Skip to main content

Here's what a VPN can't protect you from (but you need to use it)

The abbreviation " VPN " has slowly become established among average Internet users, which is certainly good, but the problem is that people have started to see VPN as the ultimate solution to all problems.

5 ways to access blocked sites

5 ways to access blocked sites

If you have limited access to some sites at work, school, college, or anywhere else, you can use these tricks to access them.

5. Web Proxy

The proxy will serve as an intermediary between your and the server computer. I wrote more about Proxy HERE.

4. VPN

Another, more efficient, way to mask an IP address. If the Proxy doesn't work, try a VPN. I wrote about him too, so take a look.

VPN structure

3. IP instead of domain

Sometimes only the domain is blocked, but the site can be accessed directly via its IP address. To find out the IP address of a site, open CMD (Run> Cmd> enter) and type "ping www.domain-someone.something" (without quotes). Or through a site, e.g. here.

Get website IP on CMD Windows

2. Edit the Proxy in the web browser itself

Simply install some Proxy add-on for the web browser you are using and enter the IP and Port of a Proxy server. You can find IP and Port on several sites, and HERE  again, you can see how to install and configure the plugin.

1. Google Translate

This way served me the most personally. This will not only work if all of Google and its servers and services are blocked. So, open Google Translate, select the language in which the site is (eg Serbian) and the language you want to translate (eg Croatian, because it can not be the same), and click on the link that appeared in the translation. Not all elements that may appear in some of the site's content are blocked by Google.

Google translate to access blocked sites

Comments

Popular this month

The Galaxy Note was ridiculed when it appeared, and now…

Did you know that the first Samsung Galaxy Note was ridiculed by users and the media? Everyone laughed at his "huge" case and said that it would fall apart immediately after it appeared. They said that it was too big and that such a phone would never be used every day.

To click on the post or not?

Recently, Facebook has been flooded with " click bait " posts, and sometimes you don't know if there is something really useful behind that post or if it's just collecting clicks. There is a plugin that can partially reveal this to you. Nothing special, it's a Chrome extension called " Photo Zoom ". What does he actually do? Enlarges the image you hover over by loading the source address of the image . How can it help? Clickbait posts often "trick" users into clicking with an image (in addition to terrible headlines). They place those pictures so that only a part of them is visible on the Facebook wall and just enough to interest your potential. If you want to see the whole thing, you have to click on the link, which is their goal.

The difference between Sleep, Hibernate and Hybrid sleep options

What is the difference between regular Sleep mode and Hybrid sleep mode? And what is Hibernate ? I will try to explain in the simplest way possible so that everyone understands nicely. 1. Sleep When you select Sleep mode , all components of the computer except RAM are shut down to store data. So, if you do something on the computer and press Sleep, the computer shuts down and everything you did (left open windows, documents, etc.) is stored in RAM.

What is GLONASS?

If you've looked at the detailed specification of an Android or GPS device, you may have seen another term next to the GPS tag and didn't know exactly what it represents. Well,  GLONASS is a global navigation system that was started by the USSR in 1976, so this project could be taken over by Russia after the collapse of the Soviet Union.

Google highlights the problems

Google has released a new study detailing how it is becoming increasingly difficult to identify harmful websites and attacks as antivirus programs increasingly prove to be an ineffective defense against new types of attacks.