Hacking Worlds

September 5, 2014

How to Unblock Websites at School, Work, Home or Anywhere

Filed under: hacker — Tags: , , — Jayveer Singh Rathore @ 5:05 am

Internet Censorship has grown drastically over the past few years with countries like China, Pakistan, Saudi Arabia, Iran taking the lead over other governments in extending internet censorship to almost all sources of free unbiased information. Some schools and offices also prevent users from accessing certain websites which they believe are of no use in the respective areas. Governments sometimes enforce censorship on all forms of print and digital media like newspapers and television. China is known to have even forced Google to filter its search results. In such times, sometime you may need to access a website that is blocked. This article explains how.

 

Which websites are most commonly Blocked?

The most commonly blocked websites include websites about pop culture, health, medicine, women, religion and politics. Social websites that are often blocked includeBlogger (Blogspot) blogs, Google News, Twitter, Facebook, MySpace, Bebo, Flickr, Hulu, LinkedIn, Yahoo! Messenger, Typepad, eBay, WikiLeaks, Digg, Reddit, Technorati, StumbleUpon, Delicious, Wikipedia, YouTube, DMOZ etc.

Access Blocked Websites at School, Work or Anywhere

There are many genuine reasons for which you might visit blocked websites at your school or office. Given below are the many ways you can use to regain access to the blocked website you wish to visit.

1. Cache: Many search engines maintain a cache of web pages indexed by them. You can search for a website on Google , Yahoo! or Bing and click on the cached link that is given next to the result. To load the web pages more quickly, you can visit the text-only version.

2. Using Google Mobile Search: Google Mobile Search acts as a proxy which you can use easily. It removes all the CSS styling and JavaScript and presents a stripped down version of the web page to the user from it’s own server. Due to this, the blocking software feels that you are visiting Google, whereas in reality, you are viewing the blocked website. It also breaks larger pages into many smaller ones. Go to Google Mobile Search.

3. To access a blocked website, you can enter the IP address instead of the URL in your browser’s address bar. This can bypass most basic forms of website blocks. Although if the blocking software maps the IP address to the website domain, the website will still remain blocked. You can find the IP address of the website by pinging the website domain name in command prompt and noting its IP address. Execute ping www.hackingworlds.wordpress.com in command prompt to ping www.hackingworlds.wordpress.com

4. Access Blocked Websites using Google Translate or Yahoo! Babelfish. You can also use translational services to get on blocked websites. To do so, enter a language different from the website in the ‘From’ field and English in the “To” field. You can also use this method to bypass software that block websites on the basis of specific keyword mentions. Just translate the URL you wish to visit in a different language to overcome the keyword block.

5. Proxy Websites: There are many proxy websites (anonymizers) which open blocked websites on their servers and present the data to you. This hides from the service providers the address of the website you are trying to visit. Few popular free ones include Anonymouse and KProxy.

6. Use RSS Readers for Accessing Restricted Blogs: All blogs syndicate their content via RSS feeds which you can subscribe to in web based RSS Readers like Bloglines to access blocked content. For example, the RSS feed of this blog is located at www.hackingworlds.wordpress.com/

7. Use IP Address to Decimal Conversion: If you cannot access blocked websites, you can enter the decimal equivalent of the URL’s IP address to get access to restricted websites. Search Google for IP to Decimal + IP Address of the banned website and Google will convert it into decimal. Enter that into your browser’s address bar and see if the blocked website opens.

8. Create a 2 layered Unblocker: Just go to Google Translate or Yahoo! Babelfish, open any proxy website inside it and then use that proxy website to access your blocked website. In this way, you can achieve two layered website unblocking.

9. TOR: TOR or The Onion Router is a free software that protects the privacy and security of its users by channeling data through multiple nodes so as to prevent the orginal data from being unscrambled. Although browsing through TOR is a bit slow, it is one of the most effective ways of bypassing restricted websites.

10. Nyud.net: To unblock blocked websites, just add nyud.net to their URL. For example, if this blog (www.hackingworlds.wordpress.com) is blocked, you can visit it by going to www.hackingworlds.wordpress.com.nyud.net.

11. Opera Mini Simulator: Opera offers a web based version of Opera Mini to allow users to get an experience of what it is like. You can use this demo version to access most websites that offer their mobile versions. Even websites that do not offer a mobile version can be viewed through this, although the quality of the results obtained may not be that good.

12. Changing DNS servers: A common way of blocking websites is preventing DNS servers from giving the locations of the blocked website’s servers. In such a scenario, changing your DNS servers to OpenDNS’s or Google’s DNS will be your best option to get over the block. As an additional advantage, this will also increase your internet speed.

13. VPN Software: VPN or Virtual Private Network Software can be described as a tunnel under the public network that offers more anonymity than proxy websites as it also encrypts the data transferred by the blocked website thus, offering complete anonymity when you access your favorite web applications. Although most VPN software are available as paid software only, HotSpotShield is a popular free alternative.

14. IP Hiding Software: Sometimes, websites block users on a particular IP address from visiting themselves. In such cases, free IP hiding software like UltraSurf can be used to visit them. While free software offer very less features as compared to paid ones, they are still effective for overcoming most common blocks.

15. Edit your host files: Some malware and blocking software edit your host files and add a website’s address to prevent you from visiting that website. In such a scenario, you can edit your host file with Notepad by visiting “C:\WINDOWS\system32\drivers\etc” if C is your system drive and remove that website. In Windows 8, Windows 7 and Windows 8.1, a warning from UAC might be displayed while editing your host files.

 

Advertisements

CMD Hacking Commands

Filed under: hacker — Jayveer Singh Rathore @ 1:38 am

Command Prompt Tricks, Hacks & Codes

Command Prompt is one of the most powerful tools in Windows; but sadly, it is also the most ignored one. Things were not always like this; but with the advent of GUI based operating systems, people started feeling that computing through command based tools was boring. This ultimately lead the command prompt into obscurity.

However, the command prompt is not useless. In fact, it can be pretty useful. This article provides some excellent tricks, secrets and hacks that will make you realize that the Windows Command Prompt is not only useful but also a tool that you should definitely give more respect to.
 
  1. Accessibility Options : access.cpl
  2. Add Hardware : hdwwiz.cpl
  3. Add / Remove Programs : appwiz.cpl
  4. Administrative Tools : control admintools
  5. Automatic Updates : wuaucpl.cpl
  6. Wizard file transfer Bluethooth : fsquirt
  7. Calculator : calc
  8. Certificate Manager : certmgr.msc
  9. Character : charmap
  10. Checking disk : chkdsk
  11. Manager of the album (clipboard) : clipbrd
  12. Command Prompt : cmd
  13. Service components (DCOM) : dcomcnfg
  14. Computer Management : compmgmt.msc
  15. DDE active sharing : ddeshare
  16. Device Manager : devmgmt.msc
  17. DirectX Control Panel (if installed) : directx.cpl
  18. DirectX Diagnostic Utility : dxdiag
  19. Disk Cleanup : cleanmgr
  20. System Information : dxdiag
  21. Disk Defragmenter : dfrg.msc
  22. Disk Management : diskmgmt.msc
  23. Partition manager : diskpart
  24. Display Properties : control desktop
  25. Properties of the display (2) : desk.cpl
  26. Properties display (tab “appearance”) : control color
  27. Dr. Watson : drwtsn32
  28. Manager vérirficateur drivers : check
  29. Event Viewer : Eventvwr.msc
  30. Verification of signatures of files : sigverif
  31. Findfast (if present) : findfast.cpl
  32. Folder Options : control folders
  33. Fonts (fonts) : control fonts
  34. Fonts folder windows : fonts
  35. Free Cell : freecell
  36. Game Controllers : Joy.cpl
  37. Group Policy (XP Pro) : gpedit.msc
  38. Hearts (card game) : mshearts
  39. IExpress (file generator. Cab) : IExpress
  40. Indexing Service (if not disabled) : ciadv.msc
  41. Internet Properties : inetcpl.cpl
  42. IPConfig (display configuration) : ipconfig / all
  43. IPConfig (displays the contents of the DNS cache) : ipconfig / displaydns
  44. IPConfig (erases the contents of the DNS cache) : ipconfig / flushdns
  45. IPConfig (IP configuration cancels maps) : ipconfig / release
  46. IPConfig (renew IP configuration maps) : ipconfig / renew
  47. Java Control Panel (if present) : jpicpl32.cpl
  48. Java Control Panel (if present) : javaws
  49. Keyboard Properties : control keyboard
  50. Local Security Settings : secpol.msc
  51. Local Users and Groups : lusrmgr.msc
  52. Logout : logoff
  53. Microsoft Chat : winchat
  54. Minesweeper (game) : winmine
  55. Properties of the mouse : control mouse
  56. Properties of the mouse (2) : main.cpl
  57. Network Connections : control NetConnect
  58. Network Connections (2) : ncpa.cpl
  59. Network configuration wizard : netsetup.cpl
  60. Notepad : notepad
  61. NView Desktop Manager (if installed) : nvtuicpl.cpl
  62. Manager links : packager
  63. Data Source Administrator ODBC : odbccp32.cpl
  64. Screen Keyboard : OSK
  65. AC3 Filter (if installed) : ac3filter.cpl
  66. Password manager (if present) : Password.cpl
  67. Monitor performance : perfmon.msc
  68. Monitor performance (2) : perfmon
  69. Dialing Properties (phone) : telephon.cpl
  70. Power Options : powercfg.cpl
  71. Printers and Faxes : control printers
  72. Private Character Editor : eudcedit
  73. Quicktime (if installed) : QuickTime.cpl
  74. Regional and Language Options : intl.cpl
  75. Editor of the registry : regedit
  76. Remote desktop connection : mstsc
  77. Removable Storage : ntmsmgr.msc
  78. requests the operator to removable storage : ntmsoprq.msc
  79. RSoP (traduction. ..) (XP Pro) : rsop.msc
  80. Scanners and Cameras : sticpl.cpl
  81. Scheduled Tasks : control schedtasks
  82. Security Center : wscui.cpl
  83. Console management services : services.msc
  84. shared folders : fsmgmt.msc
  85. Turn off windows : shutdown
  86. Sounds and Audio Devices : mmsys.cpl
  87. Spider (card game) : spider
  88. Client Network Utility SQL server : cliconfg
  89. System Configuration Editor : sysedit
  90. System Configuration Utility : msconfig
  91. System File Checker (SFC =) (Scan Now) : sfc / scannow
  92. SFC (Scan next startup) : sfc / scanonce
  93. SFC (Scan each démarraget) : sfc / scanboot
  94. SFC (back to default settings) : sfc / revert
  95. SFC (purge cache files) : sfc / purgecache
  96. SFC (define size CAHC x) : sfc / cachesize = x
  97. System Properties : sysdm.cpl
  98. Task Manager : taskmgr
  99. Telnet client : telnet
  100. User Accounts : nusrmgr.cpl
  101. Utility Manager (Magnifier, etc) : utilman
  102. Windows firewall (XP SP2) : firewall.cpl
  103. Microsoft Magnifier : magnify
  104. Windows Management Infrastructure : wmimgmt.msc
  105. Protection of the accounts database : syskey
  106. Windows update : wupdmgr
  107. Introducing Windows XP (if not erased) : tourstart
  108. Wordpad : write
  109. Date and Time Properties : timedate.cpl
Older Posts »

Blog at WordPress.com.

Hacking Worlds

hacking worlds,how to hack window,virus coding,cyber hacking,code programming,Malware,Security architecture,Trojan horse ,Social engineering ,Spam,Spyware,Dancing pigs.