Mega Track Info Block Bypass. How to get around IT prohibitions at work. A comprehensive solution for access to blocked resources from all home network devices

We will be frank: For many of us, our workbook is a small island house outside the house. Probably, it is just true, given that our home computer is often a branch office outside the office. Therefore, in breaks between the writing of reports and thinking summary tables With the calculations, we use our work computers for your personal life. We buy products for the birthday, watching funny clips on YouTube and rewrite with friends on "ICQ" or email.

And very often some things make it easier to do with the help of consumer technologies than with the help of often clumsy corporate technologies - compare at least gmail mail With a corporate mailbox.

In this regard, one problem arises: our employers are unhappy with our behavior in the workplace. Partly because they want in the workplace we worked. And partly they are afraid that what we do, threaten the internal network of the company. Therefore, they ask the IT-Division to prohibit us to drag your personal life from home to work.

What, fairy tale the end? Well, no, not so fast. To find out whether it is possible to bypass the prohibitions of the IT department, we applied for advice to experts on network resources. Namely, we asked them to find 10 main secrets who hide from us from the IT department. For example, how to go to a locked site and not leave traces, or how to communicate in real-time chat without loading for this prohibited program.

However, so that everything is fair, we also appealed to security specialists to find out what we risk by committing these bypass maneuvers.

For tips on hacking, we turned to the editor of the Internet guide to the productive use of the Lifehacker.com network Gina Trapani, the editor of the blog of the same appointment Lifehack.org Leon Ho and to Mark Frauenfelder, the founder of the BOGEBOING.NET blog and the editor of Make magazine, which gives recommendations on technology In the format "DIY".

To assess the risks, we talked to three experts who earn about the fact that they help IT departments to draw up the rules and track the intruders who torment them to break. This is John Pourdy, the main strategist on the information threats of the consulting company from Amsterdam Getronics, a specialist in information security From PricewaterhouseCoopers Mark Loubel and a threat specialist from the manufacturer's company McAfee's protective software Craig Shmugar.

So, these are 10 secrets who hides your IT-Division from you, and the dangers associated with them, as well as advice, how to protect yourself and not lose jobs when you apply them in practice.

1. How to send giant files

Problem: All of us from time to time you need to send big files, ranging from slides for the presentation and ending with photos from vacation. But if you send something harder than several megabytes, then you risk getting a message that exceed the limit installed by your company.

Companies can limit the amount of data that their employees can be sent by mail, by one simple reason: they want to avoid overloading servers, which will slow them down. A request to the manual asking to enlarge your limit on send files may be a very cloud process.

Bypass maneuver:Use Yousendit, Sendthisfile or Dropsend Internet services that allow you to send three-dimensional files for free - sometimes up to several gigabits. To take advantage of their services, it is usually required to register by providing personal information, such as your name and email address. After that, you can enter the email address of the recipient and the message for it or for it, and the site will provide you with instructions for downloading the file. In most cases, a link comes to the recipient address, going on which it can download the file.

Risk: Since these service sites send your files over the Internet, they are outside the company's control. This facilitates the task of cunning hackers that can intercept these files on the way.

How to protect yourself: Some of these sites are better reputation than others. For example, youndit - new companywhich is headed by the former head of Adobe Systems and which is funded by well-known venture companies. Other such sites offer little information about yourself and therefore, with a greater probability, you can make a booster in a security system than hackers can take advantage to kidnap your information.

If the site owners are not obvious, there are other guidelines for which you can appreciate it. Look for security icons - in Internet Explorer. Such an icon looks like a small lock at the bottom of the screen - which means that this site uses the coding system to protect the confidentiality of information from visitors.

2. How to use softwarewhich your company prohibits download

Problem:Many companies require employees before downloading programs received permission from the IT department. However, this may be problematic if you want to download the program that the guys from IT brought into the blacklist.

Bypass maneuver:There are two easy ways to solve this problem: find an alternative to this program on the Internet or bring the program to external carrier.

The first way is easier. Suppose your company does not allow you to download a popular program to communicate real-time AOL Instant Messenger. You can still communicate with your friends and colleagues using the online version of the program called Aim Express (Aim.com/aimExpress.adp). In addition, Google's company has real-time communication service Google Talk available at Google.com/Talk. . There are online versions of such programs as musical players and video games - usually they are somewhat trimmed compared to original programs.

The second approach to solving the problem is more complicated, but with it, you will receive access to the program itself on your computer. All three of our experts called Rare Ideas LLC (RareIDeas.com), which offers free versions popular programs, such as Firefox and OpenOffice. You can download programs on portable devices, for example, on the iPod or on the "flash drive", through the Portable Apps service (portableapps.com). After that, you connect this device to your desktop, and ready. (True, if your company prohibits using external devices, Consider you are not lucky.)

Risk: Using online services can create excessive load for company resources. And programs on external media, create a safety threat. People from IT prefer to keep control of the software used by the staff to in the event of a virus or other problems, they could easily fix everything. If you bring programs with you, the degree of their control is reduced.

It is necessary to remember another one: some less reliable programs, especially the program for sharing files, can be equipped with spyware.

How to protect yourself:If you bring the program on the outer carrier, says Loubel, at least change the settings antivirus program On your work computer so that he scanned the device for the subject potential threat. It is easy to make, going out in the "Settings" or "Options" menu. In the same way, if you use the file-exchanged files, configure them so that others cannot access your files, also through "Settings" or "Options".

3. How to go to sites blocked by your company

Problem:Companies often overlap their employees access to certain sites - from truly obscene (porn sites) and probably not the most respectable (sites with gambling) to almost innocent (sites with email).

Bypass maneuver:Even if your companies do not give you to enter these sites by stinging their address in top string, you sometimes still crawl around them. You go to the site called "proxy", and you dial the Internet address in the search bar. Then the proxy site goes to the site you need and gives you his image - so you can see it without going on it directly. For example, Proxy.org, serves more than 4 thousand proxy sites.

Another way to achieve the same result is offered by Frauenfelder and Trapani: use Google's translator by asking him to translate the name of the site from English into English. Just enter the following text: "google.com/translate?langpair\u003den|en&u\u003dwww.blockedsite.com", replacing "BlockedSite.com" to the address you need. Google actually acts as a proxy server, finding a site mirror for you.

Risk:If you use a proxy site to view mail or video files from YouTube, the main danger is that the authorities will be caught up. But there are more serious threats associated with safety. Sometimes bad guys who will be on the Internet are buying addresses of sites, one or two letters differ from the addresses of popular sites, and use them for infecting the visitor computers with viruses, warns Loubel. Often companies block and these sites - but if you enjoy a proxy, you will be defenseless in front of them.

How to protect yourself: Do not turn the use of proxy sites into the habit. Resort to this method only to enter certain sites, access to which your company has closed in order to increase productivity - for example, YouTube. And more inactive with spelling.

4. How to check the tracks on the corporate laptop

Problem: If you use a laptop owned by a company to work from home, it is very likely that you use it for personal purposes: you organize family leave, buy books for reading on the beach, make up photo-albums on the Internet, and so on. Many companies reserve the right to track everything that you do on this computer because technically he is the property of the company. What will happen if ... uh ... Your friend will accidentally get acquainted for a porn site or will look for a medicine on the Internet from some shameful illness?

Bypass maneuver: Latest versions internet browsers Explorer and Firefox allow you to drop tracks. In IE7, select Tools, then DELETE BROWSING HISTORY. Here you can either erase the entire history of your visits by selecting Delete All, or choose several links that you want to erase. In Firefox, simply press Ctrl-Shift-Del or click on the Clear Private Data in the Tools menu.

Risk:Even if you clean your story, free internet surfing still puts you at risk. You can inadvertently picing on some dubious spyware site or create legal problems for the boss by your behavior. If you are caught, at best, you threaten an awkward situation, and at worst - you risks to lose work.

How to protect yourself:Surrender your personal data as often as possible. Even better, do not use the working computer for anything that you would not like to inform your bosses.

5. How to find working documents from home

Problem:You commend your work late in the evening or on weekends - but the document you need remained on the office computer.

Bypass maneuver: Google, Microsoft, Yahoo and IAC / InteractiveCorp offer software quick search Documents on the computer desktop. In addition, some of them allow from one computer to search for documents stored on the desktop of another. How it works? The search engine saves copies of your documents on your server. Thus, it can scan these copies when you make a remote search.

To use on Google - one of the most popular - you need to do the following steps. First, install Google's account on both machines by visiting Google.com/accounts. . (Be sure to use the same account on both computers.)

Then leave the desktop.google.com website and download software to search on the desktop. When it is installed, again on both machines, click on Desktop Preferences, then on Google Account Features. Tick \u200b\u200bopposite the phrase Search Across Computers. From now on, all the documents you open on both computers are copied to Google servers, which will allow you to find them from both computers.

Risk: Corporate Technology Specialists imagine a catastrophic scenario: you have saved extremely secret financial information on your work computer. Installed the program to access these files from your personal laptop. And then the laptop was lost. Ah ah ah.

In addition, experts discovered in google program To search for computers vulnerable places, thanks to which hackers can force the user to provide them with access to the files, says Shmugar from McAfee. (After that, these problem areas were corrected, but others may be there, he says.)

How to protect yourself:If there are files that do not have any circumstances on your work computer, ask the system administrator from IT to help you install Google Desktop. So, to avoid leaks.

6. How to store working files online

Problem: In addition to searching on the desktop, most people who often have to work out of the house found their own decision. They save working files on portable devices or in the company's network, from where they take them remotely. But portable devices can be too cumbersome, and the connection with working network It happens slow and unreliable.

Bypass maneuver:Use online storage services such as Box.NET, Streamload or AOL XDrive belonging. Most of them offer a free service for saving information from one to five gigabytes, and for a package with an additional place take a few dollars a month. Another partisan method is to send yourself these files on your personal email, such as Gmail or Hotmail.

Risk: Bad guys can steal your password for one of these sites and contracted copies of the secret materials of your company.

How to protect yourself:When you are going to save one or another file on the Internet, ask yourself what will happen if it is widely available or falls into the head of the company, which is your main competitor. If nothing terrible happens, continue.

Problem: Many companies have the opportunity to track emails Employees both in the working address and other electronic addresses, as well as communication on ICQ.

Bypass maneuver:When you send emails from your personal electronic drawer Or from the working mail, you can encode them so that only the addresis can read them. In Microsoft Outlook, click on Tools, then Options and select the Security string.

You can enter a password here, and no one can open a letter without knowing this password. (People who are intended for those letters, you, of course, must report this password in advance.)

For personal correspondence with postal services On the Internet, use the Frauenfelder advice. When you check your mail, add the letter S after "HTTP" in the address line in the address line - for example, https://www.gmail.com. Thus, you will start a secure session, and no one can track your letters. However, not all web services support it.

To encode your real-time communication, use the Trillian service from Cerulean Studios, which allows you to work with AOL Instant Messenger, Yahoo Messenger and other real-time communication programs and help encode conversations in such a way that no one outsider read them.

Risk:The main reason on which companies track the electronic correspondence of employees are to catch those who transmit confidential information. Resorting to all the above tricks, you can provoke false alarm, and complicate the IT staff to fight the real threat.

How to protect yourself:Encountered methods only from time to time, and do not use them by default.

8. How to get remote access to the working mail if your company does not want to be broken by the PDA

Problem:Everyone who has no PDA, is familiar to this feeling: you went to the restaurant to have lunch or drink beer after work, and here everyone got into pockets for their PDAs, and only you are forced to pump a glass alone.

Bypass maneuver:You can also keep in touch with a workingwall using various mobile devices. Just configure your work mail so that the letters are sent to your personal email address.

In Microsoft Outlook, you can do this by clicking on right button Mouse when working with any letter by selecting "Create a rule" and asking you to send you all letters to another address. Then configure your own mobile phone so to check with it email, Following the instructions from your provider (this is the company that sends you the accounts for the phone).

Risk:Now hackers can hack not only your computer, but also your phone.

How to protect yourself:There is a "right" way to access the work mail using various personal mobile devicesAfter taking a password and other information in the IT department.

9. How to access personal mail from working CCP

Problem:If your company provided you with a PDA, you are probably encountered with the opposite problem. You want to check your personal mail just as easily as a worker.

Bypass maneuver:Note the "Settings" section of your personal mailbox and make sure that you have activated POP (email protocol) used to receive mail through other addresses. Then go to the site of your services provider for the BlackBerry PDA. Click on the "Profile" button, find the Email Accounts section there. mailboxes") And select Other Email Accounts (" Other mailboxes "). Then click on Add Account (" Add Box ") and enter information about your Personal electronic address. Now your personal mail will come there as and corporate.

Risk:Your company is likely to use a whole arsenal of means to ensure safety and combat viruses and spyware. When you get a personal mail on BlackBerry, it comes, bypassing these protective barriers. This means that spy software or viruses can penetrate your PDA through personal mail, says Shmugar from McAfee.

What is even worse, he says when you connect BlackBerry to your working computer, there is a chance that this spyware is moved to the hard disk.

How to protect yourself:Cross your fingers and feel that your email provider does everything that depends on it to protect against viruses and spyware (perhaps it is it).

10. How to pretend that you work

Problem:You are engaged in vital search on the Internet, and suddenly the boss appears at your back. Your actions?

Bypass maneuver:Quickly press Alt-Tab to minimize one window (for example, in which you explore the ESPN.com website) and open another (with the preparation for today's presentation).

Risk:Good news: in terms of the security of the company, it does not face anything.

How to protect yourself:Take up work.

If you use the Internet services (and this is definitely so, since otherwise you could not read this article b), and also live in the Russian Federation, then you probably know what site blocking is. For you, this is expressed in the fact that the provider, referring to the decision of Roskomnadzor or any other administrative authority, or other "significant" cause blocks access to a particular site. Therefore, of course, you can not go to this resource in the future.

We will dedicate this article to the review of this issue. In it, we consider the reasons why sites, as well as technologies, thanks to which it can easily get around. You will learn how to disable despite any attempts of the provider not to let you down at a particular resource.

How do we go to the site?

So, for a start, to understand how the sites blocking works, you need to figure out a little about how we get to a particular resource, as the Internet is generally arranged and why someone can not allow us somewhere. Let's start with a bundle - DNS, IP and domain name.

So, you know that the Internet, with which you go to the network, is provided by your provider. Monthly you make payments for using it with services, choose tariffs, speed and so on. The provider, in turn, sends you to the DNS server, which handle your request when you try to visit a particular resource. The DNS server, in turn, converts your request and redirects you to the IP address on which the site is located. And the domain name of the site (for example, google.com) is simply an alphabet expression of an IP address that is easier to perceive.

Blocking mechanism

If you want to know what it should be understood at what level the resource was blocked. The first level is the easiest - this is a DNS blocking. It is easy to remove it - use the public servers that are now full. Now addresses are provided by Google, Comodo, Norton, DNS Advantage and other service providers. It is enough just to register the numbers of their DNS in your computer settings to use them. Since there are no restrictions on public servers, go to "VK" or other service you can without any problems.

Lists available for use of proxy servers can be found on Hideme.ru sites, FreeProxy.ru and others. In addition to free lists, There are also access to which it opens for a certain amount. At the same time, such lists are used, as a rule, professional programmers and hackers. For home use, you are most likely free, and free proxies.

VPN - encrypt "full"

Another technology of how to get around the blocking of sites (Rostelecom is or any other operator is not important) is VPN. This tool is a "tunnel" encrypted connection of your computer with a destination server. Its charm is that all the data that will be transmitted during the action of the session will be encrypted, and no one can intercept them. This means not only the complete anonymity of all your actions at the computer, but also the security of transmitted data and, of course, the option of how to bypass the site blocking "Odnoklassniki" (and not only).

To use a VPN to your computer, you will need to install a client program. It should also be considered that the servers through which your data will be passed, do not work for free. For the use of VPN technology, you need to pay from 5 dollars per month, depending on the degree of protection. Well, of course, solving the question: "How to bypass the blocking of sites by the administrator?" This approach can not be because the admin of your network is likely to notice the data needed to encrypt data. But on home computer You will be able to use complete freedom of action.

Among the most popular services that provide VPN data encryption services should be selected: webmastervpn.com, inferno.name, geosurf.com, ibvpn.com, boxpn.com and others. The difference between them is the geography of server location, as well as the cost of final services and the depth of data encryption. The more servers will be involved in the work scheme, the greater will be the likelihood that to track where you go in fact, it will be unrealistic. Yes, and do this, most likely no one will be.

Tor - Forget about blocking

Another, more secret and difficult to ensure that the TOR program can be called. In fact, if you remember, we have already been briefly mentioned at the beginning of the article, so now we describe the principle of operation in detail.

The application consists of a set personal computersconnected to a single network. The information between them is transmitted by special encrypted channels that are constantly changing, because of which it is impossible to track them. In addition, the number of participants changes in the TOR system, which is why it is a real "headache" for special services. It was repeatedly tried to turn her, drown and some other way to eliminate. However, TOR alive.

As already noted, the whole market of narcotic drugs are operating in the system, which can be ordered and sell using encrypted information transmission channels. In addition, Tor has a giant pornography catalog, predominantly prohibited, the placement of which is not allowed in the "ordinary" Internet on simple hosting. Due to this, the TOR connects an increasing number of people, and the control services are only bred by their hands. We can use this program if we do not know how to bypass the blocking of the site "VKontakte" and others prohibited by some administrative authority. In addition to the program, you will be available to any resource from any country in the world, you can also save anonymity using it. Thus, you should not worry about any persecution for violation of the prohibition - no one simply will be able to track your computer.

A little morality

As you can see, in this article we painted several ways that such a blocking of sites, how to get around it and make it so that no one can see you. Perhaps some users described instructions may seem like something complex and inaccessible, but it is not. Each of the tools specified in this article can enjoy the one who owns a PC at the base level. Some special knowledge so that the site for blocking sites does not allow you to visit one or another resource is usually not required.

However, it should be understood that we do not encourage violate the established legislation. All materials are given here exclusively for familiarization. After all, if the Internet site was banned for visiting and blocked by your provider, it means that it is not recommended to go on it, it contains materials, including who can harm you. The question arises: "Do you need to bypass the blocking of such a site?"

It's one thing when it is blocked by an objectionable regime in the state that interests you purely for review; And another, when users browse pirate films (even do it all), ordered narcotic drugs or distribute them, buy weapons or browsing pornography. If we talk about the last, then such prohibitions, on the contrary, protect some users (for example, children) from such materials, which is an explicit benefit. And of course, in this case, the measures that are being made by providers around the world can be called positive.

In addition, some services can be used not only to unlock resources, but also to protect your data, including personal, location.

Causes of Rutracker.org blocking in Russia, possible methods Log in.

The administration of the Rutracker.org website provided users themselves to solve the fate of the resource. Reason to block steel creation of Russian authors Which and so no one downloadslocated on the resource.

About two weeks the voting continued,
According to the results of which 2/3 of the participants expressed next opinion: Forbidden content from the site not delete, and allow you to block access to the site from the territory of the Russian Federation forever.

Thus, in a month, when trying to enter the rutraker, users will see the acquaintance "this resource is blocked". The official blocking of the site providers began January 25, 2016.

The most simple ways to enter Rutracker.org to the browser means.

1. Tor browser

Bypass torrent tracker blocking is the main scope of the TOR browser. Installation file With installation instructions - download.
All you need is to install a browser from the archive. From the first session, it will use proxy servers to connect to the desired site. There is in this and its cons: the connection speed can be quite low (when using IP, for example, Canada, New Zealand or Australia). All sessions in the browser are one-time, so entering a login password will have every time again.

You can use both the main domain and a special ONION-link (http://rutrackerripnext.onion/) if connections with the site did not happen, restart the browser or select "New Tor Chain for this site" in the "New Chain" settings. Probably the Russian proxy was involved.

All active Internet users in Ukraine shocked the presidential decree on the ban of the Russian social network In contact with. In addition, in Ukraine, classmates, Male.ru, Yandex, and all related services of these companies were blocked.

We offer to your attention step-by-step instructions for unlocking access to prohibited sites. This leadership is relevant for Russian Internet users, with its help you can return access to Ruther, flibuse and a variety of other torrents and useful sites!

Several options are offered how to bypass the blocking of sites in Ukraine:

How to get around the blocking of websites by the provider using VPN

Virtual private network, also known as VPN. With this connection, you can pretend to be a citizen of other countries in which the sites you need are not prohibited. Thus, the user who uses such a network in Ukraine can count on encryption of absolutely all transmitted and obtained data, and the channel for which such manipulations occur is protected. This function is provided various extensions In browsers, even in such as Yandex.

To install such a connection in the browser Google Chrome. You must go to the extension directory, the path to them lies through the settings.

As soon as the desired option is found - you need to go to the search for extensions, that is, get to the online store. In the search column we prescribe a VPN and get several extensions in response to help cope with the task.

Actually, open any of them and install, after turn on and get yourself a stable operation of the Yandex search engine and a social network classmates as in the old days.

For example, you are shown the first expansion of all available - Zenmate. After installation, you will need to register using email, and then its function button will glow in the upper right corner of the screen.

As soon as all these simple operations are held, it is necessary to choose a country through which traffic will go, and the question of how to bypass the blocking of websites by the provider will not be increasing.

You can choose another other extension called Hola! However, he has a drawback associated in violation external view Some pages. Of the advantages, you can select the ability to quickly view a different media system, as the loading video load is accelerated by using other user users, which also installed the plugin.

In addition to these extensions, the VPN connection can be used a little differently by using such a browser as Opera. To configure the connection, you must go to the settings, find the Security tab and put a check mark on the VPN.

Block bypass on the smartphone (VPN applications)

It is worth noting that to bypass blocking VC and classmates from the phone there are similar services such as Opera VPN, Turbo VPN, TunnelBear, Zenmate and others. Find them in Android MarketInstall and confirm the registration in the application itself (if necessary).

Depending on the application, you either immediately connect to the VPN when it starts, or you will be forced to set necessary settings. As soon as all this is done, free access to the locked provider of sites will appear. The only inconvenience of such a solution is the need to launch the VPN application every time when using social networks, which is partially solved by the VPN resolution to work in a background without unloading from memory.

Using a proxy server

The proxy server works on the principle of an intermediary. Simply put, a person sends a request to the resources you need, and the proxy server processes it and sends it directly to the locked site, after which it transmits this information back to the user. All these frauds are invisible, of course, however, with the setting of this access option, it will have to tinker a little, and the contents of the contents of the web pages will be very slow.

Access to the locked page is obtained in the following way: Find a proxy server on the Internet, an example of which proxfree, Hide My Ass, Ninjacloak, etc., after which in the field enter the address of the page of interest. After a few seconds, the query will appear on the screen. In general, the use of VPN sees a much more convenient solution.

How to open a blocked site using Tor

There is a program called Tor, it is needed here. An anonymous network that is engaged in transmitting traffic in an encrypted form, and also gives warranty on absolute anonymity.

The system on the principle of sending requests among many other users is working, while the amount of shipment cannot be traced. Only the first and end node will know what kind of information is requested. For installation, register the request on the Internet. Tor Browser., go to the official project site, choose last version Downloadable application and run it after downloading. After installation, the option will be offered standard settings, It is he who needs.

By choosing it, it will take some time, the application configuration will be completed and ready to use. In fact, this is an ordinary browser in which the network surfing occurs similarly to Chrome, Opera, Yandex-browser, etc.

Now you know how to go to the sites blocked by the government. Use free Internet without absurd restrictions!

Initially it was assumed that the Internet was global networkwhich connects the whole world. However, in reality, many web resources can be blocked in separate regions in accordance with legislative initiatives. How to do if you still need to access a locked site? We collected several reliable and effective ways To bypass blocking forbidden resources.

1. Opera web browser

Another reliable way to block the blocking is to use the Tor Browser web browser based on Mozilla Firefox.. Browser Tor It is a client application for the anonymous network of the same name. To ensure user privacy, multi-level encryption and routing of your network traffic on a distributed network are used.

This technology prevents the external observer of your Internet connection to find out which websites you visit, prevents the situations from finding your physical location, and also allows you to access locked web resources.

The main disadvantage of using Tor - low speed Connections. However, you pay for the anonymity and confidentiality of personal data. The browser can be used absolutely free and without restrictions.

Some locks can be carried out by changing the DNS settings. In this case, to bypass the blocking, it is enough to change the DNS server on the computer or on the router. When trying to visit a blocked site, a third-party DNS server will redirect your traffic through the tunnel. The remote server will consider that you get access from the relevant country, and the site will work.

When configuring the DNS on the router, the sites will be unlocked on all devices in home network. At the same time, you do not need to constantly change dNS settings. The connection will be stable for all your traffic.

Google Public DNS is a free global service domain name system (DNS) used as an alternative to the DNS of your Internet provider. Advantages: Increased speed, reliability and safety of the Internet connection.
CLOUDFLARE DNS - WORK "1.1.1.1" is focused on speed and privacy protection, providing fast and secure web surfing on the Internet.

Using next Services and instructions, you can create and run your own VPN or proxy server.

Outline VPN is a service that allows any user to create and launch your own VPN server. And to provide other users access to this server.
3Proxy on FreeBSD - Ready Script Settings and step-by-step instruction For rent I. fast setting virtual Server For proxy.