Friday, April 8, 2011

Facts about your Android mobile.



Did you know that your Android mobile can support VPN? 


If you like to use your Android Phone for Internet browsing through public Wi-Fi spots or hotspots, if you are worried about your privacy, if you are going abroad and you will have to use your home media files securely? Or you are among the few who know that the traffic they send over internet using emails, Instant messages or just any other data that does not uses SSL encryption can easily be decrypted using even free tools! Then you should get a VPN Connection!

But hey, wait! Did you know that using VPN, you can have much more benefits? Imagine yourself as a national of this whole world and not just a single country? Confused? It is simple, just read on!

Today, there are many countries/online services like TV watching and even some games that put geographical restrictions on their users. However, is you use a you can easily get an IP of the country of your choice and can then act as if you are the national of that particular country! So what are you waiting for? Become a Global National, get VPN! Protect yourself and the one you care about!

Monday, April 4, 2011

OpenVPN Compatibility

Is OpenVPN standards-compliant?


As a user-space VPN daemon, OpenVPN is compatible with SSL/TLS, RSA Certificates and X509 PKI, NAT, DHCP, and TUN/TAP virtual devices. OpenVPN is not compatible with IPSec, IKE, PPTP, or L2TP.


Can OpenVPN tunnel over a TCP connection?


Yes, starting with version 1.5.


Can I use a web browser as an OpenVPN client?


No. While OpenVPN uses the SSL/TLS protocol for security, OpenVPN is not a web application proxy. It is an OSI layer 2 or 3 full-mesh internetwork tunneling solution and requires that OpenVPN be installed on both client and server.


OpenVPN runs on:


OpenVPN runs on Linux, Windows 2000/XP/Vista/7 and higher, OpenBSD, FreeBSD, NetBSD, Mac OS X, and Solaris

Why SSL VPN?

Does OpenVPN support IPSec or PPTP?


There are three major families of VPN implementations in wide usage today: SSL, IPSec, and PPTP. OpenVPN is an SSL VPN and as such is not compatible with IPSec, L2TP, or PPTP.
The IPSec protocol is designed to be implemented as a modification to the IP stack in kernel space, and therefore each operating system requires its own independent implementation of IPSec.
By contrast, OpenVPN's user-space implementation allows portability across operating systems and processor architectures, firewall and NAT-friendly operation, dynamic address support, and multiple protocol support including protocol bridging.
There are advantages and disadvantages to both approaches. The principal advantages of OpenVPN's approach are portability, ease of configuration, and compatibility with NAT and dynamic addresses. The learning curve for installing and using OpenVPN is on par with that of other security-related daemon software such as ssh.
Historically, one of IPSec's advantages has been multi-vendor support, though that is beginning to change as OpenVPN support is beginning to appear on dedicated hardware devices.
While the PPTP protocol has the advantage of a pre-installed client base on Windows platforms, analysis by cryptography experts has revealed security vulnerabilities.

Why OpenVPN uses TLS?

Why choose TLS as OpenVPN's underlying authentication and key negotiation protocol?


TLS is the latest evolution of the SSL family of protocols developed originally by Netscape for their first secure web browser. TLS and its SSL predecessors have seen widespread usage on the web for many years and have been extensively analyzed for weaknesses. In turn, this analysis has led to a subsequent strengthening of the protocol such that today, SSL/TLS is considered to be one of the strongest and most mature secure protocols available. As such, we believe TLS is an excellent choice for the authentication and key exchange mechanism of a VPN product.

Why OpenVPN?

What distinguishes OpenVPN from other VPN packages?


  • OpenVPN's principal strengths include cross-platform portability across most of the known computing universe, excellent stability, scalability to hundreds or thousands of clients, relatively easy installation, and support for dynamic IP addresses and NAT.
  • OpenVPN provides an extensible VPN framework which has been designed to ease site-specific customization, such as providing the capability to distribute a customized installation package to clients, or supporting alternative authentication methods via OpenVPN's plugin module interface (For example the openvpn-auth-pam module allows OpenVPN to authenticate clients using any PAM authentication method -- such methods may be used exclusively or combined with X509 certificate-based authentication).
  • OpenVPN offers a management interface which can be used to remotely control or centrally manage an OpenVPN daemon. The management interface can also be used to develop a GUI or web-based front-end application for OpenVPN.
  • On Windows, OpenVPN can read certificates and private keys from smart cards which support the Windows Crypto API.
  • OpenVPN uses an industrial-strength security model designed to protect against both passive and active attacks. OpenVPN's security model is based on using SSL/TLS for session authentication and the IPSec ESP protocol for secure tunnel transport over UDP. OpenVPN supports the X509 PKI (public key infrastructure) for session authentication, the TLS protocol for key exchange, the OpenSSL cipher-independent EVP interface for encrypting tunnel data, and the HMAC-SHA1 algorithm for authenticating tunnel data.
  • OpenVPN is built for portability. At the time of this writing, OpenVPN runs on Linux, Solaris, OpenBSD, FreeBSD, NetBSD, Mac OS X, and Windows (2000/XP and later versions). Because OpenVPN is written as a user-space daemon rather than a kernel module or a complex modification to the IP layer, porting efforts are dramatically simplified.
  • OpenVPN is easy to use. In general, a tunnel can be created and configured with a single command (and without any required configuration files). OpenVPN's documentation contain examples illustrative of its ease of use.
  • OpenVPN has been rigorously designed and tested to operate robustly on unreliable networks. A major design goal of OpenVPN is that it should be as responsive, in terms of both normal operations and error recovery, as the underlying IP layer that it is tunneling over. That means that if the IP layer goes down for 5 minutes, when it comes back up, tunnel traffic will immediately resume even if the outage interfered with a dynamic key exchange which was scheduled during that time.
  • OpenVPN has been built with a strongly modular design. All of the crypto is handled by the OpenSSL library, and all of the IP tunneling functionality is provided through the TUN/TAP virtual network driver. The benefits of this modularity can be seen, for example, in the way that OpenVPN can be dynamically linked with a new version of the OpenSSL library and immediately have access to any new functionality provided in the new release. For example, when OpenVPN is built with the latest version of OpenSSL (0.9.7), it automatically has access to new ciphers such as AES-256 (Advanced Encryption Standard with 256 bit key) and the encryption engine capability of OpenSSL that allows utilization of special-purpose hardware accelerators to optimize encryption, decryption, and authentication performance. In the same way, OpenVPN's user-space design allows straightforward porting to any OS which includes a TUN/TAP virtual network driver.
  • OpenVPN is fast. Running Redhat 7.2 on a Pentium II 266mhz machine, using TLS-based session authentication, the Blowfish cipher, SHA1 authentication for the tunnel data, and tunneling an FTP session with large, pre-compressed files, OpenVPN achieved a send/receive transfer rate of 1.455 megabytes per second of CPU time (combined kernel and user time).
  • While OpenVPN provides many options for controlling the security parameters of the VPN tunnel, it also provides options for protecting the security of the server itself, such as --chroot for restricting the part of the file system the OpenVPN daemon has access to, --user and --group for downgrading daemon privileges after initialization, and --mlock to ensure that key material and tunnel data is never paged to disk where it might later be recovered.

What is OpenVPN?

With OpenVPN, you can:


  • tunnel any IP subnetwork or virtual ethernet adapter over a single UDP or TCP port,
  • configure a scalable, load-balanced VPN server farm using one or more machines which can handle thousands of dynamic connections from incoming VPN clients,
  • use all of the encryption, authentication, and certification features of the OpenSSL library to protect your private network traffic as it transits the internet,
  • use any cipher, key size, or HMAC digest (for datagram integrity checking) supported by the OpenSSL library,
  • choose between static-key based conventional encryption or certificate-based public key encryption,
  • use static, pre-shared keys or TLS-based dynamic key exchange,
  • use real-time adaptive link compression and traffic-shaping to manage link bandwidth utilization,
  • tunnel networks whose public endpoints are dynamic such as DHCP or dial-in clients,
  • tunnel networks through connection-oriented stateful firewalls without having to use explicit firewall rules,
  • tunnel networks over NAT,
  • create secure ethernet bridges using virtual tap devices, and
  • control OpenVPN using a GUI on Windows or Mac OS X.

Saturday, April 2, 2011

OpenVPN Portable Powered By ProXPN

You can also view the updated Free VPN 2012 using OpenVPN here.

Free Internet and for Online Gaming
 Introducing OpenVPN Portable powered by ProXPN

For Globe and Smart User.

Click here to register an account in ProXPN and select No thanks, I want a proXPN Basic account
(bandwidth limited to 300kbps) and fill up the form, Note: use a valid email address to register in ProXPN, because ProXPN send a confirmation to the email to be able to use your account.

After downloading the file \OpenVPNPortable Powered By Proxpn\data\config\ account.txt and put your email address and password of your registered ProXPN account.

Note : Your modem should be Connected.

For Globe : You should have maintaining balance of (P0.00)
For Smart : You should have maintaining balance of (P1.00)

Dashboard Setting :

For Globe :
Config Filename : Name you want
Dial number: *99***1#
APN: http.globe.com.ph
For Smart :
Config Filename : Name you want
Dial number: *99#
APN: internet
No need to configure your OpenVPN. It has a built-in Proxy.
Tested on Globe and Smart.

Open your OpenVPN portable.
For Windows 7 always Run as Admin.
Please Click yes if OpenVPN portable requires to install Virtual Network Drivers.



After installing Virtual Network Drivers. Splash Screen will appear.
Now, right click the OpenVPN GUI on the system tray.



Click Connect.
Wait until it's successfully connected.



Now, enjoy free internet using VPN.

Lovely apps at Apple Games/Apps

How to use ProXPN

This software is TESTED on Globe Broadband Only! Try also to your Smart Broadband.

After installing ProXPN.
Go to C:\Program Files\proXPN\config
Open ProXPN.ovpn then paste and save the following:
NOTE: Make sure to back up the original ProXPN.ovpn config file.

client
dev tun
proto tcp
remote miami.proxpn.com 80
resolv-retry infinite
nobind
persist-key
persist-tun
ca ssl/ca.crt
cert ssl/client.crt
key ssl/client.key
cipher BF-CBC
keysize 512
comp-lzo
verb 4
mute 5
tun-mtu 1500
mssfix 1450
auth-user-pass
reneg-sec 0
redirect-gateway def1 bypass-dhcp

# If you are connecting through an
# HTTP proxy to reach the actual OpenVPN
# server, put the proxy server/IP and
# port number here. See the man page
# if your proxy server requires
# authentication.
;http-proxy-retry # retry on connection failures

or

Use Parent Proxy Tricks :

client
dev tun
proto tcp
remote miami.proxpn.com 443
resolv-retry infinite
nobind
persist-key
persist-tun
ca ssl/ca.crt
cert ssl/client.crt
key ssl/client.key
cipher BF-CBC
keysize 512
comp-lzo
verb 4
mute 5
tun-mtu 1500
mssfix 1450
auth-user-pass
reneg-sec 0
redirect-gateway def1 bypass-dhcp

# If you are connecting through an
# HTTP proxy to reach the actual OpenVPN
# server, put the proxy server/IP and
# port number here. See the man page
# if your proxy server requires
# authentication.
;http-proxy-retry # retry on connection failures
http-proxy 141.52.28.8 80 #you can change 141.52.28.8 80

Working Proxy:

141.52.28.8 80
129.186.136.105 80
121.134.218.89 80
12.24.248.14 80
147.171.65.3 80
12.30.120.67 80
139.174.200.2 80
166.111.142.79 80
120.118.254.200 80
208.96.213.149 80
216.139.170.50 80
58.42.232.80 80
200.252.42.216 80
157.95.56.15 80
164.78.252.110 80
96.4.142.35 80
75.254.128.202 80
216.109.73.20 80
216.139.170.55 80

For Smart Proxy :

202.133.50.193 8080
95.170.202.78 8080
202.145.3.52 8080
118.97.12.188 8080
77.104.233.46 8080
125.162.188.113 8080
193.198.185.3 8080
94.125.27.20 8080
58.150.182.76 8080
125.162.39.172 8080
84.54.160.34 8080

How to configure FireFox

Open your FireFox browser.
1. Click Tools
2. Click Option





3. Click Advanced
4. Click Network Tab
5. Click Settings





6. Click Manual Proxy Configuration
7. Under HTTP Proxy. Input : 127.0.0.1 port : 9666
8. Check use this proxy server for all protocols.


Friday, April 1, 2011

How to Configure UltraSurf

Open UltraSurf


Click Option.



Check "Don't use IE"
Check "Hide Golden Lock"
Click Proxy setting.



Click Manual.



Please check working Proxy below.
After you input the Proxy manually, please wait the Usurf until connected.





Proxy :


For Smart




Proxy: 10.102.61.46
Port: 8080




For Globe




Proxy: 203.177.42.214 port 8080(100% working)
192.40.100.20 port 8080(100% working)
Other working proxies:
203.177.91.131:80
202.149.67.82:8080
118.97.234.253:8080
119.252.162.120:8080
202.51.107.34:8080
222.124.213.118:8080
210.23.77.200:8080
125.162.242.160:8080
201.18.15.11:8080
192.40.100.20:8080




How to configure FireFox Browser!