENTS This book has been made possible only due to the following people:­ 1) Typical IT administrators who block YouTube to reduce load on network so that their UltraHD (4096 pixels) porn gets buffered faster 2) College Administrators, who do not understand the idea that it’s much more economical to provide unrestricted internet with one IT guy rather than investing in a bunch of fools (known as IT Support) and an expensive UTM (Unified threat management such as Cyberoam, Fortiguard, Sophos, Watchguard etc.) 3) Anakata for creating The Piratebay! Vive La Liberté ! Vive La Internet! 4) My parents for not buying me a dongle when I asked them to do so. 5) All those a**holes who make a living by making UTMs 6) All those lowly creatures often called batch mates or colleagues who constantly pest me to ‘sort their internet’ so they could satisfy their ‘other needs’. As far as the acknowledgments goes I have no one to thank for and I did it all by myself. Note: 1) If you find the language of this book disrespectful, hurtful blah, blah, its Gaurav’s fault. He is the editor of the book. Any fault you may find in the book in all probability is his. 2) If you find the cover disrespectful, hurtful blah, blah it’s not Pitamber’s fault. If you think it’s not appropriate, why don’t you make us a nice cover for free and then we will talk. 1
    • http://www.technolawgyx.blogspot.com PREFACE Let me begin with the usual. This book is for educational or information purposes purpose only, and by reading it any further, you agree that the author cannot be held liable for any misuse of the information provided or any kind of damage caused to any person directly or indirectly. This book’s sole purpose is to make ethical use of Internet and this information can be used in cases say where say your ISP receives an order to block certain videos on YouTube and it blocks the website YouTube altogether (Blocking a website is so much easier than blocking a video, dumbasses!). Or in cases where you may want to visit a website anonymously for the reasons best known to you. In plain words this simply means that if you do anything wrong making use of information given in this book it will be you who will go to jail and any person concerned with this book in whatsoever manner CANNOT be held liable. In case you disagree please don’t proceed ahead and delete this book right now. This book is being provided completely free of cost and in case you bought it you were just duped. This book has been written in overly simplistic manner and in case you still face any such difficulty in using it. You should probably not read it. However irrespective whether you get anything in your head or not, don’t you dare contact me with emails saying “How to do this and how to do that and blah blah”. Remember that I do have a life. Problem? Google it! Or wait. We have more options for you … For the reader’s convenience, this book makes extensive use of hyperlinks. They are meant to be used  with time, the hyperlink may become dead, though I will try to update them as and when I get time, but if I don’t, you can always check it out yourself. Spoonfeeding is bad. I have intentionally ignored certain tools due to them being paid and expensive. In case after going through the book you have suggestions, feedback, do feel free to contact me at the blog here but I repeat don’t you dare shoot a mail on how to do stuff. If you don’t get it after reading the book, chances are high you I won’t be able to explain it to you anyway. Who said I will be! 2
    • http://www.technolawgyx.blogspot.com In case you want to be an expert on how to Google stuff don’t forget to read our article ‘Power Searching with Google’. After going through the book please do fill up this survey form here. This will help me provide you with better content in the next edition. 3
    • http://www.technolawgyx.blogspot.com CHAPTER 1 – MISCELLANEOUS METHODS So let’s begin with easy to do methods. In this chapter we will only use method which requires little or no external aid. So there you go SSL Connection – Often you will find this case, the website you are trying to open is not opening up. Sometimes the biggest problems have the simplest solutions. In the address bar of your browser type ‘https://’ (without quotes) before the URL. In case you get a warning click on proceed anyway. See if that works. Example: In case it does use this userscript to automatically redirect to SSL connection. To know how to use scripts and more such stuff read our article ‘Setting Up Your Browser’. IP Address Method – In this method we will try to access the website by its IP address rather than its domain name. Windows user, go to run and type ‘cmd’ without quotes and press enter. Mac users open your terminal. In the terminal/command box type ‘ping’ without quotes and then name of your website without ‘www.’ And press enter. E.g.: Now after the text ‘Reply from’ in the above image the number that comes is your IP address. So IP address of saavn.com is 54.251.246.179 and if you will type this IP address in address bar of your browser and press enter, the site may open, depending on the way the website is being blocked. 4
    • http://www.technolawgyx.blogspot.com SSL + IP Address - In this method see if you could access the website by inserting ‘https://’ (without quotes) in front of website’s IP address. Press continue or select proceed anyway if you get any warning. E.g.: Don’t be bothered with the red line or the cross as long as it works its fine. GetIP Method – I have made a small python script which may make the life a bit easier. Download the zip file from here. Extract the contents of the file. Run the getip.exe file. Enter the url of the desired website. Don’t write ‘http://’ before the name of the website; using ‘www.’ is optional. Press enter and then press enter one more time to exit the program. Now where you have extracted the content of zip file you will find a newly created file ‘link.txt’ Open it and you will find a link which will be ‘http://’ and then followed by a number. Use this link if it doesn’t work try using ‘https://’link. Do not open the link.txt file till you exit the program. Link.txt file with its content: 5
    • http://www.technolawgyx.blogspot.com Google Translate Method – This method is pretty easy to go. Go to Google translate. In the box where you enter text to be translated select any language other than English and in the box where you get the translated text select English. Then enter the URL of the website you intend to visit where you type the text to be translated and press Translate. E.g.: This is the end result. 6
    • http://www.technolawgyx.blogspot.com Mobile Simulator Method – Go to any mobile simulator like this and in its browser type the URL address of the website you intend to visit. E.g.: Webpage in email – Running behind that timeline, and the webpage you want access to is blocked? Go to emailtheweb and enter the URL and you will get the webpage in your mail. Since the webpage loses its formatting in the email the email also gives you an option to view the page as it is. You must have a Gmail account to use this website. E.g.: Screenshot Method – Go to URL2PNG and enter the URL address of the website. You will get the screenshot of the entire webpage in its all glory. To extract text 7
    • http://www.technolawgyx.blogspot.com automatically out of this image rather than typing it manually. Read our series on ‘Art of Copying and Pasting’ and refer to OCR part. E.g.: Alternate Domain Method – There might be times when the real domain is blocked but its alternate versions such as mobile version of the website are not. So no harm in giving it a shot. For example Facebook could be accessed by using https://m.facebook.com/, https://touch.facebook.com/ and https://blog.facebook.com/. Similarly Twitter could be used by this link https://mobile.twitter.com. Torrentz could be accessed by http://www.torrentz.li. Don’t forget to try SSL. Change DNS Server – Well your IT administrator may be using simple filtering tools so changing the DNS server might do the trick for you. Google Public DNS nameservers (8.8.8.8 and 8.8.4.4) are good enough. To configure them see the guide here. Using this guide you could also try changing the nameservers to Open DNS (208.67.222.222 and 208.67.220.220). In order to determine the fastest DNS nameserver use this easy to use software. Coral CDN Method - Just append ‘.nyud.net’ without quotes to any website. Say for example you want to visit cnn.com then the new url becomes ‘cnn.com.nyud.net’ (without quotes). 8
    • http://www.technolawgyx.blogspot.com CHAPTER 2 – SETTING UP TOOLS Setting Up Proxy - This is an optional chapter and only helps you in setting up your tools which will be used ahead in other chapters. This chapter is useful if you need to connect to some sort of proxy (Such as 127.0.0.1:4444 or proxy.abc.com with port 8080) before connecting it to the internet. Now most of the software this book uses have some sort of option to configure proxy settings. Something like this But if they don’t know worries. We need to use a Proxifier then. A proxifier is a software program which can make other programs pass through a proxy server 1. So my personal favourite is Proxifier but unfortunately it’s paid. So use Freecap as it’s free. Since I haven’t used it myself I am willing to assume it must be pretty straightforward. Anyway it’s your headache now to learn how to configure it to set up your proxy settings with other programs. Go to Google and try to search how to do it. 1 http://en.wikipedia.org/wiki/Comparison_of_proxifiers 9
    • http://www.technolawgyx.blogspot.com You still didn’t get it did you? Ok here’s a guide to use Freecap with Your Freedom. Using this guide I hope you could configure Freecap to be used with other software which do not have an inbuilt proxy setting option. Safe Testing Environment – This book will often ask you to install software. The author has most used most of the software recommended in the book but not all. As a result, it is recommended that you test the software in a safe manner so that no harm is made to your computer. Precaution can save you from a lot many things, including AIDS. In order to do so that you may either set up a virtual machine. Here is an excellent guide by Lifehacker which tells you how to do so. The other method is to use Sandboxie. Here are the two guides on how to use Sandboxie and what it is all about. • Guide 1 (Official Guide) • Guide 2 Changing MAC Address – If you want even more privacy and anonymity you might also want to change your MAC address. MAC address is a unique identifier assigned to your LAN card and Wi-Fi Adapter. Technitium MAC address changer is free, easy to use software for the job. Download it from here. Don’t change your MAC address if your internet connectivity is restricted to your MAC address. 10
    • http://www.technolawgyx.blogspot.com CHAPTER 3 – BROWSER BASED METHODS Opera Turbo Mode – Yes, Opera has an inbuilt proxy. All you need to do is enable the Opera Turbo mode and you are good to go. Opera Turbo Mode option is available at the bottom left corner of the browser. The blue icon in the above image looks like this when zoomed upon. Yandex Turbo Mode – Similar to Opera, Yandex also features Turbo Mode. Even if Opera turbo mode doesn’t work then also there is no harm in trying out Yandex. Download Yandex from here. Conventional Proxies – Old is gold. Nothing beats the good old conventional proxies. You open a link in it you type the URL address and voila it runs. The problem is that most of them are blocked by default and don’t work. So here’s a list of some of the lesser known proxies: 11
    • http://www.technolawgyx.blogspot.com • http://mirrorrr.appspot.com/ • http://air-proxy.us/ • https://www.kproxy.com/ • http://www.ipcamouflage.com/ • http://www.forwardproxy.org/ • www.youtubeproxy.pk/ • www.youtubeproxyfree.com/ • http://mousematrix.com/ • http://www.peacefire.org/circumventor/ (Proxy Lists) • http://www.azproxies.com/proxy-lists/zelune-web-proxies.html (Proxy Lists) • https://groups.google.com/forum/#!forum/zelune (Proxy Lists) • https://launchwebs.org/ (Proxy Lists) Sharing is caring but enough usage of these will ensure that they get blocked too! Don’t worry, we will come up with more. TinyProxy - It is a light-weight HTTP/HTTPS proxy daemon for UNIX based operating systems. Instructions to run it on Ubuntu are available here. There seems to be a Windows version too. I am not sure if Windows’s version is the same TinyProxy ported to Windows or something completely different. No harm in trying as long as you try it out in Sandboxie or in a virtual machine. Here is the link for the windows version. 12
    • http://www.technolawgyx.blogspot.com Web Freer - It is a 2048 bit encrypted https web browser providing absolute online security and privacy. Additionally, it also opens blocked sites. It is built with the open-source Chromium models on which Google Chrome is built. It is almost as fast as Google Chrome and layout is also almost identical. Download it via CNET from here. UseJump – It is a WebKit (the rendering engine used by Chrome) based browser. It was designed to stand against censorship and content filtering. It uses P2P (Peer to Peer the protocol used by torrent clients such as uTorrent) and encryption technologies based on open standards. Download it via softpedia from here. 13
    • http://www.technolawgyx.blogspot.com xBrowser – It is a web browser designed to run on both the Tor and XeroBank anonymity networks. It is a portable browser and could be used on a pen drive as well as on a portable hard disk. XBrowser upon exit clears all the data that was created during surfing. The surfing in this browser is bit slower than normal but secure and anonymous. Download it via CNET or Softpedia. Jondo – It is an IP changer proxy tool. It can be used for anonymous surfing, anonymous e-mail, chats and other purposes. It is open source and can be downloaded for free. The best way to use Jondo is by using it with Firefox. Here is an interactive guide on how to use Jondo with Firefox. 14
    • http://www.technolawgyx.blogspot.com Firefox Extensions – Following are some useful Firefox extensions which might do the job:­ i) AutoProxy – With this addon user can visit a website via proxy by adding it's domain to AutoProxy's preference. After that, whenever user is surfing, specified websites they will be automatically connected through proxy while leaving others connect directly. Available here. ii) Best Proxy Switcher – It lets user set their own proxy servers or let the addon download most recently checked list from developer’s web site automatically for free. Available here. iii) One Click Proxy IP – It let’s user activate the addon with one click and then lets user browse the web with random HTTP or Socks proxy from several countries in the world. It is ad free and does not require restart of Firefox upon installation. Available here. Chrome Extensions - Following are some useful Google Chrome extensions which might do the job:­ i) Zenmate for Google Chrome – It is a simple to use one click VPN solution. Its fast, it’s secure and best of all its free. It offers IP address from different countries such as Germany, US and UK. Available here. 15
    • http://www.technolawgyx.blogspot.com ii) Hola – It is another no nonsense one click fast VPN proxy service. It’s fast and durable. It started as an addon which allowed users outside US to access Hulu but now works on every website. Available Here. 16
    • http://www.technolawgyx.blogspot.com . 17
    • http://www.technolawgyx.blogspot.com CHAPTER 4 – CLIENT BASED TOOLS Freegate – Freegate is click to run software which bypasses Internet firewalls by using proprietary P2P-like proxy network system. It uses a unique encryption and compression algorithm in its newer builds which further enhance its capabilities. It can be downloaded from here or here. Tor - Tor (The Onion Router) anonymizes internet traffic through “onion routing”. It is the best tool if you want anonymity and is actively used by the hacktivist group ‘Anonymous’. Through Tor you could also access onion sites and the hidden web such as the famous ‘hidden wiki’ page which cannot be accessed without using Tor traffic. Best way to download and use Tor is by downloading the Tor Browser Bundle from here. Author also recommends that in case you are using Tor at a place where your internet is being monitored to check if you are using Tor you must use bridges. To know more about bridges and how to use them read more over here. 18
    • http://www.technolawgyx.blogspot.com Ultrasurf – Ultrasurf is also one more click to run software. It is completely free and bypasses censorship and firewalls using an HTTP proxy. It employs encryption protocols for privacy. On a personal note, author has found Freegate to be bit faster than Ultrasurf in Delhi NCR area of India and Lucknow, Uttar Pradesh, India. However, the speed may vary in different places depending upon the nearest server. Also, the difference in speed between Ultrasurf and Freegate is marginal and both the software are much faster than Tor. It could be downloaded from here and here. Hotspot Shield – It is a VPN software which has both free and paid versions. The free version gives a generous limit of 10 GB which is way more than required for casual surfing and could easily accommodate few downloads too. It is very easy to setup but prior to running the software you need to create a free account at the official site. It encrypts your entire traffic and is not limited to your browser. The only con is that it bombards user with ads but considering it’s a free software it shouldn’t be an issue. 19
    • http://www.technolawgyx.blogspot.com Psiphon – It is another click to run circumvention system developed by Psiphon Inc. The best thing about Psiphon is that it uses all three methods VPN, SSH and HTTP Proxy to bypass firewall and thereby maximizing user’s chances of bypassing censorship. It is also available for Mac OS X apart from windows. It could be downloaded from here. GPass – It is yet another click to run software providing for free anonymous web surfing. It protects user’s identity during web surfing and encrypts internet communications. It is pretty fast for a proxy tunnelling software. Once installed to launch an application using the proxy simply double-click the app from inside the GPass interface. Download it from here or here. 20
    • http://www.technolawgyx.blogspot.com Your Freedom – Your Freedom is another tunnelling solution for Windows, Mac OSX and Linux. It could be used to bypass proxies and access the Internet anonymously. It is completely free but in order to use it you must create an account at its official website. After creating the account, download the client software and log in using your account credentials. Then set up any proxy if your internet connection use one and search for server. After that put following proxy setting in your browser. (IP:127.0.0.1, Port:8080) In case you don’t know how to change proxy in your browser read it from here. Spotflux – It is another free encrypted VPN client. It is quite easy to install, but beware, as it tries to install third party software during installation so skip them. Running it is as easy as clicking enable and disable. Download it from here or here. 21
    • http://www.technolawgyx.blogspot.com Proxpn – It is free VPN software. It provides a maximum bandwidth of 300kbps in the free account. It is quite easy to configure and you must create an online account to use it. One of its disadvantages is that it changes your browser’s home page address to its website and doesn’t let you change it back to something else. However that being said it’s free and pretty easy to use. Download it from here. VPNium – It is another free VPN software and best part about it is that it doesn’t require registration. The normal mode lets you take IP address from Germany but if you post a comment on VPNium’s Facebook page about the software they activate the ‘Boooost’ mode for free which allows you to have IP address from countries other than Germany. It works completely from your tray icon. Download it from here. 22
    • http://www.technolawgyx.blogspot.com CyberGhost VPN – It is another free VPN service. Post installation it could be directly used without creating an account. The connection takes some time to establish but it is pretty fast once established. Free account’s downside is ads and restriction of three hours per session. To sum it up its free, fast and secure and definitely worth your time. Download it from here. Sam Proxy – This is an open source project hosted on sourceforge. Author has used it personally and it works just fine. It’s easy to use and all it needs a double click on the executable file (exe). Download it from here. 23
    • http://www.technolawgyx.blogspot.com SecurityKiss – SecurityKiss is another free to use VPN software. They use 128-bit Blowfish algorithm for session encryption. The free version allows 300MB data transfer every day which is more than sufficient for casual surfing though downloading may be an issue. For a VPN software it takes little time to establish the connection to its server. Download it from here. Open VPN – It is an open source VPN and it’s free. A free account needs to be created post installation to access the facility. Mac OS X Version is also available. Download it from here. 24
    • http://www.technolawgyx.blogspot.com PD Proxy – Another free proxy tunnelling software. You need to create an account first before using the software. User interface is intuitive and using the software will be a cakewalk for you. After running the software when it asks permission to install some drivers allow that. Download it from here. AutoHide IP – Another easy to use IP changing software which bypass censorship and help user surf internet safely and anonymously. The trial limitation is that it only allows US IP addresses while the full version offers IP address from several countries. Also it has a nifty feature that the program can be set to automatically change the IP address after a certain amount of time which is quite handy. Download it from here. GTunnel – Another click to run proxy tunnelling software. It’s completely free, fast, secure and reliable. It uses 128-bit encryption. It could be downloaded from here. 25
    • http://www.technolawgyx.blogspot.com CHAPTER 4 – MAKING YOUR OWN PROXIES Well you could use plethora of software and they will be eventually blocked but what if we could make our own proxies. Won’t that be cool because every time your proxy gets blocked you could make one more. So before we roll, you need to know a few basic things:­ a) Domain – It is the name of website. Simple so Google’s domain is www.google.com. If you want, you could get a free co.nr domain from here. b) Hosting – So websites don’t work from thin air they are kept on server from where you can access them. So in order to have your own you either buy a hosting plan or free hosting. Few free web host are 000webhost, freewebhosting, 5gbfree, and host-ed. So in order to host a proxy online you need a domain and hosting. They both may be paid or free. Free hosting is likely to be slower than paid but then who cares as long it’s free. For all the below mentioned tutorials I am using 000webhost you are free to use whatever host you like. PHProxy – 1) So first of all go and register account at http://www.000webhost.com/. 2) Now login in your account from here. 3) After login, got to the file manager. 4) There you will see a file manager like one below. Click on upload. 26
    • http://www.technolawgyx.blogspot.com 5) Now download this zip file from here. 6) Now click the choose file button in the Archives section (Panel on left) and upload the zip file you just downloaded. Then press the green tick button. 7) Now once everything is over go to the domain of your website and you will see something like this. All done enjoy your newly made proxy. Wordpress Proxy Method – In this method I will tell you how to make a wordpress based proxy. 1) Follow step 1 & 2 of PHProxy method. 2) After login, go to MySQL. 27
    • http://www.technolawgyx.blogspot.com 3) Fill in the information. 4) Click on Create Database. 5) Now save this information we will use it soon. 6) Now download the Wordpress setup from here. 7) Unzip the Wordpress zip file and open the “wp-config-sample.php” in notepad. 8) Now change ‘database_name_here’ to name of your database, ‘username_here’ to the username you just used and ‘password_here’ to password of your database. 9) Now download WinSCP from here and install it with the default options. If somebody tells you that Filezilla is better, ignore them. 10) Now open the WinSCP client. 11) Go to sessions section. 28
    • http://www.technolawgyx.blogspot.com 12) Now fill in the information required and set your protocol to FTP with no ‘no encryption’ and change port to 21. 13) In case you don’t know what to fill in host name and user name. Go to your cPanel and click on view details. In the FTP section of ‘view details’ you will get all the details except password which you should know yourself. 14) Now press login. 29
    • http://www.technolawgyx.blogspot.com 15) If you have filled all the blanks correctly a screen like this will appear (Image taken from here) except that you will see a bunch of php and other random files on right hand side in ‘public_html’ folder. 16) Delete all the files on right hand side except for ‘.htaccess’ file. I repeat, don’t delete the ‘.htaccess’ file. 17) Now on the left hand side scroll to the folder where you have all the wordpress files. Now copy paste all the files and folders in the ‘public_html’ folder just like the guy has done in the above diagram. 18) Now go to your website and wordpress will ask you to set a password. Do it. 19) Now after login, click on plugins and then click on ‘add new’. 20) Now search for ‘Repress’ and click on install and then activate the plugin. 21) Now go to settings where you will find a new entry ‘repress’ click on it. 30
    • http://www.technolawgyx.blogspot.com 22) Now add any domain say torrentz.com in the ‘adddomain name’ field and click on uncensor. 23) Now say your website is xyz.freeweb.com then you could access torrentz.com by using the URL http://xyz.freeweb.com/proxy/torrentz.com 24) That’s all folks it’s done. Proxy using Google App Engine – Yes, you could create a proxy using the Google App Engine. The best part is that you get fast Google hosting for free and downside is this proxy doesn’t support videos and sites which uses login. Here is a quick guide to do so. The instructions are also available in form of a video on YouTube. 31