Showing posts with label Hacking. Show all posts
Showing posts with label Hacking. Show all posts

Monday 26 January 2015

How to access blocked sites using Hola

If you are living in a country where some sites are blocked by the server or your office or school colleges have a restricted access to the Internet then this trick may help you in many ways. Most of the colleges and school applied some security firewalls that doesn't allow you to access certain sites. There are lots of options available to access blocked sites such as using proxy sites, VPN servers etc. But local administrator can also block these services also so it is very important for you to know about different tricks to bypass the restrictions. So we are here to help you.

Today we will see another excellent service Hola which can be used to access sites that are blocked by a local administrator. If you want to check the previous post check it here How to access blocked sites using Cocoon.

access blocked sites using Hola

What is Hola?

To access blocked sites here is an excellent service named Hola which provides wide variety of services on different platforms. It is free to use VPN service. You can use Hola on your computer as well as on your mobile phones. Hola is a browser extension for Mozilla Firefox, Google Chrome and Internet Explorer. It is also available as an application software for Windows and Mac. Also Android and iOS devices can use Hola to access blocked sites in any public or private network.

How to access blocked sites?

Using Hola to access sites is very simple check out their official website http://hola.org

*. Download Hola as a browser add-on on any browser.

hola extension for firefox

*. After successful installation you will see an icon on top right corner.

browse and access blocked sites from us server


*. Open any blocked site. If you unable to open that site then click on Hola's icon and select the country like US and in a few seconds you may able to access blocked site easily. See the example screenshot below for netflix.com

netflix before and after unblock

After unblocking site you will see any country's flag like US from where you are accessing that site and you won't be trapped by anyone. Stay and surf anonymously anywhere.

Monday 12 January 2015

How to access blocked sites using Cocoon

Are you frustrated the way online colleges and schools blocking websites? Did you just hate Cyberoam blocking sites in colleges. Don't worry now we have a solution for you. These days crazy Internet surfers like us are always want to access torrents, facebook, twitter and other social services in offices, schools and colleges also but the firewalls of these institutions are also becomes very stronger and cannot be bypassed easily but thanks to Cocoon these restrictions can also be overcome easily.

cocoon online internet privacy

What is Cocoon?


Cocoon is basically a browser add-on which is used to bypass internet restrictions. According to the cocoon developers,
"Cocoon is an all-in-one plugin that makes everything you do online secure, virus-free and private. Without Cocoon websites and hackers have access to your computer to leave cookies or infect it with viruses and malware. You even get protection on open Wi-Fi access points."


There are number of advertisers who track your every move, hackers in a hurry to steal your passwords and viruses needs a chance to attack your computer. To avoid all this you want something that hide you from the threatening things of the Internet world and here comes the Cocoon.

Cocoon is available for Firefox, Google Chrome and Internet Explorer that helps you browse the Web securely in an anonymous environment. Cocoon is available for free download and also available in paid version that is also known as Cocoon+.

How Cocoon works?


Cocoon uses a proxy service, so that all of your browsing is done through Cocoon's servers. All the web sites that you browse see their IP address or ISP instead of tracking you.
Cocoon scan files before you download ensuring that your computer won't be attacked by any malware.

How to use Cocoon?


Using Cocoon is very easy and don't need any specific knowledge. To use Cocoon following steps will help you.



*. First of all signup for a cocoon free account from https://getcocoon.com/signup_free and then download Cocoon add-on from the official website https://getcocoon.com/support/download

cocoon add on for firefox

Note: If download not works then you can download from following link directly https://getcocoon.com/downloads/vwc_cocoon.xpi?303486

*. After install you need to restart your browser and you will see a Cocoon toolbar. Just press the power button and you will see a Email address and Password fields.


start browsing with cocoon

*. Now enter your email address and password that you used while sign up process and click on Go.

cocoon toolbar attempt to login

*. Now Cocoon will start attempt to login from different proxies and in a few seconds you will be connected to the Cocoon's private world.

*. Now open any website that is previously blocked and enjoy browsing anonymously.

That's it, browse the web, bypass firewalls and Cyberoam restrictions with ease.

Thursday 25 September 2014

How to know if your E-mail account compromised in Cyber Attack

You have noticed that in the recent few years cyber crime is increased a lot. Everyday we hear news about cyber crime or hacking through mail servers, etc. Even the top websites like facebook, twitter, gmail, yahoo etc. also get hammered by the cyber criminals to get the sensitive information of the users. Personal information on these sites open to these criminals can cause vey serious issues to ourselves.

Cyber attack

In the few days of time you may heard about stealing of personal photos of Hollywood celebrities by iCloud hacking and sharing it on internet. This is a major kind of issue. It proves that although you delete your personal information from the web it may recoverable by these cyber criminals. So be alert is the only solution don’t reply to unknown persons or mails in your inbox.

But good news is that you can now know about your e-mail status in cyber attack. The website https://haveibeenpwned.com, let you know about your account status in a cyber attack. What the service does is, it collects the breached data which have been made publicly available and when you enter your email id, the service compares it with its database of compromised accounts and notifies you know if your email account is found in any of the recent security breaches.

i have been pwned

In another recent news you may heard that millions of e-mail accounts were hacked and the mail providers suggested to change the credentials of the users. So this service is very useful to let us know about our mail account. The site https://haveibeenpwned.com only stores the e-mail id and usernames of the compromised accounts. If you have more doubt, check out their FAQ page for more details.

Make sure from now that you check if your account has been compromised and do let your friends know about this service as well.

Saturday 14 June 2014

How to unblock Tor if it is blocked ?

                                               Tor blocked 
In the previous post we have seen about Tor and how we can stay anonymous on the Internet. But in case it is blocked by your network administrator then how to unblock it ? Don't worry here is the solution for that problem.

Reason to block Tor

*. Due to the rising popularity of the Tor application, lot of colleges, companies and organization started to block even Tor.
 

*. They mostly block access to all the publicly known relay servers. If network administrator blocked access to these relay servers then Tor would stopped working and you would not be able to connect to any blocked website on the Internet.
 

*. You can see complete list of Tor relay servers on the Vidalia Control Panel by clicking on View the Network button.

How to unblock Tor


If Tor relay servers blocked, then there are Bridge Relays come to the rescue. Bridge Relays are Tor Relay servers (Onion routers) that are normally not published in the public network list. They are hidden servers which are unknown to anyone of us and even the network administrator and so that they would not necessarily blocked.


bridge relay servers

To find Tor bridge Relay servers or Tor Bridges there are two ways as follows:

*. Visit to the webpage https://bridges.torproject.org and click on get bridges you will able to get information about some new Tor bridges.

*. If the above webpage is blocked then you may request for Tor bridges by email. For this send an email to bridges@torproject.org with the line get bridges in the body of email and make sure to send this email by your Gmail or Yahoo account because any other email account will not be accepted.

 Within few minutes for should receive a reply containing some bridges that you can use. But sometimes this method doesn't work, you can use other devices like mobiles phone to access the webpage and get the bridges if Tor webpage is blocked in your organization.

Once you have received Tor Bridges information you need to configure the Tor application to use these new bridges.

To do this open Vidalia Control Panel > Settings > Network and select the option My ISP Blocks connection to the Tor network. Now you will be presented by a box below, where you can add IP addresses of the new Tor bridges. It is a recommendation for you that add as many bridge as you can to make it harder for your college, company or organization to block you.
 

adding bridge relay servers

Some network administrators also block the various ports that Tor uses for communication.

In such case, it is possible to force Tor to use Port 80 and Port 443 for all its communication. Port 80 and 443 are normally not blocked because these ports are the default ports that are needed for Internet communication. To configure this option go to Vidalia Control Panel > Settings > Network and select the option My Firewall only lets me connect to certain Ports.
Mostly this will resolve the issue of blocking.  


adding port

So, just enjoy with this post and keep visiting for more tips.       

Friday 13 June 2014

Protect your privacy with TOR

Everyone in the world wants to browse the Internet anonymously. You have different ways to stay anonymous on the web like proxy servers, VPN servers, etc. but sometimes most of the proxy servers are blocked in public place where you want to access the Internet.
For this you have one option other that proxy sites i.e TOR.


TOR logo
What is TOR ?

TOR which stands for The Onion Router is a free software that is the best software for anonymity, privacy and unblocking websites.
 

TOR has thousands of servers in different parts of the world through which user's data routed and tunneled in encrypted format with the intention of keeping it completely anonymous.
 

It not only protect your privacy by keeping you anonymous, it keeps your communication on the Internet completely secure. It can be downloaded free of cost from https://www.torproject.org.

How TOR works ?

When you want to connect to the secure and anonymous network you first need to install TOR on your computer. When you have configured your browser to connect to the Internet through TOR and once TOR receives your request to connect to the domain name (For ex. www.google.com) that you want to connect, it will first connect to the TOR directory server and download a list of available TOR relay nodes (i.e. onion routers) that it potentially connect to.

TOR will now create a secure and encrypted network between you and the domain you want to connect to and route the connection by randomly selecting onion routers one after the other.
 

TOR always connect to three randomly selected onion routers in any part of the world before connecting the user to the destination system, hence it ensures the anonymity of the user. TOR always an advantage over the poxy servers by ensuring that it always connect to three different onion routers and on the other hand proxy routed through only a single system.

Once TOR circuit has been created, it will continue to be used for all the connection for 10 minutes or so, after which all new connections will be given completely new TOR circuits. It is also possible to change TOR's circuit sooner than 10 minutes if needed and in this case your identity also changes on the Internet.

How to use TOR ?

*. Download TOR Browser Bundle from here.

*. After downloading it can be extract anywhere on your computer or you can use it by extracting it on your USB pen drive. To launch TOR double click on start TOR Browser icon.


TOR browser files

*. After you launch TOR you will be presented the Vidalia control panel and TOR will connect to its directory server and download a list of TOR onion routers. and then try to establish a secure and encrypted connection. As soon as secure Tor connection established the Mozilla Firefox browser window will automatically open. 

vidalia control panel

*. The Firefox window that opens will also say Congratulations. Your Browser is configured to use Tor.

tor browser started

*. You can check your connection for anonymity by visiting http://www.whatismyipaddress.com.

*. Note that only the Mozilla Firefox Browser which automatically opens will work with TOR and all the other installed applications and browsers will not automatically connect to TOR.

If your college or organization block access to the Tor project website then you can download it by email also. To download it from email send an email to gettor@torproject.org and make sure you typed help in body of email and they will reply you with the instructions to download Tor and if you are using Windows then you have to reply them with keyword windows in the body of email.

Enjoy safe, anonymous and secure browsing on the Internet.

Wednesday 11 June 2014

Browse Anonymously with Tails OS

You want more security for your internet browsing and want to surf the web anonymously then here is the solution for you. The Tails OS which will give you anonymity in browsing the web.

What is Tails ?


tor browser with tails OS

Tails is an operating system which is build for anonymous surfing of the internet. It can also be use to bypass some restrictions that have been implemented by local system administrator. (for ex. the security firewall in colleges, offices and other public places)
It is a free and open source licensed OS that means you can use it absolutely free.
 

It is bootable from live CD or pen drive or SD card. Tails uses Tor to provide users with secure encrypted anonymous access to the Internet.

Steps to install Tails

*. The first step to download the Tails OS from their official website here. It's latest version is approximately 980 MB. If you want to install it using pen drive then you also need Universal USB installer. You can download it from here. It will allow you to install Tails on the USB pen drive and make it bootable.
Use formatted pen drive for successful installation.


universal usb installer to boot OS from USB

*. Plug in your USB pen drive and start the Universal USB installer software. After it's installation it will ask you to choose the Linux Distribution you wish to install, select Tails and then choose the path of the downloaded Tails OS .iso file and select the drive on which you want to install. Take a look on the warnings that will pop up after pressing OK about your data on the pen drive. The complete installation process takes few minutes but not more as other OS needed.

universal usb installer ready

*. Once installation is over restart your computer by pluging in USB pen drive. Before Windows starts booting, quickly press Esc, F12, F2 or other keys that your system specified for accessing BIOS settings. Look for the Boot priority or Boot sequence and make sure USB device boot priority should be higher. After that save the setting and start the computer. It will Boot from the USB pen drive.
 

*. Now follow the instructions to install Tails OS. 

tails OS manage drive

Now you are free to browse Internet anonymously with Tails and it has some useful built in applications like Pidgin Instant Messanger, Tor, Browser and others and these applications are pre-configured to give you anonymity on the Internet.

Enjoy being anonymous on the Internet.

Popular Posts