[ DONATE TO RMN ] [ Return to Main Page ] [ Read Prev Article ] [ Read Next Article ] [ CGI Media News Room ] [ SUBSCRIBE TO RMN ]

RMN is Reader Supported

Our Goal for JULY:
$2500

Powered by FundRazr

Click Widget
or Click Here to contribute.

Checks & Money Orders:

Raye Allan Smith
P.O. Box 95
Ashtabula, OH 44004


Powered

by FundRazr

Users Online:
68

Who Founded RMNews?



Dewitt Jones' Video
"Celebrate What's Right
With The World"


"When the
Starships Fly!"

Listen at YouTube



Join Rayelan's YahooGroup. Get Breaking News, photos that will warm your heart and more!

Click to join Rayelan
Click to join Rayelan

Do you send exciting and timely information to your special emailing group? How about joining the Rumor Mill News Yahoo Group and start sending RMN your emails?

Click to join RUMORMILLNEWS
Click to join RUMORMILLNEWS

RSS feed FOR READING the RMN YahooGroups


The Theme for The Obergon Chronicles

Listen at YouTube


The Obergon Chronicles ebook


RUMOR MILL
NEWS RADIO


RAYELAN.COM

COMMON GROUND
INDEPENDENT MEDIA


RMN 2012
Earthquake Link List!

Compiled by Earthgrid!


THE OBERGON
CHRONICLES


DIANA, QUEEN
OF HEAVEN


THE DIANA FORUM

ACTIVATED CELLULAR MEMORY

TEMPLAR PROSPERITY MEDITATION

WHAT ARE
THE FACTIONS?


THE AMAZING
RAYELAN ALLAN


BIORHYTHMS

LOTTO PICKS

OTHER WAYS TO DONATE

DIANA,
QUEEN OF HEAVEN:
The New World Religion


CURRENT MOON




RUMOR MILL NEWS AGENTS WHO'VE BEEN INTERVIEWED ON RUMOR MILL NEWS RADIO

______________

NOVEMBER 2008

Kevin Courtois - Kcbjedi
______________

Dr Robin Falkov

______________

Melinda Pillsbury Hr1

Melinda Pillsbury Hr2

______________

Daneen Peterson

______________

Daneen Peterson

______________

Disclosure Hr1

Disclosure Hr2
______________

Scribe
______________

in_PHI_nitti
______________

Jasmine Hr1
Jasmine Hr2
______________

Tom Chittum Hr1
Tom Chittum Hr2
______________

Kevin Courtois
______________

Dr Syberlux
______________

Gary Larrabee Hr1
Gary Larrabee Hr2
______________

Kevin Courtois
______________

Pravdaseeker Hr1
Pravdaseeker Hr2
______________

DECEMBER 2008

Tom Chittum
______________

Crystal River
______________

Stewart Swerdlow Hr1
Stewart Swerdlow Hr2
______________

Janet Swerdlow Hr1
Janet Swerdlow Hr2
______________

Dr. Robin Falkov Hr1
Dr. Robin Falkov Hr2
Dr. Robin Falkov Hr3

JANUARY 2009 ______________

Patriotlad
______________

Patriotlad
______________

Crystal River
______________

Patriotlad
______________

Dr. Robin Falcov
______________

Patriotlad

FEBRUARY 2009

Find UFOs, The Apocalypse, New World Order, Political Analysis,
Alternative Health, Armageddon, Conspiracies, Prophecies, Spirituality,
Home Schooling, Home Mortgages and more, in:

The Rumor Mill News Reading Room

For possible Future Use: Censorship & Domain To IP Converter

Posted By: Swami
Date: Monday, 29-Aug-2016 17:26:05

Internet censorship in China - Wikipedia, the free encyclopedia

https://en.wikipedia.org/wiki/Internet_censorship_in_China

"Technical implementation

Main article: Golden Shield Project

Current methods

The system blocks content by preventing IP addresses from being routed through. It consists of standard firewalls and proxy servers at the Internet gateways. The system also selectively engages in DNS poisoning when particular sites are requested. The government does not appear to be systematically examining Internet content, as this seems to be technically impractical.[41] Researchers at the University of California, Davis, and at the University of New Mexico said that the censorship system is not a true firewall since banned material is sometimes able to pass through several routers or through the entire system without being blocked.[25] Details for some commonly used technical methods for censoring are:[42]

IP blocking

The access to a certain IP address is denied. If the target Web site is hosted in a shared hosting server, all Web sites on the same server will be blocked. This affects all IP protocols (mostly TCP) such as HTTP, FTP or POP. A typical circumvention method is to find proxies that have access to the target Web sites, but proxies may be jammed or blocked. Some large Web sites allocated additional IP addresses (for instance, an IPv6 address) to circumvent the block, but later the block may be extended to cover the new addresses.[citation needed]

DNS filtering and redirection

The DNS doesn't resolve domain names or returns incorrect IP addresses.[43] This affects all IP protocols such as HTTP, FTP or POP. A typical circumvention method is to find a domain name server that resolves domain names correctly,[44] but domain name servers are subject to blockage as well, especially IP blocking. Another workaround is to bypass DNS if the IP address is obtainable from other sources and is not blocked. Examples are modifying the Hosts file or typing the IP address instead of the domain name in a Web browser.

URL filtering

Scan the requested Uniform Resource Locator (URL) string for target keywords regardless of the domain name specified in the URL. This affects the Hypertext Transfer Protocol. Typical circumvention methods are to use escaped characters in the URL, or to use encrypted protocols such as VPN and SSL.[45]

Packet filtering

Terminate TCP packet transmissions when a certain number of controversial keywords are detected. This can be effective with many TCP protocols such as HTTP, FTP or POP, but web search engine pages are more likely to be censored. Typical circumvention methods are to use encryption means, such as VPN and SSL, to protect the HTML content, or reducing the TCP/IP stack's MTU, thus reducing the amount of text contained in a given packet.

Man-in-the-middle attack

GFW can use a root certificate from CNNIC, which is found in most operating systems and browsers, to make a MITM attack. On 26 Jan 2013, the GitHub SSL certificate was replaced with a self-signed certificate in China by, generally believed, the GFW.[46]

TCP connection reset

If a previous TCP connection is blocked by the filter, future connection attempts from both sides will also be blocked for up to 30 minutes. Depending on the location of the block, other users or Web sites may be also blocked if the communications are routed to the location of the block. A circumvention method is to ignore the reset packet sent by the firewall.[47]

VPN blocking

Beginning in 2011, users reported disruptions of Virtual Private Network (VPN) services.[48] In late 2012, the Great Firewall was able to "learn, discover and block" the encrypted communications methods used by a number of different VPN systems. China Unicom, one of the biggest telecoms providers in the country was terminating connections where a VPN is detected, according to one company with a number of users in China.[49]

Other reported methods have included:

Network enumeration

It has been reported that unknown entities within China, likely with deep packet inspection (DPI) capabilities, have initiated unsolicited TCP/IP connections to computers within the United States for the purported purpose of network enumeration of services, in particular TLS/SSL and Tor (anonymity network) services, with the aim of facilitating IP blocking.[50]

Future projects

The Golden Shield Project is owned by the Ministry of Public Security of the People's Republic of China (MPS). It started in 1998, began processing in November 2003, and the first part of the project passed the national inspection on 16 November 2006 in Beijing. According to MPS, its purpose is to construct a communication network and computer information system for police to improve their capability and efficiency. By 2002 the preliminary work of the Golden Shield Project had cost US$800 million (equivalent to RMB 5,000 million or 620 million).[51] Greg Walton, a freelance researcher, said that the aim of the Golden Shield is to establish a "gigantic online database" that would include "speech and face recognition, closed-circuit television... [and] credit records" as well as traditional Internet use records.[52]

A notice[53] issued by the Ministry of Industry and Information Technology on 19 May stated that, as of 1 July 2009, manufacturers must ship machines to be sold in mainland China with the Green Dam Youth Escort software.[54] On 14 August 2009, Li Yizhong, minister of industry and information technology, announced that computer manufacturers and retailers were no longer obliged to ship the software with new computers for home or business use, but that schools, Internet cafes and other public use computers would still be required to run the software.

A senior official of the Internet Affairs Bureau of the State Council Information Office said the software's only purpose was "to filter pornography on the Internet". The general manager of Jinhui, which developed Green Dam, said: "Our software is simply not capable of spying on Internet users, it is only a filter."[55] Human rights advocates in China have criticized the software for being "a thinly concealed attempt by the government to expand censorship".[56] Online polls conducted on Sina, Netease, Tencent, Sohu, and Southern Metropolis Daily revealed over 70% rejection of the software by netizens.[57][58] However, Xinhua commented that "support [for Green Dam] largely stems from end users, opposing opinions primarily come from a minority of media outlets and businesses".[59][60]

"

~~~

Convert a list of domain names into IP Addresses

http://domaintoipconverter.com/index.php

This tool allows you to bulk convert a list of domain names into a list of IP addresses. Simply paste a list of domain names (one per line) and submit the form to batch convert them to the IP addresses for the servers they're hosted on.

~~~

Example results:

domaintoipconverter.com > 107.170.40.77
rumormillnews.com > 45.79.195.246
infowars.com > 158.85.210.65
rense.com > 216.240.137.172
whatreallyhappened.com > 173.236.29.251
zerohedge.com > 52.206.164.155
lewrockwell.com > 104.25.254.4
drudgereport.com > 65.97.58.36
activistpost.com > 104.200.30.4
youtube.com > 172.217.0.46
amazon.com > 54.239.25.192
duckduckgo.com > 184.72.106.52

~~~

It would be nice to have a Firefox Add-on to automatically perform this conversion on all bookmarks, and locally store the ip addresses, hint, hint.

There are many VPN services out there too.





If you enjoyed this article,
Please consider a monthly subscription to Rumor Mill News!!


RMN is an RA production.

The only pay your RMN moderators receive
comes from ads.
Please consider putting RMN in
your ad blocker's whitelist.

Serving Truth and Freedom
Worldwide since 1996
 
Politically Incorrect News
Stranger than Fiction
Usually True!




Aquasana Home Water Filters

^

Organic Sulfur 4 Health

Aquasana Home Water Filters

TEMPLAR PROSPERITY MEDITATION

^


AGENTS WEBPAGES

Provided free to RMN Agents



Aquasana Home Water Filters




Organic Sulfur 4 Health

TEMPLAR PROSPERITY MEDITATION

^


AGENTS WEBPAGES

Provided free to RMN Agents



[ DONATE TO RMN ] [ Return to Main Page ] [ Read Prev Article ] [ Read Next Article ] [ CGI Media News Room ] [ SUBSCRIBE TO RMN ]

The Rumor Mill News Reading Room is maintained by Forum Admin with WebBBS 5.12.