Contacts

Proxy bypass at work. How to bypass Telegram blocking using Proxy? Bypassing closed ports

The first way is easier. Let's say your company doesn't allow you to download the popular live chat software AOL Instant Messenger. You can still communicate with your friends and colleagues using the online version of the program called AIM Express ( AIM.com/aimexpress.adp). In addition, the company Google there is a real-time chat service called Google Talk available at Google.com/talk... Programs such as music players and video games also have their own Internet versions - usually they are somewhat stripped down compared to the original programs.

The second approach to solving the problem is more complicated, but with its help you get access to the very program on your computer. All three of our experts named the company Rare Ideas LLC ( RareIdeas.com), which offers free versions of popular programs such as Firefox and OpenOffice. You can download programs to portable devices such as an iPod or USB stick via Portable Apps ( PortableApps.com). After that, you plug this device into your work computer, and you're done. (However, if your company prohibits the use of external devices, consider yourself out of luck.)

Risk: Using online services can place an overwhelming burden on company resources. And programs on external media pose a security risk. IT people prefer to have control over the software used by employees so that in the event of a virus or other problem, they can easily fix everything. If you bring programs with you, their control is reduced.

Another thing to keep in mind is that some less reliable programs, especially file-sharing programs, can be loaded with spyware.

How to protect yourself: If you bring the program on external media, Lowbel says, at least change the antivirus program settings on your work computer so that it scans the device for potential threats. This is not difficult to do by going to the "settings" or "options" menu. Likewise, if you use file sharing, configure them so that others cannot access your files, also through "settings" or "options".

3. How to access sites blocked by your company

Problem: Companies often block their employees' access to certain sites, ranging from the really obscene (porn sites) and probably not the most respectable (gambling sites) to the almost innocent (email sites).

Workaround maneuver: Even if your company does not allow you to go to these sites by typing their address in the top line, you can sometimes still get to them in a roundabout way. You go to a site called a "proxy" and type the Internet address you want in the search box. Then the proxy site goes to the site you need and gives you an image of it - so you can see it without going to it directly. For instance, Proxy.org, serves over 4 thousand proxy sites.

Another way to achieve the same result is suggested by Frauenfelder and Trapani: use the Google translator, asking him to translate the name of the site from English to English. Just enter the following text: "Google.com/translate?langpair=en|en&u=www.blockedsite.com", replacing "blockedsite.com" with the site you want. Google actually acts as a proxy server, finding a mirror of the site for you.

Risk: If you use a proxy site to view mail or YouTube videos, the main danger is that you will be caught by your superiors. But there are also more serious security threats. Sometimes bad guys on the Internet buy website addresses that are one or two letters different from popular websites and use them to infect visitors' computers with viruses, Lowbel warns. Often companies block these sites too - but if you use a proxy, you will be defenseless against them.

How to protect yourself: Don't make the use of proxy sites a habit. Use this method only to access certain sites that your company has closed access to in order to increase productivity - for example, YouTube. And more careful with spelling.

4. How to cover up your tracks on a corporate laptop

Problem: If you use a company-owned laptop to work from home, it is very likely that you are using it for personal purposes: organizing family vacations, buying books to read on the beach, compiling photo albums on the Internet, and so on. Many companies reserve the right to track everything you do on this computer because it is technically the property of the company. What happens if ... uh ... your friend accidentally wanders into a porn site or searches the Internet for a cure for some embarrassing disease?

Workaround maneuver: The latest versions of Internet Explorer and Firefox browsers allow you to cover your tracks. In IE7 select Tools, then Delete Browsing History. Here you can either erase your entire browsing history by choosing Delete All, or select multiple links that you want to erase. In Firefox, just press Ctrl-Shift-Del or click on Clear Private Data from the Tools menu.

Risk: Even if you clean up your history, surfing the internet free of charge still puts you at risk. You could inadvertently pick up spyware on a dubious site or create legal problems for your boss with your behavior. If you get caught, at best, you face an awkward situation, and at worst, you risk losing your job.

How to protect yourself: Clean up your personal data as often as possible. Better yet, don't use your work computer for anything that you don't want to inform your superiors about.

5. How to find working papers from home

Problem: You finish your work late at night or on weekends - but the document you need remains on your office computer.

Workaround maneuver: Google, Microsoft, Yahoo and IAC / InterActiveCorp offer software for quickly finding documents on your computer desktop. In addition, some of them allow one computer to search for documents saved on the desktop of another. How it works? The search company keeps copies of your documents on their server. Thus, it can scan these copies when you perform a remote search.

To use Google's software - one of the most popular - you need to follow these steps. First, set up a Google account on both machines by visiting Google.com/accounts... (Be sure to use the same account on both computers.)

Then go to the site Desktop.Google.com and download the desktop search software. When it is installed, again on both machines, click on Desktop Preferences, then on Google Account Features. Check the box next to Search Across Computers. From now on, all documents that you open on both computers are copied to Google's servers so that they can be found from both computers.

Risk: Enterprise tech envisions a catastrophic scenario: You have highly sensitive financial information stored on your work computer. We installed a program to access these files from our personal laptop. And then the laptop got lost. Ah ah ah.

In addition, experts have found vulnerabilities in Google's computer search program that could allow hackers to trick users into giving them access to files, says McAfee's Schmugar. (After that, these problem areas were fixed, but there may be others, he says.)

How to protect yourself: If you have files on your work computer that should never be in the public domain, ask your IT system administrator to help you set up Google Desktop in a way that avoids leaks.

6. How to store work files online

Problem: In addition to searching on the desktop, most people who often have to work from home have found their own solution. They save work files on portable devices or on the company's network, from where they can then be retrieved remotely. However, portable devices can be cumbersome, and connections to a work network can be slow and unreliable.

Workaround maneuver: Use online storage services such as Box.net, Streamload, or owned by AOL Xdrive. Most of them offer a free storage service with a volume of one to five gigabytes, and for a package with additional space they charge a few dollars a month. Another guerrilla method is to send yourself these files to your personal email, such as Gmail or Hotmail.

Risk: The bad guys can steal your password for one of these sites and steal copies of your company's classified materials.

How to protect yourself: When you are going to save this or that file on the Internet, ask yourself what will happen if it becomes widely available or falls into the hands of the head of a company that is your main competitor. If nothing bad happens, then continue.

Problem: Many companies have the ability to track employee emails both at work address and other email addresses, as well as ICQ communication.

Workaround maneuver: When you send emails from your personal email account or work email, you can encode them so that only the addressee can read them. In Microsoft Outlook, click on Tools, then Options and select the Security line.

This is where you can enter your password, and no one can open the email without knowing this password. (The people to whom these letters are intended, of course, you must provide this password in advance.)

For personal correspondence using postal services on the Internet, take advantage of Frauenfelder's advice. When checking your mail, add the letter s after the "http" to the address bar of your mail site - for example, https://www.Gmail.com... This will start a secure session and no one can trace your emails. However, not all web services support this.

To encode your real-time communication, use Cerulean Studios' Trillian service, which allows you to work with AOL Instant Messenger, Yahoo Messenger and other real-time communication programs and helps you encode conversations so that no one else can read them.

Risk: The main reason companies track employee emails is to catch those transmitting sensitive information. By resorting to all of the above tricks, you can provoke a false alarm and make it harder for IT staff to deal with a real threat.

How to protect yourself: Use the described methods only from time to time, do not use them by default.

8. How to get to work mail if your company does not want to go broke on a PDA

Problem: Everyone who does not have a PDA knows this feeling: you went to a restaurant to have lunch or have a beer after work, and then everyone reached into their pockets for their PDA, and only you alone are forced to shake a glass in your hand.

Workaround maneuver: You, too, can keep in touch with your work email using a variety of mobile devices. Just set up your work email so that emails are forwarded to your personal email address.

In Microsoft Outlook, you can do this by right-clicking on any email, selecting "Create Rule" and asking to forward all emails to you to another address. Then set up your cell phone to check your e-mail following the instructions from your provider (this is the company that sends you phone bills).

Risk: Now hackers can hack not only your computer, but your phone as well.

How to protect yourself: There is a "correct" way to access work email using a variety of personal mobile devices by taking passwords and other information from the IT department.

9. How to access personal mail from a working PDA

Problem: If your company provided you with a PDA, you are probably facing the opposite problem. You want to check your personal email as easily as you do your work.

Workaround maneuver: Take a look at the "Settings" section of your personal mailbox and make sure that you have activated POP (postal protocol), which is used to receive mail through other addresses. Then go to the website of your BlackBerry PDA service provider. Click on the "Profile" button, find the Email Accounts section there and select Other Email Accounts. Then click on Add Account and enter your personal email address information. Now your personal mail will arrive in the same place as your corporate one.

Risk: Your company probably has an arsenal of security and anti-virus and anti-spyware tools. When you receive personal mail on BlackBerry, it comes bypassing these protective barriers. This means that spyware or viruses can enter your PDA via personal mail, says McAfee's Schmugar.

To make matters worse, he says, when you connect your BlackBerry to your work computer, there is a chance that this spyware will be transferred to your hard drive.

How to protect yourself: Cross your fingers and trust that your email provider does everything in its power to protect you from viruses and spyware (which it probably is).

10. How to pretend that you are working

Problem: You are engaged in a vital Internet search, and suddenly your boss appears behind you. Your actions?

Workaround maneuver: Press Alt-Tab quickly to minimize one window (for example, in which you are exploring ESPN.com) and open another (in preparation for today's presentation).

Risk: The good news is that when it comes to the security of the company, this is not a threat.

How to protect yourself: Get to work.

There are several different methods you can use to bypass the anonymous proxy server, although the method you should use depends a lot on how you set up the proxy server. The easiest way is to disable the proxy server in your Internet connection settings in your web browser, although this is not always effective. To bypass the anonymous proxy, you can also use another proxy that is causing you problems. But it's important to remember that you can run into serious problems if you bypass the anonymous proxy at work or school.
To bypass anonymous proxy, you need to know how the proxy is used. An anonymous proxy is a server that your computer is connected to, which then connects to the Internet, allowing you to remain anonymous while using your web browser. This is usually done either through software installed on your PC or through a setting in your web browser that automatically redirects you to a proxy server when you use it. The way in which you can bypass the anonymous proxy server depends a lot on what setting was used on your computer.

If you have software installed on your computer that forces it to connect to a proxy server, you can bypass it by uninstalling that software. But if you do not have administrator rights in the system, then you will not be able to uninstall the program. If this is the case, then you should not bypass anonymous proxy if the computer you are using is the property of a school or is installed in the workplace.

Until you know that you are allowed to bypass the anonymous proxy without losing your job or being severely reprimanded at your school, there are two possible solutions to consider. The first way you can bypass the proxy is to simply remove the proxy settings in your web browser software. This is the program that you use to navigate the Internet and visit different websites. You should check the connection settings for your browser and see if there is a proxy that you can change to bypass it.

If you can't just change your web browser to bypass the anonymous proxy, you may need to try a more complex solution. You can try using a different proxy, for example, one that actually sits between your computer and a proxy that is already in use. This may allow you to use your proxy server to avoid connecting to another. But, if you do not want to connect to an anonymous proxy on a computer on your network, you should simply change your settings to not do this anymore.

How to bypass site blocking?

In this article I will give you some tips on how to bypass the blocking of a site that is prohibited from visiting by the administration of the office where the computer is located, or by the authorities for political or other reasons. In general, I want to see, but not. Let's try to break down the walls of prohibitions and obstacles on our way. However, I emphasize that the tips below relate more to the topic of safe surfing on the net and anonymity, rather than an opportunity to bypass the prohibitions of an office or school administrator.

LET'S AGREE IMMEDIATELY ... BYPASSING LEGAL BLOCKS IS A VERY SLIPPY THEME. I WOULD NOT WANT TO BECOME THE AUTHOR OF THE RESOURCE ON WHICH THEY ARE THROWING YOUR OBSERVATION AGAINST. READY WAYS THAT YOUR INSTITUTION'S ADMINISTRATION WILL NOT COPY ARE NOT A FEW. THERE ARE ALMOST NO IN THE ARTICLE. HOWEVER, THERE WILL BE ENOUGH FOOD FOR THOUGHTING.

STRAIGHTAWAY…

  • The problem with the methods described here (as, indeed, any) is that, whatever settings on local machine were not exhibited, barriers are established on the unattainable For you apparatus(switches, routers) or a car that you simply do not have access to.
  • After you have successfully tried a workaround for blocking, remember that when using proxy services in any form (directly from a proxy server or through a plugin built into the browser) you risk information transmitted through these services. So pay attention to visiting sites over a secure protocol. https and select a SEPARATE BROWSER for working with sites where you enter passwords and logins (especially those related to payment), which does not work with a proxy.

Some of the tips may not work. The prohibition of the prohibition is strife. The resource can also be blocked by supervisory authorities. For this, the most effective method is given in the article last - this is the Tor browser. Although when working with the browser, there are problems when working with resources using a secure connection. And this is almost all social networks. Admins don't sleep either, so try everything.

How to bypass admin ban? Use a proxy.

This is the easiest way that comes to mind. Getting to your personal page on a social network will not be difficult. Here are the addresses of free proxy servers, from where you can try to get to the site prohibited by the administrator:

https://proxyweb.net/

https://www.proxy4free.com/(there are a whole bunch of proxy servers here)

here is the domestic list: http://www.freeproxylists.net/ru/

Just copy and paste the addresses into the address bar. And then on the proxy page, enter the address of the social network. You need to enter the real name of the site:

  • classmates- https://ok.ru/
  • In contact with- https://vk.com/
  • Photocountry- https://fotostrana.ru/
  • My world from Mail.ru - https://my.mail.ru/

... these resources are unlikely to help you. This method also has another disadvantage. The fact is that using a proxy server implies in some way deceiving the site you are visiting. And many sites and blogs (yes, almost no one) do not need it. This means that you may have problems with viewing some pages.
How to bypass the blocking using the browser settings of the office computer?

Recently, a huge number of extensions for popular browsers have appeared, which provide bypassing locks from the office administrator. The best such plugins I think are:

They will not require installation on a computer, they will stick to the browser quickly and imperceptibly. Worth a try.

How to use Google search engine as a proxy server or how to bypass admin ban and bypass site blocking.

Office workers are always bored and just need to carve out a couple or three hours to communicate in social networks, of which there are no longer counts. But the trouble is, evil administrators in their settings have imposed a ban on visiting popular sites. How to do this on your computer is described in this article. But you simply cannot get to the administrator's computer, you cannot correct the list of prohibited addresses. And you don't need to. There are many ways how to get around the administrator's ban on visiting social networks or bypass blocking the site. In this article, I'll show you how to do this without using absolutely anything. Practice at home, it won't take long. We will use the Google search engine as a proxy server, that is, bypass all bans. We carry out it in stages, at work you can simply skip some steps.

  • Fix (purely for yourself your real IP-address). I think you already know how to do this. Go, well, maybe this link: whatismyipaddress . Do you remember? Close the page.
  • Now comes the fun part. We go to the online translation site Google translate .
  • In the left field (the language from which you will translate), select your native language (I chose, obviously, Russian). On the right is English.
  • Now type or copy our website link:

https://whatismyipaddress.com

and paste in the same field. It should look like this:

  • Follow the link from the right window. I turned out to be a resident of India.

I chose the site for determining the IP address for clarity. You also need to replace this address with the addresses of your favorite social networking sites and do not forget your registration data. If you do everything right, everything can work out. Then you clean up your browsing history and that's it. Such a trick will not protect you from anonymity on the network, but you can bypass the network administrator, more precisely, its settings. Everything, of course, depends on the sleight of hand of the system administrator.

How to bypass site blocking through the secure search engine StartPage Web Search

It is considered a good service in the field of ensuring anonymity. Moreover, you are free to customize the search engine in the same window to suit your needs. The button we need on the right:

How to bypass site blocking using Google cache: a little cumbersome ...

  • If you find out once that your favorite site has been banned, you can try reading Google's cached copies of the site. To do this, use the operator site: when typing the site address. For example, if one day you find that my blog is blocked by the administration, type in search engine line (not address) Google address of the blog Computer76 in the following manner:

site: www.site

The search engine will give out cached blog pages, which it managed to index and save in the database. Yandex can also do this. If the link to the page is inactive, click on the Cached or Cached link at the end of the URL bar. You can read.

  • Another option from old hacker Joni Long using the cache is to use the cached information by adding some command to the address. But first, let's try to deceive everyone and everything. Take a look for yourself:

Find a site (take mine for example). However, you do not need to enter its “official” address in the address bar. So search in the search bar:

Computer76

Google will give you links that no one can block. However, do not rush to navigate through them. Look here - under the central link (the one in Russian) there is another one; it contains the cache - click on it:

Why am I all this ... If you open both of these links in 2 tabs (which, it would seem, lead to one resource), look carefully at the address lines. And everything is not simple there:

and this is what the same page looks like in the cache:

and so - in the google cache

Want anonymity? Let's go directly to Google without paying attention to the servers of the hosts of these sites. Add

& strip = 1

to the right edge of the cache address, and now you can perform manipulations on behalf of someone else. However, further internal link surfing will most likely be impossible.
How to bypass site blocking? TOR

The most effective option that will help you bypass the blocking of the site is to use a special browser (I advise you to immediately get a portable version - in case the administrator has forbidden you to install programs on the machine and have to start from a USB flash drive or from a desktop). Browser Tor- a guarantee that you will see any site, no matter where it is located, and whoever has blocked it. ... It's worth it, believe me, although it's not up to speed here. With him, all borders will be open to you. The only thing is that you have to tweak it a little. Lovers Mozilla Firefox recognize their browser without difficulty: TOR uses this particular engine. The default browser settings may be known to the administrator. So let's glue a proxy server to TOR, redirect it through a port and try it. Proxy list can be found anywhere. Some of them are banned at the level of your admin, some at the level of the site itself. And this is the very case when I urge you not to use easy paths: the addresses of such proxies can be entered manually by your admins, giving an error with the text blk_BL_redirector inside. Refer to foreign proxies (cut off Chinese).

Hello dear visitors and blog readers!

Today we will discuss such an urgent topic as blacklists of sites and methods for bypassing blocking. As you know, in the fall in Russia came into force a Government Decree on amending Federal Law No. 139-FZ "On the Protection of Children from Information Harmful to Their Health and Development", and the so-called "Registry of Prohibited Sites" was created. It would seem, what's wrong with that? After all, this is good intentions, there is nothing to post drug addiction, suicide and porn with minors on the Internet. But not everything is so simple with this "register" and the law.

  • Firstly, I am an adult, and I am annoyed by the very fact that they tell me what to do, how to do, what to read and what to be interested in.
  • Secondly, because of this innovation and imperfection of the blocking methods themselves, they fall under the distribution completely harmless sites.

According to resource statistics RosKomSvoboda, as of mid-April 2013, the picture with locks looks something like this:

This is due to the fact that if the regulatory authorities decide that there is prohibited information on a particular site, then this resource is easily blocked by its IP address. And after all, they do not think that in addition to the "harmful" site, there may be more dozens and hundreds of other sites!

With this article, I in no way urge you to visit sites with drug propaganda, sites promoting suicide and other "prohibited". But those who are mistakenly included in this register are easy!

To begin with, let's take a quick look at how the Internet works in general from the point of view of the user's access to a particular site (server).

Sites, in addition to the main domain name (for example, a website), also have a specific IP address. which can be either individual, dedicated or general. The site can be accessed not only by entering the domain name in the address bar of the browser, but also by entering the IP address. But this is completely inconvenient. Just imagine if instead of www.yandex.ru we constantly had to dial 213.180.193.3. Extremely inconvenient.

So that we do not need to remember the IP addresses of all known sites, and there is a DNS, which deals with the distribution of addresses on the Internet.

DNS - Domain Name System, i.e. domain name system.

So, when we drive into the address bar of the browser, for example, google.com, our computer first connects to the provider's DNS server to find out exactly where the resource we need is located. And after that, the browser already receives the IP-address of the site, connects to it directly and in the browser window we see our favorite search engine. Schematically, it can be depicted something like this:

So "blacklists of sites", that is, the Registry of prohibited sites consists of two types of entries:

  1. Blocking the domain name of the site
  2. Site blocking by IP address

And to bypass blocking by domain, it is enough to use public DNS, for example:

  • Google Public DNS: 8.8.8.8 / 8.8.4.4
  • OpenDNS: 208.67.222.222 / 208.67.220.220
  • Comodo Secure DNS: 8.26.56.26 / 8.20.247.20

How to register DNS in Windows

In order to register public DNS, you need to go to the "Network and Sharing Center" settings. To do this, just left-click (LMB) on the icon of your connection (number 1 in the figure), and then select the item "Network and Sharing Center" (number 2):

Also, this "Control Center ..." can be accessed through the "Control Panel". Next, you need to select the connection through which we access the Internet, and click LMB on it:

Then a dialog box of the connection status will appear, where you need to click on the "Properties" button.

Next, we will see the properties window of our connection, where you need to select the item " Internet Protocol 4 (TCP / IPv4)". We click on it twice with LMB and see a new window with the properties of this protocol. This is our final goal. Check the box" Use the following DNS server addresses "and manually prescribe the preferred and alternative DNS servers (in the figure, an example of using DNS servers Google, you can use any public DNS)

Well, in general, that's all. Do not forget to click "OK" when closing the properties windows.

Thus, if some resource is included in blacklist of sites by domain name, then by changing your provider's DNS servers to public ones, you will most likely be able to access this resource, despite its blocking. In general, I recommend using public DNS servers not only to bypass blacklisting sites, but also in your daily work. From now on, you already know how to register DNS.

Now let's consider the second option for blocking resources - by IP address.

How to Bypass the Registry of Banned Sites Blocked by IP

There are many ways to bypass such a block, and they consist in the fact that if we are not allowed to directly connect to some server (site), then we will do this using an intermediate server from which access to this site is allowed. This becomes possible because these intermediate servers are located, as a rule, outside the direct jurisdiction of the Russian Federation, i.e. outside the country, and our laws cannot affect the routing and access to some resources through these servers. Schematically, it might look something like this:

So we'll talk about these intermediate servers. The easiest (but not recommended) way to get around blacklisting sites is to use online anonymizers.

Anonymizers (Web proxies)

To get to a blocked site using an online anonymizer (sometimes they are also called - anonymizer, which is not entirely correct), first of all you need to go to this anonymizing site. There are a sufficient number of them on the network, but I do not recommend using little-known services, and even more so if, when entering such a site, the antivirus starts to "swear". The most famous anonymizers are, perhaps:

Just go to any of them, and in the field for entering the site address, enter the required one. For example, on the HideMe.ru website, I typed whoer.net into the line to see if my IP address and country will change.

And here is the required result:

Thus, any resource placed in blacklist of sites, we can visit and read with ease. But do not forget that anonymizers are not means real anonymization, and if you plan to use them for something so bad, then in no case should you do this.

It is also worth noting that many online anonymizers also provide additional paid services, such as elite proxies, VPNs, and more.

A small lyrical digression. Most often, I use http://whoer.net to find the IP address. They position themselves as a service for checking anonymity. Those. checks for what kind of information your PC is pouring into the network. In particular, in addition to standard checks for leakage from JS, Java, Flash, you can also check whether the possibility of data leakage through a "hole" in the WebRTC protocol is closed in your browser (sure it's not closed ...) ... So, this "feature" of WebRTC is too tricky to forget about it. And there are very, very few services for checking browsers for this "vulnerability" on the entire Internet. So use it to your health.

Browser extensions

Some online anonymizers have special browser extensions. For example, the HideMyAss service has add-ons for Chrome and Firefox.

Let's look at the functions of this extension using Chrome as an example. We follow the link that is indicated above (or we independently search in the Chrome Web Store, just enter Hide My Ass in the search) and install this add-on. After installation, the configuration page will open. In principle, there is no need to change anything, everything will work like that. At the bottom we are looking for the "Save settings" button, and press it, thereby saving the settings. Now a button like this has appeared in your browser:

If you click on it on any open page, then the same page will open through the proxy server. And if you click on an empty tab, you will see a field like this:

We enter the desired address, and it also opens through a proxy. Everything is very simple and done in one click. The Mozilla Firefox extension works in a similar way. If you are not satisfied with Hide My Ass, you can search the Chrome Web Store for other similar extensions. Or just follow the link: Web Proxy for Chrome.

Added later: Recently, ZenMate (for Chrome, Firefox, Opera, as well as a mobile application for Android and iOS) and friGate (for Chrome and Mozilla) have become very popular. Highly recommend.

Built-in Browser Functions (Turbo Mode)

The simplest way to visit any resource that is blacklisted is the Opera browser. Rather, its function is Opera Turbo.

Initially, this function was designed to save user traffic, because all visited pages are first loaded on the Opera servers, the pages are compressed and only then transferred to the browser for display. And this function turned out to be very useful after the introduction of these very blacklists, tk. it acts as a proxy server.

Opera Turbo is very easy to use. We launch the browser, and in the lower left corner we are looking for such an icon, as shown in the figure:

Click on this button (you can not configure anything), and turn on Turbo mode. The button will turn blue, and the browser will notify you that the mode is on. Let's now see what whoer.net "tells" us about our location and IP address.

In this mode, it sometimes happens that, for example, CSS is not loaded at all, but "naked" html is loaded. Loading speed can be very slow, and if your site takes too long to load, try disabling Turbo mode and re-enabling it. Thus, the server will change, and the download may speed up. This method, as well as anonymizers, does not provide you with any anonymity, and your real IP is visible behind the proxy server.

Turbo mode is also available in the browser from I Ndex. But in order to bypass blacklists of sites, it is not very suitable, since Russian IP addresses, servers and routes are used. But, in fairness, it should be noted that most of the blocked sites in the Turbo mode of I Ndex still open.

Added:"Turbo mode" is also available in Google Chrome for mobile OS.

All of these are the simplest ways to bypass the blacklist of sites that are intended only for such purposes, because they absolutely do not provide any security and anonymity. Next, we'll take a quick look at more drastic, secure, and anonymous methods. But within the framework of this article, only superficially, tk. the topic is very extensive, and separate articles and manuals will be devoted to it.

Proxy servers

Proxy server Is a set of certain programs that allows remote clients to make various requests to other network services. Actually, all sorts of online anonymizers are also a kind of proxy, only with a web interface (that is, a site where we can enter and use the services). We need to register the proxy in the network settings ourselves. If you do everything with pens, then you can go in different ways.

Browsers that use system network settings - Chrome, Safari, Internet Explorer.

It is enough to configure one of these browsers to work through a proxy, and all Internet connections in the browsers will be proxified (unless otherwise configured separately). You can register a proxy like this (for example, Chrome): Settings - Show advanced settings - Network - Change proxy server settings ... The standard properties of the Windows browser will open. You need to click on the "Connections" tab on "Network Settings". The local network settings window will open. Register the proxy server IP address and port.

Do not forget to click on the "OK" buttons after these manipulations.

Proxies can also be registered through the control panel: Start - Control Panel - Browser Options - "Connections" tab. And we will see the same window that we saw when we configured proxies through Chrome.

Browsers like Mozilla Firefox and allow you to work through a proxy without using the system network settings. That is, if you register a proxy server in Mozilla, then a regular direct connection will be used in all other browsers, and a proxy in Mozilla. It's pretty convenient. After all, we, as a rule, do not need to constantly work through a proxy.

In the picture, I indicated the procedure with arrows and numbers in order to proxify Mozilla Firefox. At Opere, the principle is the same.

Free proxies have significant disadvantages:

  • usually low speed
  • they usually do not "live" long, and they often have to be changed

By the way, I have not forgotten to say yet: when using public proxies, anonymizers, etc. - do not use internet banking, etc. You never know what kind of software is installed on a server unknown to us, and who owns this server.

How to choose the proxy server we need?

Since our current goal is "", we are not interested in Russian proxies, we choose foreign ones. We look at the "Speed" parameter - the lower it is, the better. We will not look at the column of anonymity in today's context. After all, we want to get to an unlawfully blocked site, on which there is no illegal information, and, therefore, we also have nothing to hide. In general, in the screenshot (proxy list from the HideMe.ru website) I have highlighted the most suitable proxies:

For now, that's all about the proxy. I repeat, this topic is very extensive, and I will return to it later. I will just say that there are also browser extensions for quickly changing proxies; proxy checker programs that check proxy lists for validity; programs that are capable of building whole chains of proxies (for example, JAP), etc. In general, proxies (especially elite and chains) are mainly used for various illegal actions on the network, cybercriminals and all sorts of politically objectionable people (such as oppositionists who want to remain anonymous ).

VPN (Virtual Private Network) - Virtual private network

Actually VPN (Virtual Privat Network, i.e. virtual private network) very useful technology. It is used both at the corporate level (various organizations, to create their own secure tunnel) and ordinary respectable users.

For example, I highly recommend using a VPN connection if you are on a public Wi-Fi network, as such networks are very often sniffed. various hackers and cybercriminals use special software to scan all traffic in such networks to identify various credentials: passwords, logins, internet banking data, etc. Therefore, a VPN tunnel in open networks is simply necessary, since all traffic that passes through it is encrypted and becomes completely inaccessible.

VPN has a number of advantages over previous ways to bypass blacklisting sites:

  • very decent connection speed;
  • fully encrypted traffic;
  • very high anonymity, if you use a service that does not store any logs, and even if it does, then what is it to us? We are not criminals, no one will be interested in us.

One of the shortcomings is that VPN is a 99% paid service. But prices don't always bite. They fluctuate depending on the tariff plan and configuration. And we don't need fancy configurations, so if you decide to use a VPN service, choose the cheapest tariff plan first. We will also return to the VPN topic several times on the pages of this site.

Tor (The Onion Router) - very high level of anonymity

With Tor, you can also bypass any blockage... Moreover, the level of anonymity is very decent, there is encryption, and if no one is interested in you (law enforcement agencies, special services), then you can not worry about your anonymity at all. It is quite difficult to track down a particular user using the Tor network. I recently published the news "", it says that they caught one hacker, who was caught for a long time. And such cases, although rare, are still not isolated.

In short and figuratively, the Tor network is a huge network of computers around the world on which a special software package is installed that allows all users of this network to use each other as an "intermediate server" (this function can be disabled in the settings so that it is yours the computer was not used for these purposes). Moreover, the chains of connections are selected at random.

The main disadvantage for using Tor for legal purposes is its very slow speed. (note: at the moment, after a year since this article was written, the speed on the Tor network is already quite high). But this drawback, as a rule, is ignored by those who use it in illegal acts, because low speed pales before all the possibilities of this network. For greater anonymity and security, Tor is sometimes used over VPN. Or vice versa.

You can download Tor on the official website. Now there is such a package as Tor Browser Bundle, having downloaded and installed which, you can immediately start working.

Many other projects are based on Tor, for example, OperaTor, OS Tails, Liberte, Whonix, etc.

I2P (Invisible Internet Project) - maximum degree of anonymity

I2P is almost impenetrable anonymity... In general, the implementation is similar to Tor, but with some "improvements". In general, everything there is simply "rotated" primarily on encryption. Everything that is possible is encrypted, every packet, and even more than once. Also, the network has very complex routing of these encrypted packets, which can change every N-minutes. Deanonymizing someone on this network is probably unrealistic.

I2P is, of course, more likely for hackers, cyber and other criminals than for the common man in the street.

Added: in connection with the recent tight control over the Runet, more and more sites began to have their own "mirrors" in the i2p network. And more and more ordinary people have become interested in this technology.

Virtual machines

There will also be more than one article on virtual machines on my blog. I think (and I'm not the only one) that they are very useful for all those who, in one way or another, are connected with computers and the Internet. Now I will just mention one specially compiled distribution kit of the GNU / Linux family (Debian), focused on security and anonymity - this is Whonix.

The distribution consists of two images for a virtual machine:

  • Whonix-gateway acting as a gateway through which all network connections go;
  • Whonix-workstation- in fact, the distribution itself

The advantage of this assembly is that a special gateway is used, and any traffic goes only through him and the traffic itself is directed to Tor. And since not all applications in the same Windows, for example, can be launched through Tor, and traffic can sometimes leak through a regular connection, this threatens anonymity. In Whonix this is excluded.

This is how, for example, my virtual machines now look like with running Whonix

That's all for now, friends. I hope the article was interesting and useful. In the future, I will analyze in more detail what is described here, since I believe that all those who are not indifferent to the fate of the Internet should know this. After all, I am sure that soon in Russia, under the pretext of combating extremism, drug addiction and pornography, any resources undesirable to someone will be blocked. (note: unfortunately) ... Mechanism started ...

And you should never forget that such giants as Google, Facebook, Ya NDEX, etc., every second monitor every click of each user of the network. And it is not known how all this may turn out in the future. So, do not neglect the means of anonymization, but do not overuse them either. Because if you constantly use an encrypted channel (VPN, Tor, etc.), then this may raise suspicions from your provider.

Now it's your turn, brothers;) Tell us, have you ever had a need to use such services? What exactly did you use? It's very interesting to hear about it. And don't forget to subscribe to blog updates if you are interested in this topic. You can also suggest some ideas for what articles you would like to see on your blog pages. After all, a blog is created for you - for readers and visitors.

Thank you for your attention and see you soon!

To bypass the blocking of the messenger, you can use a proxy or VPN. In this article, you will learn how to bypass Telegram blocking using 3 ways:

  • Through the VPN tunnel;
  • By automatically installing MTProxy using a bot;
  • Manually by specifying a proxy server for Telegram.

How to bypass VPN blocking

A VPN is a secure channel through which all Internet traffic on a device passes. It affects not only the work of Telegram, but also other programs, such as a browser or an email client.

The main plus of VPN is gaining access to any resources blocked in Russia. All sites will work as if the user is in another country. However, this approach has a number of disadvantages:

  • The speed of the Internet may slow down significantly;
  • Many sites will open in a foreign language.

When using a free service, the user will be limited by the traffic limit, which is usually several gigabytes. This can cause problems with the connection speed. The paid subscription works without restrictions, but you have to pay a few dollars for it every month. The most trusted companies are NordVPN, ExpressVPN, and PrivateVPN.

Let's consider the process of installing a free VPN on Android and iOS.

VPN for Telegram on Android

The easiest way to install VPN on Android is to use the application from Google Play. Let's list the most popular options and indicate the traffic limit for each of them:

  • TunnelBear (1.5 GB)
  • Windscribe (10GB)
  • FinchVPN (3 GB)
  • ProtoVPN (unlimited)

Let's take a look at the installation process using Windscribe as an example.

  1. Go to Google Play and download the program.
  2. Open the app and create an account by choosing the "Free" plan.
  3. Click "On" on the main screen.

If the speed is too slow, try changing the server location.

VPN for Telegram on iOS

To set up a VPN on iOS, download one of the following apps from the AppStore:

  • TunnelBear
  • Betternet
  • SurfEasy VPN
  • FreeVPN

All services except TunnelBear offer unlimited bandwidth. At the same time, they can significantly underestimate the speed and display ads. Using Betternet as an example, let's see how to set up a VPN proxy for Telegram on iOS.

  1. Go to the App Store and download Betternet.
  2. Open the program and click the "Install Profile" button.
  3. Click "Connect".

Setting up a proxy for Telegram using a bot

The easiest way is to configure Telegram through a proxy using the @BestMTProxyBot bot, which will automatically set the connection parameters. This is the official bot of the Telegram team, which is fast and free. In return, the service will display advertisements for sponsored channels at the top of the contact list. Let's consider the process of working with a bot step by step.




Did you like the article? Share it