Sabtu, 08 Oktober 2011

Get free ssh accounts

Go2proxy provider free ssh accounts
http://www.go2proxy.org/free/forum.php?mod=viewthread&tid=46&page=1&extra=#pid49


This ssh account is just for you to create a socks5 tunnel used by your local application. Any application needs lots of bandwidth is not allowed, such as vedio, downloading , etc.  Any other abuse will been prohibited. Read the TOS for more.

Due to prevent abusing go2proxy ssh accounts, You should apply the ssh account by following steps.
1.Firstly, you should have a blog or a website. The content of your blog or website should not be unlawful, harmful, threatening, abusive, tortious, defamatory, vulgar, obscene, libelous, invasive of privacy, hateful, or racial, ethnic or otherwise objectionable life harassment. You should create a new article in your blog or website, copy thisapplying thread content to the article, and publish it. Copy your new article’surl.
2.Secondly, reply this thread , and paste your new article’s url in the content.
3.Then, the administrator of Go2proxy.org will check your new article in your blog or website. If your blogor website is well-kowned, you will receive an ssh account and password by an sm (You should login go2proxy.org firstly), you can use it freely for the following 3 months. If your blog or website is just opened recently, you will also receive a ssh account and password, but you just can use it freely for the following 1 month.
4.When your account is going to exceed the period of validity, if you want to continue use the account, you should send an sm to go2 to extend the validity period.
5.If your account is abused by you or by someone else, your account will be terminated immediately without any notice. And your blog or website will be recorded to the blacklist of Go2proxy.org. Then any of your future application will be rejected . So please keep your account and password safely, and don’t abuse your ssh account.

6. The ssh server will run iptables as its firewall. The rules of iptables are followings.
iptables -A OUTPUT -p tcp --dport 22  -j DROP
iptables -A OUTPUT -p tcp --dport 23  -j DROP
iptables -A OUTPUT -p tcp --dport 25  -j DROP
iptables -A OUTPUT -p tcp --dport 465 -j DROP
iptables -A OUTPUT -p tcp --dport 587  -j DROP

iptables -A OUTPUT -p udp  --dport 6000:7999 -j DROP
iptables -A OUTPUT -p udp  --dport 8100:9999 -j DROP

iptables -A OUTPUT -p tcp  --dport 6000:7999  -m state --state NEW  -j DROP
iptables -A OUTPUT -p tcp  --dport 8100:9999  -m state --state NEW  -j DROP