473,803 Members | 3,380 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

how to bypass firewall

Hello everyone,
I need some help regrading byassing firewalls.My college has internet
aces but it prevents us from dowloading music(*.mp3,*.m id,etc.)from the
net.I use a win xp sp2 and browse using ie 6. Is there any way how i
can dowload music on my computer using this connection. (We have a
proxy server throught which all the connections pass)

Thanks,
Parth Shah

Nov 22 '05
10 6293

"Parth" <pa*********@gm ail.com> wrote in message
news:11******** **************@ g43g2000cwa.goo glegroups.com.. .
Hello everyone,
I need some help regrading byassing firewalls.My college has internet
aces but it prevents us from dowloading music(*.mp3,*.m id,etc.)from the
net.
Then Don't - The firewall, being lame as those things are, probably looks
for *and logs* specific URL's and plain-text file names. So the first step
is to not use things that it recognises.
I use a win xp sp2 and browse using ie 6. Is there any way how i
can dowload music on my computer using this connection. (We have a
proxy server throught which all the connections pass)
So *you* must have a proxy server *outside* the firewall to do the
downloading, then fetch through the firewall using some protocol that hides
the content - The combine of SSL and HTTP probably *will* go through
cleanly.

Since this is supposedly relevant to Python, how about the proxy being
Shareaza "remoted" with Pythons XML-RPC over SSH using Wx-Python as a GUI?

Maybe even support streaming so all the "warez" reside on the proxy, yet the
music plays where you are; it's probably the safest way. "Don't shit where
you eat" - "They" come and kick the door in - but not at your place.

*That* would be a neat project.

PS:

Once you got your proxy setup, you do not really need to go through the
firewall at all. A DVD/RW goes straight through with lots of bandwith ;-)

Thanks,
Parth Shah

Nov 22 '05 #11

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

4
1579
by: Dean J. Garrett | last post by:
I have a site which offers documents (.doc, .pdf, etc.) for download. The user clicks on the link and is able to download the file or open it. What if the source location of the document is behind a firewall of a remote server (i.e. not the server running the ASP application)? How can the link be configured in such a way so that security parameters are passed to the firewall to authenticate the access. This must be seamless to the user,...
2
2786
by: Rajesh Kapur | last post by:
Hello, We use Informix and MySQL on linux/unix to drive our web application. SQL*Server is used only for backend enterprise applications within the firewall. I am trying to get the management to use SQL*Server outside the firewall. They tell me there are security issues with Microsoft products, including SQL*Server, that make it vulnerable to attacks outside the firewall. Can someone please point me to white papers/documentation that...
3
6777
by: Bohus | last post by:
would like to make firewall that checks all outgoing traffic from my computer. This firewall should ask me to allow or deny all outgoing traffic. Is it possible to make such firewall using C# ? If yes, can you give me some starting point where should I go in .NET Framework (namespaces, or MSDN resources, ...) to get started. Thank you.
2
17989
by: Mahesh Devjibhai Dhola | last post by:
Can you please help me in my problem? I have a socket prog. application like http://www.codeproject.com/dotnet/csharpwhiteboard.asp My application is chat application like above architecture. I want to bypass firewall aswell as proxy if any on two chat clients like yahoo or msn can chat beyond proxy/firewalls...
7
4098
by: Randy Yates | last post by:
Is opening up port 5432 (R/W both directions) all that is required of a firewall in order to access a postgres database outside the firewall? -- % Randy Yates % "My Shangri-la has gone away, fading like %% Fuquay-Varina, NC % the Beatles on 'Hey Jude'" %%% 919-577-9882 % %%%% <yates@ieee.org> % 'Shangri-La', *A New World Record*, ELO http://home.earthlink.net/~yatescr
1
1660
by: Schalley Ben | last post by:
Hi First of all, this is my first post on a newsgroup so don't shoot me if I ask this in the wrong place. Here is the situation. I'm developing an asp.net application with access to a SQL Server 2000 on the companies network. On my development machine I have Bitdefender Internet Security v10 installed. With the Bitdefender Firewall disabled I have no problems in surfing and debugging the application. However when the firewall is...
3
11816
by: CanuckChuck | last post by:
I have a code for enabling a command button to password protect the enabling/disabling of the Shift bypass. For some reason though I keep recieving a syntax error when I try to use it. I copied the code from the following link: http://www.databasedev.co.uk/disable_shift_bypass.html It seems to have a problem with the part that reads: MsgBox "The Bypass Key has been enabled." & vbCrLf & vbLf & _ "The Shift key will allow the users to bypass...
1
6874
by: OlaPihl | last post by:
Hi, How can I by code enable and disable "Bypass proxy server for local adresses" in Internet Explorer / Tools / Internet Options / Connections / LAN Settings. I have made a program (VB.Net) that can enable and disable the proxy server but I can't find how to do the "bypass ......" Would really appreciate som help.
1
2621
by: rada.lambretha | last post by:
Configuring Linux as a Firewall * Making installation choices * Introducing iptables * Using iptables commands * Simplifying things with firewall GUIs * Adding proxy functionality As Linux gains increasing acceptance in corporate datacenters and
0
9703
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
9565
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it. First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
0
10550
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
0
10317
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
0
9125
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
0
6844
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
0
5501
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
0
5633
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
3
2972
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.