Category Archives: privacy

How to access blocked websites : 5 ways to access blocked internet sites

unblock, blocked websites : ehack

unblock, blocked websites : ehack

he Internet is a vast expanse and there’s a ton of information out there, most of it is legal, while some of it is illegal. Unfortunately, due to a number of reasons, sites that have content that may be in the clear might also get blocked by either the authorities, your ISP or sometimes even your office network administrator. Gaining access can be considered to be a very technical and complicated process, but it really isn’t. We’re going to look at some of these ways to unblock sites. Most of these techniques are really simply, while a couple of others might need more than a minute or two to get running.

1.Unblocking by changing your DNS server

A DNS server is like an index, with a list of domain names – such as, and pretty much every other site on the Internet. When you type in a website address in your browser, your computer sends a request to the DNS server and it tells you the IP address for that site. One of the easiest ways for ISPs to stop access to a particular site is by removing the entries for the sites that need to be blocked. ISPs can choose to redirect the request to a different site or a notice page as well.

Unblocking by changing your DNS server : ehack

Unblocking by changing your DNS server : ehack

However, there is a way around this. There are free, fully open third-party DNS services run by organizations and other ISPs. The most popular ones are run by Google and OpenDNS. All you need to do is change your DNS server settings to theirs. In a typical Windows 7 system, head over to the Control Panel > Network and Internet > Network and Sharing Center > Change adapter settings. Right click on your network adapter, click on Internet Protocol Version 4, click on Properties. Click on the Use the following DNS server addresses and enter the DNS server of your choice. Google’s DNS addresses are and, while OpenDNS’ are and Click on OK to save the settings and reboot your PC.

2.Using browsing proxies

Browsing proxies are services that allow you to use their Internet connection, thus bypassing most of the restrictions setup by the ISPs or the network administrators. There are plenty of these on the Internet that can be accessed through your browser. All you need to do is access them and enter the URL of the site that you want to access in the address bar provided by the site. All the requests will then be channeled through that browsing proxy server.

Using browsing proxies # hidemyass : ehack

Using browsing proxies # hidemyass : ehack

The only downside to this of course is that if the browsing proxy itself gets blocked by your ISP, you’ll have to find another one. Some of these browsing proxies, depending on how popular they are, can be slow to access. A quick Google search for ‘anonymous browsing proxy’ will give you a long list of services available on the web.

3.Using Google cached pages and Google Translate

One of the simplest ways to access text content on blocked pages on the the web is using Google. The popular search engine maintains a cached mirror of most of the popular web sites. When you search for a particular site on Google, look for the cached version of the page by clicking on the >> icon on next to the search result. A linked called ‘cached’ should be available there. Clicking on it will load the cached version of the page. This mirrored content is refreshed quite often, so you won’t be left with outdated content. The downside to using this technique is that you may not be able to use interactive content, such as Flash and streaming media. Even sites that require login and passwords will not work.

Using Google cached pages and Google Translate : ehack

Using Google cached pages and Google Translate : ehack

Another way to access content is to use Google’s Translate feature – it’s accessible at The service allows users to translate text from one language to another. However, if you enter the URL of the site you want to view, choose the page language as anything, but English and the translated language as English. You should be able to view the blocked site in English.

4.Using TOR

The most popular and easy to use tunneling service, is called TOR. It’s a software that connects to a network that claims to offer anonymity on the Internet. Of course, you also get open access to web sites. Head over to the TOR site and download a copy of the software for your operating system.

Using TOR to access blocked sites : ehack

Using TOR to access blocked sites : ehack

Once installed, the program should run and connect to the TOR network. It should also install a plug-in for your browser. For example, in Firefox you should be able to enable or disable traffic from being channeled through the TOR network, giving you open access to the Internet, all by a click of a button.

5.Using a VPN

Using a virtual private network or VPN, as it is popularly known is a more secure and concrete way to access the web. The system works by setting up a connection that is channeled through your ISP, through to a VPN service or a computer that has open Internet access. Using this technique, you should be able to access the web freely with no restrictions on sites, keywords, services, etc. Unfortunately, VPNs are a bit more complicated to set-up. For one, you will need to find a free, open service service that allows VPN connections or you might need someone with an open connection to allow VPN connections to be made to his or her system.

Using VPN # Cyberghost : ehack

Using VPN # Cyberghost : ehack

Most consumer versions of the Windows operating systems come built with a VPN server that allow one client to connect. To use this, you’ll have to add a new VPN connection through your Network Connections feature in Windows and enter the authentication as set up by the person running the VPN server. Setting up a server is also relatively easy. One of the ways to try it is by running a VPN server at home and connecting to it via your mobile device, notebook or PC at work. If you’re an advanced user and want to share your connection with multiple PCs and devices, check out OpenVPN. Another alternative is to use one of the freely available VPN programs, such as Hamachi and set up a proxy on the remote PC with an open Internet connection. There are also a whole bunch of free VPN services, such as ProXPN and CyberGhost available on the web, however these are likely to have download or speed restrictions.

 6.Some others are

UltraSurf : ehack

UltraSurf : ehack


UltraSurf is the free small software of UltraReach Internet Corp. It enables users to browse any website freely just the same as using the regular IE browser. This is very easy software to use. User can easily access any kind of website anywhere in the world because this small software breaks all the walls. the software enables users to bypass using HTTP bypass.



hot spot shield : ehack

hot spot shield : ehack

Hotspot Shield VPN is the ultimate Internet security solution that secures your browsing session, detects and blocks malware, protects your privacy and allows you to access blocked sites. Hotspot Shield is available both as a free VPN and a paid Hotspot Shield Elite subscription.







Original post at –

Thanks for reading. hope it might helped you.


YouTube ban may be lifted, hints Pak minister

Summary : Just after a month after video sharing website YouTube was banned in Pakistan for failing to block sacrilegious content, Interior Minister Rehman Malik has hinted that the site could be reopened.

youtube ban may be lifted : ehack

youtube ban may be lifted : ehack

Just after a month after video sharing website YouTube was banned in Pakistanfor failing to block sacrilegious content, Interior Minister Rehman Malik has hinted that the site could be reopened, but only after access to anti-Islamic content has been restricted.

Malik tweeted from his Twitter account that he will raise the issue of reopening YouTube in the upcoming cabinet meetings.

[YouTube] is also wealth of knowledge but hurt the feelings of Muslims.I promise to raise in the cabinet to reopen it minus anti-Islam material,” The Express Tribune quoted Malik, as saying.

According to the paper, Pakistan had blocked YouTube after a short clip from an amatureishly made film insulting Islam rose to world wide prominence.

The Pakistan Telecommunication Authority (PTA) acting on orders of the Supreme Court, started blocking links carrying the video. However, innumerable instances of the video being uploaded on YouTube largely nullified PTA’s attempts, the paper said.

After failing obtain an approval from Google to block the clip from being accessed in Pakistan, the government then finally imposed a blanket block on YouTube on September 17, 2012, to restrict access to the video, it added.

W3 total cache wordpress plugin reveals sensitive information

A security researcher is warning WordPress uses that a popular plugin may leave sensitive information from their blog accessible from the public Internet with little more than a Google search.

malicious w3 total cache plugin : ehack

malicious w3 total cache plugin : ehack

The researcher, Jason A. Donenfeld, who uses the handle “zx2c4” posted a notice about the add-on, W3 Total Cache on the Full Disclosure security mailing list on Sunday, warning that many WordPress users that had added the plugin had directories of cached content that could be browsed by anyone with a web browser and knowledge of where to look. The content of those directories could be downloaded, including directories containing sensitive data like password hashes, Donenfeld wrote.

W3 Total Cache is described as a “performance framework” that speeds up web sites that use the WordPress content management system by caching site content, speeding up page loads, downloads and the like. The plugin has been downloaded 1.39 million times and is used by sites including andsmashingmagazine.comaccording to the WordPress web site.

Simply installing W3 Total Cache from within WordPress appears to leave potentially sensitive data exposed, Donenfeld discovered. Among other things, a cache directory listing feature is enabled on the cache directory, which stores cached content. That means “anyone could easily recursively download all the database cache keys and extract ones containing sensitive information, such as password hashes,” he wrote.

“A cache is something that is supposed to be read by web applications and not users,” Donenfeld told Security Ledger.

Sites with exposed cache directories are also discoverable using a simple Google search, Donenfeld said.

Even with directory listings off, cache files are still publicly downloadable by default with W3 Total Cache. Yes, a hacker (or snooper) would need to know the key values and file names of the cache items, but Donenfeld said both are “easily predictable.”

Donenfeld developed a proof-of-concept exploit for the hole that allows a would-be attacker to try to attempt to glean password hashes from blogs running W3 Total Cache using a brute force attack to guess possible W3 Total Cache keys using different user- and site ID combinations.

vulnerability in w3 total cache plugin

A quick search revealed a number of web sites that are running the W3 Total Cache plugin that have publicly accessible directories of cached content. They include Triton Submarines, a maker of manned submersibles and the Family Policy Network, a U.S. based conservative Christian group that says its mission is to confront “immorality” in the public square and educate Christians “on important moral issues in public and corporate policy.”

Still, Donenfeld said the security holes are probably better classified as “configuration errors” than  vulnerabilities – enabling risky features by default, and giving users too few ways to securely configure the plug-in. In a subsequent post on Full Disclosure, he said that W3 Edge, the company that makes W3 Total Cache, plans an update to correct the issues he had identified.

In the meantime, W3 Total Cache users can remediate the vulnerability by disabling the “database cache” and “object cache” options, and flush any existing caches created with W3 Total Cache.

WordPress is a widely used blogging and content management platform. As a result, it is frequently the target of attacks designed to compromise a large number of web sites. Most recently, The SANS Institute warned of widespread and apparently automated attacks against both WordPress and the  Joomla CMS that were being used by cyber criminals to direct unwitting web surfers to sites serving up rogue antivirus and other malicious software. And, last week, a Russian researcher  warned of a large scale spam campaign that leveraged compromised WordPress blogs to promote sites controlled by spammers and their customers.



Original post at

Thanks for reading. hope it might helped you.

Facebook messaging changes could let paid advertisements into users’ inboxes

Facebook announced a trail that could let paid advertisers directly message users’ in-boxes, which have traditionally been held for messages from friends.

The move is seen as the latest effort by the company to monetize its hugely popular social network, which now includes more than 1 billion active monthly users globally.

“This test will give a small number of people the option to pay to have a message routed to the Inbox,” Facebook says in a post announcing the news.

The news is part of a broader set of changes Facebook made to its messaging platform today, including new privacy settings. Users can now choose from two message settings, basic or strict. In the basic settings, friends, friends of friends and  AndroidImage

Messenger users  who do not have a Facebook account can message users to their in-box. A “strict” allows the user to select who they can receive a message from.

Facebook’s messages are broken into two categories, the in-box and an “other” folder. The messaging platform is designed to “get the most relevant messages into your in-box and put less relevant messages into your other folder.” Facebook uses algorithms to determine relevance and where the message should be placed, for example, whether the sender is a friend, friend of a friend, or spammer.

With the introduction of paid messages though, people who are not in any way connected to a user’s social network can pay to send a message to someone. “Today we’re starting a small experiment to test the usefulness of economic signals to determine relevance,” Facebook says. “Several commentators and researchers have noted that imposing a financial cost on the sender may be the most effective way to discourage unwanted messages and facilitate delivery of messages that are relevant and useful.

Paid messages seem akin to an advertisement, but Facebook says it envisions other scenarios as well. “For example, if you want to send a message to someone you heard speak at an event but are not friends with, or if you want to message someone about a job opportunity, you can use this feature to reach their Inbox. For the receiver, this test allows them to hear from people who have an important message to send them,” Facebook writes.

The feature is limited to person-to-person messages, meaning that Facebook business pages and accounts are not able to utilize this service. Paid messages are also limited to one per week to users involved in the trial.


Thanks for reading. hope it might helped you.

The Top 5 Cyber Security Threats That Could Affect Your Life

The Top 5 Cyber Security Threats That Could Affect Your Life–

Cyber Security : ehack

Cyber Security : ehack

Our electronic devices are such a big part of our lives today that it’s hard to imagine what we once did without them. But our constant use of technology to keep in touch, pay bills, stay on top of the news, shop and research things has a downside: Our data can be exposed to criminals who commit crimes such as identity theft and credit card fraud – unless we take the proper precautions. Our growing reliance on electronic devices is part of the reason why careers in cyber security are growing at a faster pace. Jobs in information security, web development and computer network architecture – three fields at the forefront of cyber security – are expected to grow 22% between 2010 and 2020. Understanding the threats can help everyone do their part to make those jobs easier. Here are five top cyber security threats and tips on how to protect yourself against them, according to experts.


1. Malware and Bots


If you’ve ever spent a frustrating afternoon calling a help line to tackle a computer virus, then you know how pesky malicious software – or malware, for short – can be. Malware also includes nuisances like spyware, which allows digital hackers to track your every move and to view the passwords you are entering, according to the National Cyber Security Alliance, an organization focused on educating the public about how to use the Internet safely. Typically consumers get tricked into downloading malware by accident, when for instance they click on a rogue website or try to download what seems to be free software, like a screen saver. When criminals use malware to take control of individuals’ computers remotely to perpetrate financial crimes or attack computer networks and websites, the setup is known as a botnet.

Further, “malware can be spread by your Friends on social networking sites like Facebook,” says, Linda McCarthy, cyber security expert, former senior director of Internet safety at Symantec and author of Own Your Space: Keep Yourself and Your Stuff Safe Online. You need to think about that link your Friend is telling you to click on. Is that really a Friend sending that link, or was their account compromised? Don’t click on suspicious links, McCarthy warns. Spreading malware on social networking sites is growing at an alarming rate. “Even though social networking sites have systems in place to minimize the risk, you are still the first line of defense in protecting yourself. It makes sense that malware writers target social networks because you are likely to trust a link that came from one of your friends,” she says.

2. Spam

You already know that “spam” is the email equivalent of junk mail. But it can do more than clutter up your inbox. Some of these emailHow-to-protect-yourself missives can contain a link or an attachment prompting you to download a computer virus. They can also be used to defraud those close to you. For instance, someone who has hacked into your email account can send a message asking every one of your contacts to wire money because you are in distress – and possibly rope in a few people who aren’t familiar with this common fraud. The CAN-SPAM Act was set up to protect consumers from deceptive email messages, subjecting senders to fines of up to $16,000 per violation.

3.Hacked Accounts


One common way for identity thieves to gain control of consumers’ personal information is through digital crimes known as “phishing.” In this practice, fraudsters create an email that looks like it was issued from a legitimate company. They will ask for a recipient’s personal information – like an account number or a password – and then use that information to commit financial crimes, such as opening fraudulent charge cards in a consumer’s name and running up big bills on them.

“Phishing scams are successful because they use social engineering techniques to gain your trust,” says McCarthy. For example, one scam claims to be a relative traveling in another country reaching out for your help. It’s an email from your nephew. He was mugged, lost his wallet, and he needs you to wire him money right away. “It’s a natural reaction to want to help someone in trouble. That’s what the phishers count on. Beware of social networking techniques and be sure to protect your accounts,” she adds.

4.Unsecured Home Wireless Networks

How-to-protect-yourselfMany of us have converted to home wireless Internet networks to connect our TVs, smartphones, laptops, computers and tablets. And why not? It’s very convenient. But with these home networks come risks. Without certain protections, cyber criminals in the area may be able to access the Internet through your network and possibly gain access to your computer and other devices.


5. Data Gone AWOL


Given all of the places where we tote mobile devices such as laptops, tablets and smartphones, it becomes very easy to lose them. If the data on those devices falls into the wrong hands and isn’t properly protected through techniques like encryption (the process of masking information using an algorithm, so that it becomes unreadable), it can be a field day for cybercriminals. It’s not just consumers who lose data. Forty-five percent of data breaches at companies are caused by lost laptops and mobile devices, according to a 2012 study by the Ponemon Institute, a research center based in Traverse City, Mich., that is dedicated to consumer privacy, data protection and information security policy. Even use of YouSendIt, Dropbox and other Internet-based file-sharing tools by employees – now a common phenomenon – raise the risk that confidential corporate data will be leaked, according to Ponemon.

But even if devices don’t get lost, it’s possible that in using them we’ll fall prey to cyber criminals while checking emails in an airport lounge using Wi-Fi on a smartphone, or while reading on a tablet over a mocha latte in a café.

“With all of your devices and more to come, be sure to have a backup strategy,” advises McCarthy. Many of the security software packages now include backup as an option. That won’t help with all of the data on every device, so be sure you plan and back up all of your important devices. There’s no telling what types of devices will be part of our lives years from now. The tech explosion presents immense opportunity for those with the creativity and know-how to make the gadgets we use better and better – and to simply keep them running smoothly. In the meantime, building a few smart cyber security habits is a good way for all of us to enjoy the technology we use every day with few hassles.

Advances in technology are not likely to slow down in the future, nor is our increased reliance on the fruits of that growth. New security threats will be a constant reality, which makes it more important than ever that skilled individuals step up to fill the increasing number of jobs available in cyber security, and that those who choose other career paths take steps to protect their own security.


Original Post at

Thanks for reading. hope it might helped you.

%d bloggers like this: