Home >petition >Despite cutting the Internet and mobile network .. These applications allow you to communicate
Jul 26By smarthomer

Despite cutting the Internet and mobile network .. These applications allow you to communicate

We hear a lot about the establishment of a government in a country to withhold some websites or social media services from its citizens in cases of popular demonstrations and protests, as happened during the Arab Spring revolutions;How can this block be skipped?

How is the blocking? Regardless of the reason that led to the blocking, the methods are almost one.Some of the supplies (servers), for example, obscure access to any site that contains in its link on a specific word, and others prevent access to a specific link.

Some of them resort to blocking the Internet protocols (IP) to prevent access to them completely, or the firewalls may be used to prevent a specific port (Port);And that is when you want to block private virtual networks (VPN).

Because of the different methods of blocking, the means of transcending it also vary and vary.Sometimes, the user may have to use more than one tool to reach its goal.Given the many solutions, we will review here the easiest and most common:

We sites to skip the "ProxFree" blocking.com) and Hidemyass.Com) One of the websites that provide blocked sites services, and when entering one of them, the user writes the blocked site link so that the tool will exceed its blocking and display its contents, but this method may not succeed if the two sites mentioned are already blocked.

Google Search Engine when Google Search Move and Writing a search phrase for a published report, for example, on a Mahjoub site, an arrow will appear alongside the search result, and when you click on it, an option entitled CACHED version appears, and by clicking on it, the user is transferred to an archived version inside Google servers for the same report as possibleRead it;But this method does not work if the blocking is used according to a specific word within the link.

Web browsers and their additions to browse the Hotspot Shield. The browser additions can be used if the previous solutions are not successful, the most famous of which is the "Hotspot Shield" available to Google Chrome and Firefox..The company also provides applications for all operating systems including "Windows", "Mac OS", "Android" and "iOS".

Installing the addition in the browser would facilitate the process of overcoming the blocking, after the installation its icon will appear after the address bar, and once you press it and choose a "connection", the process of securing the communication and encryption of all data begins, as the color of the icon turns from orange to green to indicate that the communication is secure;This does not only allow the blocking of the blocking, but by protecting the user's privacy while browsing the Internet.

Opera (Opera) provides an Opera browser in its new version, private virtual network.

وبعد تثبيت المُتصفّح يتم التوجه إلى التفضيلات (Preferences)، وبعدها يتم اختيار الخصوصية والأمان (Privacy & Security)، وأخيرا تفعيل خيار "في بي إن".

The previous steps will lead to the appearance of a new button before the address bar in the name "PNN", and by pressing it begins to secure the communication and the color of the button from gray to blue is a sign of its work.

The distinguished in the "Opera" browser and its tools is the presence of more than one servant, and therefore even if the provider blocks a servant, there is a possibility to benefit from the rest of the servers that are constantly changing.

Tor provides a very high protection tool, it is also used to reach the Deep Web, and the Dark Web, as it offers a safe browser based on a copy of Firefox.

The user only needs to download the tool and run it to start the encryption process completely..

Besides the above, there are other ways to skip the blocking such as the use of proxy, and the change of a range server;And the use of these two methods is not easily the previous ways, so we ignored them here.

رغم قطع الإنترنت وشبكة الجوال.. هذه التطبيقات تتيح لك التواصل

Smartphone applications to open blocked sites beyond blocking are not limited to computers, as many smartphone applications that allow users to open blocked sites are available.

Opera VPN, which is a free application that secures the user's connection and helps it overblock while browsing the Internet.

PurevPN allows this application to the user - a simple monthly subscription to the selection of the country from which it browses, and therefore when using services such as "Netflix" - for example, but not limited to - it is possible to access the content of the United States of America or the Middle EastBy defining the required state from the list.

"Tunnelbear" and "Cyberghost", which are solutions that provide limited free subscription, but at the same time it provides a program to ensure the user rights and the ability to restore his money in the event that the service is not done optimally.

Firechat users is a firechat.

According to the developed company, this application works even without an internet connection or coverage of mobile networks, and all that requires a few people around you using it, as it depends on Bluetooth and Wi -Fi.

Brian (BRRAR) This open source app, and also allows sending private direct messages and creating special groups, with the ability to publish mini blogs that you can only read..

The developed company says that the application is designed for activists and journalists for safe correspondence among themselves.In the event that the Internet is broken, the application can sync via Bluetooth or Wi -Fi, and if the Internet returns, it can synchronize via the Tor network to protect users from censorship.

Bridgefy, which is a correspondent application that allows users to chat safely with their friends without internet or short text messages, but only using Bluetooth technology, and therefore it is useful for transferring information quickly and secretly between users in gatherings provided that all parties have proven this application in their devices.

This app works in two patterns: The first is the personal style that provides chat secrecy with others, the distance between them does not exceed a hundred meters.

The network pattern that allows chat with others exceeds the distance between them a hundred meters through the presence of others in the middle who use the same application, where the person in the middle works as a mediator to transfer the signal to the farthest..

"Qau" application.NET) This application - which was developed with inspiration from the Tahrir Square demonstrations in Egypt in 2011 - can be accessed via the "QAUL.Net ", download a version for Android phones or office computers operating systems (Windows, Obonto, OSX).

The application comes with many features such as direct private messages, sending files and conducting audio conversations.

Silence This application is to encrypt SMS (SMS) or multimedia messages (MMS) and thus you will be able to messages, media or attachments with friends with complete privacy, according to the company developed for the application;But this requires his presence on the devices of both parties used.

Treblesshot This open source application provides an easy way to send and receive files from one phone and another without an internet connection, but like previous applications must be installed on the devices of both parties.

As note, all previous applications work even with the malfunction of the mobile network or internet interruption, as each user contributes to the transfer of messages to others by passing them automatically from one device to another (via Bluetooth or Way-Fi) to its final destination, while keeping the messaging confidentiality betweenThe sender and the sender, but the matter requires the presence of the application (or applications) pre -installed on user devices.

These are some solutions to overcome the blocking of websites or social media services, but they remain proposed solutions and their collectors may not succeed, and for this reason the user himself needs to search for the best solution for the country or the geographical location in which it is present.