From: Wheel on
hummingbird wrote:
> 'Wheel' wrote thus:
>
>> hummingbird wrote:
>>> 'Wheel' wrote thus:
>>>
>>>> hummingbird wrote:
>>>>> 'Wheel' wrote thus:
>>>>>
>>>>>> hummingbird wrote:
>>>>>>> 'Wheel' wrote thus:
>>>>>>>
>>>>>>>> hummingbird wrote:
>>>>>>>>> 'Bear Bottoms' wrote thus:
>>>>>>>>>
>>>>>>>>>> hummingbird <hummingb�rd(a)127.0.0.1> wrote in
>>>>>>>>>> news:eccd1d21a2e69699d503a0ed1b64f9ee(a)aracari.127.0.0.1:
>>>>>>>>>>
>>>>>>>>>>> Have a look at my earlier post to Zo about that issue.
>>>>>>>>>>> I also ran the .exe thru jotti and it found nothing.
>>>>>>>>>>>
>>>>>>>>>>> All that said, I've been using it for a few hours and it seems to
>>>>>>>>>>> introduce some delay in loading a few webpages and the BBC site
>>>>>>>>>>> wouldn't even let me get at something because it saw me as a US
>>>>>>>>>>> IP Address and some things are only available to UK folks.
>>>>>>>>>>>
>>>>>>>>>>> So I've decided only to use it IF my privacy is important.
>>>>>>>>>
>>>>>>>>>> I saw your earlier post. The exe does more than run as a standalone app.
>>>>>>>>>> though I'm not saying it is harmful, as I do not know. I do not believe
>>>>>>>>>> it contains any virus and Panda Cloud see's a behavior they want to check
>>>>>>>>>> out. I'm going to see what they say, then run the exe through TU and see
>>>>>>>>>> what it does.
>>>>>>>>> Interesting. You may be right, given the other comments I read.
>>>>>>>>> Let us know what Panda say....
>>>>>>>> Further to the comments in earlier posts:
>>>>>>>>
>>>>>>>> hpHosts
>>>>>>>>
>>>>>>>> http://hosts-file.net/
>>>>>>>> http://hosts-file.net/?s=Download
>>>>>>>>
>>>>>>>> Where the OP's link is listed in the 'Hosts' file as:
>>>>>>>>
>>>>>>>> 127.0.0.1 ultrareach.com
>>>>>>>> 127.0.0.1 www.ultrareach.com
>>>>>>> Perhaps the evidence grows!
>>>>>>> However, that website does not appear in the MVPS HOSTS file.
>>>>>> Here's something interesting. I have the 01-Apr-2009 'hpHosts' 'Hosts'
>>>>>> file which does not contain the entries posted in my previous post.
>>>>> Which means it's been added since April? hhmmm.
>>>>>
>>>>>> Although I don't use it, I do have it configured into my system
>>>>>> ('UltraSurf v9.4 (.zip version)) without using 'IE' integration, with
>>>>>> no issues whatsoever.
>>>>>>
>>>>>> I've just prodded and probed it, fired it up, pushed things through it
>>>>>> and found no issues with it.
>>>>>>
>>>>>> Perhaps v9.5 is more than just a standard incremental upgrade.
>>>>> Dunno, I ran the executable thru jotti and it came up 100% clean.
>>>>> Like yourself, I have used it quite a bit without any obvious
>>>>> problems. I'm gonna check for root kits and ADSs later on ...
>>>>>
>>>>> My guess is that the people running ultrareach are Chinese
>>>>> Americans and much of their effort is in trying to break thru
>>>>> Chinese Govt censorship, hence u95.
>>>> Yes... a contentious program: 'nuff said.
>>>>
>>>> As I don't use it I'll not upgrade at this point but still want to
>>>> retain the capability.
>>>>
>>>> Thank you for the effort you've put in and hope you post back with
>>>> your findings.
>>> I ran several ADS programs including ADSspy to check for ADS
>>> streams and sysinternals Root Kit Revealer. None found anything
>>> untoward. I also ran Autoruns to check if any start-up drivers
>>> or whatever had been loaded. None. Seems ok to me.
>> That's plenty good enough for me. I'll download it tomorrow and
>> give it a run through.
>>
>> I'll let you know if all's well this end, or not.
>>
>> Thanks again for the time and effort given.
>>
>> Anon.
>
> You're welcome. Let us know how you get on...

Well... what can I say...

I found nothing untoward whatsoever. v9.5 looks, acts and
feels exactly the same as the previous v9.4 of the program.

There are three download points on the site, one at:

http://ultrareach.com/ - .zip version

Two at:

http://ultrareach.com/download_en.htm - .zip version
- .exe version

All three resultant .exe files are identical and act in the
same way v9.4 does.

As I configure it immediately not to manipulate my system I
have no idea of potential effects that may occur when using
it in that mode.

On the download page, where it basically says:

v9.5 includes "Green Tsunami" to remove filtering/monitoring
software installed on Chinese computers ("Green Dam").

I'll stick with v9.4 for now, as I don't know what it looks
for, or how it achieves its aims. I don't suspect anything
malicious, only an added hacking/disabling/bypassing
capability, I think.

Thanks for giving it a run which made it easier for me.
From: Saxman on
Zo wrote:
>
> UltraSurf is a free software which enables users inside countries with
> heavy Internet censorship to visit any public web sites in the world
> safely and freely. Users in countries without internet censorship also
> use it to protect their internet privacy and security.
>
> With UltraSurf started, you can use web browsers (like IE, Firefox) the
> same as before, but all are under UltraSurf's protection now.
>
> http://www.ultrareach.com/
>
> small download 419kb
>
> No installation needed. You need to unzip the file if you download the
> zip version. Double-click the UltraSurf executable file to start
> UltraSurf program.
>


Managed to get rid of the pest URLseek by doing this.


Firefox re-directs to URLseek
1. Go to the following folder (on windows system) C:\Program
Files\Mozilla Firefox\extensions. On other machines, you may go down to
the folder where Firefox is installed and then go to the extensions
folder within the Firefox folder.
2. The will be a Search Settings (or search(a)settings) folder in
within the extension folder. Delete this folder. If some access error is
occurred, shut down the Firefox (close all open Firefox windows) and try
again.
3. Run the Firefox again and type some gibberish URL. If you are
seeing normal page load error page, or the Google search page (if you
have Google toolbar installed), you problem has been fixed.
4. If the problem still persist, shut down the Firefox again and
delete whole extensions folder. You may loose some of your settings but
you problem will be fixed.