How to Unblock Facebook and Youtube using a Proxy

My Attempt to Unlock Everything on the Internet

 Hello everyone, this is a post which will help you unblock facebook and many other social networking sites like youtube and linkedin to get across almost any firewall in the world. It is really hard to believe this fact but the magic almost works truly in every respect.

When I started my first job at my new company, I was very annoyed at first time to see an error on my browser screen that it was unable to connect to my favorite site. It was just because of certain software running at the server side which almost blocks request to your favorite sites like youtube.com, facebook.com, linkedin.com and many other social networking sites. Most of the companies or the network administrator does not want you to access these websites under any circumstances.

These being a major hurdle in being connected to your friends and family even at workplace triggered a quest in my mind for finding a solution to this problem. I took it as a challenge as an IT graduate and a network engineer to find a specific solution to this problem. This curiosity led me to unravel one of the greatest mysteries of internet web in accessing almost any website that has been blocked by your network administrator or any website that has blocked your IP in accessing its resource.

It happened so that one day I was lucky to watch a video of Ankit fadia’s show on MTV called What the Hack. I was really impressed with the talent of Ankit in exploring new ideas and ways to use internet in solving everyday life problems as a computer geek. He suggested some techniques which would help you unblock facebook with ease in some way to get access to your favorite sites using proxies and minor manipulation in the URL structure to bypass firewalls. 

I will list out some of the techniques he told on the show:

1.   You can use any web proxy on the internet like anoynymous.com and many other proxies.
2.   You can also type your url like https://www.facebook.com instead of http://www.facebook.com.
3.   OR you can ping www.youtube.com in the command prompt to find the IP address of the domain and then convert every octet in the IP address to its binary equivalent and put this binary address in the URL and hit enter.

My own research in unlocking everything in the internet and unblock facebook:

Well some of the options worked in minor network firewall software but it failed to give results in case of a strong firewall. So I went on further to explore and find a solution to fully unblock facebook and youtube like sites.

How to unblock facebook and youtube like sites?

1.   Type the following queries in the search engine like Google.com “SSL proxy server”, “free SSL web proxies” or “list of SSL proxy servers” in the search box and hit enter.
2.   You will get either a SSL proxy site itself or a site giving a list of free SSL web proxies. You will find hundreds of proxy sites but choose one of them having a SSL capability.
3.   For example: I will enter a proxy address in my browser starting with https and not with a simple http. So an example of it goes here https://www.kproxy.com and just hit enter.
4.   When you log on to proxy site, just enter your favorite URL in simple format like www.linkedin.com and click browse.
5.   This will start your secured connection with proxy site which will make your data completely secured from your own network administrator. This means that your router firewall installed in your network fails to read the encrypted information in packets and therefore cannot drop packets meant for facebook and youtube domains.
6.   Hence you can freely browse your favorite sites.
7.   This trick is much simpler than what ankit fadia suggested of converting IP address in to binary form.

Unblock facebook

How to access sites that have blocked your IP address from accessing its domain?

 Well the solution to this problem is very similar to the one that I have suggested in the above paragraph but with a minor twist. Here you do not have to bypass your own firewall for accessing sites which have already blocked your IP.

So here you do not have to use a web proxy in https mode or if needed you can use any one of the mode to access your intended site. So actually you will be using a web proxy IP address instead of your own IP address thereby hiding your own IP address from other sites. So using proxies over the internet will be a complete fun and you will not have to worry about any major firewall coming your way. You can freely access sites that have been blocked by your network or sites that have blocked your IP address.

Features of using a proxy:

1.   You can enjoy uninterrupted access to the internet.
2.   You can hide your IP address and remain anonymous on the internet.
3.   You can bring complete secured communication by using a SSL proxy.
4.   You can unlock everything on the internet.
5.   You can hide your identity.

Precautions while using a proxy:

1.   Never shop online using a proxy server. Because your information is shared with the proxy.
2.   Never access your online internet banking account through a proxy.
3.   Never use a proxy for important transactions.
I hope you really enjoyed this post and will certainly leave a comment or share it.
Read more ...

LXScreenhot & LXFind

The great Stefano has been working hard for this updates. The new apps are really simple, efficient and fast, very close to the Lubuntu philosophy. Also, new icons for them were created, using the Lubuntu Box (the forthcoming theme) design guides:




If you want to test them just do this on a terminal (ignore the first line if you already added the additional Lubuntu Desktop PPA) :

sudo
Read more ...

Mocking up!

There's no time for sleeping. Or maybe yes, and dreaming about the perfect interface. So we at Lubuntu Artwork Team are still active, never forget this :) Now thinking about a new icon proposal, a new GTK / Openbox theme and, of course, a new brand official wallpaper for this sweet flavour of Ubuntu. In a few weeks the contest for wallpaper submissions will be open, and we are waiting for your
Read more ...

Please Open Immediately!









Read more ...

Get the Financial Freedom and Life You Deserve.




I know you are looking for a Financial Freedom System that can work for you.

Get the Financial Freedom and Life You Deserve.




"How JSS-Tripler Works!"

http://adv.justbeenpaid.com/?r=raka

Basically, You Earn up to 2% per Day or up to 60% per Month! No
sponsoring Requirements. Use Daily Compounding to Increase Your
Earnings! Make Daily Withdrawals to Get Your Money Out! This may be one
of the easiest and best ways to earn money you've ever seen!

Sponsor People to Earn 10% Referral Bonuses on the First Level and 5%
on the Second! Withdraw this Money Daily, or Use It to Further Compound
and Increase Your Earnings!

All Similar Programs (Usually
Called Revenue-Share Programs, Doublers, Cyclers, Autosurfs, or HYIPs)
Slow Down, Stall, and Disappear. Fortunately, JSS-Tripler is
Indefinitely Sustainable!

Enrich Yourself by Joining the JSS-Tripler Money Stampede!

JSS-Tripler is Part of the JustBeenPaid! Group of Programs. Join JustBeenPaid! for FREE to Find Out More



 http://adv.justbeenpaid.com/?r=raka

Internet user jantey hen k yahan 95% fraud he dhoka he scam he
lekn mjhe shaded taren hairat howa jb mjhe jss se payment recieve hoi
mjhe bharosa ni tha lekn me apna luck azmaya tha q k mjhe paisy par b
bharosa ni he or me chahta hon k hr koi jss se jitna mumkin ho faida
othaye aisa earning system he k ap sary kam bhol jayenge iske bad or is
se behtr mjhe internet use krte hoye kuch ni mila or jss ki emandari par
b hairat he ap bila khof isme invest kre agr online ac. Ni he phr b
join kre me apko tariqa btaonga kis tarah ac. Bnana he or invest krna he
har qism ki help k lia mje msg kre jald hi ac. Bnaye q k system aisa he
k ap jitna time lenge otna hi ap ka nuqsan hoga ja ap join krenge apko
meri bat samajh a jayegi join this link



http://adv.justbeenpaid.com/?r=raka

Read more ...

How to Keep Your Online Business Information Secure

When your entire business is online, you tend to not use paper at all. Most, if not all, of your files are probably residing on a server somewhere. You probably don't want to think about it, but what would you do if you lost these files? Are you taking the proper measures to make sure that no one can sabotage your business? You need all your files, from your business contacts to your clients contact information, it’s all necessary to keep your business running smoothly.

First and foremost, you need to protect your customer’s credit card information. You can get into serious legal trouble from the federal government if you don’t take proper precautions against hackers getting credit card information. Nothing is ever perfectly safe while connected to the internet; someone will always be able to find a way to get around any sort of high tech software you build a barrier with. This is why choosing a third party payment processor is probably the best bet for small to mid-sized businesses. These payment processors, such as eBay, AcceptPay or PayPal, allow you to facilitate credit card purchases without ever gaining this information. If you don’t know your customers credit card information, then you don’t need to protect it.

Probably the second worst thing that could happen to your online business is data failure. When a hard drive goes bad it’s nearly impossible to recover the information that was stored on it. It takes thousands of dollars to attempt to recover information from a damaged hard drive; this is without a guarantee that anything valuable will be recovered. You can protect yourself from an issue like this by simply scheduling regular backups of your information. There are plenty of cloud based backup services available that you should look into. Basically, all you do is install a piece of software and schedule when you want backups to occur. You can set the software to back up whenever a file gets changed, or you can set it to back up on a nightly basis.

Always make sure that your server host is ready for a malicious attack. When you store your information offsite on a webserver, you need to be prepared for a malicious attack. Hopefully it doesn’t come to this, but more and more innocent websites are being targeted by people who don’t even care about their target, they just want to make life harder for someone else. These types of attacks can leave whole networks bottlenecked for days or even weeks, but with proper networking, they can be mitigated and even eliminated without a single hit to performance. The key is in setting up a proper amount of redundancy in your network to handle the added stress. Coupled with the proper firewall to filter out repeated connections and connections that show signs of being an attack, and you have an easily defensible network.

It might sound scary to even own an online business with all this talk about attacks and losing data. Ignorance is bliss for a lot of things in life, but computer security isn’t one of them. When you are armed with the knowledge of what can happen and do something to prevent it, you have nothing to worry about. Just make sure that you know exactly what you will be doing if one of these problems do arise.

About the author:

Virginia Cunningham is a avid technology blogger touching on topics from social media to security solutions. She writes for a blog that specializes in identity solutions for businesses, for one of the most trusted provider of secure ID solutions, AlphaCard.
Read more ...

Password Cracking Techniques - Free Download

Password Cracking! Yah! I hope you are as excited about the subject as I am. If not, you must be at least somewhat interested since you are reading this right now, unless of course you pick up random things and read them because you have nothing better to do. In that case, I’ll get you interested!

Whether you are a computer security hobbyist, Certified Ethical Hacker, or just want to know how to crack your girlfriend’s password because she’s “cheating” on you, you will enjoy and get something out of this book. It covers the very basics of password hacking and cracking.

If you are really serious about learning all about hacking, then not only will you read everything in this book, but you will also DO. DO every example I show you because no matter how much you read, you will never really know something until you DO it. So DO it Damnit!



Password Cracking Techniques






How do I get it?


I am giving a free copy of this book to every subscriber on my other blog Ethical Hacking Guides. Sign-up to the "Ethical Hacking Guides" newsletter and you will be able to download the "Password Cracking Techniques" eBook for free.


You can subscribe by visiting the blog address here, or by using the form below:



Enter your email address:

Read more ...

Learn Batch File Programming

In DOS, OS/2, and Microsoft Windows, batch file is the name given to a type of script file, a text file containing a series of commands to be executed by the command interpreter. Batch file are mainly used to do repeat tasks. Instead of typing in a commands over and over again to do a certain task, you can create a batch file that does it all automatically by performing a bulk set of commands.

So why should hackers know batch programming? Well I’ll give you a few ideas and you can decide on your own:

Attacks: DNS Poisoning; Packet flooders; Dictionary attacks; Creating Viruses; Service Disabler; Clearing Logs.

Annoyance: Bombers (Fork, Broadcast); Msg Annoyers; Flooders (user, folders); Extension changer (ex. html -> exe); Keystroke remapper... and many more.

I came across batch file programming videos on youtube so i am sharing with you all. It will hardly take your 30 minutes and you will learn a new language. These are the 3 videos that every beginner to batch file programming should watch.



Introduction to Windows Batch Files (.bat files)







Batch Files Continued Part 1







Batch Files Continued Part 2



Read more ...

How To Use Nmap - For Beginners

Nmap is a scanner that we will find in almost every distribution of the Linux system. It is most often used from the text console, although a graphical user interface exists, so even novices can use it.

Here is a very useful video tutorial that will show you the basic usage of Nmap.



Read more ...

How To Burn An ISO Image To A Bootable CD

The readers of my site will think this is silly, but I've seen this question asked so many times in forums that i feel i should make this post. Now I'll have something on hand to point people when they email me this question. If you are burning a distro like Knoppix or Ubuntu to begin learning about Linux then i hope that this video helps you. If you don't know how to burn a bootable ISO, and you are thinking of burning a CD like BackTrack or Helix to learn about security, then maybe you should learn to crawl before you walk. In this video the author assume you are using Windows XP or Vista, which is why i recommend the freeware tool CDBurnerXP. It's free and easy to use.


Read more ...

How to Bypass an Antivirus with Metasploit

This is not a new question. Everyone who performs hacking discusses the issue of how to bypass an antivirus. Even many new users want a solution for their keyloggers, stealer’s and RAT. Everyone needs to bypass an antivirus, because even in the process of penetration testing and ethical hacking, antiviruses try to defend an operating system.

Here is an awesome video i found by John Strand that shows how to bypass anti virus tools utilizing the new tricks in Metasploit.

Read more ...

Convert PDF Files








http://hackspc.com/how-to-convert-pdf-files/How To Convert PDF Files



Hey there , in this post I’ll show you how to convert PDF files and how to win free license for wondershare’s PDF Convertor.


Read more ...

Hacking Videos


Check All Type off hacking 











http://hackspc.com/top-17-youtube-hacks/Top 17 Youtube Hacks


Want to learn cool youtube hacks ? Here is the list of top 15 youtube hacks . Let’s begin !

Continue Reading » 




Read more ...

Facebook Hacks





Want to learn cool and useful
facebook hacks? Here is list of top 24 facebook hacks , that will teach
you a lot new things about facebook!

Continue Reading »
Read more ...

CMD HACKS


Looking for CMD hacks? Here is list of top cmd (command prompt) hacks , that will teach you a lot new things about cmd!





cmd hacks for hiding driveCMD All HACKING TRICKS 


Continue Reading..
Read more ...

MOBILE HACKING TRICKS

Read more ...

Twitter Hacks









http://hackspc.com/top-4-twitter-hacks/Top 4 Twitter Hacks


Looking for cool twitter hacks ? In
this post I’ll show you top 4 twitter hacks : custom twitter
backgrounds, how to do twit of more than 140 characters, how to know who
has unfollowed you, automated twitter followers
Continue Reading » 



Read more ...

Firfox Hacks



Here is the list of top 10 firefox hacks that will fine-tune your Firefox functionality . Let’s begin!
 

Continue Reading »
Read more ...

Facebook Hack Course

Read more ...

You Tube Hacking Tricks








http://hackspc.com/top-17-youtube-hacks/Top 17 Youtube Hacks


Want to learn cool youtube hacks ? Here is the list of top 15 youtube hacks . Let’s begin !

Continue Reading » 



Read more ...

Google Hacking Tricks


 Google has proven itself to be THE choice for many everyday
internet-related activities: web search, mail, mailing lists, maps,
document sharing, source code sharing… Some users don’t take the full
advantage of those services due to lack of knowledge and information.
Let’s fix that with this 10 cool hacks!
Continue Reading »
Read more ...
All Tips And Tricks Information Computer tricks in tamil Hindi Mobile tips tricks 2013 HAcking tricks Airtel Idea Vodafone Tata Docomo Tricks internet