Proxy megaupload

Need help, my son wants a Minecraft multiplayer party with his friends during this quarantine

2020.03.19 02:36 campio_s_a Need help, my son wants a Minecraft multiplayer party with his friends during this quarantine

Hoping you guys can help. My son wants to play with his friends, I think there are 8 total that want to play. Everyone has different devices, we have computer and PS4. I assume bedrock edition is the way to go for cross play. Everything is installed and I linked my Microsoft account to the PS4 bedrock edition. Problem is there are no servers.
So can he join someone else playing? Is it possible to have a group of 8 playing this way or is it limited to an adhoc kind of setup where only two people can play together?
I could host a server on the computer, or I'm not opposed to paying for realms of another hosting service, but could the PS4 join that? I think I've seen some super shady looking YouTube videos about setting up a proxy, but I'm not stupid enough to run a random exe from megaupload or whatever.
Is there a legit way to get them all together (ideally with my son using the PS4, though PC bedrock is an option too)?
submitted by campio_s_a to Minecraft [link] [comments]


2019.05.22 04:22 thanhbinh360 Tổng hợp 9 ứng dụng giúp tăng tốc Download miễn phí tốt nhất

Tổng hợp 9 ứng dụng giúp tăng tốc Download miễn phí tốt nhất
Với sự phát triển vô cùng mạnh mẽ của Internet như hiện nay thì không có gì là không được chia sẻ qua mạng internet. Thế nhưng, đôi khi tốc độ mạng quá chậm khiến người dùng cảm thấy khó chịu khi phải tải file hay video về mà tốc độ lại quá chậm. Đó chính là lúc bạn cần dùng tới một giải pháp hỗ trợ tăng tốc độ download mạnh mẽ. Có rất nhiều ứng dụng giúp tăng tốc Download hỗ trợ người dùng máy tính tải file, video siêu tốc như IDM, µTorrent, EagleGet, FlashGet,…
>>> Top 11 ứng dụng dữ liệu trình duyệt Web phổ biến nhất hiện nay
>>> Top 11 ứng dụng Addon hỗ trợ – Extension phổ biến nhất
Dưới đây là Top 9 ứng dụng Tăng tốc Download được người dùng máy tính tải nhiều nhất

https://preview.redd.it/fnhajvhjaoz21.jpg?width=663&format=pjpg&auto=webp&s=6512197cd56a76c764d02fef23b50d1fda7dcdbb

1. Ứng dụng DAP – Download Accelerator Plus

Download Accelerator Plus là trình quản lý download dữ liệu hàng đầu thế giới, cho phép người dùng máy tính tải nhanh hơn tới 300% với độ ổn định cao, đồng thời hỗ trợ resume và sửa lỗi.
📷

Những tính năng chính của Download Accelerator Plus

– Tốc độ tải về nhanh hơn 300%
– Tăng tốc độ hoạt động link mirror
– Có thể tạm dừng hoặc tiếp tục các quá trình tải về do bị hỏng hoặc tạm ngừng
– Tải và chuyển đổi video chỉ với một cú nhấp chuột
– Xem trước nội dung video trước khi quyết định tải về
– Kiểm tra liên kết trước khi tải về
– Đảm bảo tải từ các nguồn an toàn

Link Download Accelerator Plus chính thức:

http://taimienphi.vn/download-download-accelerator-plus-1666

2. Ứng dụng GetGo Download Manager

GetGo Download Manager là một ứng dụng giúp tăng tốc Download hoàn toàn miễn phí và tích hợp rất nhiều tính năng có cả tải video trên web. Nó có thể giúp tăng tốc độ download lên gấp 5 lần đồng thời hỗ trợ khôi phục và lên lịch trình tải.
📷

Một số tính năng đáng chú ý của GetGo Download Manager

– Phát hiện và tải video ngay trên web
– Hỗ trợ công cụ tải đa luồng
– Tạm dừng và khôi phục lại các bản tải về bị hỏng và tạm dừng trước đó
– Hỗ trợ công cụ lên lịch trình tải linh hoạt, dễ dàng tải hàng loạt file

Link Download GetGo Download Manager chính thức

https://download.com.vn/download/getgo-download-manage10515

3. Phần mềm Download Accelerator Manager

Download Accelerator Manager là một ứng dụng quản lý và hỗ trợ download lý tưởng cho người dùng máy tính. Nó mang đến khả năng tải video và audio từ các website chia sẻ trực tuyến với tốc độ nhanh chóng.
📷

Những tính năng nổi bật của Download Accelerator Manager

– Giao diện trực quan và dễ sử dụng
– Hỗ trợ lên lịch trình tải về
– Hỗ trợ một loạt các thiết lập tùy chỉnh
– Hỗ trợ khả năng tự động tắt máy tính khi hoàn tất quá trình download
– Hỗ trợ làm phong phú bộ sưu tập file media với công cụ MediaGrabber

Link Download Accelerator Manager chính thức

https://download.com.vn/download-accelerator-managedownload

4. Ứng dụng Internet Download Accelerator

Internet Download Accelerator là một công cụ hữu ích hỗ trợ quản lý và tăng tốc độ tải file cho người sử dụng máy tính. Ứng dụng giúp tăng tốc Download này giúp người dùng tăng tốc độ, khôi phục lại các bản tải về bị gián đoạn và quản lý các file đã được tải về.
📷

Link Download chính thức Internet Download Accelerator

https://download.com.vn/internet-download-acceleratodownload

5. Ứng dụng Teleport Pro – Hỗ trợ download 10 chủ đề cùng lúc

Teleport Pro là phần mềm tăng tốc download giúp người dùng máy tính lấy dữ liệu từ internet với tốc độ cao. Hỗ trợ download đồng thời 10 chủ đề cùng lúc, bảo vệ website bằng mật khẩu, bộ lọc tập tin theo kích thước và định dạng và hỗ trợ tìm kiếm theo từ khóa.
📷

Một số tính năng chính của ứng dụng Teleport Pro

– Có thể Download tất cả hoặc một phần trang web về máy, cho phép người dùng duyệt web trực tiếp từ ổ cứng.
– Nhân bản một trang web chính xác với cấu trúc thư mục và các tập tin yêu cầu.
– Hỗ trợ tìm kiếm file theo định dạng và kích thước.
– Tải về 1 danh sách các tập tin đã có đường dẫn.
– Khám phá nhiều website liên kết với trang chính.
– Tìm kiếm trang web theo từ khóa.
– Tạo danh sách tất cả các trang và những tập tin trên một trang web.

Link Download Teleport Pro chính thức

https://download.com.vn/teleport-pro/download

6. Ứng dụng Bywifi – Hỗ trợ download, chuyển mã và tăng tốc video

ByWiFi Video Downloader là một ứng dụng giúp tăng tốc Download miễn phí cho phép người dùng tải về, chuyển mã và tăng tốc video từ các trang web xem phim, video trực tuyến như YouTube, Dailymotion, Metacafe, MySpace, …
📷

Tính năng chính của Bywifi:

– Tăng tốc P2P Video Streaming cao hơn từ 3-5 lần tốc độ thông thường
– Tự động phát hiện và tải Video về máy miễn phí
– Chuyển mã Video sang nhiều định dạng khác nhau
– Tiếp tục phát Video Tự động khi bạn mở lại trình duyệt Web
– Tìm kiếm Hot Video

Link Download Bywifi chính thức

7. Ứng dụng Internet Download Manager

Internet Download Manager (IDM) là một phần mềm giúp tăng tốc độ download hiệu quả lên đến 5 lần. Ứng dụng giúp tăng tốc Download này hỗ trợ tải mọi loại file tự động trên các trình duyệt phổ biến như Firefox, Chrome, IE,…
📷

Một số tính năng chính của Internet Download Manager

– Hỗ trợ trên mọi ứng dụng và trình duyệt phổ biến nhất
– Download chỉ với một cú nhấp chuột
Tốc độ download lên đến 5 lần
– Tiếp tục download các dữ liệu chưa hoàn thành do trong quá trình tải bị mất mạng hoặc mất điện
– Tự động kiểm tra Antivirus khi tải dữ liệu về
– Lên lịch tải tự động theo thời gian đặt sẵn
– Hỗ trợ nhiều loại máy chủ proxy
– Hỗ trợ Download tất cả dạng file
– Hỗ trợ đa ngôn ngữ

Link Download Internet Download Manager chính thức

https://download.com.vn/idm/download

8. Ứng dụng µTorrent (uTorrent)

µTorrent hay còn gọi là BitTorrent Client, đây là ứng dụng hỗ trợ download các tập tin dạng torrent được chia sẻ trên mạng Internet một cách nhanh chóng và hiệu quả. Sở hữu cơ chế P2P (Peer-to-peer) nên tốc độ download Torrent được tăng lên gấp nhiều, hơn nữa µTorrent có kích thước nhỏ gọn do sử dụng phương thức nén tập tin thực thi.
📷

Nhữn tính năng chính của μTorrent

– Có thể truy cập ở bất cứ nơi nào
– Tốc độ Download nhanh chóng gấp nhiều lần so với thông thường
– Cơ chế hoạt động thông minh
– Áp dụng công nghệ đột phá
– Hỗ trợ Plug-n-Play

Link Download μTorrent chính thức

https://download.com.vn/torrent/download

9. Ứng dụng FlashGet

FlashGet là ứng dụng giúp tăng tốc Download nhờ tích hợp công nghệ download đa luồng với nhiều giao thức khác nhau. FlashGet cho phép người dùng có thể tải về bất kỳ file nào từ dịch vụ chia sẻ file trực tuyến của Rapidshare, Megaupload hay Mediafile.
📷

Các tính năng chính của FlashGet

– Tối ưu hóa tài nguyên của hệ thống
– Tự động quét virus
– Tăng tốc độ tải và độ ổn định
– Hỗ trợ HTTP, FTP, BT, eMule và nhiều giao thức khác nhau
– Tính năng quản lý file mạnh mẽ

Link Download FlashGet chính thức

http://taimienphi.vn/download-flashget-1665
Trên đây là top 9 ứng dụng giúp tăng tốc Download được người dùng tải nhiều nhất, hy vọng với những chia sẻ trên đây sẽ giúp các bạn có một ứng dụng hỗ trợ download miễn phí tốt nhất!
XEM THÊM:
>>> 1001 ứng dụng văn phòng, tiện ích máy tính ai cũng cần
>>> Top 11 ứng dụng mạng xã hội phổ biến nhất hiện nay
submitted by thanhbinh360 to u/thanhbinh360 [link] [comments]


2016.04.10 00:08 SpacethonyJamtano Thoughts on OVH and hosting your own Nostalrius clone without getting shut down by Blizzard

I realise that OVH servers are excellent value for money, but from my personal experience and what happened to Nostalrius, they are simply not suitable for hosting WoW private servers or any other service that falls inside a "grey" legal area. OVH is notorious for shutting down servers without notice when receiving DMCA/cease and desist notices, sometimes even fraudulent ones. It's not entirely their fault. Since their servers are cheap, they don't have the resources required to deal with legal disputes involving their customers. They're often not interested in hearing your side of the story (if it's a DMCA request, you can file a counter-notice.) They have shut down my servers without notice and only gave me limited access (booted into recovery with drives mounted) for 48 hours to download my data. My server was shut down because I used it as an FTP server hosting files for people on my university's network (helping them get around torrent block). It was only accessible from within the university network. Similar things have happened to my friends for various other reasons.
If you're planning to host the "next Nostalrius", there are some steps you can follow to make the server almost impossible to shut down by Blizzard. These are some of the same methods used by The Pirate Bay to stay online for as long as it did: (This gets technical and assumes knowledge of how the internet works):
I hope the Nostalrius database contains enough information that people can recover their accounts on whatever server they want.
submitted by SpacethonyJamtano to NostalriusBegins [link] [comments]


2015.04.15 19:23 rojimbo0 DRM in the gaming industry - a look at some research

This is quite a complicated and divisive issue. I researched all relevant peer-review material I could and wrote this short literature review about the findings. Note, originally this has appeared on some forums, like Steam's, but this updated version exists here originally and is my (lazy) work.
In brief, DRM that is ineffective at deterring copying is detrimental to the consumer, the firm and society as a whole. DRM that is effective at deterring copying is beneficial to the gameconsumer as they experience increased product quality, innovation and social welfare.
The 2005 GSP Report commissioned by the Business Software Alliance estimates that 35% of software is copied. Software copying rates are as high as 92% in Vietnam and 90% in China. In the United States, copying rates are estimated to be 21%. The study concludes that software copying is one of the industry’s worst problems. The study did not include the positive network effects of copying, which Hui and Png (2003) did and showed that industry estimates of lost profits because of copying more than doubled the actual losses in such a case. Although since 2011 the BSA has not included economic loss figures, rather a commercial pirated value figure, I object to and ignore such estimations due to the inherent errors involved in calculating them.
According to Jain(2008), “Many industry analysts see copying as one of the key threats to profitability and innovation. They claim that copying leads to higher prices for legitimate users, lower profits for the firms, reduced new product innovation and is generally harmful to society .” The paper continues to examine the impact of illegal copying of software and other similar intellectual properties on firms’ prices, profits, and quality choices, even when there are no network effects and the market is saturated.
Controversially, his paper actually finds a case when copying can increase firms’ profits, lead to better quality products and increase social welfare. The assertion is that there is reduced price competition in mature markets with no network externalities, applicable when, for example, markets of entertainment products mature in developing countries with large income disparities (such as China and India). Unfortunately for you, this case is not applicable with this game’s DRM, and the converse is true with regard to copying’s effect on the firm’s profits, product quality, and social welfare.
Hill (2007) established the only effective strategic responses copyright holders can adopt to deal with pirating. His approach involved first establishing the causes of copying by prior work done (1) work on moral development (Kohlberg, 1969), (2)equity theory (Adams, 1963; Kabanoff, 1991), and (3) moral intensity (Jones, 1991). Based on the causes and economic consequences, both in a static and dynamic sense, Hill then proceeds to offer the only effective strategic responses that copyright-holders can pursue, of which there are seven. The fourth one is relevant with several games like Anno 2070, which is “offer something extra to consumers who purchase the legal good”. “One solution that can works well for computer software is to offer online services, such as periodic upgrades and security patches, to consumers who register the legal product using a security code that is unique to every legal copy of the product. Since those who purchase pirated copies do not have access to a security code, they cannot get these benefits. This strategy effectively raises the value of the legal product, decreasing the perception of inequity.”
Following Hill's footsteps and dealing with planned behaviour and ethics theory, Yoon (2011) finds DRM effective at countering piracy: 'First, this study reveals that moral obligation is the most infuential factor on intention to commit digital piracy. According to Reidenbach and Robin (1990) a popular understanding of these normative beliefs comes to the general public. Therefore, it is desirable to enlighten people and imprint into their minds the fact that pirating is morally wrong and it is bad behavior through advertisements in the mass media, such as via TV broadcasting. Second, perceived behavioral control is a more influential factor in pirating digital materials. It means that individuals who have the skills and resources to pirate digital materials have a higher intention of pirate digital materials. Therefe in order to make pirating a much more difficult thing to accomplish for such people, software and digital media industries should use technologies actively to secure their digital materials, such as DRM.'
Dinah et al. (2010), in a paper on DRM and music piracy, came to the same controversial conclusions as that of Jain 2008; that there are indeed scenarios where little or no DRM increases profits. However, like with Jain's paper you must consider first what those scenarios are and when they are applicable. In fact, according to Dinah, ‘the model thus illuminates the importance of two parameters: consumers' pirating effort and the perceived difference in value for DRM-free and DRM-protected versions. With an increase of pirating effort, retail prices for both traditional and digital versions of the product increase, piracy volume declines, demand for both traditional and digital versions increases, and, perhaps most important, the profits of both retailers and the record label increase. Increasing pirating effort is not the only leverage that a record label can use to achieve higher profits though. Smaller perceived value differences between DRM-protected and DRM-free versions have a similar effect, such that piracy volume decreases and the record label's profit increases, as does that of the digital retailer’. So DRM is beneficial for the record label (publisher Ubi) and the digital retailer (Steam, Uplay) and only in the case for the traditional retailer in the music industry, is DRM-free found to increase profits, which is likely why big record labels are utilising such tactics (Emi, Sony, Warner).
Another paper that would appear to promote the use of no DRM in the music piracy is Zhang (2013).The main argument by Zhang is that lowering search costs leads to people buying more niche, lower-selling albums, the long-tail. Meaning that she asserts, in the music industry, 'DRM's sharing restrictions likely raise search costs and hinder product discovery, which may decrease sales'. To make this applicable in the PC gaming software, we would first have to have had a significant positive coming from sharing PC games, to the point of that in the music industry. Arguably, this effect is much smaller than in the music industry, as you cannot play a game at a large social gathering i.e. a party and everyone will start asking what is this amazing song and where did you find it. Furthermore, she finds that 'relaxing sharing restrictions disproportionately increases sales of albums in the long tail significantly but does not benefit top-selling albums'. Even if we were to take this at face value, it would mean DRM is beneficial for the top sellers. But the industries in this regard are yet again different, as really digital distribution platforms also now have indie games and lesser-known games and the 'search cost' is minimal to begin with. She acknowledges the differences between the music industry and the video game industry in her own conclusions, 'My analysis is of course subject to limitations such that generalizing to other contexts should be done with caution. Other settings, such as books, movies, and video games, are different from the recorded music industry in many respects. Notably, products in these other industries take a longer time to consume compared to listening to a song'. And her finding is not applicable at all in developing with weak IP laws and enforcement: 'In settings where the legal framework is weakly enforced, it may not be optimal for firms to relax sharing restrictions, and they instead should consider alternative mechanisms to appropriate returns to innovation.'
Another interesting paper on this (Sundararajan, 2004) where an optimal choice of technological deterrence level is found in a market where sellers can influence the degree of piracy by implementing DRM systems. He finds the optimal response in market where the seller can price discriminate, is to offer lower levels of technology-based protection, to the point where the pirated good will always be inferior to the legal product whilst minimising any impact for the legal user. It would appear overly intrusive DRM, as defined previously, has been found to be detrimental to all, regardless of whether we are dealing with the music industry or the PC software industry, yet a low-level intrusive DRM seems to benefit all.
The argument that DRM increases social welfare rests on the argument that piracy results in reducing sales. If you accept that piracy results in reducing sales then the next question becomes - should content creators (and anyone else involved in the production chain such as distribution platforms like Steam) be worried about these reduced sales? Does piracy reduce overall social welfare by reducing the incentives to create content? Then, if by reverse, we argue that piracy reduces overall social welfare, then a smaller piracy level would increase overall social welfare.
The impact that digital piracy has on sales has been researched extensively. Danaher et al. (2013) collect the dozens of papers from both sides of the argument and conclude that "piracy results in a statistically significant reduction in sales, particularly in emerging digital channels". There also appears to be a sizeable market in converting pirates to purchase the good. Danaher et. al (2012) analysed the effect the HADOPI law in France had on music sales, a legislative measure enacted by the government to track torrenting activities of pirates and first warn them and then fine them. Their paper finds that the law in France caused a 20-25% increase in French music sales. Considering these are largely casual pirates, i.e. the 'hardcore' pirates have multiple options to circumvent the law through the usage of VPN, proxies or Bittorent protocol encryption, the case is made for there existing a large market to convert into sales. This finding was further reinforced by Adermon et al. (2014) who did a similar study on total music sales after the launch of the IPRED law that targeted torrenters and found that there was 36% increase in music sales due to the law. Another example of there being a substantial amount of casual pirates ready to buy the product given enough incentive, is that of Megaupload and its sister sites. Danaher et Smith (2013) analysed the impact of the sites shutdown on digital motion picture sales and found that a 1% reduction in Megaupload usage within a particular country caused a 2.5%-3.8% increase in digital sales. They calculated "that this increase translates into a 6-10% increase in revenues from digital movie sales and rentals for two major studios in the 18 weeks after the Megaupload shutdown".
They also note that "while there are a few academic studies analyzing the broader social impact of piracy, standard economic theory suggests that if piracy reduces revenue to content creators that, ceteris paribus, it will also reduce the incentives to create new high quality content, and that any reduction in the supply of creative content could significantly impact overall social welfare."
The mechanism through which digital piracy does this is explained in the literary review done by Pietz (2010). "A general result that we can expect in such a framework [edit:monopoly] is that piracy limits the monopoly power of the supplier of the original. As a consequence, the availability of digital copies at best leaves the firm's profits unchanged(meaning that piracy is not a real threat) or, more realistically, reduces the firm's profits. This is indeed the conclusion reached in a variety of models (see, for instance, Novos and Waldman, 1984, Johnson, 1985, and Belleamme, 2003). When price is the only strategic variable of the firm, three types of reactions are possible: If piracy is not a real threat (because copies have too low a quality/price ratio), no reaction is necessary (piracy is said to be blockaded'); otherwise, the firm either reduces its price to make all active consumers prefer the original (adeterrence'strategy), or it sets a larger price and lets some consumers use the pirated good (an `accommodation' strategy). Inevitably, profits are reduced in both the deterrence and the accommodation strategy." Profits that could have been used to create better support or additional and better quality content.
submitted by rojimbo0 to gaming [link] [comments]


2014.09.24 08:45 chris_cole42 Can't play multiplayer in Nottingham university halls.

Hi reddit, I've recently moved into my halls of residence for the next year and found that all network traffic is shoved through a proxy. Apparently this means that steam, minecraft and other services can't connect to their respective servers. I have seen people saying that I could bypass the proxy one way or another, but any discovered attempt to do so could lead to throttling or complete disconnection. They do, however seam fine with people using games consoles.
So is there anything you guys can think of to either get them to go through the proxy or convince the network that my laptop is a console?
EDIT: sorry should've been clearer, here are their actual words regarding this:
Restrictions (all users)
• Sending emails via SMTP except through the University SMTP server (smtp.nottingham.ac.uk)
• File-sharing websites such as RapidShare and MegaUpload (including paid-for and subscription services). These sites may also be blocked by the secure web gateway.
• Access to external Virtual Private Network (VPN) except those to other The University of Nottingham campuses at Ningbo or Malaysia or where agreement has been reached with Information Services.
• Using anonymous proxy services or any service designed to bypass restrictions on the SNS
• Operating a computer or device which provides services to other users, such as a file server or any network equipment or software designed to allow multiple computers to share a single connection such as Apple's Time Capsule, routers (wired or wireless), switches, hubs and printers
• Using two network connections at once, for example a 3G USB dongle as well as a wired connection to the SNS.
Increased restrictions for inappropriate use:
Should Information Services observe inappropriate activity from a single SNS connection, increased restrictions will be enforced for a period of up to one month. These restrictions may also apply if a virus is identified as originating from your connection. You will be informed by email of the reasons for these restrictions.
• All internet traffic will be blocked with the exception of Web traffic through the secure web gateway
• The users connection is throttled to a maximum of 1Mb/s You may find that Freewire TV ceases to function due to these restrictions. If you have a subscription you may wish to contact Freewire to have your service suspended during this period.The University is not liable for any loss of external services as a result of these increased restrictions.
Disconnection and reconnection
For second or subsequent offences, or in extreme cases of abuse, complete disconnection will be considered by Information Services (IS). The user will need to pay a reconnection fee of £25 to IS before reconnection.
submitted by chris_cole42 to techsupport [link] [comments]


2014.08.26 23:42 muggle_rebirth Server up (via TOR) - update 2014-08-26

Hey Rebirthers!

Status: We had to check and it came as we suspected, the attacks returned. We hope you anyway enjoyed the whole day of normal RB gaming experience.

We are again under attack and still working out some solution. You'll understand that this takes time.
The TOR solution is up. Have fun! Remember this is a temporary solution!

What you need to do:

Windows:

1) You download the bundle via Megaupload or via Torrent
2) Extract it.
3) Run the file "start.bat". You'll get one window for TOR and one window for the proxy. Wait for the TOR window to say "Bootstrapping: 100%"
4) Change your realmlist to 127.0.0.1 and then log in normally.

Mac (Credit goes to Xpresive)

1) Same step as for windows
2) Extract it (You can use The Unarchiver).
3) Install Homebrew
4) Install wine via homebrew (Open Terminal and type "brew install wine")
5) Open terminal and run "wine wowproxy.exe" (Note: You need to be in the same directory you extracted the folder in)
6) Using bundle with anonymity: Open a new tab in Terminal and run "wine tor.exe" (Note: You need to be in the "Tor" directory that is inside the extracted folder)
Using bundle without anonymity: Open a new tab in Terminal and run "wine tor.exe -f ../torrc" (Note: You need to be in the "Tor" directory that is inside the extracted folder)
7) Change the realmlist to 127.0.0.1

Linux

1) You should be able to run it via wine.
You should expect the awesome latency you were used to on Rebirth. Remember it is TEMPORARY! If you get a lot more restarting TOR could give you a better circuit so you could try that and logging back in again.
The proxy software is written by our main dev Andkem and TOR is a large open source network. If you're interested in knowing more about TOR their website is www.torproject.org.
The Rebirth Team
submitted by muggle_rebirth to rebirthwow [link] [comments]


2014.08.18 21:08 muggle_rebirth Server up - update 2014-08-18

Hey Rebirthers!

Status: We are still under attack and still working out some solution. You'll understand that this takes time.

Thanks to Andkem we do have a temporary (!) solution that should allow us to have the server up and you should be able to play. We might be pretty safe with it. Now you'll ask why this is only a temporary solution when we consider it being safe. The downside is that you'll have an increased latency! That's why we consider it only being temporary.

What you need to do:

Windows:

1) You download the bundle via Megaupload or via Torrent.
For win7/8/xp/vista you can also try this one: via Megaupload or via Torrent
2) Extract it.
3) Run the file "start.bat". You'll get one window for TOR and one window for the proxy. Wait for the TOR window to say "Bootstrapping: 100%"
4) Change your realmlist to 127.0.0.1 and then log in normally.

Mac (Credit goes to Xpresive)

1) Same step as for windows
2) Extract it (You can use The Unarchiver).
3) Install Homebrew
4) Install wine via homebrew (Open Terminal and type "brew install wine")
5) Open terminal and run "wine wowproxy.exe" (Note: You need to be in the same directory you extracted the folder in)
6) Open a new tab in Terminal and run "wine tor.exe" (Note: You need to be in the "Tor" directory that is inside the extracted folder)
7) Change the realmlist to 127.0.0.1

Linux

1) You should be able to run it via wine.
You should expect latency in the area of 300 - 1 000 ms. Remember it is TEMPORARY! If you get a lot more restarting TOR could give you a better circuit so you could try that and logging back in again.
The proxy software is written by our main dev Andkem and TOR is a large open source network. If you're interested in knowing more about TOR their website is www.torproject.org.
Let's find out how it works :)
The Rebirth Team
submitted by muggle_rebirth to rebirthwow [link] [comments]


2013.03.17 05:47 onion_vpn Am I being paranoid?

I'm wondering if I'm being excessive (read: paranoid) in my set up. When I was in college, I got a nasty letter for torrenting a TV show. After college, I found my way into a private site with password protected rar's hosted on Megaupload. After MU went down, I moved over to usenet, but my usenet provider has started getting DMCA takedowns, which makes it largely useless to me.
I've signed up for Private Internet Access. So far, it's working great. PIA allows each user to have two simultaneous connections to different servers. As such, I've configured my router to tunnel traffic to a nearby PIA server, and on my torrenting machine, I've installed PIA and had it connect to their Sweden server. The effect is that the two VPN's are effectively chained together. The VPN server that the router connects to knows my IP, and the VPN server that accesses the torrents only sees the IP of the first VPN server. The first one knows "who", but not "what", and the second knows "what" but not "who"... assuming PIA doesn't log.
And that's what I keep worrying about. I feel like I'm putting all my eggs in the PIA basket. I've been thinking of, as a last step, signing for something like the BTGuard proxy and paying with Bitcoin, so BTGuard wouldn't know my payment details or my real IP. This would give me three layers of Indirection: Me -> PIA (America) -> PIA(Europe) -> BTGuard(Europe) -> torrent.
My questions are:
Thanks for reading.
TL;DR: Does chaining VPN services together to create my own little onion routing circuit give me any additional security?
submitted by onion_vpn to trackers [link] [comments]


2013.01.27 18:19 UpBoatDownBoy Found a list of legally FREE e-Books pertaining to programming, comp. sci, and engineering over at /r/freebies

Found it over at /freebies, thought it might be useful to some here.
http://www.freetechbooks.com/ <- Here's the link.
Edit: Sorry, it looks like a lot of links are broken on this site , as pointed out by BK_Whatever. See Bk-Whatever's post for a better source.
Edit 2: The post from WTFisBehindYou linked here Which is actually from another post from ManWithoutModem (link below)
Copied and pasted source: Edit 0.5: dr0d86 sent me a link to a comment from ManWithoutModem over a year ago that was probably the original post. All credit goes there! :)
The original comment
Edit: I just woke up to a bunch of karma, I really wish I could find the original user who posted this information so that he could get all the credit. I don't remember the subreddit or the context that the post was in, I just copied all of this to Evernote and went on my way :( If anyone happens to know the permalink let me know so I can post it, I've searched but with no luck :(
Some info for anyone else looking for help on this. Sorry it's a copy / paste from another users post a while back and I'm on my phone, had all this saved to Evernote. I apologize for any weird markup:
To convert your eBooks to any other format (maybe to get it to work on your e-reader), use Calibre.
Public
http://gen.lib.rus.ec (They are blocking U.S. IP addresses, use a foreign proxy to get around it)
http://textbooknova.com
http://en.bookfi.org/
http://library.nu (invite only, Library.nu book request thread) - putting this here only because it fits with the rest of the public DDL sites R.I.P.
http://wormhole.in (specializes in math/science-need to register)
http://ebooksbay.org
http://warez-bb.org (need to register and then go to eBooks)
http://www.gutenberg.org
http://www.updatebooks.com
http://ebookee.org
http://www.manybooks.net
http://ebookshare.net
http://book.libertorrent.com/
http://www.giuciao.com
http://www.feedurbrain.com
http://oll.libertyfund.org/index.php?option=com_content&task=view&id=380
http://www.alleng.ru/
http://www.eknigu.com/
http://ishare.iask.sina.com.cn/
http://www.jubad.com/
http://btebook.com/0-01a8edbf9d27cebe.htm
http://www.cnshare.org/
http://www.bookgo.org/
http://www.pdfchm.com/
http://2020ok.com/
http://bbs.topsage.com/index_121.html
http://www.ebookshare.net/
http://nips.djvuzone.org/index.html
http://www.zainbooks.com/
http://free-books.us.to/
http://www.freebookspot.es/Default.aspx
http://www.freeetextbooks.com (need to register)
http://ebooksshares.org (need to register)
http://onebigtorrent.org
http://www.downeu.com
http://ebook-torrent-library.info (need to register)
http://forums.mvgroup.org (need to register)
http://theaudiobookbay.com (audiobooks)
>By: "ratokursi"
>Here's a custom search engine for ebooks: http://www.google.com/cse/home?cx=000661023013169144559:a1-kkiboeco
>Sites it indexes: http://gen.lib.rus.ec/*
>http://ebookee.org/*
>http://ebooksbay.org/*
>http://free-books.us.to/*
>http://librarypirate.me/*
>http://textbooknova.com/*
>http://www.downeu.com/*
>http://ebookshare.net/*
>http://www.freebookspot.es/*
>http://www.demonoid.me/*
>http://www.kat.ph/*
>http://www.esnips.com/*
>www.4shared.com/*
>http://www.ebooklink.net/*
>http://wowebook.net/*
>http://www.pdfchm.net/*
>http://www.free-ebook-download.net/*
>http://ebookbrowse.com/*
>http://www.ebook3000.com/*
>http://www.ipmart-forum.com/*
>http://www.mediafire.com/*
The following are general public torrent trackers:
http://thepiratebay.org/browse/601
http://www.demonoid.me/files/?category=11&subcategory=0&language=0&seeded=0&external=2&query=&uid=0&sort=
http://www.kat.ph/books/
http://bitsnoop.com/browse/other-ebooks/
http://torrentz.eu
http://torrent-finder.info
The following site searches direct download sites like megaupload R.I.P./rapidshare/etc:
http://www.filestube.com
You can also try googling phrases like "textbook/book title .torrent" or "textbook/book title .pdf" or "textbook/book title ebook" or anything along those lines.
Private (Feel free to make a request for any of these in the Consolidated Invite Thread.
http://bibliotik.org R.I.P. IT IS ALIVE!
http://bitme.org
http://myanonamouse.net (see sidebar for invite)
http://bitspyder.net
http://www.learnbits.me
http://www.ebookvortex.com
http://elbitz.net
http://docspedia.org
http://abtorrents.com (audiobooks)
These last few are sort of specialized eBook private trackers. Google them for info.
http://thegeeks.bz
http://theplace.bz
http://thevault.bz
http://bitseduce.com
http://salad.tl
General private trackers have some stuff too, try places like TL or DH and trackers like them. Reddit's private tracker BaconBits has a nice collection of eBooks too.
Also, don't forget that What.CD and Waffles.FM both have a huge selection of eBooks.
IRC (Don't overlook this)
irc://irc.undernet.org/bookz
irc://irc.irchighway.net/ebooks
If you don't know how to use IRC to download books, check out this link or read this:
>IRC Guide
>You obviously need an IRC client installed, a quick google search should find you a bunch of decent free ones.
>Load up the client and then type:
>/server irc.irchighway.net
>This will connect you to the irchighway server. Once you're on there, type:
>/join #ebooks
>This will take you into the ebooks channel, which has more than 2.2Terabytes of ebooks for free download. Once you're in, all you have to do to find what you want is to simply type:
>@search "Author or book title"
>... removing the inverted commas.
>You'll get a message saying that your search has been accepted. A few seconds later a searchbot will offer you a file, so accept the download. That will send you a .txt file that's zipped. Extract that and you'll get a list of files. I searched for Lian Hearn and got a list of 147 files. Here's an extract from it:
>!bald Lian Hearn - [Tales Of The Otori 02] - Grass For His Pillow .rar - 142.1 KB !bald Lian Hearn - Tales of the Otori 2 - Grass for His Pillow (CO.rar - 355.3 KB !bald Lian Hearn - Tales of the Otori 2 - Grass for His Pillow (ht.rar - 140.54 KB !bald LianHearn-[Otori_01]-Across_The_Nightingale_Floor(v3).rar - 111.62 KB !bald Lian_Hearn-[Otori_01]-Across_the_Nightingale_Floor(v4.0.rar - 115.45 KB !bald Lian Hearn - [Tales Of The Otori 03] - Brilliance Of The Moo.rar - 175.53 KB !bald Lian Hearn - [Tales Of The Otori 04] - The Harsh Cry of the Heron (v1.0) (html).rar - 351.80 KB !bald Lian Hearn - [Tales Of the Otori 05] - Heaven's Net Is Wide (v5.0) (epub).rar - 588.40 KB
>Say I wanted to download the first book. I'd copy the text shown below, deliberately removing the file size information (I've been booted for that before ):
>!bald Lian Hearn - [Tales Of The Otori 02] - Grass For His Pillow .rar
>Then just paste that into the IRC window then press enter. After 2-3 seconds you get a prompt asking you to accept or decline the file.You know how to do the rest.
If I'm missing anything, hit me up and I'll add it.
submitted by UpBoatDownBoy to learnprogramming [link] [comments]


2012.06.21 23:10 tabledresser [Table] Hi IAmA! We are core members of the Tor Project. Ask us anything!

Verified? (This bot cannot verify AMAs just yet)
Date: 2012-06-21
Link to submission (Has self-text)
Link to my post
Questions Answers
I was fire for my work for recomend the use of Tor (and change my mail to Riseup, using DuckDuckGo and being a member of the Argentinian Pirate Party). Im in this moment in the middle of a legal dispute about that. My friends allways said to me that talk to the guys in Tor and in the EFF about this. But I dont really know if you can do something from the US to help me here in Argentina. Do you have contacts with lawyers or someone in Argentina that can help me in my case?? Please email me at runa@torproject.org with some details, and I will try to put you in touch with the right people.
Now it's a known fact that Tor browsing speeds are quite low. Can we expect higher speeds in the future? Also, is the Tor Project entirely dependent on donations? And do you experience a shortage/surplus of funds? The short answer for why Tor is slow is that there are 500,000 people using Tor daily and only 3000 relays in the network. You are sending your traffic through three relays somewhere in the world, and each relay have different amounts of bandwidth donated to Tor users. We need more people who can run relays and help the network grow even bigger.
If you want the longer answer to your question, then I suggest you read the blog post called Why Tor is slow and what we're going to do about it written by Roger in 2009.
To answer the second part of your question; yes, we depend on grants, donations, volunteers who help us with development, testing, documentation etc. All companies (non-profit or not) go through stages where there's a shortage of funds, and the Tor Project is no different. That said, I am really excited that we recently won the Knight News Challenge on Networks.
Is there any way you can make some sort of dummies guide to setting up a relay? Or could it never be that simple? You can set up a Tor bridge in the Amazon cloud with Tor Cloud.
Why do you set up a donation site where the money goes into a fund that buys Tor bridges? I'm sure some wouldn't mind a giving a buck to that and it doesn't require any technical knowledge. We have our donation site, but the Tor Project does not run bridges and relays. If you want to donate specifically for that purpose, check out torservers.net and Noisetor.
As far as I understand as a TOR newbie, the foundations of TOR were a United States Navy project. What can you offer to refute that TOR is simply an intelligence honeypot? The code is open source and available online. You can find it on gitweb.torproject.org.
Tor's protocol specifications are also available online.
If we were to introduce a backdoor in our own software, we would not only have a broken tool, but a trashed reputation as well.
Tor is used by 500,000 people daily, including core members of the Tor Project.
Volunteers all over the world run 3000 relays in total. Your client will pick three relays at random when sending traffic through the network.
I heard that the Navy discover that the only way the tool be usefull is if a lot of diferent people use it, and thats the reason they free the code. This is true? Tor is more useful if lots of people use it, otherwise you stand out as the only person making an encrypted connection to a known Tor relay. I don't know if this is the reason why Tor is now open source, though.
Any idea if the military uses it? See Link to www.torproject.org
Aren't there significant legal risks to allowing people to proxy through your IP address? Potentially, yes, and you need to be aware of this risk before setting up an exit relay. I recommend that you read Tips for Running an Exit Node with Minimal Harassment if you want to run an exit relay. If you just want to contribute in some way, consider setting up a bridge using Tor Cloud.
, thank you for Tor, I use it a lot for just general browsing. I suppose my only question is is there anything I can contribute to the project as a C#/android developer? Our volunteer page contains information about our projects and how you can help us. I would also recommend you check out our projects page to see if there is anything that interests you. You can also get in touch with the developers at The Guardian Project. They do lots of awesome work on Android.
of all, thank you for your efforts! What's you opinion on anonymous linux distros like tails? Thanks! Tails is actually an official Tor project, and we are working with the developers to ensure that all traffic is safely routed through Tor and no trace is left on the system. I, personally, think Tails is a great distro and have used it a few times while traveling.
Sorry, didn't know that. Actually I can't even open torproject websites and bridges, since my traffic comes from Kazakhstan that seems to block all tor-related websites :( You can use the latest Tor Browser Bundle with one of the following three bridges to connect to the network: 213.138.103.17:443, 107.21.149.216:443 46.137.226.203:55440.
To receive the English Tor Browser Bundle for Windows, send an email to gettor@torproject.org with windows in the body of the message. You can leave the subject blank.
Are the exit node and relay something that can be done at home or do they require a larger setup? If you want to help out but don't want to run an exit relay, or can't run a relay from home, consider setting up a bridge in the Amazon cloud using Tor Cloud.
So if 20 redditors set up TOR on free Amazon EC2 as an exit node then general speed of network increase significantly? The ToS for Amazon EC2 does not allow Tor exit relays. Running a non-exit relay is pretty expensive, which is why we have created bridge-by-default images.
So how beneficial is it actually for a bunch of us to set up relays? I just set up a Tor Cloud in Singapore, but it kind of sounds like the bigger choke point is exit nodes. A Tor Cloud instance is actually a bridge, not a non-exit relay. A bridge helps users connect to the Tor network, and is very useful for people in countries such as China. But yes, you are right, we really do need more exit relays.
What's your opinion about the depraved things TOR can and are being used to search? I don't judge you guys and I think it's an awesome program, just curios. People search for depraved things on the normal Internet too, Tor is no exception.
How safe is it exactly to run an exit node? I am from Europe and have a ton of unused bandwidth, but I can't even be bothered to open my mail - let alone deal with any legal stuff that might be brought on by me running one. It really depends on what you are worried about and what you count as safe. Either way, I think it's important to first understand what running a Tor exit relay really means, and you will want to consider hosting it somewhere other than in your own home. The Tips for Running an Exit Node with Minimal Harassment post is a good source for information, and you can find a list of Tor-friendly hosting providers on our wiki.
Is it truly annonymous? Aka is there a way to track which websites were visited? We cannot guarantee that you will always be anonymous, but we do our best to make sure that this is the case. You should be using the latest Tor Browser Bundle with its default settings, and you should follow the recommendations in the warning section on our download page.
Given that the scipts are turned off (thanks for the useful button) and you don't download anything - how big of a risk is it to get infected by a virus/trojan/malware? Assuming you define virus/trojan/malware as something that runs on your computer; You won't be infected unless you download an unknown piece of software that you choose to run on your computer.
Why is there no major google-type search engine on .onion? The community seems to be tech savvy and decent in size, think that they could make something usefull. Oh there is; Link to 3g2upl4pq6kufc4m.onion is the Tor hidden service set up by DuckDuckGo (source 1, source 2).
What % of your exit nodes do you believe to be gov't sponsered? You have access to as much information about the network as I have. You tell me?
Just out of interest do you guys use your own service as standard when on the internet? I do, yes, and I know other Tor developers who do it as well. It's actually quite easy to get used to the difference in speed when switching over to the Tor Browser completely.
Also how do you feel about the fact that a large number of Onion domains are used for transactions and sharing of illegal goods and services? Does this corrupt the original purpose of Tor or was it something you expected to go hand in hand with the project? I think it's interesting to see people claim that a major part of hidden services is illegal content, without having any proof that this is really the case. We hear about all the bad things because that's what media likes to write about, but that doesn't mean there aren't a ton of good hidden services out there as well.
I can't really comment on the original purpose or if this was something that was expected. What I can say is that we are working hard to explain what Tor is and is not, and I think Karen's response in TOR regarding law enforcement and hidden services is a good one.
You say you use it for all your browsing. I thought this was unsafe? I read explicitly NOT to use it when doing things like checking my personal email and logging into my Twitter account. Am I wrong? Or how do you go about using it for everything safely? Where did you read that? I use Tor for email, twitter, and all the other things I do. Just make sure that the websites you log on to are using https/ssl, enable two factor authentication in gmail etc.
Can your anonymity using Tor be compromised if you disconnect and then reconnect from a wifi network whilst loading a page through the Tor network? What are you worried about? That the URL of the site you are browsing is going to leak because it's loading before you have reconnected to the Tor network? Or that someone watching both you and the site you are connecting to can identify your user from all the other users?
The IP address of each relay in the network is publicly available on sites like torstatus.blutmagie.de, including contact information for each relay operator (if set in the Tor config file). I can recommend reading the blog post Tips for Running an Exit Node with Minimal Harassment.
What are you worried about? That the URL of the site you are browsing is going to leak because it's loading before you have reconnected to the Tor network? Or that someone watching both you and the site you are connecting to can identify your user from all the other users? The first one, I suppose. Would you start loading the site before the Tor network, or would you reconnect to Tor without the URL of the site leaking? Tor will only work as long as you have Internet access. Tor Browser will not allow you to browse a page if Tor is not running and connected to the network.
Is it true that government intelligence agencies like the CIA, FBI, and NSA each own several exit nodes? How would I know? :)
What is the current status of IPv6 support in TOR ? What changes does it requiere in the routing models when it comes to preserving anonymity? In 2011, Nick wrote a blog post called IPv6 is the future, I hear outlining the things we need to make Tor+IPv6 happen. In December last year, Linus sent an email to the tor-dev mailing list explaining how you can configure your Tor client to connect to a Tor IPv6 bridge.
Have you ever been contacted by law enforcement regarding the use of tor for illicit activities? Have they tried taking legal action to take it down. Legal action against who in this case? A single relay operator or the Tor Project as a company? We often meet with or talk to law enforcement to explain what Tor is and is not, and what we can and cannot do to help them.
What is the future of tor? Will we see a return to having easier access to a standalone vidalia or is it more integration into the tor browser bundle? We are going to discontinue the standalone Vidalia eventually and focus on the Tor Browser Bundle. We are also focusing more on trainings, support, a forum etc.
there still is a standalone vidalia but you need to get an addon into Firefox to make it work and change proxy settings in Google chrome to make it work. Personally I could not get chrome to work but Firefox is fine. Please do not use Tor with Google Chrome :(
Please do not use Tor with Google Chrome :( I'm fairly new to all this, so sorry if this is a stupid question, but why? Is it basically "because Google"? Something to do with the data sync and it saving your visited sites on Google's cloud server? It is technically possible to use Tor with other browsers, but by doing so you open yourself up to potential attacks. We do our best to make sure that Tor is safe to use with the Tor Browser (Firefox with some extra patches), but we simply don't know how Tor behaves with other browsers.
Is there a way people who have only just started programming or studying computer science can contribute? You can help with anything you want, such as development, testing, documentation, support, running a relay etc. Our volunteer page contains information about our projects and how you can help us. I would also recommend you check out our projects page to see if there is anything that interests you.
You can find us in #tor and #tor-dev on irc.oftc.net :)
Thanks! I'll check out the IRC channel. Do you think a beginner coder will be able to contribute anything worthwhile? Yes, definitely. You should also consider applying for Google Summer of Code next year!
is there a way to find out which region could use more relays ? We need more bridges and relays outside the US.
also, is there a list of companies that let you rent a server for a TOR relay without bitching about it (and maybe even let you rent it anonymously ?) Yes, check out the list of Tor-friendly hosting providers on our wiki.
I've never used Tor, I've heard a lot about it, what is it that makes yours different from just simply browsing in Internet Explorer. Because for all I know IE is awesome...right... Anyways, how does Tor make things totally anonymous, is it like a proxy server? I can say a lot about how browsing with Tor is different from browsing without Tor, but I'll try to keep it short; when you are not browsing with Tor, you are allowing your ISP, anyone watching your network, and the websites you visit to learn what you are doing online, which sites you visit, what you searched for on Google, what you bought on Amazon, and so on. The article I wrote for ORGZine a few weeks ago has some more information about this.
Tor helps with a number of things, such as defending against traffic analysis, reducing your digital footprint, preventing your ISP from learning which websites you are visiting, and allowing you to access websites which have been blocked where you are currently located.
The tl;dr for how Tor anonymizes your traffic is that it wraps it in three layers of encryption and sends it through three random servers in the Tor network. The longer explanation, with detailed images, can be found on our overview page.
It will be very hard (not to mention awkward) for me to justify setting up a tor node on campus. Have any recommendations on what I should say? I run IT for our lab but the University-wide IT has the final say on what we can and can't have set up. Edit: spelling You would have to explain what Tor is, how it works, what running a relay means, what the implications are, and justify why you should be allowed to set up one on campus. I'd be happy to help any way I can.
My experience with tor is that you have to be pretty high brow tech savvy to get the full experience, anyway this is likely to change in the future? Allowing it to become customizable , safe yet noob friendly? You get the full experience if you use the latest Tor Browser Bundle and leave the settings as they are. Users are more likely to do something wrong and deanonymize themselves if they are allowed to customize things too much.
You guys are rad. With recent events such as the megaupload shutdown, what do you think is the best way to protect shared/hosted data? Never keep copy of material on one single site. Ideally, you would want to have local and off-site backup.
I run a bridge and have noticed that the majority of users are coming from the United States. Is there any way i can limit use of my bridge to users who actually need it. i.e. people in Syria, Iran, etc.? There is no way to keep your bridge accessible only to users in country x, y, and z. The best you can do is set up a private bridge and give out the address to trusted people in those countries, and hope they don't spread it too far. Upvote for username.
There was recently a story about a child pornography investigation (FBI) which was abandoned because the FBI had trouble tracking through TOR. A TOR spokesperson was quoted as saying that TOR helped FBI by providing them exploits the the TOR system to utilize, but this was later clarified with the following: "he TOR Project has clarified that it does not in fact instruct law-enforcement agents on how to exploit vulnerabilities in the service" Can you clarify how TOR does help law enforcement in cases such as this? Karen was badly misquoted in that article. We help law enforcement understand what Tor is and is not, and we point out that a Tor hidden service can be vulnerable to attack if the software it is running is vulnerable. I recommend you read Karen's long answer on TOR for details.
Are you winning? Yes.
I can imagine a cat and mouse game, especially with big censoring countries like china. how does fighting with these big players go? It's an arms race. I recommend you watch the video of Roger and Jake's talk at 28c3 last year about how governments try to block Tor.
my other question is, can you identify what censorship software is in use in given countries? We try to, yes.
edit: check out the censorship wiki for more info.
What ever happened to the TOR "router" that would move all traffic and not just web browsing? You mean the Torouter. It's kinda on hold for various reasons, but I'm hoping we can do something with the Raspberry Pi.
How do i acquire a tor t-shirt? tor is the SHIT! Link to www.torproject.org
I have a VPS with a "shared" 100Mb port. I ran it as an exit node and was suprised at how little bandwidth it was using. It was limited to 2Gb a day, and wasn't hitting that. I don't know if I configured it properly... Please email help@rt.torproject.org if you want some help configuring and testing your relay.
I would love to run and manage a relay or exit node at the University I work at, but I'm sure something like that will get me fired and have other repercussions as well Try talking to the IT department?
Thank you; Thank you and Thank you; from ( Hell = Iran ). You're welcome! Please email help@rt.torproject.org if you have any questions about Tor (outside of this iAmA) and/or need help.
Tor gives you anonymity not security. The Tor Browser Bundle provides some security, but we recommend that you encrypt files, emails etc with GPG if you're sending/receiving something sensitive.
Type the text on notepad, encrypt it, send it. This is the best way to do it, forget about add-ons and other browsers.
Okay, now I'm impressed! You guys seem to have an article ready for any question that could be asked. We try! :)
No, you should be proud to use Tor. The more "normal" people use it, the better. Anonymity loves company :) Yep, everyone's welcome to use Tor.
Seeing as Tor was originally designed for government use, what is Tor's stance, ethically and professionally, on co-operating with governments, in particular when requested to help identify users. We do not log, track, or identify our users and we therefore have no data to give out whatsoever.
Last updated: 2012-06-25 20:56 UTC
This post was generated by a robot! Send all complaints to epsy.
submitted by tabledresser to tabled [link] [comments]


2012.01.31 23:19 karmie Really bummed about the latest season

I love Skins, it is an awesome show. The problem is I live in the US and typically don't get to see a season until it's been around so long that it's on amazon. For season 5 I had been using megaupload, but I think we all know how that went.
Kind of an odd question, but would anyone be willing to set up a .uk web proxy that I could use so that I could watch the show through 4oD?
submitted by karmie to skinsTV [link] [comments]


2012.01.28 14:19 shah5555 Skipping or Bypassing Rapidshare or Megaupload, hotfile waiting time.a proxy browser where you can change your permanent IP Address to dynamic IP Address.

Skipping or Bypassing Rapidshare or Megaupload, hotfile waiting time.a proxy browser where you can change your permanent IP Address to dynamic IP Address. submitted by shah5555 to hacking [link] [comments]


2012.01.22 23:54 bi-polar_with_cars Won't the direct and indirect shutdown of filing sharing sites just push people to get more sophisticated in their file sharing, ultimately making them harder to detect?

If the large sites are shut down, won't that just cause people to get more sophisticated, using proxies, anonymity tools, offshore sites, etc.
Remember, the presence of servers in the USA is what got Megaupload in the end, so file sharing sites can simply move servers off shore.
I guess, in the end, my point is simply that people like their movies/songs/porn, and they're not going to start buying it again.
"Trap my body, can't trap my mind, easily explains how we adapt the crime" - Jay Z "Can't knock the Hustle" (feat. Mary J. Blige)
submitted by bi-polar_with_cars to AskReddit [link] [comments]


2012.01.20 04:13 CableHermit IF SOPA PASSES, this is a guide to everything you need to get around it.

SKIP THE NEXT THREE PARAGRAPHS IF YOU KNOW EVERYTHING ABOUT SOPA AND HOW IT WORKS feel free to correct me if I'm wrong
A quick rundown of SOPA for anyone that doesn't know: The Stop Online Piracy Act is a bill that extends PIPA by requiring sites to filter out copyrighted material, and if the sites don't, rightsholders and companies part of the RIAA can blacklist entire websites (even if they are foreign-based), and have its operators imprisoned and fined. All those memes from popular shows and movies? Yes, reddit would be a thing of the past.
What is blacklisting and DNS filtering? A blacklist is a list of objects/people/sites/etc that are not allowed. The internet blacklist would be a nation-wide blacklist, and the government would be given the power to force all Internet Service Providers (along with search engines) in the US to DNS Filter sites on the blacklist, or shut them down. DNS filtering is messing with the net's list of Domain Names and simply plucking specific ones out. (a.k.a your website animalunicornsex.com can no longer be found). It'll be like surfing the net from school computers.
The bigger picture is that these internet bills require no Due Process, meaning that any site can be blocked for any reason and its operators be hauled off to prison, all without a single trial.
NOW HERE'S HOW YOU GET AROUND SOPA, FUCK THE LAW, AND ACCESS BLOCKED WEBSITES ANYWAY please feel free to share/correct
1) SOPA and PIPA implement Domain Name filtering, meaning you can still access websites via their IP address by typing in http://[ipaddress] into your URL bar. To look up the IP of a domain, simply go to your command prompt, and type in nslookup [domain]. For example, nslookup http://www.reddit.com returns the result 174.129.203.181 A redditor by the name Akathos posted a list of IP-Addresses to popular sites and I would like to thank him and all others who have done so. I am not telling you to alter your host file.
2) SOPA and PIPA only affect search engines and ISPs in the US, so you can still access websites via proxies and VPNs that route you outside of the US. Note: I don't know who those people are, but they give a good explanation. A common proxy browser is TOR and a VPN I have personally used is Relakks. Relakks offers a free trial, and I believe their servers to be based in Sweden. Proxy and VPN servers may be asked and may accept to give, say, the FBI your information so please be careful with what you do. Tor is an onion router, meaning it wires you through multiple proxy servers, each that alter your IP, so it will be more difficult, but it is not impossible. WARNING. IT IS NOT RECOMMENDED THAT YOU INSTALL ADDITIONAL ADDONS TO YOUR TOR BROWSER.
3) The third option is even simpler. You can access the website by providing an alternate domain name, like "newsrss.bbc.co.uk" instead of "news.bbc.co.uk". Alternatively, you can access information via RSS aggregators, or by going to http://translate.google.com and translating the webpage even if you don't need to. Last but not least, if only the http version of a site is blacklisted, and the site has https enabled, you can access the site simply by typing in https instead of http. Vice versa.
4) There are two popular firefox addons that focus on bypassing DNS blocks. These two are MAFIAAFire Redirector and MAFIAAFire: ThePirateBay Dancing! You can find these at https://addons.mozilla.org/ They will work for firefox on any OS.
5) This is something you can do without any tools. Google caches webpages that show up in its search. This is how you access cached websites
LINUX, BSD, AND UNIX USERS, YOU ARE OUT OF LUCK! haha, jk. please feel free to post additional solutions you know of
1) It gets a little more complicated if you aren't a Windows user. If you are a MAC user (and yes, MAC OSX is UNIX-based), Relakks, Tor, etc etc should all be readily available for you. If you are running Linux or BSD, you should be able to find countless of forum posts if you type in "[yourOS] VPN" into google. There should also be plenty of RSS aggregators that work for you, and you can search via IP or use cached pages whatever OS you use! :D
2) This site shows you how you can get TOR working on BackTrack and most likely other Debian-based OSs. Worked for me. Also, ToVidalia may be available via your specific software center. Update your sources and package lists. (Updating package lists from sources for Debian-based operating systems, including Ubuntu: sudo apt-get update). Depending on your OS, you can access your sources through poking about your settings.
3) If somehow you can't do any of this, your next option is to burn a live-cd image of the Tor Project's Live Distribution called Tails which is a Debian-based OS that routes all internet access through Tor's onion servers. If you add apps, you have to figure out how to wire them yourself, though everything you need is already included, including a popular Linux messaging client. If you don't want to have to run live, you can always use Virtualbox. VIRTUALBOX WORKS FOR MAC, WINDOWS, SOLARIS, AND LINUX. YOU CAN RUN LIVE DISTRIBUTIONS NO MATTER YOUR OS; THEY DON'T TOUCH IT.
FOR MORE INFORMATION, I recommend going to this site and/or downloading Anonymous' extremely comprehensive Care Package. no, it doesn't contain hacking tutorials or anything, chill. just guides to protesting, VPNs, proxies, anonymously blogging, bypassing censorship, etc. activist, not hacktivist, stuff. Neither TrendMicro, ESET, HitmanPro, or MalwareBytes, have ever found it infected.
TL;DR Please refer to top of post and read.
And yes, some of these methods should hypothetically let you surf pr0nz from your school computers, but I'm not to blame for whatever way you use this information.
And today's Megaupload demonstration is an example of how Congress isn't hesitant to abuse its power. We cannot yet be absolutely sure SOPA, along with other bills, won't pass.
submitted by CableHermit to SOPA [link] [comments]


2011.05.21 11:12 HoBoKristian How to play LoL on a mac [Tutorial]

Hello fellow summoners!
A few days ago i tried to get LoL to work on my mac. After multiple attempts i found this subreddit and the post in the sidebar (http://www.reddit.com/leagueoflegends/comments/ezodw/league_of_legends_mac_beta_link_to_dmg/)
This post was a little outdated and i just wanted to make a post updating /Leagueoflegends on what you have to do to get LoL running smoothly.
*NB: i do not take credit for these steps i got all my information from http://www.reddit.com/leagueoflegends/comments/ezodw/league_of_legends_mac_beta_link_to_dmg/ and http://eu.leagueoflegends.com/board/showthread.php?t=48154&highlight= *
  1. Download a .dmg from: http://www.megaupload.com/?d=8PD2JMHB
  2. Run the .dmg and install LoL
  3. Run LoL and let it update (this may take forever depending on your mac/internet connection). Also i would like to add that it stops on 33% (atleast it did for me and my brother). There is a small label with the current file the program is working on and as long as that label changes the program is being updated.
  4. After updating you can play freely on the US server (since you downloaded the US .dmg)
Extra:
If you live in europe and want to play on the US server you can do so by following the steps above and then do:
  1. Download a proxy (i prefer proXPN because it's free and easy to use)
  2. Create an account while running the proxy (you should then be able to create an american account). This of course only works if the proxy you are using connects to a server in America (proXPN does)
If you live in Europe and want to play on the EU server you have to do some extra steps:
  1. Locate LoL in your applications folder on your mac
  2. Right-click and choose "Show package content"
  3. Then a small finder window will appear and click the different folder in this order: Resources -> transgaming -> c_drive -> rads -> Projects -> lol_air_client_config_na -> releases -> 0.0.0.1 -> deploy
  4. Open lol.properties in your favorite text editor
  5. change to of the lines that starts with "host=" and "xmpp_server_ur=" and edit them into this: host=prod.eu.lol.riotgames.com xmpp_server_url=chat.eu.lol.riotgames.com
  6. Save the file and restart LoL
  7. enjoy playing LoL on the EU servers.
EDIT: I just noticed that my tutorial reach the side bar. Happy to see that it helps so many people :)
submitted by HoBoKristian to leagueoflegends [link] [comments]


2011.04.12 20:24 ExpressCServices Need PHP script edit

Rapidleech script
The main point of this script is very simple. User use their download link and send a request to download a file from repositories as rapidshare, megaupload , etc.. Server with premium access is connecting to repository server with authentication and translocation . File is putting into temporal directory /files/ and from here User gets a temporal link to his file. So he can download the file and avoid the limits of repositories.
Here are the problems. Repositories are not happy to be bypassed and they ban accounts that have been transferred too much bandwidth.
We need this kind of system: We need to distribute bandwidth of current accounts per proxy servers gradually. Proxy must work per gate.php (for example) which will be in the other server and that server will be used for sending data to primary server. Each server would have their own premium accounts, for example: Proxy #1 has (Rapidshare premium #1 , Rapidshare premium #2, Megalupload premium 1, Megaupload premium 2) Proxy #2 has (Rapidshare premium 3, Rapidshare premium 4, Megaupload premium 3, Megaupload premium 4) Proxy #3 has (Rapidshare premium 5, Rapidshare premium 6, Megaupload premium 5…) Proxies must change one by one but not random, from the list starting with first, second, third… etc.
This system has been already created and it is working just we need that re-script with proxy servers to avoid ban.
For more information here is our project link. http://www.leechmod.us
Please contact us via email for more details if you are able to do it. ExpressContantService@gmail.com
submitted by ExpressCServices to work [link] [comments]


2010.09.08 03:56 mirou- Justice DJ set from BBC Radio 1 (90 minutes duration)

I extracted the Justice set from the Essential Mix recorded on the 1st of January 2010, which can be found in its entirety here.
You can download the set here from Megaupload. Edit: This link only appears to be working from time to time. Get the set here from SoundCloud!
I'll need a little bit of help for the tracklist though. If we manage to get the names of all the tracks, I might set up another download link, with all the tracks separated and named properly. Here is what I got at the moment:
0:00:01 - Justice - Genesis 0:01:49 - Justice - Waters of Nazareth + Scenario Rock - Skitzo Dancer (Justice Remix) 0:04:41 - Justine Electra - Killalady (Surkin Remix) 0:06:25 - Justice - DVNO (Les Petits Piloups Remix) + Felix Da Housecat - Elvi$ 0:09:45 - Kraftwerk - AeroDynamik (Alex Gopher & Étienne de Crécy Remix) + Felix Da Housecat - Elvi$ 0:15:24 - Justice - D.A.N.C.E 0:19:16 - Grant Phabao - Tub 0:21:48 - Boys Noize - My Head (Para One Remix) + Soulwax - NY Excuse (Justice Remix) 0:26:01 - Justice - Phantom Part 2 (Boys Noize Remix) + Soulwax - NY Excuse (Justice Remix) 0:29:06 - TC Crew - Once Beats (Cosmic Kids Remix) 0:31:05 - Human Resource vs. 808 State - Dominator (Soulwax Remix) 0:34:52 - The Chemical Brothers - These Beats Are Made For Breakin' 0:35:52 - Mr. Oizo - Gay Dentists 0:37:51 - Cassius - 1999 0:39:50 - Duck Sauce - aNYway 0:42:56 - Thomas Bangalter - Colossus + LFO - Freak 0:45:48 - Justice - Stress + David Guetta - Jack Is Back 0:57:17 - The Chemical Brothers - Block Rockin' Beats 0:58:50 - Billy Squier - The Big Beat 0:59:57 - Daft Punk - Da Funk 1:02:29 - SebastiAn - Motor + Depuis91 - Erothiq (VNNR Remix) 1:06:50 - Huoratron - $$ Troopers + High Powered Boys - Hoes Get Down 1:09:15 - SebastiAn - Busy Busy Busy 1:11:28 - Tiga - What You Need (Proxy Remix) 1:14:19 - Laurent Garnier - Coloured City 1:16:36 - Prodigy - Everybody In The Place 1:18:42 - Daft Punk - Crescendolls 1:21:39 - Justice - Phantom Part 2 (Soulwax Remix) 1:29:09 - Justice vs. Simian - We Are Your Friends 1:31:42 - War - Why Can't We Be Friends?
Hope you'll enjoy!
Edits: Thanks to h_h_help, xdest, sandsmark, tehdelicatepuma, conorp, Tuff_Ghost and sternomastoid for helping out with the tracklisting! New download link on SoundCloud.
submitted by mirou- to electronicmusic [link] [comments]


http://swiebodzin.info