How to access a blocked resource. VKontakte "Access is closed" - how to enter

Since the spring of 2014, the Law on Internet Censorship began to apply in Russia, which gives a number of departments the right to block both individual web pages and entire sites without a court decision. At the moment, on the territory of the Russian Federation, access to dozens of information resources is closed. But immediately after the adoption of this law, there were also ways to do it. A lot of them were proposed - from simple, accessible to any user, to technically complex, but giving additional bonuses.

Google services

You can also browse prohibited sites using some Google services. If you go to the Google translator page, insert a link to the translation window and press the enter key, the required page will open. For the correct display of the content, it is advisable to select the "Original" viewing method.

You can also use Google cache. To do this, just open the main page of Google and copy the desired link into the search line, add "cache:" to it on the left without quotes, then press Enter.

A serious disadvantage of this method is the inability to view blocked images, as well as interactive content on sites. If social networks suddenly get blacklisted and the question arises of how to bypass the blocking of "VKontakte", for example, then the services of "Google" will not help here. They are only suitable for viewing text on static pages.

Opera browser in turbo mode

The easiest way to visit prohibited sites in Russia is to turn on turbo mode in your Opera browser. In this case, the traffic will not go directly, but through the Opera servers. This technology was originally created to speed up the loading of web pages, but has proven to be effective in overcoming censorship as well. Opera and Chrome mobile browsers also support turbo mode.

The disadvantages of this method include the fact that the turbo mode does not hide the user's IP address. Also, compressing images can degrade their quality.

The Yandex browser also has a turbo mode, but for obvious reasons it is unlikely to be effective as a tool to combat censorship restrictions.

Anonymizers

Anonymizers are special websites designed, as the name suggests, for surfing anonymously. With their help, you can also bypass the blocking of sites or get to those Internet resources on which you were banned. Some anonymizers also allow you to select the country through which traffic will go. In this case, the site you are accessing will take you for a user from that country.

The scheme of work of anonymizers is very simple. You just need to go to such a site and enter the address of the desired page in the field located on the site.

Anonymizers can be fraught with danger - the owner of such a service has the ability to intercept data transmitted by the user, including logins and passwords from sites. To protect your personal data, it is recommended to use animators that support the secure connection (SSL) function.

Browser plugins

Chrome and Firefox allow you to install additional plugins that extend the functionality of the browser. There are plugins for bypassing censorship.

One of the most effective yet simple plugins is Stealthy... When using it, you just need to click on a button to send traffic through a proxy server. When proxy mode is enabled, the plugin icon will be green, when disabled, it will be red.

Plugin friGate somewhat more difficult to use. It routes only traffic from those sites that are on its list through the proxy. The plugin has a list set by default, as well as the ability to independently add new sites there. The advantage of this extension is the high data transfer rate.

A plug-in has already appeared, designed specifically for visiting the very resources that Roskomnadzor has added to its "black list". The blocking of sites by this department is carried out by sending IP addresses of Internet resources to Russian providers, access to which must be closed. Plugin NoZapret collects data on blocked addresses from the Antizapret.info site, and then on its basis independently generates a list of sites that will be opened through a proxy. All other connections will be made directly. This plugin is convenient in that it does not require manual configuration and provides fast data loading.

It should be remembered that the use of such plugins does not provide complete anonymity on the Web, but only allows you to bypass the prohibitions established by the authorities of individual countries. In addition, as in the case of anonymizers, the owner of the proxy server through which the traffic passes can, if desired, intercept the personal data of users.

"Torbrowser"

Tor is a distributed network that provides users with a high level of anonymity. Tracking the real location of someone who visits a site through Tor is almost impossible, since traffic passes in encrypted form through several nodes.

In order to use this technology, you need to download from the official website and install Tor Browser Bundle... There are browser options for Windows, Mac OS, and Linux operating systems. The Tor browser for the Android platform is called Orbot.

The advantage of using "Torbrowser" is that it allows you to both bypass the blocking of sites and to perform truly anonymous surfing. Tor technology also allows you to create hidden sites that can only be accessed through More information about such sites can be found by visiting the Hidden Wiki - a directory of hidden services, which itself is accessible only through the Torbrowser.

The Tor network also has serious drawbacks. First, there is a low data transfer rate. The point is that nodes on the network are supported by enthusiasts, so the throughput of nodes can vary greatly. It is only natural that traffic passing through a few random nodes is often quite slow.

Another danger lies in the possibility of traffic scanning by the masters of end nodes, information from which is transmitted, as opposed to intermediate nodes, in an unencrypted form. To avoid password theft, you should, if possible, work with those sites that support the https protocol.

VPN

Virtual private network, or VPN, is a technology that allows all traffic from all applications to pass through a remote server, usually located in another country. In this case, data between the user's computer and the remote server is encrypted and cannot be intercepted by the provider.

The main feature of a VPN is that absolutely all traffic is directed through the proxy server. If you use several browsers, you do not need to configure each of them separately - bypassing the blocking of sites will be carried out automatically.

There are several flavors of VPN. Therefore, it will not be superfluous to dwell on their features in more detail.

PPTP - This protocol has been used for a long time. It is supported by all popular platforms and operating systems. You can configure the router to transmit traffic through this type of VPN without installing additional software. The disadvantage of this protocol is considered to be insufficiently strong encryption. In addition, there may be difficulties with PPTP connection via 3G modem.

L2TP is a tunnel-only protocol. Therefore, as a rule, it is used in conjunction with IPSec - this bundle also provides encryption. However, if you only care about how to bypass site blocking, you do not need to use encryption. This type of VPN also does not require the installation of special software.

OpenVPN is the most common type of virtual private network. Provides reliable encryption of transmitted information. It overcomes NAT and corporate firewalls when configured correctly. To work with OpenVPN, you need to install additional software on your computer.

Most VPN services are paid. Free VPNs either have a limit on the amount of transmitted and received traffic, or show ads on the pages viewed. Of course, the speed of paid services is also much higher.

Open proxies

There are sites on the Internet that regularly publish up-to-date lists of open proxies. They are a list of IP addresses and ports. These data must be entered into the network by selecting manual proxy settings beforehand. There are also browser plugins that make it easier to work with proxy lists.

Open proxies can be anonymous or transparent. When using anonymous proxies, the sites visited by the user will not know his real IP address and location. When transparent information is used, the information about where the user goes to the Network from will remain open. But in any case, the blocking of sites by the provider will be successfully overcome.

Using open proxy lists is a rather inconvenient way to bypass censorship. There are several reasons for this.

  • First, the speed of loading pages through public proxies is usually very low.
  • Secondly, such proxies are unstable and close quickly.
  • Third, open proxies can be created by hackers to collect passwords and other personal information from unsuspecting users.

Public DNS Servers

Another effective way to visit freely is by using alternative public DNS servers. By default, requests to Internet resources are processed on the provider's DNS server. And if a program for blocking blacklisted sites is installed there, then instead of the prohibited site, the user will be shown a stub page.

The use of public DNS servers allows you to ignore the locks set by the provider. In order to start using this tool, it is enough to change the network settings of the operating system once.

The most popular alternative server today is Google Public DNS. Its primary and secondary addresses for DNS queries:

  • 8.8.8.8
  • 8.8.4.4

Google, in addition to solving the problem of how to bypass the blocking of sites, also promises to speed up Internet surfing and improve the protection of users from the actions of computer fraudsters.

I2P network

The decentralized I2P network is designed to reliably protect user anonymity. This technology is also called the "Deep Internet", because within the I2P network there are websites, peer-to-peer networks, instant messengers and other services that are technically impossible to censor. The invulnerability of the network is ensured by encrypting and tunneling all internal traffic. The client program processes not only the information requested by the user, but also serves as an intermediate node for the transit traffic of other network participants. As a result, neither the provider nor government regulatory authorities can trace the final recipient of the encrypted packets.

The increasing censorship on the Internet in Russia has already led some popular sites to acquire mirrors on the I2P network. An example is the free library "Flibusta", which opened sites in I2P and Tor.

Another possibility to visit prohibited sites in Russia using I2P is to use gateways from the anonymous network to the regular Internet. A serious drawback of such gateways is the very low loading speed of sites. It is expected that as the number of I2P users grows, the data transfer rate will also grow both within the network and when exchanging data with the external Internet.

SSH tunneling

If you have your own server located outside of Russia, the question of how to bypass the ISP blocking can be solved using SSH tunneling. in this case it is used as a regular SOCKS proxy.

You don't have to buy or lease a foreign server to use this method. You can use Amazon EC2, which allows you to use a dedicated server hourly for as little as three cents an hour.

Setting up a tunnel to a remote server is straightforward. It is enough to enter a command of the form through the console:

ssh -D localhost: port username @ server_address

  • port - an open port on your computer;
  • username - your login on the remote server;
  • server_address is the host of the remote server.

After that, in the network settings of the browser, you need to select the use of a SOCKS proxy and specify the desired port and localhost as the address.

other methods

The arsenal of methods for bypassing blocking is so wide that a detailed description of each of them may take more than a dozen paragraphs. One way or another, they all boil down to forwarding traffic through a foreign server, as a result of which the list used by the Russian provider for blocking sites turns out to be useless. Here is a small list of the most interesting ways.

  • JAP is a well-known program for ensuring anonymity on the Internet. Passes traffic through a chain of proxy servers. Has a paid mode that increases your surfing speed.

  • Ultrasurf is a project developed in China to bypass government censorship. Requires software installation. By default, it is configured to use the Internet Explorer browser.
  • TunnelBear- a paid application for mobile devices. Uses VPN technology. Has a free version limited to 500 megabytes of traffic per month. Requires customization.
  • Onion pi- a portable device that directs all traffic through the Tor network and distributes Wi-Fi access. Allows you to anonymously access the Internet from a computer on which no programs for anonymous surfing are installed. This can be convenient if you have to work from someone else's or office computer.

Further perspectives

Obviously, in the event that users begin to massively bypass the restrictions imposed by the state on access to Internet resources, censors will take additional measures to ensure the blocking of prohibited sites. Methods for limiting the network activity of citizens can be both purely technical and police.

The most popular proxy servers and Tor exit points can be blocked. Private individuals may not be allowed to use VPN. However, it is almost impossible to restrict the use of I2P and products like the JAP program. SSH tunneling will also remain a reliable way to get around the bans.

Effective censorship on the Internet is possible only if the country is completely disconnected from the World Wide Web, similar to the way it is implemented in North Korea. In all other cases, you can always find ways to get to the information you need.

From other people, but we ourselves often find ourselves in their place. And if many still agree to put up with the unavailability of certain websites at work, then at home - sorry. However, neither timely payment for home Internet nor civil rights and free speech guarantees us unhindered access to all web content. Resources that have entered the register of prohibited in Russia, for example, many popular torrent trackers, are closed from us with seven locks.

Fortunately, blocking sites, even at the provider level, is not a bulwark. No matter how hard Roskomnadzor tries, we will still find the keys to them. Today you will learn how to enter a blocked site by all available means without breaking the law.

Anonymizer is an intermediary node (web proxy) between the user and the target resource, designed for anonymous surfing of the network, as well as - access to blocked sites.

How anonymizers help bypass blocking: when you open any Internet page, the request is transmitted to the provider's devices, where the name and IP of the site are checked against black lists. If the resource is available, the request is sent to the target server and the browser downloads the content. If closed, the provider redirects the user to the stub page. For MTS, it looks like this:

At Beeline - like this:

Other providers have it in their own way, but the essence of the message is the same: access to the site is denied. And the point.

When accessing the same site through the anonymizer, the provider's network devices see only the data of the anonymizer. And since it is not on the black list, nothing limits the loading of the target resource.

Using the anonymizer is very simple:

  • open his page;
  • in the "Open" field, enter the URL of the target site and click the transition button.

Unfortunately, today many popular anonymizers are also blocked. Only the most harmless ones remained - those intended for opening VKontakte, Odnoklassniki, Facebook and other similar portals, which are usually not allowed to visit at work. And of those that help unblock the sites of the Roskomnadzor blacklist, the absolute majority has been closed.

At the end of January and beginning of February 2017, the following free anonymizers are available:

  • NoBlockMe - Provides alternative access to social networks and LiveJournal.
  • Pingway - for accessing social networks and YoutTube.
  • Anonim.pro - unblocks social networks, YouTube, dating sites, Avito, Tanks online.
  • Anonymouse
  • Anonymizer.ru - for any Internet resources.
  • Guardster is also for everything.

When opening a site through an anonymizer, you may encounter problems:

  • Incomplete loading of content. The page may open without pictures, audio and video, buttons may not be pressed, the menu may not work, etc.
  • Displaying pages in a distorted form - with displacement of blocks, crawling text onto pictures, etc., up to complete unreadability.
  • The inaccessibility of web resources transmitting data via the https protocol.
  • Overly intrusive display of ads - huge banners, pop-ups, constant redirects to other web resources. It is possible to secretly install adware (from the word adware - adware) and spyware on your computer, which you will then have to struggle with for a long time.

To reduce the likelihood of this, use anonymizers tailored for the content you need, for example, social networks. Or use other methods to bypass the blocking.

"Chips" of browsers

In regular web browsers, there are no special tools that allow you to open blocked sites, but there are options for which this action is "side". In Opera and Yandex Browser, such a tool is Turbo traffic saving mode. So, if you want to speed up the opening of slow-loading pages, you will receive a nice bonus in the form of free access, for example, on Rutrecker.org.

In Opera, the Turbo option is turned on in the main menu.

In Yandex Browser - in the main settings.

There is no Turbo mode in Google Ghrome and Mozilla Firefox, but Google Translate can be useful in them for our purposes. The translated site opens in a separate frame, and access to it is no longer blocked.

If you have never used the Google translator, we will explain how to do this: in the left window, paste the URL of the page you want to open and select the original language. Even if the page is in Russian, the original should be assigned a foreign one, for example, English, and the target language should be Russian. Then press the button "Translate".

The result of opening Rutrecker.org, as you can see in the screenshot, turns out to be quite decent.

Another way to bypass site blocking is to enter not a name in the address bar of your browser, but an IP address, which Whois services will help you determine. For example, this one.

Unfortunately, the "tricks" of browsers are not 100% effective: some sites Google does not translate, in Turbo mode they also remain blocked, not only by name, but also by IP.

Special browser extensions

If you are unable to access the site using your own browser tools, a third-party extension can help solve the problem. One of the most popular tools for this purpose is FriGate (the link is given to the Chrome store, but it exists for other browsers).

FriGate encrypts and forwards some of the web browser traffic through its own VPN server. This not only restores access to sites when blocked, but also speeds up the connection.

In addition to FriGate, a lot of free extensions also have similar functions. Here are some of them:

Some of them, after installation, need configuration, for example, creating custom lists of web resources and rules, others have only an on / off button and nothing else. Some extensions provide a choice of 3-4 available proxy servers, others do not. Use what suits you best, since there are many options. At least one will work.

Free VPN clients for Windows and other platforms

The main purpose of a VPN is to create closed communication channels to protect network traffic from leaks and outside access. However, this technology is also used to visit blocked Internet pages. Unlike anonymizers, which redirect a request to a single site, and browser extensions that pass traffic from a single web browser through a proxy, VPN applications direct all computer network traffic to a closed channel.

Services for accessing VPN servers through a client program are usually paid (they cost $ 1-50 per month, depending on the bandwidth and the availability of additional options), but there are several free ones.

The best free VPN client for Windows, Mac OS X, Linux, and mobile platforms, according to the author, is CyberGhost 6. Here are its most significant advantages in comparison with analogues:

  • No traffic limits. Most free applications of this format limit traffic to about 500 mb per month or for the entire period of use. If you need more, sign up for a paid subscription.
  • Sufficiently high connection speed. The bulk of free VPNs keep it to a minimum.
  • Large selection of available servers around the globe. Many free counterparts offer only one server, which is located somewhere in the US and is constantly overloaded.
  • Several preset profiles for different tasks (only half is available without payment, but it is quite enough for most tasks).
  • Can be used to access any type of web resource. Supports almost all types of traffic: streaming video, online games, social networks, etc., limits p2p.
  • Easy for beginners to learn.
  • Russified.

To get to a closed site using CyberGhost 6, you just need to launch the program and select one of the available profiles.

When you select the anonymous surfing option (yellow tile), you just need to set the browser download mode (normal or incognito) and specify the desired VPN server.

When choosing to unblock basic websites (blue tile), you just need to click on the corresponding icon.

Tor browser), which implements onion routing technology for Internet traffic.

The principle of data transmission over the Tor network differs from the usual one in that all transmitted information is repeatedly (layer-by-layer) encrypted and follows a randomly built chain of proxy servers absolutely anonymously. Neither the intermediate nor the end-node is informed about the originator of the request and the route of the traffic. Each server reads exactly the information that is needed to transfer the packet to the next node (figuratively removes its own layer of onion husks). Such a system provides the user with maximum privacy and makes tracking his traffic, if not impossible, then very difficult.

No method of blocking web resources withstands Tor's onslaught. But only if Tor itself is not closed. Unfortunately, in Kazakhstan and Belarus, many ways of connecting this wonderful instrument are blocked at the state level. In fact, this makes it impossible to use it by the bulk of the inhabitants of these countries.

Tor is not yet banned in Russia, and its use does not threaten you with any sanctions.

Allows the competent authorities to extrajudicially block access to any Internet resources on the territory of Russia. Officials were given the opportunity to arbitrarily close absolutely any site for users inside the country, which, for reasons only known to them, seemed “unreliable” and “extremist”. This was clearly demonstrated with all decisiveness and cynicism.

In the early nineties, we naively believed that the times of censorship and persecution for thought crimes remained far in the Soviet past, but today in Russia lists of prohibited books and “extremist materials” are being actively compiled and people who dared to publicly declare their disagreement with the “only true” official point of view. De facto, the effect of fundamental articles 29 and 31 of the Constitution of the Russian Federation, which declares freedom of speech, freedom of thought, freedom of information and demonstrations, and article 19 of the Universal Declaration of Human Rights, which proclaims freedom of information as one of the most important political and personal human rights, has been canceled.

In these conditions, we are forced to return to the topic of bypassing the blocking of Internet resources - in order to restore the inalienable constitutional right of citizens of the Russian Federation to freely receive and disseminate information.

1. "Turbo mode" in Opera and "Yandex Browser"

The simplest and still quite effective way to access sites blocked by your provider is to use the "Turbo" mode built into the Opera and Yandex Browser browsers. Initially, this mode was intended to speed up page loading on slow connections: traffic from the requested Internet resource is previously transmitted to the browser's Internet servers, where it is compressed and optimized - and only then is transmitted to the client's computer.

In addition to actually speeding up downloads, this mode allows you to access blocked resources, since for the provider such traffic looks like data from harmless servers, so Turbo also acts as a free proxy anonymizer that does not require any settings at all.

To enable the "Turbo" mode in Opera, you just need to click on the corresponding icon in the lower left corner of the window, and in the "Yandex Browser" you need to go to the settings, click on the "Show advanced settings" button at the bottom of the page and find the "Turbo" item.

The problem is that sooner or later the Opera and Yandex.Browser servers themselves may be blocked at the provider level, and this function will simply become unavailable. In addition, in the case of Yandex, whose servers are located on the territory of the Russian Federation, the pages blocked for display in our country by the content provider themselves may not open, which we can already observe: Alexey Navalny's LiveJournal opens perfectly in Opera (via foreign servers), while Yandex Browser issues a "stub" about its blocking on the territory of Russia.

2. Stealthy and friGate plugins for Chrome and Firefox browsers

If you use Chrome or Firefox browsers, you can install the Stealthy plugin to access blocked resources, which allows traffic to pass through foreign anonymous proxy servers. To enable the plug-in, just click on the corresponding button: green means that the Stealthy mode is enabled, red means that it is disabled.

Stealthy also has a free online service, but it is less convenient and for some reason does not work as reliably as the plugin.

The main disadvantage of any web proxy is a significant decrease in the speed of access and page loading.

4. Virtual private network (VPN)

A radical way to gain access to any network resources without restrictions is to set up a virtual private network (VPN). As a rule, VPNs encrypt all traffic transmitted through them and redirect it through a whole chain of servers, which provides a very high level of anonymity (unfortunately, not absolute, since many VPN providers undertake to cooperate with law enforcement agencies, which is separately noted in the user agreement).

In most cases, a VPN is a paid service, but there are also simplified services that provide the user with minimal functionality for free. In particular, VPNBook offers completely free VPN services with cross-platform OpenVPN or Point-to-Point Tunneling Protocol (PPTP) support. Both of them are not secure enough if you are interested in special services or professional hackers, but they are quite suitable for the average user.

VPNBook does not require registration or account creation. Moreover, if you intend to use the PPTP protocol, then you do not even need to install any additional software. It is enough to select a new connection in the settings of network connections of the operating system (supported by Windows, Linux, Mac OS, Android, IOS, PS3) and enter the parameters specified on the VPNBook website. Some ISPs block the PPTP VPN protocol, in which case you will need to download and install the free OpenVPN client to bypass this limitation and operate over standard TCP or UDP protocols.

5. Tor browser

"Classics of the Genre" - Tor browser based on "onion routing" technology. Its meaning is that all transmitted data is repeatedly encrypted and decrypted, passing through a sequence of "onion routers", each of which redirects them to random routers on the Net. As a result, the need for guaranteed reliability of each of these routers is lost, since it is impossible to determine where the data was originally transmitted from. Of course, like any other, this technology also has vulnerabilities, but if used correctly, it guarantees a very high level of security.

6. I2P network

An alternative to the Tor network is the second best known anonymous decentralized distributed I2P network. It is a kind of add-on, a "network within a network", a set of encrypted tunnels that provide a high level of anonymity and security for all users. I2P provides the ability to access resources both within the network itself and on the "external" Internet, for which, as in Tor, special gateways are used.

To access sites via HTTP, you will need to download and install the I2P service and then configure your browser to use an HTTP proxy on IP 127.0.0.1 through port 4444. Detailed instructions, links and a description of I2P network capabilities can be found in the files attached to the distribution service. Nice quick setup and setup instructions can be found

Do you like that someone decides for you which sites to visit, what to read, what to watch, what to download, with whom to communicate and how to live? To me - definitely not. Meanwhile, the practice of blocking web resources for certain offenses is spreading wider and wider.

Almost every week we hear about the closure of one or the other Internet portal from Russian visitors. Plus, employers do their bit. We will not, looking at this, sit back! Let's talk about how to bypass site blocking in simple and free ways.


How to bypass site blocking: fast, easy and free

VPN

VPN(virtual private networks) are used not only for access to corporate or private intranets, but also for anonymity on the World Wide Web. Unlike browser extensions, they pass all computer or local network traffic through the proxy.

To surf closed sites, you need to install a VPN application. Most of them, unfortunately, are paid, but I have selected a few free ones for you.

The best free VPN service in my opinion is Freemer.org. He:

  • Russian-speaking.
  • Understandable.
  • Has no restrictions on the volume of traffic.
  • Supports a directory of frequently visited sites, which you can create yourself. You just go to Freemer.org, add the desired web resource to the list and after a while it appears in the application. It is more convenient than using browser bookmarks.
  • Works automatically. It has no manual settings, which means it will not allow you to get confused or do something wrong.
  • Always chooses a server that can provide the most stable and fastest connection to the required web resource.
  • Reliably protects your real IP and all transmitted data from leakage into the hands of strangers.

How to use Freemer

To add a blocked site to the Freemer directory, go to, enter its URL in the field shown in the screenshot and click the add button.

To go to any resource already included in the list, run the application and click “ Site directory“. Or enter its URL in the address bar and click “ Find“.

Once you find the website you want in the catalog, just click on its thumbnail. In a few seconds it will open on the same page.

Want to get to RuTracker.org? No problem! And by clicking on the star in the upper right corner of the window, you will add it to the visual bookmarks of the Freemer browser.

To get additional information about any site from the catalog - description, search tags, a screenshot of the main page, click on the thumbnail button “ More details“.

To quickly go to this site from the description page, click “ Play“. It's that simple!

In second place on the list of the best VPNs, I would rate it for:

  • cross-platform - works under Windows, Linux, OS X, Android and iOS;
  • conducts proxying through servers of different states;
  • does not impose restrictions on the volume of traffic;
  • provides a good connection speed;
  • reliably hides the original user data;
  • makes it possible to replace information about the operating system and web browser.

Other VPN service applications:

Bypassing blocking using anonymizers is convenient and beautiful, but not without a flaw. The disadvantage of all such services is limited support: for example, they are useless for access to game and multimedia portals. Often they do not open well with multi-structured web resources - with numerous scripts and complex transitions. It happens that the design of pages is distorted - blocks are displaced and the text spreads. In a word, it is better to use anonymizers for what they are "sharpened" for.

Turbo Browser Mode

Turbo mode, which speeds up the loading of web content, is also used to access blocked sites. True, not to everyone and not everywhere. Working in turbo mode, the browser does not route traffic along the usual path, but through a proxy server (intermediate network node), where data is compressed. Bypassing the block is an undocumented feature and a nice gift to users.

Option " Turbo»Is by default in Opera, Yandex.Browser and some web browsers for mobile platforms. In the rest, it must be installed as an extension.

In Opera, the button for activating the turbo mode is in the main menu:

In Yandex.Browser, the function is enabled in the settings:

Turbo extension for Google Chrome is called "" (Traffic Saving), and Mozilla Firefox, unfortunately, has no analogues today.

Browser extensions

To access blocked resources, it is convenient to use anonymizers in the form of browser extensions that direct web traffic first to proxy servers, and from there to the vastness of the global network under changed IPs. So, if the site is closed to visitors from Russia, the IP-address of another country will serve as a "key to the front door" for it.

The friGate CDN extension is designed to remove the blocking of resources that have come under the sanctions of government agencies, by the way, today our favorites are among them. The list of disgraced pages is stored in the application itself, and the user has the ability to replenish it.

Proxy servers are located in different states. When you open a prohibited page, a small window will show you under the flag of which country you are here. If you want to select a different server, click on the flag image.

friGate is supported by Opera, Mozilla Firefox and Google Chrome browsers.

There are other extensions with similar functionality:

Unlike friGate, Zenmate, Browsec and Hola encrypt and redirect all browser traffic to servers scattered around the world.

Tor

The final bypass bypass in today's roundup is. It uses onion routing technology, the essence of which is that all transmitted information is repeatedly (layer-by-layer) encrypted and passed through a chain of intermediate nodes. This provides the highest level of anonymity and guarantees access to any blocked sites, although it significantly slows down the connection.

For constant surfing the Tor network, as a rule, is not needed, but when all the possibilities to get to the treasured resource are exhausted, only he saves.

And one more question worries many: by using means of bypassing blocking, are we breaking the law? Not! None of what I talked about in the article is prohibited in Russia. At least today we are not threatened with any punishment for this.

Hello everyone! I am in touch with you again, Alexey. In this short post you will learn how to enter a blocked site by Roskomnadzor. Very interesting right? Surely you have come across resources on the Internet that you could not open.

Sometimes it happens that some resource becomes inaccessible on the Internet by the decision of Roskomnadzor. And as a result, you cannot load the site due to the fact that it is blocked by your provider. For example, the same torrent tracker rutracker.org was blocked at the request of the copyright holders. That was a year ago and to this day it remains blocked in Russia. You can check it yourself. This is how it looks:

In general, after reading this article, you can go to absolutely any site. It also happens that some foreign resources are restricted by access to visitors from other countries. Or, for example, you are abroad, and you need to open your favorite site, which is not available.

So how do you learn how to open blocked sites? There is more than one way. Although the principle is the same, but in a different design. Now I'll tell you everything, read on.

What is the principle?

As I said, the principle is the same, but the execution is different. In order to download a blocked resource, you must be in another country. Who would move for such a trifle? No one. That is why, and not only because of this, there are so-called intermediaries. That is, this is a computer that will be located in another country and which will be able to transmit its traffic to us. They are called proxy servers. There is also VPN networks. All this can be paid or free. Actually, in this way we will get access to any site. This is the principle - to use an intermediary between the user and the Internet.

A proxy allows several computers to access the Internet through one, which is actually a proxy server. That is, you can set up a local network at home or at work by connecting several computers, one of which will have an Internet connection. For implementation, you need special software. I will not go into details. I just wanted you to know about this Additional information about the essence of the proxy so to speak.

VPNs are a little different. This is a completely different technology, but nevertheless it will be an intermediary. You will go to the private network and go to the global

Turbo mode in Opera and Yandex Browser

The easiest way to open a locked resource is to turn on turbo mode. In normal mode, the browser acts directly, immediately addresses the server of the site you need. If the turbo mode function is enabled, then your web browser accesses the Opera or Yandex Browser servers. Depending on what you are using. The server accepts the request and "goes" to load the web page for you. After downloading, he transfers it to you. This is how it works. In addition to this feature, the servers will compress the traffic transmitted to you. Actually, this is the main purpose of such an opportunity. It is no coincidence that "Turbo" is called

True, this does not always work if you are going to load sites through a Yandex browser. This is due to the fact that some Yandex servers are located in Russia. Therefore, this trick may not work. But you can always put an add-on and not think about it. By the way, since I'm talking about extensions, I suggest you read the post here. There I talked about add-ons for Yandex Browser.

How to enable turbo mode in Opera: click on "Menu" in the upper left corner of the screen and select "Opera Turbo".

How to enable turbo mode in Yandex Browser: Enter the string in url - browser: // settings and go down to the very end without opening the "Advanced options". Check the box "Always". Or follow the link browser: // tune and activate the mode.

Dedicated browser extensions

There are special extensions that help you change your ip address. When enabled, the web browser communicates with the site server through a proxy. I have provided examples of extensions below.

  • For Firefox: anonymoX
  • For Opera: ZenMate VPN
  • For Yandex Browser and Chrome: FriGate

FriGate is already in the list of add-ons in the web browser from Yandex. You just need to activate. Go to the address browser: // tune and turn it on.

For Chrome or Yandex Browser users, I suggest using an extension that will help save traffic and visit blocked sites in one go. Google developer. You can download it here. Truth does not work with HTTPS requests.

Special versions of browsers

I never use this option. Somehow it did not take root. Such browsers immediately work through several proxy servers, thereby helping to maintain deeper anonymity on the network and give access to all resources on the Internet. I want to note that when using such web browsers, sites load much slower. This is either anonymity and access to resources, or speed. Have to prioritize

Here is one of them - Tor Browser. There is also Globus. Which one to download is up to you. Both are analogues of Chrome in terms of interface. However, I recommend the first option.

Web anonymizers

Web anonymizers are a resource on the Internet with an input form. Everything is simple here. You need to enter the url of the resource that you want to open. Great for occasional use. The internet is full and easy to find. I personally use hideme.ru. Through the site, you can go to any others in an anonymous state.

There is another good anonymizer called chameleon. I suggest you try it out. Here it is .

Online text translators

With the help of such services, you can open a blocked site for a couple of times, and still get a translation. I use Google Translate. I have never failed! Just copy the link into the first translation form, the second one will have an active link that you can click on. Click and enjoy bypassing site blocking

Computer programs

Yes ... There are also programs that will help in solving this problem. In addition to the web anonymizer, hideme.ru has a program that you can freely download and install on any operating system. That is, even to your phone with android or ios (iphone). You can try the full functionality for free for just one day. Then you have to pay.

For those who do not want to pay, I propose to cheat! You are given a unique key that is tied to your E-mail address. In the free version, it is valid for 24 hours. You can get a new one by entering another E-mail. Everything is logical. But every time registering E-mail addresses is not so hot, so you can find mail for 10 minutes. Search the internet. Or do as I do, create a new mailing address in the existing one. This function is in mail.ru but also in yandex.ru, it seems, too. In gmail, I don’t know how. For mail.ru you need to go to the mail settings and you will see there at the very end. Here is a link if that.

Proxy Switcher

In principle, a normal program. Finds just a bunch of servers to connect to. One thing worries me. I don't know where all these servers come from, honestly. Perhaps they just have a base that is being edited. Do not know. But the program is shareware and a lot of people mention it, so it gives me a little confidence.

Proxifier

Simple proxy client. To use it, you need to know the ip address, port and version of the proxy server in order to configure it. To find all this, you can use the Internet and find free proxy lists.

Hide ip easy

Another program to hide your ip. You will be able to open blocked sites, depending on the country you selected, and remain anonymous. True, it is paid

Underwater rocks

I decided to tell about them last. I will not rant too much. Briefly and clearly. If you have any questions, please write in the comments.

In general, the danger lies in free proxy servers. If it belongs to an intruder, then you may regret it. But what could possibly happen? The thing is that traffic will go through his server, thereby giving him the opportunity to dig into it. Let's say you entered the site by entering your username and password. The chances are that an attacker will be able to dig them up. By the way, this is done when distributing wi-fi, in a cafe, for example. As a result, he will receive login data, and then you cry bitterly.

So it goes. But not always free, it means bad. Although, of course, it is better to use paid, knowing this information. Or carefully choose a proxy server to avoid such situations.

Conclusion

In order to be able to access a blocked resource on the Internet, an intermediary is needed. A computer that is located over the hill In order to use it, you need special programs or extensions. I wrote about all this above.

Moreover, VPN and proxy servers help you stay anonymous on the Internet, which reduces the risk of attacks on your computer or mobile device. Unless, of course, you are connected to the attacker's server.

That's all dear friends! If you have any questions, be sure to write in the comments. Also suggest on my blog so as not to miss new posts. See you later!