CurrPorts will show you a detailed list of all currently opened TCP/IP and UDP ports on your PC, it will tell you the process name, the protocol being used (TCP/UDP), local port, remote port, remote IP being connected to and much more.
Currports is a very complete network monitoring software that easily beats Windows Task Manager, this free alternative to Windows Task Manager gives you exhaustive information about the applications running in your computer and allows you kill the processes that opened the ports as well as exporting all of the network activities data to a text or HTML file.
CurrPorts free network monitoring software
Another feature of this port monitoring tool is that it will automatically highlight in pink colour suspicious TCP/UDP ports opened by unknown applications, filters and command line are also available.
The Chinese government has had the Golden Shield Project , 金盾工程 (aka Great Firewall of China) since 1998. Officially Chinese Internet filtering blocks access to websites containing:
Anti-social opinions and activities (decided by China censors)
Organizations and commentaries which are a threat to national security (Tibet, Taiwan, etc)
Pornography
Organizations and commentaries undermining the government’s policies on religion (Falung Gong)
Websites helping to circumvent Internet censorship
It is also possible that your website could be blocked in China by mistake, websites blocked by China ISPs are also likely to be deindexed from China based search engines and will not be shown in the results.
How China blocks websites on the Internet
It is not technically feasible for Chinese censors to examine all of the Internet content, the Chinese government blocks access to websites using firewalls and proxy servers at the Internet gateways of China’s ISPs.
Researchers from the University of California, Davis and University of New Mexico found out that the Great Firewall of China is not a true firewall since banned material is sometimes able to pass through several routers or through the entire system without being blocked.
Website filtering is done through and ad-hoc network without a centralized server it is possible for some web sites to be in one Chinese city and available accessing it from another region of China.
When the Chinese Internet filtering system detects a banned word traveling across the network it sends a series of commands to break the connection and block the access to the website. Chinese internet filtering looks for the use of banned words, this will encourage a certain level of self-censorship from Chinese surfers since they know that certain words are taboo they will choose a different topic altogether.
Filtering was particularly erratic at Internet peak times when more Chinese users were online.
Website banned in China
How to reduce the likelihood of your site being blocked in China
Do not post political material considered sensitive by the Chinese Government: Some obvious content susceptible to be blocked by the Chinese authorities includes references to the Falung Gong spiritual movement, Tiananmen Square protests, democracy in China, Taiwan independence and the free Tibet movement in between others.
Get a dedicated IP for your hosting: This will reduce the chances of your site being blocked by accident due to using a shared hosting account hosting content banned in China in a different domain.
Do not publish pornography: Internet pornography is forbidden in China and the Internet police will block access to your site if they find out your website distributes it.
Get a webhost located in China: Chinese webhosts are more expensive and downtime might be higher than in other locations but they are also less likely to be blocked by the Chinese Internet filter.
Although administered by the Chinese government Hong Kong is not subjected to Internet censorship as it has special status.
Test if a website is blocked in China
Site24x7: This service will ping a website from different locations across the world, including servers located inside China, if you notice a packet loss from those servers this could indicate that the site is not accessible in China.
ViewDNS China firewall test: This test checks for symptoms of DNS poisoning, one of the more common methods used by the Chinese government to block access to websites, the test uses test a number of servers from various locations in mainland China.
Watch Mouse: This service monitors your website access from various locations across the world, including tests using servers located inside China.
WebSite Pulse: This test will connect to your site and will download the complete HTML web page using various servers located across China, it will also report how long it takes to download.
GreatFirewallOfChina: Websites are tested used various servers located in mainland China, you will be informed whether the request has timed out, it failed (blocked) or it is reachable.
If you need to perform frequent tests on website accessibility or SEO from inside China you can use China based VPN, this will mask your real IP and make you appear like you are Chinese Internet surfer.
Web2PDF is a free service to convert websites to PDF and it allows you to receive full websites in your email as a PDF files.
It is being sold as a service for those with limited access to the Internet but it also works fantastic to bypass Internet filters, as long as you can access to your email you can ask Web2PDF to send you via email any website in the World, whether blocked by your ISP in your country or not, Web2PDF servers converting sites to PDF are located in the United States and that is the location that will matter when you request a blocked site is sent to you.
I have tested Web2PDF requesting pornographic sites are sent to my email and it works very well with the service sending me via email a PDF that includes pictures and text.
I tried to request single pictures or single files from a website and it returns a blank PDF, the request needs to be a full page and not a single file, the PDF that Web2PDF sends you is non clickable you can not visit the links included, other than that this works perfectly well, it took 2 minutes for my banned website to be received in my email inbox, just make sure you can receive attachments.
There is no Internet filter capable of blocking this page retrieval system, it would be necessary to block your access to all email services for that. You can also use a mobile device able to read PDF files and capable of receiving email and browse the Internet this way, however data bills must still be taken into consideration.
Read websites without Internet access
If you do not have Internet access at home and normally use a Library or Internet cafe for an hour a day you can ask Web2PDF to convert to PDF all of the websites you would like to browse, save the PDF converted sites on a USB memory stick and read them with time in the comfort of your home with an E-book or any other device able to read PDF files.
If your College or workplace limits your Internet connection to only email, you can request Web2PDF the websites be sent to your email and get around the filter restrictions. Any network administrator looking at your activities will not be able to know that you are browsing the Internet and what sites you visit, at most they could see that some of your emails contain attachments and its size but not able to read the content if you use an email service with SSL encryption protecting you from from man in the middle attacks.
Web2PDF tutorial: Click to picture enlarge
Web2PDF tutorial
To receive any website in your email as a PDF document send a message to: SUBMIT @ WEB2PDFCONVERT.COM simply write the URL you want to retrieve in the subject or body of the message and leave the rest of the message blank, you should receive a copy of the requested website in your inbox in a few minutes.
You can use Web2PDF if you do not have a proxy server and want to anonymously visit a site without anyone knowing and leaving no logs on the server, if you request the site is sent to you via email the only IP logged by the site you are reading will be the Web2PDF computer IP address, I have checked this on my own server and Web2PDF bot identifies itself as ISP VolumeDrive located in Clarks Summit, Pennsylvania, United States.
VolumeDrive is a data centre, I am assuming that is where their automated bot resides, although Web2PDF itself has its headquarters in Lithuania (Europe).
I do not know the maximum number of websites you can request to be sent to your email but there is a cheap premium option that removes that limitation, allows you choose the paper quality and it removes their company logo from the PDFs sent to your email.
Search the Internet using your Email
If you are not sure of the website URL address you want to retrieve, you can use a service called Web2Mail that works like Web2PDF and has extra features, it will not send you PDF files it uses HTML files instead which reduces the size of the email.
To use Web2Mail to search the internet via email you just input the search words in the email subject, send it to their address at WWW @ WEB2MAIL.COM and you will get a reply with your internet search results in your inbox in 5 minutes.
Web2Mail also allows you to set up Email subscriptions to your favourite web pages, you don’t need to request them all the time, you can set up Web2Mail to send you a copy of certain website daily or weekly to your email inbox.
A Network Attached Storage, commonly known as NAS, is a centralized device dedicated to data storage used to share files over a network, either your own local home network or the wider Internet.
Network Attached Storage devices contain one or more hard drives and are networked with other appliances, NAS units are configured for file sharing between multiple computers. If they contain more than one hard disk they can be configured as a JBOD (Just a Bunch Of Disks), or in RAID to facilitate data back up and quick file access.
Small and remote offices and home networks they all normally use a NAS appliance for file sharing, NAS drives have software that can be set to automatically back up every computer on the network and they can also be used as a servers but very few of them include data encryption capabilities.
The NAS operating system and other software on the NAS unit provides the configuration and management of the data storage and access functionality.
CryptoNAS is a multilingual Debian based Linux live CD with a web based front end that can be installed into a hard disk or USB stick. CryptoNAS has various choices of encryption algorithms, the default is AES, it encrypts disk partitions using LUKS (Linux Unified Key setup) which means that any Linux operating system can also access them without using CryptoNAS software.
CryptoNAS configuration and settings
CryptoNAS provides two packages: CryptoNAS-Server and CryptoNAS-CD
The CryptoNAS-Server: Targeted at network administrators and it adds hard disk encryption to a file server (running Samba, NFS, DAV, etc.).
The CryptoNAS-CD: Targeted at home users and it allows for easy NAS device encryption and browsing through a web interface.
CryptoNAS default username and password are admin:admin you should change both as soon as you have it installed. The next step is to create a configuration partition for CryptoNAS settings to be stored, after that you can enable disk encryption, format the hard disk using your file system of choice and enter the passphrase to be used, CryptoNAS will start encrypting the hard disk straight away, you will be able to see the progress clicking on status.
CryptoNAS interface
Your router will need to be in the same subnet, which means its IP needs to be 192.168.0.1. Check the default gateway address through the network connection details, log into your router and change the address in the LAN/network settings if necessary.
To access CryptoNAS through your web browser use https://192.168.0.23 you will get a message warning you about a problem with the security certificate since CryptoNAS uses a self-signed certificate, ignore it and go ahead.
If you switch off the computer where CryptoNAS is running the encrypted hard drives on your NAS will shut down and it will be inaccessible until you reopen it again entering the correct passphrase. You must remember that as long as CryptoNAS is running with the disks mounted the data is unencrypted and the encryption key held on RAM memory, only if someone disconnects your NAS device (i.e. NAS device gets stolen) or you turn it off encryption will secure your data.
Alternatives to CryptoNAS
Use stand alone free open source encryption software like Diskcryptor or Truecrypt to encrypt your NAS hard drive and mount them on request.
Use a NAS device that comes with encryption integrated, QNAP, Seagate, and Synology all have AES256 encryption for some of its high end Network Attached Storage products.
Use FreeNAS, a free open source NAS distribution based on FreeBSD that also allows for encryption of NAS hard drives.
Every time you visit a website with your Internet browser through the HTTP header exchange the server will know what your browser brand you are using as well as your settings and what plugins you have installed, this data will be used in order to give you the optimum experience to serve you the best content for your Internet browser settings.
Typical information that the Internet browser transmits to the server of the visited website are the operating system, the Internet browser brand, browser version, local language settings (which can be used to determine what your native language is), if JavaScript is disabled or enabled, flash or Java plug-in presence and anything else to do with the browser environment, the combination of all of these settings together with data like geolocation, can make your browser unique and enable someone to identify and track you through websites.
Test your Internet browser uniqueness
According to an study by the Electronic Frontiers Foundation only one person in about 1,500 will have the same User Agent as you, once you combine this data with geolocation and unique browser plugins you can see how your Internet browser can become so unique that it can be used to track you down.
Before you do this be aware first that changing your identifying browser user agent can make a website to display tailor made content for a different browser brand and present you with a malfunctioning page, but not in every case, this is just the price for achieving high Internet privacy. You can always disable the browser User Agent fake ID for trustworthy websites you trust and only use for places that you believe could be tracking you down on the Internet.
The fingerprinting of your Internet browser uses a combination of your computer IP, browser header and configuration information, one of the best things you can do to confuse websites tracking you down is to use a VPN to change your geolocation combined with a random browser user agent.
It is inevitable that either because of a shaky ISP connection or some other network or software problem your Internet connection will drop at some point and if you happen to be using a Virtual Private Network proxy to browse the Internet when your VPN disconnects, you will not get a visible warning and you will carry on browsing or sharing files peer to peer as normal with your computer IP exposed for everyone to see.
The worst part of your VPN connection dropping out and not getting a warning is that you will not realize of this and your anonymous Internet surfing will have been compromised without you ever knowing, your OpenVPN software normally automatically reconnects after the VPN connection has dropped but by then your computer IP will have been compromised.
How to stop a VPN disconnection showing your computer IP?
Use an SSH tunnel for anonymous Internet surfing instead of a VPN
One option is to use an SSH tunnel instead of a VPN, when you have your browser configured to browse the Internet through an SSH tunnel when the Internet connection goes down for whatever reason the browser stops working, as simple as that.
The downside of using an SSH tunnel is that you will need to configure every single application to go through it but once you have done it once this is not difficult, your SSH tunnel provider should be able to provide you with instructions.
Most anonymity providers are jumping into the VPN bandwagon and there are not many SSH tunnels providers left, some of the ones I know of are Cotse, VPNSecure, and JTAN ProShell.
Another advantage of using an SSH tunnel for anonymous Internet browsing instead of a VPN is that it is very easy to make it work in all Unix systems, it does not matter if your main operating system is Linux, Solaris or NetBSD instead of Windows. When you use an SSH tunnel for anonymous Internet browsing you do not have to rely on the OpenVPN software given by VPN providers, which usually is closed source.
If you use an SSH tunnel for anonymous internet surfing you will also have two IPs at the same time, your real computer IP in one browser, not configured to go through the SSH tunnel, and your anonymous SSH tunnel IP to be used with a second browser to visit sensitive sites.
It is fairly easy to set up your own private SSH tunnel on a cheap shared Virtual Private Server if you know about Unix and are comfortable with the command line. Setting up your own private VPN server on the other hand normally requires a dedicated server which makes it much more expensive and not economically worthwhile for a single user.
Get a VPN provider that protects your privacy from VPN disconnections
Not all VPN providers are made equal and some of them have realised that there is a huge privacy problem when the VPN connection drops and your computer IP is exposed without warning, some VPN providers are starting to include a new feature to stop your browser from accessing the Internet unless it is through the VPN.
There are few VPN providers I know of that provide this at the moment, one of them is Hide My Asswhich has a secure IP bind which forces your specified application to only work behind their encrypted VPN. Another VPN provider that will protect you against disconnections is IdealVPN it comes with software called VPNGuardian that shuts down your Internet when the connection breaks.
Always ask a VPN service if they have they have protection against disconnections revealing your real IP before buying their product.
VPNCheck
Use a software application to stop IP exposure after VPN disconnection
VPN LifeGuard: Open source freeware application that will cease all traffic (P2P, browser,etc) in case of VPN disconnection. It can automatically reconnect the VPN and there is a portable version available, it only works with PPTP.
VPNCheck: VPNCheck will disable your web browser or any other specified application to stop your real IP being exposed when your VPN connection breaks.
VPNetMon: VPNetMon prevents unsecured connections after your VPN connection goes down, VPNetMon will close down the specified applications when your Virtual Private Network disconnects.
Use a firewall to force all your applications through the VPN
Using a software firewall you can tell it to allow applications to connect only through the VPN, including your browser, the only downside to this is that firewalls all have very different configuration settings and you will probably need to read the documentation or ask at some computing forum about how to bind your browser with your VPN connection.
The firewall that comes with Windows has few configuration options, Comodo Firewall can be customized to your taste to stop all Internet browsing that does not follow your established rules like going through the VPN.
Local Shared Objects (LSO), commonly known as Flash cookies, are used by any website that contains Flash based animations or videos, the Flash Player uses a sandbox security model and the cookies it installs are not handled by your browser, this means that you can not delete them using the browser cookie manager.
There is relatively little public awareness of Local Shared Objects, many of the most popular sites on the web are dependent on Flash, and thus a high percentage of Internet users have installed the Flash plug-in.
Adobe Flash Player default settings does not seek the user’s permission to store Flash cookies on the hard disk, those cookies are then used for tracking purposes by websites. Online banks, merchants or advertisers all may use hard to erase Flash cookies for tracking purposes.
Flash cookies storage mechanism is sometimes used by evercookies and since they are not browser based there is currently no easy way for the average user to remove them, simply deleting the files does the job but a user would need to know where they are located. This makes Flash cookies very persistent on the local system and hard to erase without specialist software.
The private browsing features in Chrome and Firefox are a complete false sense of privacy and security since both browsers do not have build in protection against Flash cookies not even in private mode browsing.
Differences between conventional cookies and Flash cookies
The Flash standard incorporates local Shared Objects (LSOs), which allows data such as preferences to be stored in the local Flash instance on a user’s machine. Flash cookies are stored as individual files with a .sol file extension, by default they are less than 100 Kb in size and unlike traditional HTTP cookies, they have no expiration date.
A browser cookie has a limit of just 4Kb while flash cookies can store up to 100Kb.
A browser cookie has an expiration date a flash cookie does not expire.
A browser cookie can be deleted using the browser cookie manager, a Flash cookie can not.
Flash Cookies give very similar information to what we find in traditional HTTP cookies such as what websites were visited, when the site was first and last visited and since the .sol (Flash cookie extension) files are saved individually, there are also a set of file system timestamps that give away the date and time certain website was visited.
Important to note that Flash based advertisements also have the ability to save Flash cookies in your computer and you do not need to have visited their domain in order to have one of its cookies stored in your hard disk, just viewing and advertisement from that website will be enough reason to have one of its Flash cookies in your hard disk.
MAXA cookies manager
Firefox plugins to delete flash cookies
NoScript FireFox addon: The NoScript Firefox extension provides extra protection for Firefox, Seamonkey and other Mozilla-based browsers. This free open source add-on allows JavaScript, Java and Flash and other plugins to be executed only by the trusted web sites of your choice.
BetterPrivacy FireFox addon: BetterPrivacy is a safeguard which protects from usually not deletable Flash cookies on Google, YouTube, Ebay. Better Privacy Firefox extension is a free tool for identifying and removing Flash cookies from your local system.
Ghostery browser addon: Available for Firefox and Chrome, able to detect trackers, web bugs, pixels, and beacons placed on web pages by ad networks, behavioural data providers, web publishers, and other companies interested in your activity. Ghostery allows you to block scripts from companies that you don’t trust, delete local shared objects, and even block images and iframes.
Click&Clean FireFox addon: This Firefox addon can erase all temporary Internet files, remove downloaded files history, cookies (including Flash cookies) and typed URLs. Quick&Clean allows to delete private data when Firefox closes.
Windows software to delete Flash cookies
Flash Cookie Cleaner: Freeware application that allows you to view and delete the flash cookies from your computer, it does not offer customization but gets the job done quickly and efficiently.
Maxa Cookie Manager: A windows tool that can manage Flash cookies together with conventional cookies, works with all major browsers and handles all kinds of cookies in a centralized way. The Pro version allows you to keep some cookies while deleting the tracking cookies and web bugs.
.sol Editor (Flash Shared Object): This open source Flash cookie editor can open and create a Macromedia Flash shared object file (.sol), display the content of the file and allow you to change the values.
Macromedia Flash manager: By visiting Macromedia Flash settings website you can view Flash cookies locally stored in your computer and use the Adobe Flash player manager to delete Flash cookies as well as deciding to trust or reject them permanently in the future.
To make sure your system is clean of Flash cookies you can perform a search of your entire hard disk, including hidden and system files, for the extension *.sol, since Flash cookies use the .sol extension.