No matter how savvy you think you’re being when downloading torrents there is always someone watching. This site records the IP addresses of torrent users and saves them to a database. It can tell you the name of the files that you have downloaded as well as your location and the dates that the files were downloaded. Check the link to see if you’ve been caught
Searching Google for relevant results can be somewhat of a mixed bag. Try to make the most of your searches with the tips shown in the link below.
If you are at work or school and you are trapped behind a strict firewall then why not create a tunnel to your home computer and route all the traffic through that tunnel giving you unrestricted internet access.
All these directions are based on using a Linux based computer. I’m sure it can be done in Windows too I just haven’t tried it.
This post describes how to ssh to a personal server using authenticated proxy. SSH (Secure Shell) is typically used to log into a remote machine and execute commands, but it also supports tunneling, forwarding TCP ports and X11 connections; it can transfer files using the associated SFTP or SCP protocols.
Normally we use NetCat to ssh outside using proxy server but if its not support proxy user / pass to authenticate by proxy server and then ssh outside. Here we will use a package called connect.c.
connect.c is the simple relaying command to make network connection via SOCKS and https proxy. It is mainly intended to be used as proxy command of OpenSSH. You can make SSH session beyond the firewall with this command.
This can be achieved by other methods too but this works for me.
1) Download connect.c software.
2) Compile connect.c Using GCC
gcc connect.c -o connect
and then copy to directory in your PATH i.e /usr/bin or /usr/local/bin
cp connect /usr/bin
3) Congiure ssh_config
append following line
ProxyCommand /usr/bin/connect -H proxy.yourserver.com:8080 %h %p
4) Export Proxy User / Pass as variable
It is insecure but we have to used it. If your proxy doesnt use user/pass for authenticatio, you can skip this.
Thats it now you can ssh outside without any restriction
An in depth article on setting up SQUID to control web access on your network.
It’s no secret that I love Open Source. I love the freedom it brings to a user, no licence fees, no pirating software and generally there’s a great community behind Open Source projects that help a user to find their feet. YaCy is no different.
I was reading an article about a guy that was trying to move from Google. He was trying to find an Open Source alternative to all the Google products that he used. While the article was very interesting the main project that stood out for me was his alternative to the Google search engine.
YaCy is a completely Open Source search engine that is based on the P2P model. It’s extremely easy to set up and it runs on your local machine (after installation just point your browser to http://localhost:8090)
The installation takes only three minutes. Just download the release, decompress the package and run the start script. On linux you need OpenJDK6. You don’t need to install external databases or a web server, everything is already included in YaCy.
I only installed it last night on my home machine and haven’t had a chance to give it a full workout but when I do I will report my findings back here but on first inspection it is an incredibly powerful and incredibly easy to install personal search engine.
*Edit* Did I mention that it is cross platform and will run on Windows, Linux and OSX?