服务承诺
资金托管
原创保证
实力保障
24小时客服
使命必达
51Due提供Essay,Paper,Report,Assignment等学科作业的代写与辅导,同时涵盖Personal Statement,转学申请等留学文书代写。
51Due将让你达成学业目标
51Due将让你达成学业目标
51Due将让你达成学业目标
51Due将让你达成学业目标私人订制你的未来职场 世界名企,高端行业岗位等 在新的起点上实现更高水平的发展
积累工作经验
多元化文化交流
专业实操技能
建立人际资源圈Internet Censorship and Circumvention--论文代写范文精选
2015-09-25 来源: 51due教员组 类别: 更多范文
51due论文代写网精选代写范文:“Internet Censorship and Circumvention ”互联网可以连接许多设备,如笔记本电脑、手机、平板电脑等。这是十分方便地,因为人们可以在远距离和短时间内进行交流和传输数据。但互联网带来了许多隐私问题,也有许多审查制度。该论文重点讲述了如何避免审查屏蔽方面的问题。
The Internet connects numerous devices such as laptops, phones, tablets, and more. This can be advantageous since people can communicate and transfer data/info across large distances and over a wide audience very quickly. However, with every good comes bad and with every free resource comes dictators. The Internet poses many privacy issues and strict censorship. Thankfully, there are ways around these issues.
Basic Concept
Internet Censorship refers to the control of accessible and permitted content on the Internet. This means citizens of the area cannot view or access particular websites, and the people are not allowed to upload/publish certain content and ideas. For instance, China blocks many Tibetan-related content, info on the Dalai Lama, and many other topics. China's censorship is sometimes referred to as "The Great Firewall". As another example, Iran blocks numerous sites such as Facebook, Twitter, Google, and almost anything that may go against the strict government's rules, religion, or philosophies. However, North Korea bans Internet access to nearly all of their citizens. The few people that are permitted to use the Internet are closely monitored.
Similarly, "mass surveillance" is the act of monitoring behavior and activities of most or all of a population. This may include monitoring Internet activity and data, covert listening (such as "bugs" or hacking/tapping phones), remotely accessing computers, viewing/accessing emails and email accounts, etc.
The Internet censorship of a country is upheld by a department of the government called the "Internet Police". The Internet police may be its own governmental department/branch or the duties may be carried out by another department (such as the communications department). For example, India's Internet police has its own department called the Indian Computer Emergency Response Team (CERT-In). In contrast, the Chinese Internet police is the Internet Society of China (ISC) which manages more than just censorship. However, the ISC gets governmental backup from the Ministry of Information Industry and other government departments. In addition, arrests, interrogations, and penalties are carried out by the Chinese Police Department and their legal system.
Technological Concepts
The censorship is performed in many ways. The government can require Internet Service Providers (ISPs) to not allow certain traffic and websites. The Internet infrastructure within the country can contain DNS servers and routers that lack or block connections to certain domain names and IP addresses. In the Internet infrastructure, firewalls can block ports, protocols, IP addresses, domain names, etc. Also, special nodes (devices/computers) in the infrastructure can be packet sniffers which look for certain content. DNS servers and routers can keep track of the activity of IP addresses so that the government knows what the citizens are viewing. Some countries may force or court-order a website owner to give the government the server logs and the user login information for all registered users.
Escaping Censorship
There are many ways computer users can retain their rights and freedom. There are special programs that are easily obtainable and usable.
Tor is a open-source browser that protects people's privacy and offers security. Also, Tor is the gateway to the Darknet which is different from the "Surface Net". The browser is available for all systems including Windows, Linux (and Android), OS X, iOS, and various Unixoid systems. Tor is an acronym for "The Onion Router". Tor networks are made up of "Tor Relays". When a Tor client connects to a server, a random path between the client and server is created among the Tor relays. The data is encrypted many times. Each relay decrypts the data once to get information as to where to send the data next. Then, the next relay decrypts another layer and sends the data to the next relay until the data reaches the client or server. Since the data is encrypted multiple times, the data is often compared to an onion with many layers (hence the name). This layered concept is called "Onion Routing".
An alternative to GNUnet is Freenet. However, Freenet can also publish "freesites". A freesite is a website that is only accessible through Freenet. Freenet is cross-platform and is written in Java. The "Freenet" is similar to the regular Internet. However, Freenet (the program) uses different protocols and algorithms to access the Freenet (network) than what regular browsers use to access the Internet (or "Surface Net").
Another alternative to Freenet and GNUnet is the Invisible Internet Project (I2P). This software is open-source and cross-platform. I2P supports file transfers, websites, chatting, email, etc. (just like Freenet). Websites on the I2P network (not part of the Surface Net) are called "Eepsites" and their URLs end in ".i2p". Instead of DNS, I2P uses "netDB".
Another method for transmitting forbidden/restricted content is to use steganography which is the practice of hiding the "real" or primary data inside of "fake" or carrier data. For instance, by using steganographic programs (apps that apply steganography), users in China can transfer Dalai Lama related content inside JPEG files. The censorship monitors would see acceptable pictures (perhaps of Chinese food) and not the Dalai Lama data that is inside of the JPEG file. The recipient can then "extract" the hidden data from the carrier data. Examples of steganographic programs include Wnstorm
Other ways of circumventing censorship is to use cached pages (from Google, if Google is accessible). This can be done by typing "cache:some_blocked_url" into the search bar. Also, checkout www.archive.org for archived webpages. In addition, www.web2mail.com can be used to email someone a webpage (with or without images). RSS aggregators can also be used in some cases.
By combining many of these tricks, citizens in oppressive governments can still access web content despite the censorship. Just remember to be careful, clear cache and temporary files, encrypt all data (network packets, hard-drives, files, etc.), and use common sense.
51Due网站原创范文除特殊说明外一切图文著作权归51Due所有;未经51Due官方授权谢绝任何用途转载或刊发于媒体。如发生侵犯著作权现象,51Due保留一切法律追诉权。
更多论文代写范文欢迎访问我们主页 www.51due.com 当然有论文代写需求可以和我们24小时在线客服 QQ:800020041 联系交流。-X

