Disabling the proxy settings in Internet Explorer.This method will NOT work with packet filters
This is the quickest method but can sometimes be tricky. In this case we will assume that the settings have been locked, the desktop does not have any icons, the run command is missing from the start menu, and that you have been denied access to the registry editor.
NOTE: Internet Explorer cannot be running while you are activating this patch (Steps 2-5) or it will not take effect.
1. Copy the code at the end of the article and save it as ByeByeBESS.reg or anything else that you want as long as it ends in .regNOTE: This file can be downloaded at home and then put on a disk.2. On the computer that is limited by Bess, Start Notepad or Paint and choose Open from the File menu.3. Go to the Disk (probably the A: drive) and in the drop-down box labeled "Files of Type", choose "All Files (*.*)"4. You should see the file you downloaded. Right-Click it and then, in the menu that appears, left-click on "Merge"5. When you see the message saying that it worked, click ok and then start internet explorer.
NOTE: You can also accomplish this by unlocking the settings using the system policy editor which is on the windows CD and should fit on a disk.
Using a Proxy ServerThis method will work with packet filters and NAT blocks
There are two main types of Proxy Servers. However, they both function roughly the same:
1. You tell the server where you want to go2. It downloads the page you are looking for3. It tells Bess that it is the source of the page and then gives it to you.
The first of the two types is the regular proxy server. Server-side censorware products are actually modified proxies.You can find lists of regular proxy servers using google by typing the keywords FREE PROXY. The fatal flaw to this technique is that the proxy server is rendered useless if it is blocked by the NAT Router.This method works with an alternate browser or with internet explorer. To use an alternate browser, simply type the address of the proxy into the appropriate box in the preferences page. It is also possible to create a patch to unlock Internet Explorer.
The second type of proxy is the CGI proxy. The difference is that a CGI proxy can be used simply by browsing to it with your browser.You can run your own CGI proxy server if you have either an always-on internet connection like Cable or DSL, a dial-up connection that you can leave on, or if you have a web page account with CGI support.
If you want to run your server at home, install the Apache Web Server and Perl and then follow the instructions for if you have a CGI-enabled server.
If you have a CGI-enabled web server, download and install one of these packages:
* CGIProxy* AccessWeb* HTTP Bridge* And Others...
They will convert your site into a CGI Proxy server
The fatal flaw to this technique is that the proxy server is rendered useless if it is blocked by Bess.
Using a Secure Tunnel
This method will work with packet filters and NAT blocks
A secure tunnel is a technique by which your machine can exchange data with another by hiding it within seemingly innocent data. You can find the software at Sourceforge. The downside is that the unblocked computer must be running Linux and that this can be very complicated to set up.