Circumventor - Xtechnology®Network.Server -
Circumventor
A circumventor is a method of defeating blocking policies implemented using proxy servers. Ironically, most circumventors are also proxy servers, of varying degrees of sophistication, which effectively implement "bypass policies".
A circumventor is a web-based page that takes a site that is blocked and "circumvents" it through to an unblocked web site, allowing the user to view blocked pages. A famous example is elgooG, which allowed users in China to use Google after it had been blocked there. elgooG differs from most circumventors in that it circumvents only one block.
Students are able to access blocked sites (games, chatrooms, messenger, offensive material, internet pornography, social networking, etc.) through a circumventor. As fast as the filtering software blocks circumventors, others spring up. However, in some cases the filter may still intercept traffic to the circumventor, thus the person who manages the filter can still see the sites that are being visited.
Circumventors are also used by people who have been blocked from a web site.
Another use of a circumventor is to allow access to country-specific services, so that Internet users from other countries may also make use of them. An example is country-restricted reproduction of media and webcasting.
The use of circumventors is usually safe with the exception that circumventor sites run by an untrusted third party can be run with hidden intentions, such as collecting personal information, and as a result users are typically advised against running personal data such as credit card numbers or passwords through a circumventor.
An example of one way to circumvent a content-filtering proxy server is by tunnelling through to another proxy server, usually controlled by the user, which has unrestricted access to the internet. This is often acheived by using a VPN type tunnel, such as VPN itself or SSH, through a port left open by the proxy (eg. Port 443 is nearly always left open to allow the use of HTTPS). Through the use of encryption, tunnelling to a remote proxy server, provided the remote proxy server is itself secure, is not only difficult to detect, but also difficult to intercept.
Add by FiQ@Xtechnology®Network.Server
YOUR SERVER STATION
YOUR SERVER STATION
0 comments:
Post a Comment