Total Pageviews

Friday 31 May 2013

在PHP空间搭建Tw2other

在众多Twitter同步的方法中,Tw2other是最好的选择。首先,Tw2other不会同步自己的用户名;其次,能过滤@、RT推;最后,同步的延迟只有几十秒,算的上是实时同步。

对于Tw2other的搭建,网上也有很多教程,所以今天这一篇并不想重复网上的内容,而是侧重如何在000webhost上搭建Tw2other。能在000webhost上搭建Tw2other的话,在其他主机上搭建只会更简单,举一反三即可。

000webhost是一款优秀的美国免费主机,号称比某些收费主机还好,据说能免费到2012年(然后看是不是世界末日再决定是不是继续免费么。。。),但其速度和稳定性确实对得起这个“号称”。

Tw2other是由@ cluries开发的基于php主机的Twitter同步程序,具体可以查看项目主页(http://code.google.com/p/tw2other/, http://code.google.com/p/tw2ohter/)。另外,插一句,如果没有耐心折腾的话,这一篇就直接无视吧,那么好的免费主机浪费了也怪可惜的。

下面就开始介绍搭建的步骤。

空间申请

可能由于中国地区的滥用,000webhost是不对中国地区的IP开放申请的。所以,申请000webhost的免费空间时,最好使用高匿代理或者VPN,否则申请是不会予以通过的。网上所说的Submit Ticket这一招也早就不管用了。

代码下载

到(http://code.google.com/p/tw2ohter/downloads/list)下载源码,最新版已经支持腾讯微博,但由于对腾讯没有好感,所以这一篇使用的是0.85版本。

代码修改

这是最重要的一步。从项目主页下载的代码,如果直接上传到空间,是肯定不会搭建成功的。因为000webhost限制了对twitter.com的访问,所以要对代码进行修改,以绕过这一限制。

需要对3个文件进行修改:

1. twitteroauth文件夹下的twitteroauth.php
修改很容易,原则就是把所有含有“twitter.com”的链接换成二级域名,具体如何修改见下图。这里有我已经修改好的 (http://www.mediafire.com/?35vf3pydo4zfups),其中oauth验证用的是@ LonelySwan的itap,当然自己搭建的itap也可以。


2. config.php
这是Tw2other的设置文件,大部分需要设置的里面都有说明,就不重复了。需要注意的是:
define ( 'INTERVAL', 50 );——是同步延时,不建议修改
define('OAUTH_DIR','../../oauth/');——是用来设置oauth文件夹路径的,视情况自己修改
$twitterSyncLevel = 0;——是用来设置是否过滤@、RT推的,视需要自己修改

3. cron.php
要在这里填上index.php的路径

代码的修改就这些,当然要在Twitter注册Application获取CONSUMER_KEY和CONSUMER_SECRET,同步到新浪微博的话还要在新浪微博注册应用获取api_key,这里就不赘述了。

代码上传

代码的上传用FlashFxp就行了。这个无需多说。
需要注意的是需要把tw2other文件夹、cookies文件夹、oauth文件夹设置为可写,即权限777。

Cron Job设置

000webhost是支持cron job的,只有设置了cron job才能实时同步。

第一步,登录用户面板。

第二步,进入CPanel。

第三步,进入Cron Jobs,并按下图设置即可,方框内要填上“/public_html/tw2other/cron.php”,即cron.php的绝对路径。


至此,Tw2other在000webhost上搭建完毕。

使用方法

只需访问http://XX.OO.com/tw2other,oauth验证一下即可。如果不成功的话,将Tw2other目录下的lock文件删除,重新oauth验证。

当看到Tw2other文件夹下,有tweet.id和update.time文件时,证明oauth成功,并且cron job正常工作。

此时Tw2other的搭建大功告成,尽情享受同步的乐趣吧.

绿豆ROOT神器

http://www.ishuaji.cn/
http://www.ishuaji.cn/root.html

Thursday 30 May 2013

提升 网站访问速度之设置HTTP缓存

快速打开自己的网站,是每个站长的梦想。每次打开百度、新浪等网站,心中都默默地希望自己的网站也能达到这样的速度。今天就先讲一下其中一个提升网站访问速度的方法:设置合理的HTTP缓存。


缓存是什么?

简单地说,就是将网站上的一些静态资源(图片、js、css等)存储在本地,这样在用户第二次打开网页时,就直接从本地读取而不必再次从网站重新下载这些资源。这个功能不但提升了网页打开速度,也减轻了服务器带宽等压力。目前大多数浏览器厂商都提供了这一功能。


缓存有多大作用?

缓存的作用有多大?如果用户不会打开你网站的第二个页面,那缓存就没有作用。但是对于一个大型网站来说,缓存则是必不可少的。比如百度,首页日均PV约为10亿,在首页上加载的百度logo(http://www.baidu.com/img/shouye_b5486898c692066bd2cbaeda86d74448.gif,size:1.54KB)在每次访问时都会显示出来,假如关闭缓存并忽略304命中,那么每天将产生1.54*1000000000 (KB)=1468.66(GB)也就是约1.5TB流量,假如全天24小时跑满,那么需要至少:(1503906.25*8)/86400=140MBps这么大带宽的主机,生产环境流量不可能24小时均衡的,并且这只是这一张LOGO图片的流量需要这么大的资源,而其它的资源并未考虑到。所以,百度明智地对这张图片配置了长达10年的缓存。


如何设置缓存?

在Apache环境下,可以通过在.htaccess文件中添加下面的代码,设置图片的HTTP缓存和有效期(需要开启apache的headers模块支持):

# Image and Flash content Caching for ONE Year mydomain.com

Header set Cache-Control "max-age=3156000"

其中max-age后面这个数字就是设置的缓存有效期(以秒为单位),比如上面的代码设置了网站的图片使用为期一年(3156000秒)的HTTP缓存。

在Nginx下,可以通过修改nginx.conf配置文件,来修改缓存设置:

location ~* \.(flv|gif|jpg|jpeg|png|ico|swf)$ {
expires 1y;
access_log off;
break; }

同样的方法,你也可以给js和css文件设置缓存。


如果要修改缓存的文件怎么办?

前面我们对静态文件设置了长达1年的缓存,一般来说这些静态文件很少修改,可是万一要修改呢?

别担心,HTTP1.0标准协议中规定,HTTP缓存只对单独的URL有效。

所以,如果你对静态资源做了修改,只需要在url后面带个参数,就可以更新缓存文件了。

比如,我对博客的图片设置了1年缓存,图片链接为http://mydomain.com/test.jpg。在访问这个页面时加载了这个URL,输出了1年的缓存,不过缓存只对这个URL有效,如果我修改了这个图片,只需要在引用这个URL到时候在后面加个参数,如改成http://mydomain.com/test.jpg?20130531,这样用户访问到的就是新的图片。当然,更简单直接的方法是,直接修改文件名,如改成http://mydomain.com/test2.jpg


好了,关于HTTP缓存就讲这么多.

“2012年中国最经典的帖子”

按:据说是“2012年中国最经典的帖子”。黄了点儿,但也符合国情。我在十多年前就撰文建议中共把红旗改为黄旗。

一、中国40岁以上官员中,超过80%与原配常年没有性生活,他们又不准备离婚。老百姓亲切地把这种现象称为“一不做,二不休”。

二、香港的媒体如果不报导真相就会丢饭碗,我们的媒体如果报导真相就会丢饭碗,这就叫一国两制。

三、海军某首长带二奶在海边散步,指着远处的军舰说:“我在你身上花的钱都能买这艘军舰了吧?”二奶笑骂:“死鬼,那你怎么不说在我身上放的炮,都能解放钓鱼岛了!

四、2012年“敢动中国”和“中国敢动”名单新鲜出炉:敢动中国奖获名单:1日本、2菲律宾、3朝鲜、4韩国、5泰国、6帕劳、7印尼、8缅甸、 9索马里海盗、10尼日利亚。中国敢动获奖名单:1临时工、2拆迁户、3外来务工人员、4乡村医生、5流动商贩、6游行群众、7薄熙来、8捐款、9公积 金、10养老保险。

五、在中国最牛逼的事情:1、车“超载”了,车胎没爆,桥却压塌了。2、出动万人,击毙一逃犯,数百人立功。花18亿,塌一大桥,无一人负责。3、 据说在中国能安全过桥的只有云南米线了!4、每个倒塌的桥面上,必然趴着数不清的蛀虫。管你塌不塌,捞完走人。5、过个车,大桥坠毁;打个雷,高铁追尾;下个 雨,满城泡水;开个会,全国戒备;生个病,债台高垒;读个书,全家受累;眨个眼,肉价飙飞;上个访,有去无回;喝个奶,时间不对;摆个摊,城管砸毁;炒个股,终生后悔。

六、记者:“大娘,您捡垃圾幸福吗?”老人:“啥?”记者提高声音:“您幸福吗?”老人:“我耳聋你大点声”。记者声嘶力竭:“您幸福吗?”老人继 续:再大点声!记者无奈离去。老人自语:“早tm听见了,累死你个龟孙!钓鱼岛和腐败的事你不问,拎个破JB玩意满大街问穷人幸福吗?我83了还在捡破烂 你说我会幸福吗?”

2012年即将过去,总结起来,跟往年一样:杯具的一年,纠结的一年。

1、这一年,“我爸是李刚”拉开了中国人拚爹的序幕,大量的富二代官二代用他们的行动告诉我们:在中国,人生最重要的不是你所朝的方向,而是取决于你是谁的精子。

2、这一年,重庆的打黑运动让我们明白:电视上经常看到的那些衣着光鲜,人模狗样的公仆,他们往往在下一刻就变成了黑老大。而你是公仆还是黑社会,关键看你有没有站错队。

3、这一年,国与民争利达到高潮,财政收入连创新高,人民饭碗却营养不良。GDP世界第二,百姓收入勉强够活,房事彻底沦为多数人的浮云。而盛会,依然在一个叫隆重的地方举行。

4、这一年,在苹果砸中牛顿沉寂数百年后,以数码产品的姿态席卷全球。让我们看到,世界上最遥远的距离是:大家一起出门,有人去买苹果四代,而有人却买不起四袋苹果。

5、这一年,各地下雨全是百年不遇,武汉的海景成为新的城市名片。成都、长沙、南京纷纷在报纸上表示自己是特大号护舒宝,流量再多也不用担心,随即就被老天爷一个无情的耳光扇过去。

6、这一年,高铁恍如一夜之间长满祖国各地,人们用高于普车数倍的价格向铁道部购买时间,而那些时间充裕的人因普车的取消也不得不买几个小时,然后 在目的地玩,来消磨时间。号称世界领先的动车出轨了,人们悲怆的发现,吃的、住的、坐的竟没有一种让人蛋定。对于善良的中国人来说,打酱油比抢碘盐还来得 更轻松和毫无风险。

7、这一年,雷公也成了弱势群体,悲催的替铁道部背了黑锅。当我们在盘点中国事故责任人时,发现他们分别是临时工、临时工、临时工。。。还有雷公,这时玉帝大叫道:他也是临时工。

8、这一年,几万元的校车,装60多个学生。几十万元的公车,装一个领导干部。他们对医疗不重视,因为他们有高干病房;他们对教育不重视,因为他们 的孩子留洋;他们对食品安全不重视,因为他们有特供食品;他们对堵车不重视,因为他们出行警车开道;他们对国家未来不重视,因为他们妻儿已经移民美国!他 们对维稳很重视,因为他们怕失去这些!这就是我们的领导!能买光全世界的飞机,却买不起一辆校车;能把卫星送入太空,却造不一座小桥;能给别国花数亿,却 不肯多几所小学;一年能吃掉几十艘航母,却逼着孩子捐出午饭钱。

9、这一年,灰太郎对喜洋洋说:我咬你,你不要动,我们要和谐。这一年的总结我们以一个吃牛肉面的故事结束,某男子去面馆要了一碗牛肉面,可是面上 来后没看到一块牛肉。就气得把老板叫来,牛肉面怎么没有牛肉?老板淡淡地说:“别拿名字当真,难道你还指望从老婆饼里吃出老婆吗?你什么时候看见人民大会 堂里面坐过人民?凡是门口挂“人民”二字招牌的地方,均岗哨林立,充分体现了“人民”的崇高。这些地方一般都是人民无法随意进出的,像“人民政府”、“人 民法院”等等……好不容易找到一个“人民银行”,还不办理储蓄业务。只有“人民医院”的门可以随意进出,却是人民不愿意进去的地方!!!

最新国情“顺口溜”
奶粉,米粉,面粉,粉粉有毒;
京官,县官,村官,官官腐败;
国道,省道,乡道,道道收费;
国税,地税,杂税,税税有理;
学士,硕士,博士,士士无用;
影星,歌星,体星,星星脱衣;
河水,江水,海水,水水污染;
牛奶,羊奶,二奶,奶奶伤人。

“刚柔相济”习近平 作者-何清涟

何清涟
5/16/2013

习近平的强硬,从2009年墨西哥一番讲话后就闻名于世。有人就其强硬性格作了种种畅想,比如畅想他强硬对外,弘扬国威;畅想他重拳治腐,整顿吏 治。还有人干脆将习总与普京相比,写了篇“习近平的铁腕与普京的强硬有何异同”,盛赞“从重拳反腐到厉行节俭,从南巡广东力推改革开放,到屡赴艰苦地区访 贫问苦,从强势治军到和平外交,从依法治国,到经济发展注重质量效益,……习近平都展示出张弛有度,刚柔相济的治国风范。”
“张驰有度、刚柔相济”这一评价是否正确?这得看评价者站在谁的立场。
反腐败:有所为有所不为
先说“反腐”。习总最著名的反腐语录莫过于“老虎苍蝇一齐打”。“老虎”、“苍蝇”的级别并无中央文件予以规定,在一般传媒眼里,省部级就算得上 “大老虎”了。最近,一篇题为“习近平下手又快又狠、连打三只省部级‘老虎’”的文章,就将四川省委副书记李春城及湖北省人大副主任吴永文、国家发改委副 主任兼国家能源局局长刘铁男列为“老虎”。其实,这一等级的“老虎”,中共一直在打。2012年5月11日,国家预防腐败局副局长崔海容在香港廉政公署第 五届国际会议上的发言透露,过去30年,中国共有420余万党政人员受处分,其中有90余名省部级官员因贪腐被追究司法责任。更何况刘铁男等三人出身均为 平民,在红色政权的老板们——各大红色家族成员眼中,本不属于“八旗亲贵”,充其量算“包衣奴才”,奴才利用职权贪污腐败,坏我祖宗江山,该抓该判——这 是习总反腐的“有所为”。
我为什么要用“八旗亲贵”与“包衣奴才”这等词汇?那是因为在专制与等级制上,如今中国与大清并无本质不同。中共红色政权骨子里还是家天下,只不过 不是皇帝一家所有,而是众多红色家族共同所有,权力授受模式非常重视血缘关系。即使在社会主义国家大家族里,也只有两个半政权如此:一是北韩父死子继,二 是古巴兄终弟及,剩下那半个是中国,由红色家族代际传承。中国没有弄成北韩古巴模式,乃是因为毛泽东无合适的男性继承人,经过30年折腾,绕了一个大弯, 经过两代管家,权力之棒又回到了红色家族手中。为了不再发生管家摄政,现在已开始培养红色家族的第三代、第四代。
“红色政权守护人”这一角色的功能首先是对红色家族负责,习近平当然很清楚自己的职守。因此,去年权斗虽然厉害,但对“八旗亲贵”圈人物还是“黄带 子阿哥”待遇。 薄熙来权斗失意后,“高墙圈禁”。与薄案有关的太子党成员如陈元,虽然从国家开发银行放了数百亿款给薄,以支持其问鼎大业,但给予的惩罚不过是将其从肥职 国家开发银行董事长位置上调离,与此同时还赏赐一顶“全国政协副主席”荣衔恩养。去年因卷入高层权斗的红色家族成员,许多人的财富不幸被曝光,习近平知 道,“不瞎不聋,做不得当家翁”,一律不予追究。因为这江山本就是红色家族集体打下来的,只是当初打着“革命”旗号,不便建立世袭爵位制以慰功臣,如今就 让他们拿点财富回家,这也算是理所当然之事。这点分寸,作为掌门人心中应该有数——这叫做“有所不为”。
管控社会:宽严张驰皆有度
对谁该严?以下例子供读者参考。据报载,2010年至今,共发生7起因为征地导致工程车碾死村民事件,其中有3起发生于今年3、4月:3月27日, 河南中牟县农民宋义和在自家承包地里被闯入的开发商铲车碾压致死;3月30日,湖北巴东农妇张如琼在与当地高速公路施工方交涉时,被施工人员驾驶水泥罐车 碾头而死;4月3日,四川西昌市村民宋武华被重钢西昌矿业有限公司的推土机碾压致死。上述事件的发生,缘于权力、资本与农民个体利益发生冲突。主导事件发 展及其结局的当然是权力。权力如何对待这些骇人听闻的事件呢?最后都是赔偿谈判,在权力眼中,没有用人民币摆不平的事情。农民们虽然以死相抗,但在与权力 的较量中总是败北。
国内媒体总说,这是地方官员为了政绩,却不知这种情况是中共政府蜕变成自利型政治集团的逻辑后果。当中国的自然资源被所谓经济发展消耗殆尽之后,就 剩下土地这一实体财富成为地方政府财源之时,让老百姓活还是让政府活,就成了最后选项。在权力面前,农民其实没有选择,胡星斗最近曾说,他受委托主持江苏 连云港灌云县陆庄村征地拆迁研讨会,据协商维权专家周鸿陵提供的资料,该村6000余人,因为征地发生了100 次以上的群体性事件,有1000人次以上被判刑、劳教、拘留、进学习班——为了保住那点活命的地,这个村六分之一的人成了“国家的敌人”。
英明的中央不知道吗?我可不这样认为。为了维持红色政权,当政者已将中国资源金木水土掠夺殆尽,如今新城镇化成为唯一的经济发展之策,不征地,地方 政府何以维持?没有地方官员这些“包衣奴才”效忠,红色政权不就成了光杆司令部?所以,发展经济大计所系,压死几个人算什么?该征还得继续征。
治国之难:不在治民在治官
对于红色政权当家人来说,治国难,不在治民而在治官。中国政府对付民变有两手,一是武力镇压。前不久,中国政府发布《中国武装力量的多样化运用》白 皮书, 其中提到,武警部队是国家处置公共突发事件、维护社会稳定的骨干和突击力量,2011─2012年累计用兵160多万人次。此数量相当于一场大规模战争所 用兵力。二是用钱摆平,比如最近北京安徽女子袁莉亚跳楼事件,最后以给袁家40万元了结。
但一个政权要想长治久安,还得依靠吏治。吏治清明,政权稳定;吏治腐败,民生困苦,政权也不稳定。习近平这个红色政权掌门人的难处就在于:他无法堵住腐败源头。
习慕普京,无论是对普京的行事作风还是治国方式,他都甚为欣赏。但普京有些做法习近平却不敢仿效。比如,普京要求官员在今年4月1日以前申报财产, 并在6月 1日以前清理自己的海外资产;即使那些离开国家岗位的人员,在正式离职3年之内也不能拥有海外资产;违反规定者将被课以500万至1000万卢布罚款,或 被判处5年以下有期徒刑,3年内不得担任公职。
习不敢效仿普京反腐,其原因就在于他无法惩治拥有巨额财富的红色家族。既然无法惩治红色家族之腐,仅仅约束官员就是无用之举。在腐败方面,榜样的力 量是无穷的。中国的国家资源既然号称“全民所有”、“国有”,凭什么只有红色家族能够巧取豪夺?红色家族能将公共财据为己有,官员为何不能?所以,中国形 成了不规则的矩形腐败,即上下都贪,底层官吏只要有足够的事权,照样可以上亿地捞,比如广东那几个贪腐逾亿的小小村官。
习总书记的“宽严有度”胸怀再次显现:既然不能让官员公布财产并清理他们的海外资产,就清理呼吁官员公开财产的人士;既然没办法阻止权贵资本主义肆 虐,就不让国民讨论权贵资本主义;没办法管住权贵与官员的贪婪之手,就管住老百姓的思想,让老百姓不知世界上还有普世价值、公民意识与新闻自由这等事物。
中国人曾满心盼望经历过“文革”之痛与上山下乡之苦的习近平体恤民情,刷新吏治,重整河山,最后终于盼来了颇显铁腕风格的“9号文件”。体现9号文 件精神的“七不讲”,即不许讲普世价值、新闻自由、公民社会、公民权利、党的历史错误、权贵资产阶级、司法独立等等,全是针对老百姓那正在觉醒的权利意 识。也就是说,在习总书记眼中,官吏的腐败未必导致红色政权垮台,国民的权利意识觉醒那才真是要了红色政权的命。
如此“刚柔相济、张驰有度”的治国,站在红色江山众老板的立场看,习近平确实是个合格的掌门人。
原载《中国人权双周刊》第104期 2013年5月3日—5月16日(http://biweekly.hrichina.org/article/7272),http://heqinglian.net/2013/05/17/xi-fight-corruption/

http://voachineseblog.com/heqinglian/
http://heqinglian.net
何清涟的文章非常值得一读
-------------------------------------
( 自以为是太子党就了不起了?最终一样是collapse的结局,时间问题而已)

全球十大神秘绝美群岛

全球十大神秘绝美群岛:阿尔达布拉岛无人居住(组图)


  全球十大神秘绝美群岛:阿尔达布拉岛无人居住
  尽管旅游业已如此发达,但大自然的创造力总是超乎人类的想象,至今仍有很多地方不为人知的美丽海岛,在它们被公之于众的同时,呼吁大家共同保护每一片美丽的沙滩,不要让它们的美丽变成“曾经”,希望几十年后我们的后代仍然能享受大自然如此美好的恩赐。

  
全球十大神秘绝美群岛:阿尔达布拉岛无人居住(组图)


  塞舌尔的阿尔达布拉岛

  阿尔达布拉岛是世界上第二大珊瑚环礁,总面积达到155平方公里,由4个独立的岛屿构成。数百年前,人类便知道这座岛屿的存在,岛上为何无人居住成为 一个难解之谜。阿尔达布拉岛是世界上其中一种数量最多的巨龟的家园。大约有15万只阿尔达布拉巨龟生活在这座环状珊瑚岛,

  
全球十大神秘绝美群岛:阿尔达布拉岛无人居住(组图)


  英属处女群岛阿内加达岛

  阿内加达岛是英属处女群岛火山链中唯一的一座珊瑚岛,意为“沉没的陆地”,整个岛由马蹄礁所环绕,任何喜爱海滩、飞钓和野生动植物的人都会立刻爱上这里。在海岛东岸有洁白的细沙铺就的广阔海滩,南边海域是成群的骨鱼,而西海岸则有不少水和当地的鸟类。

  
全球十大神秘绝美群岛:阿尔达布拉岛无人居住(组图)


  英属处女群岛阿内加达岛

  晚上美美地吃只传说中加勒比海最美味的大龙虾,然后在舒适的宾馆中安然入梦。

  
全球十大神秘绝美群岛:阿尔达布拉岛无人居住(组图)


  越南吉婆岛

  吉婆岛是下龙湾唯一有人居住的岛屿,也是海防市所辖最大的海岛,岛上大部分为石山。吉婆岛上有一大片漫无边际的原始森林,以保护园内众多的珍贵树木。森林里繁殖栖息着多种珍禽异兽,是一座巨大的天然动植物园。

  
全球十大神秘绝美群岛:阿尔达布拉岛无人居住(组图)


  越南吉婆岛

  你可以从下龙湾乘坐轮渡到达,但要注意的是,岛上的住宿条件比较简陋,但如果你对此并不介意的话,就可以尽情地拥抱这片未受破坏的原始自然。

  
全球十大神秘绝美群岛:阿尔达布拉岛无人居住(组图)


  美国南卡莱那州

  Daufuskie岛这里有人迹罕至的美景海滩、宽广的高尔夫球场。而且便捷的交通、SPA、娱乐中心、网球场等一应俱全。到这里的人都是冲着这里的两座无敌高尔夫场而来。

  
全球十大神秘绝美群岛:阿尔达布拉岛无人居住(组图)


  美国南卡莱那州

  游客在岛上可以骑自行车、乘高尔夫车代步,晚上则住在宾馆或度假屋中。这里世外桃源般的安宁,只有你自己和海边的海豚共同享受。

  
全球十大神秘绝美群岛:阿尔达布拉岛无人居住(组图)


  所罗门群岛的泰特帕雷岛

  所罗门群岛的泰特帕雷岛被称之为「最后的蛮荒之岛」,自19世纪中期以来便无人居住,当时本土部落因猎取人头的野蛮人的威胁纷纷逃到周围岛屿。泰特帕雷岛面积45.5平方英里(约合118平方公里),是西太平洋地区最大的无人岛。

  
全球十大神秘绝美群岛:阿尔达布拉岛无人居住(组图)


  所罗门群岛的泰特帕雷岛

  泰特帕雷后裔协会是一家登记注册的所罗门群岛慈善组织,2002年以来便负责对泰特帕雷岛进行监管,保护岛上的森林以及其他自然资源,为子孙后代谋福利。在后裔协会的监督上,泰特帕雷岛建造了一个生态度假村,为当地岛上居民提供就业机会,为保护计划筹集资金。

  
全球十大神秘绝美群岛:阿尔达布拉岛无人居住(组图)


  帕劳的洛克群岛

  洛克群岛因2005年初播出的美国真人秀《幸存者》第10季帕劳篇闻名遐迩。这个群岛由250至300座岛屿构成,总陆地面积仅有47平方公里,丰富的生态多样性是其骄傲的所在。这些石灰岩岛和珊瑚岛最高点高出海平面207米。

  
全球十大神秘绝美群岛:阿尔达布拉岛无人居住(组图)


  帕劳的洛克群岛

  岛上森林茂密,拥有很多隐藏的礁湖及其他湖泊并且生活着一系列独特的生物。帕劳的洛克群岛是一个美丽富饶的世界,虽然现在可能无人居住,但在过去数千年时间里,人类可能多次在这个群岛上留下自己的足迹。一个最令人好奇的证据莫过于发现所谓的「微型人」遗骸。

  
全球十大神秘绝美群岛:阿尔达布拉岛无人居住(组图)


  哥斯达黎加的可可斯岛

  可可斯岛有点像北方的加拉帕戈斯群岛,它孤零零地躲在太平洋一角,距离哥斯达黎加西海岸大约有550公里。这座大致呈矩形的小岛,面积是23平方公里,上面生活着一定数量的鹿、野猪、野猫和人类有意或无意引入的老鼠。

  
全球十大神秘绝美群岛:阿尔达布拉岛无人居住(组图)


  哥斯达黎加的可可斯岛

  尽管这里有充足的可用淡水资源,但人类从没在这里长期定居过,可可斯岛的周围水域里生活着大量海洋生物。伊斯拉·纳布拉尔岛在西班牙语里的意思是雾岛,而可可斯岛是中或南美洲附近唯一一座拥有庞大的雾林生态系统的小岛。

  
全球十大神秘绝美群岛:阿尔达布拉岛无人居住(组图)


  基里巴斯的菲尼克斯群岛

  菲尼克斯群岛由8座小岛和几个珊瑚礁组成,位于夏威夷至南太平洋斐济的中途。整座群岛的面积仅为27.6平方公里,除了最大的一座小岛──坎敦岛上生活着几二十多个人外,这座群岛的其他地方无人居住。

  
全球十大神秘绝美群岛:阿尔达布拉岛无人居住(组图)


  基里巴斯的菲尼克斯群岛

  过去2个世纪,人们曾几次尝试在菲尼克斯群岛上定居或移民,但是所有努力都以失败而告终,最后一批居民在1963年撤离该岛屿。

  
全球十大神秘绝美群岛:阿尔达布拉岛无人居住(组图)


  柏尔的金字塔岛

  从视觉效果上来说,高1844英尺(562米)的柏尔的金字塔可能是世界上最令人印象深刻的小岛,它位于太平洋上,1965年确实有人第一次成功爬上 这座「小尖塔」的顶部。攀爬柏尔的金字塔在1982年被完全禁止,不过1990年的攀爬活动是个特例,这是美国政府申请的结果。

  
全球十大神秘绝美群岛:阿尔达布拉岛无人居住(组图)


  肯尼亚拉姆岛

  拉姆岛是肯尼亚最早的居住地,这里小小的城镇和悠闲自在的生活节奏都让人神往。最特别的是交通工具还保留着最初的方式:驴子。现在它以黄金海岸著称,海边非常适合游泳,还可以到不远处的历史遗迹和珊瑚礁上去探险。

监测io读写 的命令-iostat

现在硬盘、移动硬盘都会加入几块内存作为写入数据的缓冲,你看到复制完毕了其实硬盘还在工作,这时候拔掉移动硬盘就有很高几率破坏上面的数据。那么如何监测io读写情况呢,Linux下集成了一个命令。

输入
iostat -x -d -m /dev/sdb 3


iostat是我们所需的,几处flag解释下:
-x 显示额外信息
-d 去除cpu信息(官方的解释是显示设备利用率),其实去除这个flag后cpu信息就出来了,可我又不需要它。
-m 以MB/s来显示
/dev/sdb监测的盘
3 每3秒自动刷新一次。
其他的具体查询man iostat

phpjsrsa与WP插件-“WP No Keyword”

http://code.google.com/p/phpjsrsa/

encrypt text from php in rsa then decrypt by javascript.
-------------------------------------------------------------------

WordPress Plugin: “WP No Keyword”防关键字屏蔽


简介

由于众所周知的原因,我们的页面可能会因为触及敏感关键词而遭到页面重置,严重的可能会被封IP。本插件可将指定的关键词进行不同程度的加密,启用后就基本不用怕关键字过滤了。

下载

当前版本:V1.4 WordPress官网下载 (2010-03-30更新)
适用版本:WordPress 2.5或更高版本。
目前插件已更新到WordPress插件目录:插件主页

说明

使用方法

激活插件后,到后台设置中的“WP No Keyword”页面,填入你想要防屏蔽的关键词,每行一词。我们提供多种加密模式,如果你想启用更高级的加密模式,请在页面内勾选非默认模式的选项。保存后自动生效,有效范围是日志内容及评论内容。

工作原理

本插件提供3种加密模式:
默认模式(V1.0加入): 用<span>标签将关键词中的每个字分隔开来,并将每个字转换成unicode编码,使得关键词并不连续且难以辨别,从而增加了机器关键词匹配的难度,进而减小页面被关键词屏蔽的概率。
phpjsrsa模式(V1.1加入):这是virushuo提供的加密方法。此模式会将关键词在服务器端用PHP加密,当用户浏览页面时再在客户端用JavaScript解密。此方法的加密效果比默认模式的更好,搜索引擎和某墙暂时都无法识别加密的内容。
符文之语模式(V1.3加入):这是由darasion提供的加密方法。此模式会将关键词在服务器短用PHP加密成其他不相关的非敏感文字,当用户浏览页面时再在客户端用JavaScript解密。此方法与phpjsrsa相似且效果比默认模式更好。
除了默认加密模式,其余模式均由网友提供,其作者已在上面标明。

注意事项

  • 插件仅对日志内容及评论内容进行处理,不会对日志标题、标签、评论者姓名、RSS输出等内容进行过滤。
  • 插件不会对RSS内容进行高级加密,即只进行默认模式的加密。如果你选择的是非默认加密模式,那么RSS不会进行加密。
  • 日志内容中的HTML标签的大多数属性,如图片的alt、title,都不会进行加密。
  • 默认模式仅能防止最简单的关键字匹配屏蔽,面对高级的过滤(如搜索引擎)无能为力。
  • 非默认模式加密的效果最好,但这将增加服务器的消耗,也将增加客户端的消耗(需要等待时间,而且在页面载入完成前关键字不会被解密),同时搜索引擎无法识别加密的内容,请慎用。
  • 使用此插件后基本可以避免机器式的关键词匹配,但面对直接到页面内浏览的人肉审核无能为力。
  • 插件将用<span>来分割关键字,因此在某些主题中可能会影响排版。解决方法是修改主题的css样式或者修改本插件将<span>改成其他标签。
  • 当页面内包含复杂的或不规范的HTML标签,并且标签内容符合关键词时,插件有可能会将其加密从而时HTML失效、页面混乱。我们已尽量避免这一结果,但还是请小心使用英文关键词。
  • 当页面内关键词较多时,大量的<span>标签可能会增加页面的消耗。
  • 由于某些问题,在某些主机上启用非默认模式可能会产生错误,这时请切换回默认模式。

更新记录

  • 2010-03-30 V1.4 修复在RSS中依进行非默认模式加密的BUG,即此后在RSS中只会进行默认模式的加密(如果开启了默认模式的话)。
  • 2010-01-02 V1.3 加入符文之语模式,修复了phpjsrsa在某些配置环境下无法运行的Bug。
  • 2010-01-01 V1.1 加入phpjsrsa模式,并加强了默认模式的加密方式。
  • 2009-12-31 V1.0 插件发布。
加密效果对比(源代码)。符文之语加密形式与phpjsrsa相似(phpjsrsa是加密成数字,符文之语是文字)。
此插件已尽可能地避免了关键词屏蔽,但被不最终还是得看各自的造化.

tubewall

http://code.google.com/p/tubewall/

Wednesday 29 May 2013

AnyRouter(软网关)

一个集路由器、DNS服务器、NAT、上网日志记录、上网限制于一身的代理服务器软件,用于实现局域网内的所有计算机共享一个 Internet 连接(连接方式包括MODEM、xDSL、宽带等),防止单位重要资料机密文件等的泄密;监督审查限制网络使用行为。主要功能有:
一、Internet共享功能:
1.具有路由器的寻径功能,让局域网里的多台计算机进行共享上网,还能对外来访问进行隔离,起防火墙作用,自动保护内部网络不受到外部的攻击;
2.具有DNS转发功能;
3.具有自动拨号功能;
4.支持单网卡模式的Internet共享;
二、端口映射,支持在企业内部网架设WEB服务器;
三、网络行为监视:包括网站浏览监视、邮件收发监视、聊天行为监视、游戏行为监视、FTP监视、流量监视;
四、网络行为控制:包括网站浏览控制、邮件收发控制、聊天行为控制、游戏行为控制、端口级控制;
1.禁止某些电脑在指定时间段指定的网站;只允许浏览指定网站;
2.禁止某些电脑在指定时间段收发邮件、只允许收发指定邮局(白名单)、禁止收发指定邮局(黑名单);
3.禁止某些电脑在指定时间段使用指定的聊天工具(包括QQ、MSN、Yahoo Messenger、ICQ、网易泡泡、E话通、UC等);并可以自行增加聊天行为控制列表;
4.禁止某些电脑在指定时间段玩网络游戏(比如联众、泡泡游戏等等);并可以自行增加网络游戏行为控制列表;
5.禁止自定义控制列表,比如股票软件、BT软件等;并发起阻断;
6.禁止某些电脑在指定时段使用FTP工具外发资料;
7.可进行严格的UDP/TCP整个网络段的全系列端口级别的控制,并支持黑名单和白名单功能;
五、流量限制/带宽限制;
可以对每台电脑设置每秒的收发网络数据流量最大值;最大限度地减少BT软件对网络带宽的影响。
六、IP和MAC绑定;
七、其他功能。
1.采用C/S管理模式,支持分级权限管理;
2.跨平台监控;被监控电脑也可以是Unix 、Linux 等其他操作系统;
3.支持无限多个IP网段监视;
4.采用连接密码管理禁止非法用户连接;
5.服务端作为系统服务运行在后台,不需要登陆和用户干预就可实现监控和上网控制.

 FROM http://down.chinaz.com/soft/2773.htm

WinRoute

能超强的NAT,Proxy Server,POP3,SMTP,DNS Server,DHCP Server,Firewall程序.程序不大,但功能都应有尽有.最实用的就是通过设置软网关在局域网共享MODEM,还能多人共享同一个email帐 号而不互相干扰。 
 
FROM http://down.chinaz.com/soft/5008.htm
 

吴思:政改的预测框架(与其苦等ccp垮台,还不如尽早 go abroad)

政治改革的框架有四层,如同玛雅金字塔:塔尖是领导集团的政改动力,然后是影响政改意愿的三层力量:危机强度、社会上不同的行为主体、影响行为主体的重要变量。

下边逐层讨论,最后推出几点观察。
  一、政治体制改革的动力
  向民主宪政转型,意味着官方权力受限和公民权利扩张。这是巨量利益的重新调整。从利益的角度看,作为一个整体,官方动力不足而阻力强大,因此,中国的政治体制改革,主要动力将来自危机带来的社会压力和由此触发的体制内动力。
  官方内部的一些“条条块块”、一些官员,出于自身利益或价值观,或许拥护民主宪政转型,但在巨大的体制利益面前,没有外部压力和危机触动,内部动力很难提升。
  二、危机分类和互动常规
  1.危机级别
  民众群体性事件引发的危机带来的社会压力,从不同的角度可以做不同的分类。从诉求内容看,有涉及经济权利的、政治权利的、社会福利的、司法公正 的、环境安全的、信息公开的,等等。从挑战的层级看,有针对核心制度的、某项法规的、某项政策的、具体决策的,等等。从抗争手段看,有非法的、合法的、暴 烈的、温和的,等等。这些分类各有价值。这里采用的分类标准是危机规模及其后果,可分为五级。
  一级危机:导致国家政权被推翻的革命,例如法国、俄国和中国的革命,以及当代的其他革命。
  二级危机:中心城市动荡,并向全国蔓延,如五四运动或四五运动。
  三级危机:全省或省会城市动荡,例如辛亥革命前的四川保路运动、乌鲁木齐的“7·5”事件。
  四级危机:市县动荡,例如厦门散步事件、什邡事件和瓮安事件。
  五级危机:乡镇或村庄以下规模的危机,例如征地导致的群体事件。
  这些分类主要依据地域,即所谓“块块”。很多发生在“条条”即行业里,如出租车行业、传媒行业,不过,维稳的责任主要在地方,“条条”可以并入“块块”。
  小规模群体性事件与五级危机的区分边界并不清晰,但为便于分析仍然冠以危机名称。这样来看,在过去的十年里,五级“危机”数不胜数,四级平均每年一次左右,三级十年一见,二级则是一代人以前的事了。
  2.互动常规
  由群体性事件引发的危机一旦出现,无论由什么触发,官方都希望降低危机水平,防止事态扩大。知识分子则关注其政治体制意义,阐释提升制度涵义,通过各种传播手段扩大影响。互联网的普及降低了动员成本,官方处理不慎,五级就可能升至四级,例如乌坎事件。
  传统的维稳思维是努力把危机消灭在萌芽状态,以堵为主。不过,危机爆发之后,往往迅速让步,以堵为主转为以疏为主,并且就事论事,降低冲击的制 度意义。2003年,孙志刚事件导致国务院废除了收容审查制度,制度变迁的价值相当高,其背景是:法学界高调申请违宪审查,人大常委会有意介入。
  危机带来的压力可以推动政策调整甚至制度变革。小压力,小变革;中压力,中变革。大量的中小危机,还可能推动大变革,例如取消农业税。
  拒绝变革,一味用强,可能激化矛盾,导致危机升级,甚至引起内部分歧。内部分歧也会促成变革。
  至于一级危机,下边将证明,当代中国缺乏发生革命的条件。
  危机带来的压力产生的另外一种作用,就是推动维稳体系日益完备。提高堵的能力,可以提高由打压转向让步的拐点,但不能铲除危机和产生危机的土壤。从长远来说,打压策略反过来亦可制造危机。
  三、主要社会行为主体
  1.规约分析法
  西方学者研究社会关系,通常以契约论为分析框架。他们重视统治合法性问题,认为中国共产党与民众之间存在一种事实上的契约:共产党发展经济、改善民生,民众拥护党的领导。合法性主要来自经济绩效。
  中国传统一向重视政权的巩固问题,载舟覆舟,弹压规训,主要依靠国家机器的强制力。
  尽管基础不同,这两种分析框架在中国都有适用性,并且有重合部分。执行契约需要强制力的保障,暴力强制也要有个说法。
  两者可以合并使用:在契约分析之外,再加上对强行规定的分析——有平等协商自由选择的领域,也有不容商量强行规定的领域,有规训,有契约,份额 不同,比例可变,这就是规约分析。中国政治的核心领域由于欠缺能够充分体现契约关系的民主选举,因此,规约分析的基础更多的不是契约,而是强行规定。
  强制容易造成剥夺感。剥夺感越重、越普遍,危机的引爆点越低。相比之下,契约关系安稳得多。对当事人来说,在契约关系和强制关系之间,还存在一 块利益。受益者努力扩大并保护这块利益,受害者努力压缩这块利益。这方面的博弈,涉及蒙蔽与启蒙,反抗与压制,本身也要消耗大量资源。政改成功即可节省这 类维稳费用。
  2.主要行为主体
  社会好比一盘棋,棋盘上有许多行为主体。行为主体之间存在各种关系,其中官民关系是最重要的关系。
  对斯大林或毛泽东时代之后的社会格局,国际研究者通常称为后极权主义社会。但中国与变革前的苏联东欧有一个重大不同,就是市场经济发育多年,出现了许多新的社会群体。首先是庞大的个体小农,其次是民营企业家和工人。
  这个棋盘上的主要行为主体,至少应该注意八个:一官,二农,三农民工,四工人,五国企老板,六民企老板,七知识分子和专业人士,八学生。传统的官-民(民又分为士农工商)格局出现分化,相对强弱也有变化。
  上述每个主体都可以继续细分,而且有多种分法。例如,官以中央和地方分,或以立法、执法和行政分,按年龄还可分为老人和新人。
  每个社会集团的权利/权力边界,都有扩张、维持或受损三种可能。权利/权力还有名义和实际之分。官员的实际权力往往大于名义权力,民众的实际权 利往往小于名义权利。一般说来,权利受到保护,合乎契约,就有秩序稳定;权利受到侵犯,被强制剥夺,就可能造成危机。名义权利/权力和实际权利/权力的差 异也可能造成危机。对这些集团的权利状态可做规约分析。
  (1)官。中国有世界上历史最悠久、规模最庞大的官僚集团。他们人才济济,经验丰富,善于学习,掌握着一年十几万亿元的财政收入,拥有金融、能源、交通、电信领域的世界级垄断公司,主导着教育、传媒和医疗行业,控制着全国的土地和矿产资源,掌握着强大的国家机器。
  官方承诺建设小康社会。经济建设、政治建设、文化建设、社会建设、生态文明建设,五位一体。其中主要是经济发展和改善民生这两个领域,尤其是经济发展,属于官民共同利益。官方希望发展顺利,十年后中国的经济总量超过美国,跃居世界第一。
  发展的主要措施是深化改革。深化各种改革,难免牵连到政治体制改革。在这方面,官民利益有冲突。不过,1987年以后形成了一种均衡:口头说,实际很少去做。既满足民众期望,又满足官僚集团利益。目前还没有打破均衡的迹象。
  作为一个整体,官员的实际权力大于名义权力,名义权力也大于民主宪政制度下官员的常规权力。优势地位导致权利/权力边界继续扩张,并吸引更多的人进入。对这个集团来说,在其他条件改变之前,维持现状是利益最大化的选择。但其内部也有求变的压力。
  人大、政协、法院和检察院之类的“条条”,实际权力小于名义权力,希望发生变化。
  各地政府,财权与事权不对称,权力和义务不均衡,不平是不满的温床。
  在中共党史上,高层权力交接过程中,往往出现内部竞争引发的问题。党员、党代表和中央委员,在选举中享受的实际权利小于名义权利。权利分配没有达到可以长久稳定的状态。
  对地方普通公务员来说,晋升道路往往被权势家族和买官者堵塞,沉沦下僚的精英有被剥夺感。
  官员内部存在精神危机。言语与实行如果差距巨大,真诚的实践者难免碰壁。在经济发展顺利、官民共同利益突出的时候,精神危机可以蛰伏;一旦发展减速,经济绩效与民众拥护的契约失效,精神危机可能迅速激化。
  (2)农民。农民处于历史上的最好时期。农业税、特产税等彻底取消,种粮还有补贴。新农村合作医疗和养老保障体系基本建立。九年制义务教育基本 实现。村委会可以海选。农民的基本要求都得到了满足。从契约的角度看,农民付出较少,却得到了基本的公共服务,农民在交换中有盈余。
  农民是中国最大的社会集团,农民满意,中国就没有大规模暴力革命的土壤。但对城市郊区的部分农民来说,低价征地属于严重剥夺。一亩地补偿几万 元,政府转手就卖几十万元甚至上百万元,这种剥夺造成大量的群体事件,不断引发五级危机。不过,征地所涉及的农民比例并不高。按照现行标准,征地补贴相当 于耕种土地30年的收益,与种地相比并不吃亏,剥夺只是相对的。在官方让步之前,这个领域仍将是五级危机的多发点。
  (3)农民工。农民工是中国工业化和城市化进程中形成的过渡性群体。目前人数约2.6亿,第二代农民工将近60%。
  第一代农民工中的大多数以回乡为归宿。他们基本满意,有打工自由,收入比种田高,生活比过去好。在与政府的关系方面,他们很少感到不公平。
  第二代农民工,中学毕业就进城市打工,缺乏长期独立的种田经历。他们不想回乡,种田收入低,回去也难以生活;但是房价太高,又很难在城市安家落 户。他们正在进入婚龄,前途不明,这几年工资连年提高,问题不大,倘若经济减速,失业增加,这是非常不稳定的群体。这个群体还没有提出明确的政治经济主 张,不过,考虑到房价的一半以上进了政府的腰包,他们与政府的关系中潜伏着重大矛盾。
  房价背后的利益分配,培育出所有买房者与政府的矛盾,除了第二代农民工,还包括新一代城镇工人、白领阶层、知识分子和大学毕业生。
  (4)工人。城市工人直接面对的是国营或民营老板。大型国企待遇很好。经济发展,劳动力短缺,民企的工资也连年提高。
  社会保障体系初步建立之后,城镇群体性事件大幅度下降。从契约的角度看,在和政府的关系方面,这个群体没有明显的被剥夺感。不过,在和其他社会集团的关系方面,收入水平和社会地位的相对下降,可以造成相对失落感。
  在工资长期停滞时期,工人罢工较多,政府以压制为主。那时候,在和政府的关系方面,工人有被剥夺感。将来,如果经济减速,失业增加,工资增长停滞,罢工再度增加,不当政策将造成工人与政府的关系紧张。这个分析对农民工也适用。
  (5)国营企业管理层。大型国企有上百万亿元人民币的资本,他们是享有特权的群体,可以借助行政权力维持垄断,扩张地盘,限制甚至剥夺他人的经济权利。管理者还有机会利用各种手段牟取个人利益。深化改革,无论是经济改革还是政治改革,都可能损害他们的利益。
  (6)民营企业老板。2012年民营企业1000多万户,投资者2000多万人,注册资本金超过31万亿元。民企对就业率的贡献超过80%。在GDP、税收和全社会投资中的比例都超过60%。此外,中国还有3900多万个体户。
  民营企业家是改革开放政策的受益者,他们发财了,但是又普遍不满。民企被垄断性国企排挤,交易成本越来越高,税费重,经常遭遇敲诈勒索。
  面对官员和垄断国企,民营企业家的实际权利小于名义权利。民企的产权缺乏保障,政治权利与社会贡献不相称,但不敢有任何政治性组织活动,他们有被剥夺感。许多人通过个人和家庭移民追求安全,代替反抗。如果抗争的风险下降,他们对宪政的支持将有高含金量的表达。
  (7)知识分子和专业人士。传媒知识分子的被剥夺感很强烈,因为,在言论出版自由方面,名义权利与实际权利的落差最大,而这种权利正是媒体人获得财富和荣誉的基础。这种切身利害,支持着媒体行业的自由化倾向。
  律师和教育等领域的专业人士,也有比较多的被剥夺感。他们比较了解外部世界,对民主宪政有更多的认可,因此,在各个社会集团中,知识分子大概是不满最多的群体。
  除了争取自身权利,在各级危机中,知识分子与官方大事化小的策略相反,尽力放大危机的意义,被官方看作麻烦制造者。官方与知识分子的紧张关系,很难从根本上缓解。但政府还是凭借权力和财力,通过课题费和个人升迁等手段,与大量知识分子建立了契约性的合作关系。
  (8)大学生。中国有学生运动的传统。1989年以后,在严密控制和市场就业的引导之下,大学校园基本平静。2012年在校大学生约有2536 万人,每年600多万大学生毕业,虽然就业机会不平等,“拼爹”、拼关系,但就业率还没有低到酿成危机的程度。如果经济状况不佳,就业困难,平等机会被剥 夺的感觉就可能强化,校园将难以保持平静。
  上述八个群体有共同满意的领域,即经济发展、社会秩序稳定和国家地位提高。从公共契约的角度看,官方提供了基本的公共物品,而且在社会保障方面明显加强,表现大体合格。
  但他们也有共同的不满,主要集中在获得上述公共品的代价方面。一对环境污染不满,二对贪污腐败和两极分化不满,三对假话空话和道德沦丧不满。还有,由于公民权利不受尊重,无论官民,普遍感觉缺乏安全和尊严。
  任何群体的特殊不满,一旦引发,都可以获得共同不满的呼应,经过知识分子的意义阐释,指向制度缺陷,引发官民对立,引出政治体制改革的要求。
  根据以上分析,可以作出两项总体判断:
  第一,中国缺乏发生革命的条件。除了传媒方面的知识分子,没有重要群体感到严重被剥夺。对农民的强制征地、对民营企业的歧视、第二代农民工融入城市的障碍、大学毕业生就业的不公平、公务员升迁的不公平,其范围和强度都不足以引发一二级危机。
  第二,不满普遍存在,四五级危机发生概率大。
  四、影响不同行为主体的因素
  1.经济增速下行
  从中长期的角度看,经济增速下行是难以避免的。政府预计,经济增速将由10%降至7%-8%。一般认为,数年后可能再下一个台阶。
  经济增速下行一个台阶,对就业状况有多大影响,再下一个台阶又将如何,都是未知数。就业状况对第二代农民工和大学毕业生的影响巨大。经济增速下行对财政状况的影响更大。
  一旦经济发展增速降到世界常规水平,经济绩效与民众支持的隐性契约即面临考验。如果找不到获得民众衷心拥戴的新旗帜,又没有建立民主选举之类的契约性程序,强制力量将成为维护统治的主要依靠。
  2.财政状况
  经济增速在10%上下,财政收入的增速通常在20%-30%之间。反过来,经济增速下一个台阶,财政收入增速也可能下降不止一个台阶。如果财政收入大幅度下降,出现财政危机,就可能有三种选择。
  第一是压缩开支。养老金缺口已经存在,如果再压缩社保、医疗等方面的福利,政府对工农失约,为了保护既得福利,三四级危机的发生概率必然提高。如果压缩政府自身的开支,将占用财政支出超过20%的政府自身耗费降低到世界常规水平10%以下,那就必须进行政改。
  第二是增加税收。即使不算贪污腐败之类的隐性负担,目前中国的税费负担已经不轻,进一步增加中小企业负担,将增加破产,逼走资本,提高失业率。
  第三是印票子,通货膨胀。高通胀是对全民的剥夺,将降低危机引爆点。
  财政危机亦将削弱政府解决环保问题的能力,而往年的四级危机大多起源于环境问题。
  总之,经济下行和财政危机可能把更多的社会行为主体推入严重不满的阵营,同时,财政危机还可能使得维稳成本难以承受,维稳能力下降,削弱危机控制体系。
  3.政府手中的资源
  面对经济增速下行和财政危机,政府手里有许多好牌。
  向民营企业开放新的领域,例如金融、能源、教育、医疗、电信、基础设施建设等,必将提高效率,增加就业,带来新的经济增长。这意味着改革经济体制,动垄断集团的奶酪。不过,在压力面前,为了官民共同利益,抛弃垄断集团是两害相权取其轻的选择。
  如果财政危机严重,政府手里还有巨额外汇储备,可以出售价值数十万亿元的国有企业。通货膨胀实在控制不住,实行土地私有化,开放土地市场,也能吸纳巨额货币。
  这几张好牌带来的改革红利和真金白银能够支撑多久,一二级危机就可能延缓多久。
  4.公权力扩张
  公权力或明或暗的扩张、垄断和腐败,对其他社会集团有重大的负面影响。
  垄断和腐败的实质都是掠夺。一般认为,中等腐败国家的腐败金额约占GDP的3%,相对30%多的税费负担,从掠夺率的角度看,并非不可承受。但是,贪污腐败导致交易成本提高,降低经济效率,由此造成的GDP损失大于3%。
  垄断和寻租,设立种种限制,剥夺民众的权利和自由,属于更高级的掠夺。这方面的高掠夺率可以造成更大的经济损失。同样的资源,在垄断领域和自由竞争领域的使用效率大不相同。两者之间的效率差距,就是当前的净损失。扼杀自由竞争带来发展活力,更是难以估算的长远损失。
  强征土地并转卖高价,对房屋加征各种税费,也是权力公然扩张带来的收益。买房人都有被剥夺之感,无房者更是一肚子怨气。
  在经济高速发展时期,蛋糕越做越大,权力多切走一些尚可忍受。经济发展减速,抢劫率即使不变,引发危机的概率也会大大提高。更何况,在得不偿失之前,不受制约的权力必将持续扩张。
  如果管住了这种扩张,政改的必要性就降低了一半——损害经济而非损害尊严的那一半。如果管不住这种扩张,经济减速和财政危机就可能加重。历史经验表明,治标手段难以控制权力扩张。
  5.观念和说法
  官方意识形态并不否认民主宪政的正当性。之所以不能立刻实行,一个说法是条件不成熟,需抓住机遇发展经济,不能添乱,为政治体制改革打好基础。未来十年,如果经济再翻一番,条件不成熟就说不过去。如果经济增速下降,抓住机遇和不添乱的说服力也会下降。
  与此同时,公民权利的观念会进一步深入人心,成为公平与否的衡量标准。公民权利意识的觉醒,也将降低危机的引爆点。
  如果官方意识形态拥抱更多的民主,就会发动政治体制改革。如果官方意识形态僵化,民间的第二文化将日益繁荣,逐步成为社会主流观念。
  人的行为既受利益支配,也受思想支配。两者矛盾时相互抵消,一致时力量放大。法国大革命,既有连年歉收的原因,更有精神启蒙导致的对旧制度的不满。俄国革命,既有连年战争和贫困的原因,也有共产党人对理想的追求。中国革命也同样。
  6.行动组织成本下降
  由于互联网和通讯技术的发展,组织联络成本大幅度下降,于是,在原有的社会组织——经济组织、宗教组织、NGO和媒体之外,又形成了各种形态的社会组织,包括自媒体及其粉丝群。社会上出现了许多有组织的行动者,组织之间还有密切联系。
  这些因素,可以降低危机引爆点,还可以提高危机升级速度。
  五、几点推测
  1.未来五年至十年,如果经济增速保持在7%左右,出现一二级危机的概率不高。即便出现,凭借多年形成的经验和物质基础,有望及时化解矛盾,社会严重失序的可能性很低。
  2.未来五年至十年,在中小级别危机的驱动下,政治体制会有某些小型甚至中型改良。中型改良更可能发生于容易控制的领域,例如立法机构和司法等领域。
  3.未来五年至十年,在经济增速下行的压力下,深化经济体制改革,市场经济得以完善的概率较高。
  4.未来十年,如果经济增速下行导致的问题处理妥当,各种危机应对顺利,中国经济跃居世界第一的梦想成真。但10年到20年之间中国经济增速总 要降到常规水平,财政的好日子终将过去。那时,政府手里的好牌不多了,权力的寻租空间越来越小,麻烦越来越多,失业增加,财政危机,穷人保福利,富人抗税 费,官僚集团将追逐最后剩余的利益:生命和财产安全。他们将以此为条件,开出和平转型的高价,尽力在自己的掌控下向民主宪政过渡。
最后补充两点:
一、以上没有讨论外部环境的影响。按照中国和世界历史的惯例,外部压力对变革的影响很大。但是,在中国的体量日益壮大的今天,外部压力相对变弱,不足以成 为决定因素,于是采用国际环境大体不变的假定。当然,从长远考虑,中国发生的所有变革,背后都有外部影响的因素:中国人看到了另外一种低风险高收益的制度 是如何运作的,并且追求这种制度,由此形成趋利避害的历史大势。
二、以上没有讨论民族问题。事实上,最近的两次三级危机,都发生在民族矛盾比较尖锐的地区。民族情绪可以成为强有力的动员手段,但剥夺感才是危机的基础。中国民众共有的剥夺感,在民族地区也应该存在。

相关帖子-http://briteming.blogspot.co.uk/2013/04/blog-post_71.html

陈季冰:正在逝去的“中国梦”

想起《人民日报》近日刊发的一篇评论——《莫让青春染暮气》中涉及的话题,文章称,80后一代青年少了年轻人应有的朝气和锐气,本该朝气蓬勃的他们 现在却变得暮气沉沉。不管党报文章以及目前正在其版面上开展的大讨论是否切中了问题的要害,它提出的现象却是真实存在的,而且的确相当值得深思和讨论。
从“大学生就业难”到“年轻人凡事拼爹”,再到“80后一代暮气沉沉”……这一系列相互关联的社会现象折射出一个令人担忧的问题:在改革开放30多 年以后,中国社会中的普通人通过自身的冒险精神、聪明才智和辛苦努力——可能也不能遗漏一些运气成分——来寻求上升的机会之路正变得越来越窄。
每当和中学、大学同学谈起时下年轻人千军万马挤公务员这根独木桥的景象时,我们都不由得感叹:20多年前我们毕业时,读书成绩比较优秀的、稍微有点出息的,有谁愿意去当公务员或进国企?时代真的变了!
按理说,这是非常难以理解的矛盾现象——一方面,过去30年的中国经济经历了世界经济史上从未有过的一次长期高增长阶段;与此同时,人类历史上最大 规模的工业化和城市化进程又在中国引发了空前的人口流动。然而,恰恰是在这样的高增长、大变动(意味着应当孕育数不清的重大机遇)时代,中国却反而出现近 来人们常说的所谓“社会阶层固化”的尖锐问题。
其实,用“阶层固化”来概括目前的社会流动状况,多少是有些不准确的。一个农民的儿子想要成为一名建筑工人、一个小生意人的女儿想要当上一位幼儿园 教师……这样的身份流动不仅完全可能,而且事实上每天都在成千上万地发生着,这与改革开放前那种生老病死统统由国家规定的僵化格局还是有根本性区别的。
然而,一个不争的事实是:如今,一个没有任何“关系”的普通人想要像80年代那样仅仅靠敢于冒险、不怕吃苦就成为令左邻右舍羡慕嫉妒恨的“先富起 来”的“万元户”,那种机会已经一去不复返了。相反,在今天的中国,越是需要冒风险、越是干着格外辛苦的活儿,挣得越少;而少数另一部分人则既不需要承担 任何风险、付出多少智慧和汗水,又可坐享无穷收益。
总之,稍微好点的事情已经越来越轮不到平民百姓了。
归根结底,社会阶层的固化或上升通道的堵塞,背后其实是利益格局的固化。
的确,中国经济仍在以每年7%以上的速度增长,也就是说,“蛋糕”仍然在迅速做大。然而,普通中国老百姓在不断增大的蛋糕中所能够分到的部分却越来 越少。因为各级政府以及以国有企业为代表的利益集团通过行政力量和市场垄断,轻易地拿走了其中的大部分。这也就是为什么务实(《人民日报》文章称之为“暮 气”)的年轻人如今找工作首选政府机关和国有企业的经济根源——今日中国的社会财富分配规则告诉他们:如果你想要多分得一些蛋糕,最好成为那个执掌切蛋糕 刀的人,而不是做蛋糕的人。
更加令人担忧的还在于,正是由于行政垄断之下的利益格局日益固化,创业和创新,在当代中国也变得越来越艰难、新的机会日益稀缺。近来,从“微信收 费”到“禁止打车软件”……政府部门和国有垄断企业假借“规范市场”之名,对社会上的创新活动行打压之实的事情,我们实在已是屡见不鲜。这是因为,创新必 然要动到既有利益格局的“奶酪”,而感受到威胁的利益集团则必然先下手为强,将这种威胁扼杀在萌芽阶段。
改革开放前半段,由于寄生于政府行政力量的垄断利益集团尚未形成,或者说它们本身也在快速地流动变化之中,所以,小到街边小饭馆这样的自主创业,大 到门户网站这样的经济科技创新……新的机会层出不穷,造就了众多成功故事。换句话说,那时还有一些头脑灵活的人在体制边缘或干脆在体制之外凭一己之力做出 了一块新的蛋糕。但在今天,这样的美梦也正在被无情地掐灭。
这就使得我们的社会在整体上显得如此不公平,但又令人无可奈何。我相信,这才是“80后一代暮气沉沉”的根源。从我这样一个“60后”的眼睛里看出 去,历史仿佛开了一个巨大的玩笑:他们原本属于让我们这代出生于文革中的人羡慕并寄予厚望的“改革开放一代”,但他们中的绝大部分却没有能够享受到改革开 放的丰硕成果,更未能站在进一步更大力度的改革开放的潮头,反而未老先衰了。
这是否意味着,今天的田头和车间里再也走不出明天的李克强们?

匿名冲浪指南

You could try reading about wingates, socks and proxies (oh before i forget, turn off java, javascript, cookies, what's related, and smart update ... if you are using IE you're not very smart). Also try installing a firewall, or DHCP or you can learn from me!
There are situations in which you may want to visit a site without leaving a trace of the visit. For instance you want to check what's going on at your competitor's site. Your visit will generate a record in the log file. Frequent visits will generate many records. Do you want to know what kind of records? See in YOUR REQUEST, YOUR WHOIS RECORD, GEOGRAPHIC LOCATION and MAP, Privacy Analysis of your Internet Connection, Another Privacy Investigation Report, BrowserSpy Info, ShowMyIP - will tell you some scary info about what can be told about your computer via the internet.
Note that these tests are not very sophisticated. A dedicated "snooper" can often learn much more. Once I came across a server that tried to connect to my computer's disk while I was browsing ... that was an exciting experince. You should also remember about things like cookies, hostile applets and java scripts, browser security holes and so on. So why don't we send someone instead of ourselves? Good idea.
Remember that simple owner of Web server may collect information about requests you had performed in search engines, keywords you had typed, your browser and language, date, time, your operating system, physical and geographical position, pages from which you had clicked links and so on. See below some records generated by our server users (real IPs are slightly changed).. Note that large internet companies such as doubleclick, google, government institutions have tremendous possibilities to collect much more information about you and your behaviour..
24.10.31.1 - - [17/Oct/2006:07:03:22 +0000] "GET /proxy/howto.htm HTTP/1.1" 200 33104
 "http://www.google.com/search?complete=1&hl=en&q=change+ip+address+proxy&btnG=Google+Search"
 "Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.0.7) Gecko/20060909 Firefox/1.5.0.7"
217.154.66.1 - - [17/Oct/2006:07:03:25 +0000] "GET /proxy/ HTTP/1.1" 200 37361
 "http://www.google.co.uk/search?q=http+proxy+for+ftp&start=0&ie=utf-8&oe=utf-8"
 "Mozilla/5.0 (Windows; U; Windows NT 5.1; en-GB; rv:1.8.0.6) Gecko/20060728 Firefox/1.5.0.6"

Step #1-Determine your IP Address:

Every computer connected to the Internet has a unique identifier called an IP Address. On many networks, the IP Address of a computer is always the same. On other networks, a random IP Address is assigned each time a computer connects to the network. This is what we are referring to when we ask if you have a static or a dynamic IP Address. If a system uses dynamic addressing, the IP can change quite often. Look into REMOTE_ADDR row in THIS LINK to determing your current IP Address.

Step #2-Get Anonymous:

Method #1: Anonymizer

One can surf anonymously and easy with the help of a nice services called CGI/Web proxies. Simply type a URL you want to visit -- the Page does the job for you, selecting random CGI/Web proxy from a hundreds of available services, securing you from many potential dangers. When you follow a link on a page viewed via CGI proxy you get there via the this proxy again, so you don't have to type a new URL.
CGI/Web proxy has two more nice features. Firstly, there are WWW sites that are inaccessible from one place, but easily accessible from another. Once I was trying to load a page located in Australia for 20 minutes, all in vain. Using CGI/Web proxies immediately solved the problem. Secondly, there are certain sites that give you information depending on where you are "calling" from. Let's take an example. I was at Encyclopedia Britannica site, trying to check the price for their products. Clicking on Order Information button gave me the list of Britannica's dealers all over the world, no price info. Going to the same place via the Anonymizer led me to a different page, where I found the price list. As it turned out the local dealer's price for Encyclopedia Britannica CD was several times higher than the one at which it's sold in USA. Good savings!
Some CGI/Web proxies are able to encrypt URLs (uniform resource locator) in a way that these can be used as reference for a server. If a request with an encrypted URL occurs, they are able to decrypt the URL and forward it to the server, without enabling the user to get knowledge about the server address. All references in the servers response are again encrypted before the response is forwarded to the client.
Some CGI/Web proxies are able to use secure HTTPS protocol for exchanging data between proxy and your computer, even if original server is not secure. This option excluding possiblility to sniff a data flow between your computer and this proxy is very useful in some cases, for example, when you are forced to work in possibly scanned/sniffed insecure public network.
To get your personal CGI/Web/FTP proxy simply download free James Marshall CGIproxy script and install on your Web server (Apache as a rule, Perl or mod_perl support is required), Glype proxy is another CGI script written in PHP which allows webmasters to quickly and easily set up their own proxy sites or PHProxy. Our ProxySite Perl script allows to run your own Web proxy on any computer (Linux, Windows, ..) with only Perl interpreter installed.

Method #2: Proxy Servers

What is proxy?
  • Proxy - a server setup designed to offer either firewall security or faster access to cached content normally accessible only through slower connections.
  • Proxy server - is the software installed on some network server. The main purpose of this software is to relay traffic between two network hosts (client and server), sometimes this software does some data caching (usually this is performed by HTTP proxies). If your browser is configured to work through the proxy server then all your network traffic will go through that proxy server.
The main purposes of proxy servers:
  • Transfer speed improvement (in case of caching proxies). You may use your ISP's proxy to access the internet - usually you have better connection to your ISP's proxy than to other hosts, if this proxy has the resource you requested from the internet you will get a copy of it from proxy (from its cache).
  • Security and privacy (for HTTP). Anonymous proxies hide information about your computer in the request headers, so you can safely surf the net and your information will never be used in any way.
  • LAN interconnection (or LAN to WAN connection). Sometimes you experience some problems while accessing the server located in the other network (for example in the internet).
There are 3 types of HTTP proxies:
  • Fully anonymous (elite or high anonymous) proxies. Such proxies do not change request fields and look like real browser. You real IP is also hidden of course. People that administrating internet servers will think that you are not using any proxies.
  • Anonymous proxies also do not show your real IP but change the request fields, so it is very easy to detect that proxy while log analyzing. Nothing really matters, but some server administrators restrict the proxy requests.
  • Transparent proxies (not anonymous, simply HTTP) change the request fields, also they transfer real IP. Such proxies are not applicable for security and privacy while surfing on net. You can use them only for network speed improvement.
When Web Proxy Servers are Useful?
  • Permitting and restricting client access to the Internet based on the client IP Address.
  • Caching documents for internal documents. - Selectively controlling access to the Internet and subnets based on the submitted URL.
  • Providing Internet access for companies using private networks.
  • Converting data to HTML format so it is readable by a browser.
One can also anonymize one's web surfing by using a proxy server. Proxy servers are similar to the Anonymizer, i.e. web pages are retrieved by the proxy server rather than by the person actually browsing the Web (you). But there are several important distinctions: proxy servers don't help with cookies, hostile applets or code. In most of the cases they do just one thing: they conceal your real geograhic location.
Most of proxy servers restrict access based on the IP Address from which a user connects to them. In other words if you have an account with Bluh-Bluh-Com, you can't use La-Di-Da-Net's proxy server, access will be denied. Fortunately you can always find a "kind-hearted" proxy server on the Net the owners of which openly state that the service is publicly available, or a proxy server that doesn't restrict access that due to whatever reason, but the fact is not known to everyone.
How do you find a "kind-hearted" proxy server? Good news for lazy people: there are many lists of available proxy servers with periodic updates: http://rosinstrument.com/proxy/. RSS feeds are also available for proxy lists syndication and to keep up with proxy lists in an automated manner that can be piped into special programs or filtered displays, such us Google Reader, Bloglines, etc.: RSS in browser, RSS in Google Reader, RSS planetlab in browser, RSS planetlab in Google Reader.
For those who are not so lazy: find your own proxy server, it's real easy. Go to your favorite search engine (Google.com for example) and type something like +":8080" +":3128" +":1080" filetype:txt OR filetype:html, and you'll get the list of Web pages where ISPs give complete instructions to their users of how they should configure their browsers. Try every proxy address and after 5 or 7 failures you will surely find a proxy server that works for you. So let's say you have found a proxy, e.g.: some.proxy.com, HTTP port 8080. To make your browser use a proxy server fill out the corresponding fields in Manual Proxy Configuration tab (hope you can find it yourself).
Custom Search
Testing proxy lists you have found.
As a rule a quality of proxies from proxy lists you have found by such ways is sufficiently low because of large number of requests to these proxies by many users which have found that lists in search engine, number of professional abusers and robots using these proxies very intensive for network adverising, spamming, flooding forums, bulletin boards, blogs and so on. Number of working proxies from such lists varies from 0.00% to 10-20%. Therefore manual selection of operable proxies is not possible. Fortunately, a few of proxy testing software exists such as our ProxyCheck Java application, Proxyrama for Windows with source code available, Charon for Windows and others. See our Related Links for more examples.
Warnings!
Misconfigured Servers
Often, a PUBLIC proxy server is open because it has not been configured properly. Most of open proxy servers are not supposed to be public. The person that configured the server was not aware of the potential problems and security risks. It is very common to for a novice administrator to set up a proxy with access rights that allow anyone to connect. To close a proxy server it is necessary to force users to connect from one IP Address or a range of IP Addresses. An alternative is to require users to use a user name and password.
'Honey Pots' or 'Honey Proxies'
Everything that is done on or through the open proxy server can be logged and traced. A honey pot is an open proxy server intentionally deployed by security professionals to lure hackers and track their every move. A honey pot can also be installed by a hacker. A hacker can put a proxy server up on his, or a victim's computer and wait for a scanner to find it. Sending spam e-mail trough a honey pot proxy exposes the sender's activity. When a spammer uses the proxy to send bulk email, it is possible to collect the content of the spam and report the spammer to his ISP.
Educational, academic public proxy systems: Planetlab, CoDeeN
The CoDeeN (a suite of network services, including a CDN, that provides users with more robust access to network content) proxies are big, fast, logged and cached proxy servers cluster based on PlanetLab (a global platform for testing and deploying an emerging class of planetary-scale network services) global research network which was founded in 2002 in Princeton, Berkley and now consists of more than 700 nodes located in many educational and research institutions in the world opened for public use. These proxies are often placed in many "anonymous proxy lists" such as "high anonymous" and "elite", HOWEVER everything you do online is thoroughly tracked. As a rule these proxies are configured on 3124,3127,3128,8888 TCP ports. Some limitations for these proxies usage also exist, for example HTTP POST method is disabled.
Security Risks
When you use an open proxy server, your computer is making a direct connection to another computer. You do not know who is in control of the remote computer. If you are using proxy servers from open proxy lists, you could be trusting your email messages, passwords or other sensitive information to a person running the server. Someone can be watching the unencrypted information you are transferring over the network.

Configuring your browser to easy switch between multiple proxy configurations

There are many different software that could be used to set up a proxy for your system. For example small and free SwitchProxy Tool Extension for Mozilla, Firefox, Thunderbird. SwitchProxy lets you manage and switch between multiple proxy configurations quickly and easily. You can also use it as an anonymizer to protect your computer from prying eyes. Text proxy lists in host:port format are very flexible and can be used with most proxy software for Internet Explorer, Mozilla, Firefox, Thunderbird, Opera and other browsers.

Configuring your browser with "Proxy Auto-Config File" proxy.pac

Definition

The proxy auto-config (.pac) file defines how user agents can automatically choose the appropriate access method for fetching a given URL. See Wikipedia article for more detailed description.

Firefox

Go to Tools -> Options -> General -> Connection Settings. Select the option to enter an automatic proxy configuration URL. Enter http://rosinstrument.com/cgi-bin/proxy.pac and click OK twice.

Firefox 2

Go to Tools -> Options -> Advanced -> Network -> Settings. Select the option to enter an automatic proxy configuration URL. Enter http://rosinstrument.com/cgi-bin/proxy.pac and click OK twice.

Internet Explorer

Go to Tools -> Internet Options -> Connections. If you use a dialup connection, select it and click Settings. Otherwise, click LAN Settings. Select the option to use an automatic configuration script. Make sure no other options are selected. Enter http://rosinstrument.com/cgi-bin/proxy.pac and click OK twice.

only SOCKS, CONNECT or HTTP selection

Configuring your browser manually

FireFox

Tools - Options - General - Connection Settings - Manual proxy configuration - View, and for HTTP and FTP type name of your proxy server (example: proxy.net) and port number (example 3128).

Mozilla, Nestcape Navigator 6.x, Nestcape Navigator 4.x, Netscape Communicator

Edit - Preferences - Category - Advanced - Proxies - Manual proxy configuration - View - Set proxy for following protocols: HTTP, FTP, etc.

Konqueror

Setting - Configure Konqueror... - Proxies - Enable "Use proxy" - Set proxies for HTTP, HTTPS, FTP or other protocols.

Internet Explorer 5.x, 6.x, 7.x, 8.x

Service - Internet Options - Connections - Choose your connection and click "Settings" button for dial-up connection or click "LAN Settings" button in the "Local Area Network (LAN) Settings" group box - Enable "use a proxy server - type proxy name and proxy port - If nessesary, enable/disable "bypass proxy server for local addresses" - OK

Internet Explorer 4.x, Internet Explorer 3.x

View - Internet Options - Connection - mark "Access the Internet using a proxy server". At ADDRESS type name of the server (example: proxy.net) and at PORT type port number (example: 3128), click on advanced button and mark "Use the same proxy server for all protocols".

Opera 8.x, Opera 9.x

Tools - Preferences - Advanced tab - Network - "Proxy servers" button - set Proxy Server address and proxy configuration port - OK.

Mozilla Thunderbird proxy settings

Tools - Options - Advanced - "Offline and Connections Settings" -"Connection Settings" - "Set up Proxies for accessing the Internet" - select radio button for "Manual proxy configuration" - set Proxy Server address and proxy port - OK.

mIRC

Tools - Options - Open Connect - Firewall - in "protocols" combo box select SOCKS4, SOCKS5 or Proxy (for HTTP, HTTPS) - set Proxy Server address and proxy port - OK.

Emule

Options - Proxy tab - enable check box "Enable proxy" - choose the SOCKS4, SOCKS4a, SOCKS5 or HTTP 1.1 - enter "Proxy host" and "Proxy port" - OK.

Kazaa

Tools - Options - "Firewall" tab - select "Use SOCKS5 Proxy Server" - set proxy addres in "Hostname" field and proxy port in "Port" field - OK.

AOL Instant Messenger

"Setup" button - "Connections" button - "Connect using Proxy" box - set Host and Port - select protocol type - OK.

Yahoo Messenger proxy settings

Login menu - Preferences - "Connection" tab - 'Use proxies' - set your proxy address and port - OK.

MSN Messenger

Tools - Options - "Connection" - "Advanced Settings" - set proxy address and port - OK.

Windows Media Player 9.x, 8.x, 7.x

Tools - Options - Network tab - in the Proxy Settings area click protocol you going to configure - select 'Use browser proxy settings' or change this setting to manually configured proxy - OK.
Once you have carried out this simple operation, you can start surfing the Web leaving traces as if you are from Bulgaria, USA, North Korea (that would be fun!) or somewhere else, but ...there is one more very important privacy concern, "Is My Proxy Anonymous?".

Is My Proxy Anonymous?

Not all proxy servers are truly anonymous. Some of them let the system administrator of the site that you visit via a proxy server find out the IP Address from which the proxy server is accessed, i.e. your real IP Address. You can perform an anonymity check test: DETECT PROXY
If you get the message: Proxy server is detected! - then there is a security hole in your proxy, and information about your real IP Address will be listed. If the message is Proxy server is not detected - everything should be OK. In any case, carefully study the list of IP Addresses that is returned by this online tool. None of them should belong to you. You can also use alternative tests to check if your browser is anonymous. Such tests can give a complete list of the parametrs your browser passes to a remote server (this is called Environmental Variables).

Where are these proxies from?

Sometimes is required to determine Country, City or even geographical latitude and longitude to select from proxies list or servers list. Now it possible HERE, due to bulk interface to geoiplookup utility. Paste HERE your public proxies or simply hosts list in simple text format and press "Lookup GeoIP info" button. As a result you'll get your bulk proxies list opposite to corresponding Country, City, Longitude and Latitude and even link to Google Map of this server geographical location.

Test My Proxy Speed

Anonymity and Caching for speedup surfing are priority aims of Proxy servers. But not all proxy servers sufficiently fast for comfortable surfing due to high server load, bad/slow client-server connection and so on. To determine does proxy you have selected have sufficient speed for you CLICK HERE to measure your connection speed twice, first, without proxy configured, second, with proxy configured. If you'll have received sufficiently similar results for measured speed in both cases, so the configured proxy has speed capabilities sufficient for your connection speed. Otherwise try to select and to test another proxy.

Final Considerations

In spite of all of the the above said ... use proxies only when it's necessary. Working via proxy servers slows down data transfer rate and is an additional load on the network and the servers. Another important thing that is often forgotten by many people: use proxies for legal purposes. Hiding you identity is ok (at least in the free world) as long as you want to visit a site that offers, say, pornography. But if you use a proxy server for purchasing CDs or software with a bogus credit card number there is a good chance that you'll end up in prison, let alone the moral aspects. Remeber, all the connections are logged, and if you violate the law you can be tracked down. The site administrator can check the logs and contact the proxy's administrator, he can in turn check his own logs and find your real IP Address, then they both will contact your ISP, and your ISP keeps logs too ... Anyway, I hope you got it.

Specially for paranoiacs

Look, different tools described above can be chained! For example you set up your browser to use Proxy A, and you know the addresses and port numbers of 2 more servers Proxy B and Proxy C. The URL that you type should look something like that: http://proxyB:port/http://proxyC:port/http://www.whereyougo.com/ As the result you go to the site via 3 servers: A,B and C. One of them can be the Anonymizer. WARNING: Not all the proxy servers allow chains like that. Such capabilities exist ONLY for CGI/Web proxies (pay attention to chaining CGI proxy combobox), HTTP proxies with CONNECT capabilities (additional software is required for chaining, usually such software supports both SOCKS and CONNECT proxies, see examples for SOCKS) and SOCKS proxies (such software is required as Prtunnel, Proxyrama and others).

Anonymity and Myths

Anonymity is derived from the greek word ανωνυμία, meaning without a name or name-less. In colloquial use, the term typically refers to a person, and often means that the Ppersonal identity, or personally identifiable information of that person is not known.
The main question is of course, what are you trying to hide? Closely following that is how important is it? The precautions you take have to weigh up to the value of the data you are trying to protect, in this case, you are trying to protect your anonymity. In the recent years privacy and anonymity have become big issues with CCTV cameras everywhere, and projects like Echelon reading all your e-mails and reporting back to the Orwellian ‘Big Brother’. So just for normal surfing, or if you are planning on hacking a foreign governments personnel database (not that we recommend that of course), you need to protect yourself in different ways.
Remember Anonymity is not an absolute, there are varying degrees.
The Myths
Using a proxy I found on the web in my browser is enough.
People have been using proxies for years, normally open proxies found from scanning large IP ranges on the internet, what you have to think though, is this proxy open for a purpose? Is this purpose to listen to what you are doing? To collect your passwords? Also it’s not infallible, remember the traffic has to go from your computer to the proxy, and come back in, those records can be corelated in your country alone and need to external aid. Plus the proxy may keep records of who access what and when, it make be a honeypot and keep full packet logs of all completed TCP/IP sessions. The problem is you just don’t know.
If I chain proxies no one can find me.
Also not true, it doesn’t matter if you cross through Taiwan, Korea, Russia and Iraq, your ISP just needs to see the packets going out and coming in at the right times to your machine from the last proxy hop in your chain.
The Reality
It can be said, pretty much whole heartedly, there is no such thing as real anonymity online, if you do something bad enough, the people in power can find you. IP Spoofing is misunderstood in 9/10 cases and is no protection against anything (I’ll write an article about this later). And web proxies, as above, offer little or no protection. They are good enough if you just want to stop your school/parents/office from tracking your surfing habits, but they won’t protect you from doing time if you commit a federal crime. The next best thing from this is Onion Routing, the common peer to peer implementation known as Tor.
Onion Routing prevents the transport medium from knowing who is communicating with whom — the network knows only that communication is taking place. In addition, the content of the communication is hidden from eavesdroppers up to the point where the traffic leaves the OR network.
Source: Onion Router
Tor is a toolset for a wide range of organizations and people that want to improve their safety and security on the Internet. Using Tor can help you anonymize web browsing and publishing, instant messaging, IRC, SSH, and other applications that use the TCP protocol. Tor also provides a platform on which software developers can build new applications with built-in anonymity, safety, and privacy features.
You can read more at the Tor site, the Wikipedia articles Onion routing and Tor (anonymity network).
Getting Tored Up
For most people Tor is enough, I recommend getting the Tor Bundle, which includes Tor, TorCP and Privoxy. All you need to do is set your applications to use a proxy, host is localhost and port is 8118. Instructions with screenshots are here: Linux/BSD/Unix, Windows. Then you’re done, it works for most applications. Just remember though it’s encrypted from your machine to the end point, not from the end point to wherever it’s going, so that Tor node can see whatever traffic you are sending through Tor.. So make sure you encrypt (POPS, SMTP with TLS etc).
The h07 unix research team recognized that people paranoid enough to use tor are still dumb enough to use plaintext-authentication protocols like pop3 and telnet. They might think it’s “secure because tor encrypts it”. This isn’t the case. It’s encrypted, but …… communication from client to entry node and exit node to server will still remain as is. POP3, telnet and others will still be plain-text and thus subject to sniffing.
Freenet p2p software
Freenet project is free software which lets you publish and obtain information on the Internet without fear of censorship. To achieve this freedom, the network is entirely decentralized and publishers and consumers of information are anonymous.
Freenet can be thought of as a large storage device. When you store a file in it, you receive a key which can be used to retrieve the file. When you supply Freenet with a key, it returns the appropriate file (if it is located). The storage space is distributed among all connected nodes on Freenet.
Freenet is a Peer-to-peer network, which is both decentralized and anonymized. The nodes that you connect to only knows its nearest neighbours and has no idea about how the network as a whole is structured.
Freenet is built on the principle of small world networks. By connecting to nodes of people you already know, and the people you know in turn connect to people they know, one should be able to reach all nodes in a Freenet network.
XeroBank (aka Torpark) Browser and XeroBank anonymity network
xB Browser is an commercial anonymous web browser designed to run on both the Tor and XeroBank anonymity network. xB Browser was originally forked from Portable Firefox web browser with Tor access built into it, but was redesigned from scratch in 2007. It is designed for use on portable media such as a USB flash drive but it can also be used on any hard disk drive. The XeroBank network routes traffic through at least two multi-jurisdictional hops. In contrast to Tor, the XeroBank network is immune to 3rd-party traffic injection, supports both TCP and UDP protocols, and performs channel multiplexing for low observability, however it is run by a single entity.
True Anonymity?
It may not be totally legal, but it’s pretty much bulletproof (Unless of course you get caught in a car parking jacking off to porn downloaded from an open Wireless Access Point). When you do this, you should make sure you are using an anonymous operating system, so what better than a bootable distro especially for this purpose, called Anonym-OS, You can check it out here.
kaos.theory’s Anonym.OS LiveCD is a bootable live cd based on OpenBSD that provides a hardened operating environment whereby all ingress traffic is denied and all egress traffic is automatically and transparently encrypted and/or anonymized.

Using SocksCap client and SOCKS proxy for anonymity in non HTTP applications without build in SOCKS protocol support (telnet, ftp, IRC and so on)

What is SocksCap?
SocksCap automatically enables Windows-based TCP and UDP networking client applications to traverse a SOCKS firewall. SocksCap intercepts the networking calls from WinSock applications and redirects them through the SOCKS server without any modification to the orginal applications or to the operating system software or drivers. It is a great difference in situation with built-in SOCKS support from the years of SocksCap debut. Most network applications now have SOCKS protocol built-in support. Only few of the legacy applications need SocksCap type standalone application for SOCKS servers usage.
Where do I get SocksCap? Is SocksCap free? Is the source code available?
SocksCap now as a matter of fact is out-of-date and not supported software, but there are a lot of SocksCap clones and successors, see Related List for alternate SOCKS capable servers (SS5, Dante, 3Proxy etc.) and clients (Socks5, FreeCap etc.).
What do I enter for SOCKS server and port in SocksCap Setup?
Enter the address and port of the SOCKS server you need to traverse. If you are not sure what those are, contact your ISP, network administrator, or firewall administrator for your site or consult a lists: SOCKS LIST 1, SOCKS LIST 2.

Using HTTPort software and CONNECT/SSL/HTTPS proxy for anonymity for HTTP and non HTTP applications and bypassing of your local HTTP proxy filtering

HTTPort allows you to bypass your HTTP proxy, which is blocking you from the Internet. With HTTPort you may use various Internet software from behind the proxy, ex. e-mail, instant messengers, P2P file sharing, ICQ, News, FTP, IRC, etc. The basic idea is that you set up your Internet software in such a manner, that it connects to your own local PC as if it was the remote server it needed. HTTPort then intercepts that connection and runs it through a tunnel through the proxy.
HTTPort doesn't really care for the proxy as such, it works perfectly with firewalls, transparent accelerators, NATs and basically anything that lets HTTP protocol through. HTTP is the basis for web surfing, so if you can freely surf the web from where you are, HTTPort will bring you the rest of the Internet applications.
HTTPort performs tunneling using one of two modes. The following schemes will give you the idea.
In SSL/CONNECT mode HTTPort can make a tunnel through a proxy all by itself. It requires that the proxy supports a certain HTTP feature, specifically CONNECT HTTP method. Most of the proxies have this method disabled by default, and administrators don't readily enable it, so if you find that this tunneling mode works for you, you must be lucky. SSL/CONNECT mode much faster, but encryption can't be used in this mode and as described here, your proxy tracks all your actions easily.
Remote host method is much more capable for tunneling through just about any proxy. In this mode HTTPort uses a special server software called HTTHost installed somewhere outside of your proxy-blocked network. HTTHost is basically a web server with a twist. When HTTPort is doing tunneling, it sends series of HTTP requests to the HTTHost. The proxy sees it af if you were surfing to some web site, and consciously allows you to. HTTHost in turn performs it's half of tunneling and talks to the target servers. This mode is much slower, but works in most cases, and it features strong data encryption which makes proxy logging useless.

Using Proxifier to tunnel any Windows/Mac network application through SOCKS/HTTPS proxy server

Proxifier is a Windows/Mac program that allows network applications that do not support working through proxy servers operate through a HTTPS or SOCKS proxy server or a chain of proxy servers.
With Proxifier you can easily tunnel all connections on the system or separate applications. You can work with any Internet client (browsers, FTP, IRC, BitTorrent, messengers, telnet, SSH, video/audio, games...) through a network that is separated from Internet by a firewall (only one open port is required for a proxy tunnel to bypass firewall). Proxifier will provide you with added privacy in all your Internet activities. An example is sending and receiving email through a proxy server or by chaining multiple proxy servers together. Proxifier supports all mail clients while allowing you to remain anonymous.

Related links

Rosinstrument.com related links list
Assorted list of links related with Rosinstrument.com site with brief descriptions (proxy lists, howto's, forums and so on)
Proxy related code Perl
Perl sources and examples for proxy servers, clients, tuneling, tools, scanners, list convertors, etc.
CGI proxy judge for Apache webserver C language
Simple, small and fast proxy judge CGI environment tester to determine proxy request anonymity
PROXY SITE server fast, small, simple and easy to use Perl script Perl script
Perl script run as small, simple, fast, standalone HTTP daemon (HTTP SITE) and acts as HTTP, FTP, HTTPS, GOPHER, other protocols PROXY
HTTP/FTP Proxy in a CGI Script by James Marshall Perl CGI script
Retrieves the resource at any HTTP or FTP URL, updating embedded URLs in HTML and other resources to point back through this script
Glype proxy, web-based proxy script written in PHP PHP script
Free PHP script for anonymous browsing and bypassing censorship restrictions which allows webmasters to quickly and easily set up their own proxy sites
PHProxy is a web HTTP proxy to bypass firewalls and blocks PHP script
PHProxy is a web HTTP proxy programmed in PHP meant to bypass firewalls and access otherwise inaccessible resources (i.e. blocked websites)
Privoxy web proxy Linux, Unix, Windows, source
Privoxy is a non-caching web proxy with advanced filtering capabilities for enhancing privacy, modifying web page data, managing HTTP cookies, controlling access, and removing ads, banners, pop-ups and other obnoxious Internet junk
Squid Web Proxy Cache Unix, Linux, FreeBSD, OpenBSD, NetBSD etc. sources and binary
Full-featured Web proxy cache, the result of many contributions by unpaid (and paid) volunteers, proxying and caching of HTTP, FTP, and other URLs; proxying for SSL; cache hierarchies; ICP, HTCP, CARP, Cache Digests; transparent caching; WCCP (Squid v2.3 and above); extensive access controls; HTTP server acceleration; SNMP; caching of DNS lookups
Aladdin Knowledge Systems Windows/Linux
eSafe gateway based content security providing protection against malicious software and spam/url filtering. Also offer USB smart card for token authentication and hardware dongles for software copy protection purposes.
Chutney Technologies Windows, Unix
Offers caching solutions for arbitrary application objects such as HTML/XML fragments and session objects.
Cyberoam
Offers content filtering, load balancing and caching features. Firewall add-on available. Integrates with anti-virus and anti-spam software. Includes evaluation software and documentation.
Dante Unix
Circuit level proxy with firewall, supports SOCKS, msproxy and http proxy. Port redirection and bandwidth usage control available through add on modules.
DeleGate Windows, OS/2, Unix
Offers caching, filtering and proxy support for most common protocols. Free downloads and reference manuals.
EServ Windows
Offers mail and news server hosting, web caching and activity logging. Trial downloads, online ordering and PDF documentation.
SOCKS5 Unix, source
This is NWSL (previously CSTC) version 5.0 of SOCKS, a package that allows Unix hosts behind a firewall to gain full access to the internet without requiring direct IP reachability. It does require a SOCKS server program being run on a host that can communicate directly to hosts behind the firewall as well as hosts on the Internet at large.
ProxyChains - HTTP and SOCKS any app proxifier Linux, source
ProxyChains allows you to use SSH, TELNET, VNC, FTP and any other Internet application from behind HTTP(HTTPS) and SOCKS(4/5) proxy servers
TSOCKS, transparent SOCKS proxying library Linux, source
TSOCKS allows non SOCKS aware applications (e.g telnet, ssh, ftp etc) to use SOCKS without any modification. It does this by intercepting the calls that applications make to establish network connections and negotating them through a SOCKS server as necessary
FreeCap Windows
transparent redirect connections through SOCKS/HTTPS server (SocksCap analog) and SOCKS/HTTPS servers chain (SOCKS Chain analog). Supports SOCKS v4, SOCKS v5, HTTPS /CONNECT/ protocols, supports Internet Explorer, Netscape, Mozilla, Trillian, Opera, MS Outlook Express, others as clients.
ezbounce
Configurable IRC proxy.
ftp.proxy Unix, Windows
Offers application layer FTP service proxying to facilitate use of service through firewalls. Supports various access control options.
iMimic Networking, Inc. Solaris, Linux, FreeBSD
Offers web caching and multimedia streaming caching functionality. Also offer content filtering software.
JanaServer Windows
Offers connection sharing, monitoring and user level access control. Also offers http, email, ftp and news server functionality.
602 LAN SUITE Windows
Offers mail server, spam filtering, antivirus, web caching, access control, firewall and activity logging.
micro_proxy Unix
HTTP/HTTPS proxy that runs from inetd, and uses less than 1kb of diskspace.
NetProxy Windows
Offers web caching, site filtering, firewall, activity logging and access control.
Netscape Proxy Server Unix, Windows
Offers web caching, content filtering, access control and activity reporting.
Novell.com: Volera
Website acceleration and content caching systems.
Philtron PHP, platform independent
Filtering HTTP proxy that rewrites the HTML of the web pages that pass through it; removing unwanted/hostile content from the pages and providing enhanced user anonymity.
Proxy+ Windows
Offers web caching, firewall, mail server, access control and activity logging.
PServer Java, platform independent
Offers connection sharing, content filtering and activity logging.
Wingate Windows
Wingate offers connection sharing, caching, access control, usage monitoring and firewall services. Content filtering, anti-virus and VPN options available as extras.
Spoon Proxy Windows
Offers connection sharing and logging.
Surfer Protection Program Windows
HTTP proxy that enhances user privacy by deleting (or faking) eight data elements, including the Cookie field and Referrer fields, from web browser responses.
TcpIQ Windows
Offers connection sharing, bandwidth throttling and realtime graphical and data analysis of proxied traffic. Supports HTTP, FTP and POP3 traffic.
Tinyproxy Unix
HTTP proxy with low system resource requirements. Offers http header blocking.
Tircproxy Linux
IRC proxy, access control available via standard Unix hosts file configuration.
Vicomsoft Ltd MacOS, Windows
InterGate software offers web caching, stateful inspection firewall, content filtering and network management services. Anti spam module also available.
WWWOFFLE
Open source caching Web proxy for offline use and low-bandwidth connections. Supports ad blocking and security filtering.
AnalogX proxy Windows binary
supports HTTP (web), HTTPS (secure web), POP3 (recieve mail), SMTP (send mail), NNTP (newsgroups), FTP (file transfer), and Socks4/4a and partial Socks5 (no UDP) protocols
WinProxy Windows binary
proxifying, caching, filtering, antivirus and antispam modules. Supports HTTP, HTTPS, NNTP, etc.
CCProxy Windows binary
Small proxy server with SOCKS protocol support, in china
Proxyrama Windows binary, source code
Tool for finding and testing proxy servers for anonymity, speed, gateway or not proxy, 'connect' method support (chainability), socks 4/5 support and geographical location. Furthermore, Proxyrama can be used as a local proxy server that redirects your traffic through chain of anonymous 'connect' method proxies. Source code also available.
Charon Windows binary
Proxy finding and testing tool. Crawls search engines for open proxies, test proxies anonymity.
SS5 Linux, Solaris, FreeBSD
SS5 is a socks server for Linux, Solaris and FreeBSD environment, that implements the SOCKS v4 and v5 protocols.
3Proxy Cross-platform (Win32 and Unix)
3[APA3A] tiny proxy 3Proxy is really tiny cross-platform (Win32&Unix) proxy servers set. It includes HTTP proxy with HTTPS and FTP support, SOCKSv4/SOCKSv4.5/SOCKSv5 proxy, POP3 proxy, TCP and UDP portmappers. GNU/GPL license.
Nylon BSD, Solaris, HP-UX and Linux
Nylon is a proxy server, developed on OpenBSD. It supports SOCKS version 4 and 5, as well as a mirror mode so that services can be mirrored directly.
Prtunnel Unix
Prtunnel is a program that can tunnel TCP/IP connections in a variety of ways, including through HTTP and SOCKS5 proxy servers.
HTTPort Windows, source
HTTPort allows you to bypass your HTTP proxy, which is blocking you from the Internet by using remote tunnel server and local client for wide range of not only HTTP applications, such as e-Mail, instant messengers, P2P file sharing, ICQ, News, FTP, IRC, etc. clients applications.
Freenet Linux, Windows, OSX, source
Freenet is free software which lets you publish and obtain information on the Internet without fear of censorship. To achieve this freedom, the network is entirely decentralized and publishers and consumers of information are anonymous. Freenet is a Peer-to-peer (p2p) network, which is both decentralized and anonymized. The nodes that you connect to only knows its nearest neighbours and has no idea about how the network as a whole is structured.
XeroBank Windows
XeroBank's internet privacy software suite gives you the tools to anonymously access the internet. The XeroBank Installer includes xB Browser, xB Mail, and xB VPN. Interet privacy software evades tracking, logging, cookies, spyware, and does not leave personally identifiable information.
SOCAT, a relay for bidirectional data transfer package Linux, Unix, source
a relay for bidirectional data transfer between two independent data channels. Each of these data channels may be a file, pipe, device (serial line etc. or a pseudo terminal), a socket (UNIX, IP4, IP6 - raw, UDP, TCP), an SSL socket, proxy CONNECT connection, a file descriptor (stdin etc.), the GNU line editor (readline), a program, or a combination of two of these
Proxifier Windows, Mac OSX
Proxifier allows network applications that do not support working through proxy servers operate through a HTTPS or SOCKS proxy server or a chain of proxy servers.
Charles Proxy Java: Windows, Mac OSX, Linux
Charles Proxy HTTP proxy / HTTP monitor / Reverse Proxy that enables a developer to view all of the HTTP and SSL / HTTPS traffic between their machine and the Internet. This includes requests, responses and the HTTP headers (which contain the cookies and caching information).
SPIKE Proxy Windows, Linux
SPIKE Proxy professional-grade tool for looking for application-level vulnerabilities in web applications. SPIKE Proxy covers the basics, such as SQL Injection and cross-site-scripting, but it's completely open Python infrastructure allows advanced users to customize it for web applications that other tools fall apart on. 
 
from http://www.proxies.by/howto.htm