123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

The Reason I Can't Use Facebook

Profile Picture
By Author: Bob Smith
Total Articles: 203
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

When I began my new job I'd a serious difficulty - boredom, there just wasn't enough function to do That does not sound too awful, but it was over a night-shift and there was nearly no one else to talk to.
The job involved switching computer cassettes and disks onto an old mainframe. It was the sort of machine that cost millions years past, and nobody appeared to want to upgrade it. The amount of work changed but occasionally I'd go for an hour or two without doing anything. It was occasionally quite challenging with the hum of airconditioning and the server room making it even more difficult to remain alert.
My manager would not have minded me filling out the hours by surfing the web, maybe browsing Face Book but regrettably it had been all blocked. This was to discontinue the day staff from squandering their days, but sadly it afterward applied to me too.
I discovered how it was blocked, it was through a small apparatus called a content filter which also looked within the content for just about any requests and prevented accessibility to the Face novel URL.
The trick I found was to use a mix of techniques, ...
... first you needed to use a proxy to relay your petition to Face Book or the blocked website. Second you had to use some type of encryption so that the content filter couldn't read the contents of your petition. In this scenario it'dn't see any mention of Fb and thus allow the petition.
It works in pretty much the exact same manner anyplace, even in these nations that are occasionally blocked from getting websites like Fb. In fact on a nation grade the filtering is much less complex and easier to bypass.
They did therefore by simple DNS poisoning, when Turkey recently blocked entry to Twitter. Meaning that when you request the IP address of Twitter, you received a bogus one from the ISPs DNS servers, which instead routed you through to some Authorities written page. Or you can avoid using others pop in a hosts file and resolve the addresses manually and DNS servers to some extent. But unfortunately most corporate networks are somewhat more advanced than that.
Anyhow you may find these sorts of applications but unfortunately they're rather costly to perform so I did not locate any free ones. What you want though is a proxy/VPN service which enables a level of encryption - it also needs to be fast as a small overhead is added by encryption.

Total Views: 298Word Count: 417See All articles From Author

Add Comment

Computers Articles

1. Few Good Insights To Follow With Pc Gaming In Australia!
Author: Jack Williams

2. Transform Your Online Store With Australia's Leading Ecommerce Developers
Author: themerchantbuddy

3. How To Choose The Right Technology For Your mobile App?
Author: goodcoders

4. The Rise Of User Centered Web Design
Author: goodcoders

5. Reasons Why Laravel Perfect For Web Development?
Author: goodcoders

6. Ssd Vs Sas Vs Sata Drives: Which Is Better For Your Dedicated Server Hardware?
Author: The CyberTech

7. Raid Servers And Data Protection: Common Myths About Raid Servers
Author: The CyberTech

8. Top 8 Do's And Don’ts When Dealing With A Corrupted Sd Card
Author: The CyberTech

9. Nvme Vs Ssd: What To Choose For Your Storage Solutions?
Author: The CyberTech

10. 8 Common Data Recovery Myths Exposed!
Author: The CyberTech

11. Understanding Ssd Lifespan: Signs, Durability, Data Recovery, And Factors Affecting The Life Of An Ssd
Author: The CyberTech

12. Server Data Recovery Solutions: When Your Raid Server Is Crashed!
Author: The CyberTech

13. Data Recovery Solutions For Undetected Ssd On Bios
Author: The CyberTech

14. Problems Faced By Mobile Phone Users: Green Line Issue, Motherboard Failure, Phone Stuck On Logo And Mobile Data Recovery Possibilities
Author: The CyberTech

15. Ssd Vs Hdd: Weaknesses, Data Recovery Factors And Failure Rates
Author: The CyberTech

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: