poisonbl wrote: Weaver wrote:
OsirisX wrote:d*mn school computers doesn't even let me install the client, and blocks every possibly proxy site imaginable....
SSH Tunneling my friend. Run your SSH server on port 80 and there is no stopping you...
that only works if you have a way to put a box outside in the open internet, not just sitting in, for example, verizon's wan (i've had bad experiences with people in 3 different WANs trying to find each other's BF1942 servers), ... all my boxes sit in one closed net or another (school, apartment, etc.), i can go out, but i cant get in from anywhere else ... hmmm, i do kinda work with my department's (engineering at WVU) tech group right now (technically, i start tomorrow at 9am) ... maybe after i get settled in, i'll play more ...
Well of course. There are only a few fundamental ways to defeat a filtering proxy. One of the ways is legitimately get around it using the mechanisms built into the proxy itself. Be it an override password or whatever.
Another is to break the proxy by force or with finesse. Break into the box it is running on, reconfigure and away you go. This method is not recommended as it is illegal, but always available.
Another way is to simply bypass the proxy. Many organisations configure clients so that its default gateway (default route) points to an interface on the proxy server. Then the proxy server communicates with an edge device like a router to send the datagram on its way out to the Internet. Bypassing the proxy would require a simple change of the default gateway to point to the edge device (router, etc). Note that this will not work if the filtering/proxying is done at the ISP level. Note that there are many reasons why this method will not work (edge device and proxy server are on physically different LAN segments), but I have seen it work in many cases.
Another way is to actually get out of the network legitimately by creating a tunnel (SSH, VPN, etc). The other end of this tunnel obviously has to be a location that the proxy server and router will let you connect to. Once the tunnel is up, it can be configured in a way that all of your requests pass through the tunnel and then go out to the Internet from the other end. The bottom line with this approach is that you have to have a device outside of the proxied network, and that device has to be reachable.
The primary purpose of the DATA statement is to give names to constants; instead of referring to pi as 3.141592653589793 at every appearance, the variable PI can be given that value with a DATA statement and used instead of the longer form of the constant. This also simplifies modifying the program, should the value of pi change.
-- FORTRAN manual for Xerox Computers