How to open blocked pages. How to send giant files

Hello, dear blog visitors and readers!

Today we will discuss this current topic, How blacklists of sites and methods for bypassing blocking. As you know, in the fall the Government Resolution on amending the the federal law No. 139-FZ "On the protection of children from information harmful to their health and development", and the so-called “Register of Prohibited Sites” was created. It would seem, what's wrong with that? These are good intentions, there is no point in posting drug addiction, suicide and porn with minors online. But not everything is so simple with this “register” and the law.

  • Firstly, I am an adult, and the very fact that I am told what to do, how to do it, what to read and what to be interested in irritates me.
  • Secondly, because of this innovation and the imperfection of the blocking methods themselves, completely harmless sites.

According to resource statistics RosKomSvoboda, as of mid-April 2013, the picture with blocking looks something like this:

This is due to the fact that if regulatory authorities decide that a particular site contains prohibited information, then this resource is easily blocked by IP address. And they don’t think that in addition to the “harmful” site, there may also be other sites on the same IP address. dozens and hundreds of other sites!

With this article, I in no way encourage you to visit sites promoting drugs, sites promoting suicide and other “forbidden” sites. But those mistakenly included in this register are easy!

To begin with, let's briefly look at how the Internet generally works from the perspective of a user accessing a particular site (server).

Websites, in addition to the main domain name (for example, a website), also have a specific IP address. which can be either individual, dedicated, or general. You can get to the site not only by entering the domain name in address bar browser, but also by entering the IP address. But this is completely inconvenient. Just imagine if, instead of www.yandex.ru, we constantly had to dial 213.180.193.3. Extremely inconvenient.

In order for us not to need to remember the IP addresses of all known sites, there is DNS, which distributes addresses on the Internet.

DNS – Domain Name System, i.e. domain name system.

So, when we type, for example, google.com into the address bar of the browser, our computer first connects to the provider’s DNS server to find out where exactly the resource we need is located. And after that, the browser already receives the IP address of the site, connects to it directly, and in the browser window we see our favorite search engine. Schematically, this can be depicted something like this:

So, here are the “black lists of sites,” that is, the Register of Prohibited Sites consists of two types of entries:

  1. Blocking a website domain name
  2. Blocking a site by IP address

And to bypass domain blocking, just use public DNS, For example:

  • Google Public DNS: 8.8.8.8 / 8.8.4.4
  • OpenDNS: 208.67.222.222 / 208.67.220.220
  • Comodo Secure DNS: 8.26.56.26 / 8.20.247.20

How to register DNS in Windows OS

In order to register public DNS, you need to go to the settings of the Network and Sharing Center shared access". To do this, just left-click (LMB) on your connection icon (number 1 in the figure), and then select “Network and Sharing Center” (number 2):

You can also access this “Control Center...” through the “Control Panel”. Next, we need to select the connection through which we access the Internet and click LMB on it:

After which the connection status dialog box will appear, where you need to click on the “Properties” button.

Next we will see the properties window for our connection, where we need to select " Internet Protocol 4 (TCP/IPv4)"We click on it twice with LMB and see a new window with the properties of this protocol. This is our final goal. We check the box "Use the following DNS server addresses" and manually register the preferred and alternative DNS servers (in the figure there is an example of using DNS servers Google, you can use any public DNS)

Well, that’s all, basically. Don't forget to click "OK" when closing the properties windows.

Thus, if some resource is included in blacklist of sites by domain name , then by changing your provider’s DNS servers to public ones, you will certainly be able to access this resource, despite its blocking. In general, I recommend using public DNS servers not only to bypass website blacklists, but also to daily work. From now on you already know how to register DNS.

Now let's consider the second option for blocking resources - by IP address.

How to bypass the registry of prohibited sites blocked by IP

There are quite a few ways to bypass such blocking, and they consist in the fact that if we are not allowed to directly connect to some server (site), then we will do this using an intermediate server from which access to this site is allowed. This becomes possible because these intermediate servers are located, as a rule, outside the direct jurisdiction of the Russian Federation, i.e. outside the country, and our laws cannot influence the routing and access to any resources through these servers. Schematically it might look something like this:

So we’ll talk about these intermediate servers. The easiest (but not recommended) way to bypass blacklists of sites is to use online anonymizers.

Anonymizers (Web proxies)

To get to a blocked site using an online anonymizer (sometimes also called - anonymizer, which is not entirely correct), first of all you need to go to this anonymizer site. There are a sufficient number of them on the Internet, but I do not recommend using them little-known services, and even more so if, when you access such a site, the antivirus starts to “swear”. The most famous anonymizers are perhaps:

Just go to any of them, and in the field for entering the site address, enter the required one. For example, on the website HideMe.ru I entered the address whoer.net into the line to see if my IP address and country would change.

And here is the required result:

Thus, any resource placed in blacklist of sites, we can easily visit and read. But don’t forget that anonymizers are not tools real anonymization, and if you plan to use them for something so bad, then under no circumstances should you do this.

It is also worth noting that many online anonymizers also provide additional paid services, such as elite proxies, VPNs, etc.

A small lyrical digression. Most often, I use the site http://whoer.net to determine the IP address. They position themselves as a service for checking anonymity. Those. checking exactly what information your PC is leaking onto the network. In particular, except standard checks for leaks from JS, Java, Flash, you can check whether your browser is closed for data leakage through a “hole” in the WebRTC protocol (I'm sure it's not closed...) . So, this “feature” of WebRTC is too insidious to forget about. And there are very, very few services for checking browsers for this “vulnerability” on the entire Internet. So enjoy it for your health.

Browser extensions

Some online anonymizers have special extensions for browsers. For example, the HideMyAss service has add-ons for Chrome and Firefox.

Let's look at the functions of this extension using Chrome as an example. Follow the link given above (or search for it yourself in Chrome Web Store, just enter Hide My Ass into the search) and install this add-on. After installation, the configuration page will open. In principle, you don’t have to change anything there, everything will work as is. At the bottom we look for the “Save settings” button and press it, thereby saving the settings. Now a button like this appears in your browser:

If you click on it on any open page, then the same page will open through the proxy server. And if you click on empty tab, you will see this field:

We enter the desired address, and it also opens through a proxy. Everything is very simple and can be done in one click. Extension for Mozilla Firefox acts in a similar way. If you are not satisfied with the Hide My Ass service, you can search in Chrome Web Store other similar extensions. Or just follow the link: Web Proxy for Chrome.

Added later: IN Lately ZenMate extensions have become very popular (for Chrome, Firefox, Opera, as well as mobile app for Android and iOS) and friGate (for Chrome and Mozilla). Highly recommend.

Built-in browser functions (Turbo Mode)

The simplest option for visiting any resource placed on blacklists of sites is Opera browser. More precisely, its function is Opera Turbo .

Initially, this function was designed to save user traffic, because... All visited pages are first downloaded to Opera servers, the pages are compressed and only then transferred to the browser for display. And this function turned out to be very useful after the introduction of these very black lists, because... it acts as a proxy server.

Opera Turbo is very easy to use. We launch the browser, and in the lower left corner we look for this icon, as shown in the figure:

Click on this button (you don’t have to configure anything) and turn on Turbo mode. The button will turn blue and the browser will notify you that the mode is enabled. Let's now see what whoer.net "tells" us about our location and IP address.

In this mode, it sometimes happens that, for example, CSS is not loaded at all, but “bare” html is loaded. Loading speed can be very slow, and if a site takes too long to load, try turning off Turbo mode and turning it on again. Thus, the server will change, and the download may speed up. This method, like anonymizers, does not provide you with any anonymity, and your real IP is visible behind the proxy server.

Turbo mode is also available in the browser from Yandex. But in order to bypass blacklists of sites, it is not very suitable, because... Russian IP addresses, servers and routes are used. But, in fairness, it is worth noting that most blocked sites still open in Yandex Turbo mode.

Added:"Turbo mode" is also available in Google Chrome for mobile OS.

All of these are the simplest ways to bypass the blacklist of sites that are intended only for such purposes, because... They provide absolutely no security or anonymity. Next, we will briefly look at more drastic, secure and anonymous methods. But within the framework of this article only superficially, because The topic is very extensive, and separate articles and manuals will be devoted to it.

Proxy servers

Proxy server– this is a complex certain programs allowing remote clients perform various requests to others network services. Actually, all kinds of online anonymizers are also a kind of proxy, only with a web interface (i.e., a website where we can log in and use the services). We need to register proxies ourselves in the network settings. If you do everything manually, then you can go in different ways.

Browsers that use system network settings – Chrome, Safari, Internet Explorer.

It is enough to configure one of these browsers to work through a proxy, and all Internet connections in the browsers will be proxied (unless separately configured otherwise). You can register a proxy like this (using Chrome as an example): Settings - Show additional settings– Network – Change proxy settings... Standard properties will open Windows browser. On the "Connections" tab, click on "Network Settings". The settings window will open local network. Enter the proxy server IP address and port.

Don't forget to click on the "OK" button after these manipulations.

A proxy can also be registered through the control panel: Start – Control Panel – Internet Options – “Connections” tab. And we will see the same window that we saw when we set up a proxy through Chrome.

Browsers like Mozilla Firefox and allow you to work through a proxy without using system settings networks. That is, if you register a proxy server in Mozilla, then in all other browsers a regular direct connection will be used, and in Mozilla a proxy will be used. It's quite convenient. After all, as a rule, we do not need to constantly work through proxies.

In the picture, I indicated with arrows and numbers the procedure for proxying Mozilla Firefox. In Opere the principle is the same.

Free proxies have significant disadvantages:

  • usually low speed
  • They usually don’t “live” long, and you have to change them often

Oh, by the way, before I forgot to say: when using public proxies, anonymizers, etc. – do not use Internet banking, etc. You never know what kind of software is installed on a server unknown to us, and who owns this server.

How to choose the proxy server we need?

Since our goal today is “”, we are not interested in Russian proxies, we choose foreign ones. We look at the “Speed” parameter – the lower it is, the better. We will not look at the anonymity column in today's context. After all, we want to get to an illegally blocked site, on which there is no illegal information, and, therefore, we also have nothing special to hide. In general, in the screenshot (proxy list from the HideMe.ru website) I have highlighted the most suitable proxies:

That's all about proxies for now. I repeat, this topic is very extensive, and I will return to it later. Let me just say that there are also browser extensions for quick change proxy; proxy checker programs that check proxy lists for legal capacity; programs that are capable of building entire chains of proxies (for example, JAP), etc. In general, proxies (especially elite ones and chains) are mainly used for various illegal actions on the network, by cybercriminals and all sorts of politically objectionable people (such as oppositionists who want to remain anonymous ).

VPN (Virtual Private Network) - Virtual private network

In fact VPN (Virtual Privat Network, i.e. virtual private network) Very useful technology. It is used as corporate level(various organizations to create their own secure tunnel), and ordinary respectable users.

For example, I highly recommend using a VPN connection if you are in a public Wi-Fi networks, since such networks are very often “sniffed”, i.e. various hackers and cybercriminals using special software scan all traffic on such networks to identify various credentials: passwords, logins, Internet banking data, etc. Therefore, the VPN tunnel in open networks simply necessary, because all traffic that passes through it is encrypted and becomes completely inaccessible.

VPN has a number of advantages, relatively previous methods bypass blacklists of sites:

  • very decent connection speed;
  • fully encrypted traffic;
  • very high anonymity if you use a service that does not store any logs, and even if it does, then what do we care? We are not criminals, no one will be interested in us.

One of the disadvantages is that VPN is 99% payable service. But prices don’t always bite. They vary depending on the tariff plan and configuration. And we don’t need “sophisticated” configurations, so if you decide to use the services of a VPN service, choose the cheapest one first tariff plan. We will also return to the topic of VPN more than once on the pages of this site.

Tor (The Onion Router) - very high level of anonymity

Using Tor, you can also bypass any blocking. Moreover, the level of anonymity is quite decent, encryption is present, and if no one is interested in you (law enforcement agencies, intelligence agencies), then you don’t have to worry about your anonymity at all. It is quite difficult to track a particular user using the Tor network. I recently published the news "", it says that they caught one hacker who was caught for quite a long time. And such cases, although rare, are still not isolated.

Briefly and figuratively, the Tor network is huge network computers around the world on which a special software package is installed that allows all users of a given network to use each other as an “intermediate server” (this function can be disabled in the settings so that your computer is not used for these purposes). Moreover, the chains of connections are selected randomly.

The main disadvantage for using Tor for legal purposes, is very slow speed (note: on this moment, after a year has passed since this article was written, the speed in Tor networks already quite high). But this drawback, as a rule, is ignored by those who use it in illegal acts, because low speed pales in comparison to all the capabilities of this network. For greater anonymity and security, Tor is sometimes used over a VPN. Or vice versa.

You can download Tor on the official website. Now there is such a package as Tor Browser Bundle , having downloaded and installed it, you can immediately start working.

Many other projects are based on Tor, for example, OperaTor, Tails OS, Liberte, Whonix, etc.

I2P (Invisible Internet Project) - maximum degree of anonymity

I2P is almost impenetrable anonymity. Overall the implementation is similar to Tor, but with some "improvements". In general, everything there is simply “focused” primarily on encryption. Everything possible is encrypted, every packet, and more than once. The network also has very complex routing of these encrypted packets, which can change every N minutes. It is probably unrealistic to de-anonymize someone on this network.

I2P is, of course, more for hackers, cyber and other criminals than for the average person.

Added: In connection with the recent strict control over the Runet, more and more sites began to have their own “mirrors” on the i2p network. And more and more ordinary people became interested in this technology.

Virtual machines

By virtual machines There will also be more than one article on my blog, because... I believe (and I’m not alone) that they are very useful to use for all those who, in one way or another, are connected with computers and the Internet. For now, I’ll just mention one specially compiled distribution of the GNU/Linux family (Debian), tailored for security and anonymity - this is Whonix.

The distribution consists of two images for the virtual machine:

  • Whonix-Gateway, which acts as a gateway through which all network connections go;
  • Whonix-Workstation– actually, the distribution kit itself

The advantage of this build is that a special gateway is used, and any traffic goes only through him, and the traffic itself is directed to Tor. And since not all applications in Windows, for example, can be run through Tor, and traffic can sometimes leak through a regular connection, this threatens anonymity. Whonix has this excluded.

This is, for example, how my “virtual machines” now look with running Whonix

That's all for now, friends. I hope the article was interesting and useful. In the future, I will analyze in more detail what is described here, since I believe that all those who are not indifferent to the fate of the Internet should know this. After all, I am sure that soon in Russia, under the pretext of fighting extremism, drug addiction and pornography, any resources that are objectionable to someone will be blocked (note: This is already happening, unfortunately) . The mechanism has started...

And we should never forget that such giants as Google, Facebook, Yandex, etc., monitor every click of every network user every second. And it is unknown how this all may turn out in the future. So, don’t neglect anonymization tools, but don’t abuse them either. Because if you constantly use an encrypted channel (VPN, Tor, etc.), this may arouse suspicion from your provider.

Now it’s your turn, brothers;) Tell me, have you ever had a need to use such services? What exactly did you use? It's very interesting to hear about this. And don’t forget to subscribe to blog updates if you are interested in this topic. You can also offer some ideas about what kind of articles you would like to see on the blog pages. After all, the blog is created for you - for readers and visitors.

Thank you for your attention and see you soon!

For several years now, Roskomnadzor has been obliging Internet providers to block sites that the so-called “Experts” have considered unacceptable on the Russian Internet. They end up on the banned list. This contradicts the principles of the Internet, where all information should be distributed freely. Fortunately, there are ways to bypass the blocking.

This article will also be useful to those who want to bypass the blocking at school or at work. The instructions will contain only the most simple ways. Choose the one that suits you best. At the end of the article there are instructions for mobile devices.

Browser cache

Try using cache. This is temporary information. IN in this case the site is located in it at the time when it last time have worked. The only downside is that it may not be relevant.

In the search engine Google system You can use this by clicking on the small arrow next to the site address. When you go to the site, the date it was saved will be indicated. The same can be done in other search engines.

Browser extension

The easiest way to visit a blocked resource is with an extension friGate. It is popular because of its operating algorithm, which allows you to view blocked sites without reducing speed due to its own list. The list is constantly updated.

The extension uses its own proxy servers ( intermediate computers). Just turn it on and forget it. You will see a semi-transparent icon on the right. It means that the extension is working ( appears only if the site is in the list).

Install and use for:

If you are logging in from work or school, you will most likely have to add the site manually, since the administrator has probably blocked popular Internet resources.

If sites are not in the list, try adding them manually. To do this, go to settings and create your list.


Then open it.


In it, enter the address of the site you want to access.


TOR - browser for anonymity

Download free browser TOR. It allows you to hide your location. With each new session, your IP changes randomly. The data begins to pass through the same users as you. This allows you to easily bypass the blocking.


Outwardly it looks like Mozilla Firefox. Use it like a regular browser and easily access blocked sites. Its main drawback is its slow speed. Loading will take much longer than usual.


Turbo mode in Opera and Yandex

In this mode, not only does page loading speed up, but it also makes it possible to bypass blocking due to the fact that traffic goes to the server where the data is compressed and only then transmitted to the client. Enable it in the menu as in the image below.


In Yandex it looks a little different. If you don’t want to constantly enable the mode every time you start, then go to the settings.


At the very bottom, check the “Always On” option as shown below.


Anonymizer sites

Any anonymizer will do an excellent job with the current task. It is a site through which others can browse anonymously. In the process, your IP changes and thanks to this the blocking does not work. You just need to enter the address of the desired site in the line.

Here are a few of them:

An example of a successful login to a website from the Roskomnadzor registry. As you can see, the link has been slightly changed, but otherwise there are no differences.


Login from mobile devices

All of the above methods are also suitable for mobile devices. In case of TOR browser you can use the Orbot app. These are proxy servers combined with TOR for android devices.

Still in settings mobile version Google Chrome can be enabled traffic savings. This will allow you to log in from phones or tablets.

You can download Opera Mini, which will have a similar effect.

The above methods should be sufficient. There are even more advanced methods ( VPN setup, proxy), but their use in this case is inappropriate. If you have any difficulties, please contact us in the comments.

How did you bypass the blocking?

Poll Options are limited because JavaScript is disabled in your browser.

    I used the extension. 36%, 28 votes

The trends that are now clearly visible in changes in the legislation of the Russian Federation do not please many Russian citizens, limiting the usual freedom on the Internet. More and more sites blocked by censorship and prohibited categories of Internet resources are appearing, and not every user knows how to bypass such Roskomnadzor bans.

Fortunately, in modern information space There are many tricks, tricks and workarounds that can successfully solve most virtual problems. This article will show you several ways to bypass the Roskomnadzor ban and allow you to freely visit sites from the “Register of Prohibited Internet Resources.”

1. Activities of Roskomnadzor on the Internet

Initially, the Internet was declared as free space, and now there are many censorship bans - Roskomnadzor, because of one suspicious site, easily blocks entire domains and, often, completely unauthorized.

As a result of ill-considered actions, not only pornographic and violent sites are blocked, but also absolutely harmless Internet resources. Roskomnadzor looks less and less like a servant of the law and more and more like a clumsy elephant on the dance floor of a modern disco.

Screenshot from home page Roskomnadzor:

I haven’t seen this “interview with obscene language” with my own eyes, but I’m almost sure that we are talking about one or two words that can be heard in any place where there is more than one person. In addition, Maxim magazine positions itself as entertainment edition for men. Is it any wonder that it contains quite explicit photographs? beautiful women and a strong word slips out? Probably not.

Instead of limiting access to the magazine for children, as is done in all civilized countries, Roskomnadzor is applying sanctions, for now in the form of a warning, but blocking this Internet resource is quite possible. Who will be fined or blocked next, the Hermitage website for publishing obscene images?

That is why gaining access to the site bypassing the blocking can be safely considered justified for any adult. And the likelihood of punishment for such a violation is negligible, if not completely excluded.

2. Unified register of prohibited Internet resources

The complete “black list” of sites blocked by Roskomnadzor can be found on this resource. In addition, here you can get some recommendations on how to bypass blocking of prohibited sites:
- establish a VPN connection (paid service);
- download and configure TOR browser.

However, these options are not suitable for everyone; the first service is paid, and the second has a number of disadvantages. For example, even if you configure the TOR browser correctly, it can work slowly and very often require the user to enter a “captcha” (blocking using scripts for auto-entry and cheating visits).

3. How to bypass blocking of sites banned by Roskomnadzor

There are many ways to bypass blocking of Internet resources, some of them require some effort and time. But they all allow you to achieve positive result even for users who are not very well versed in IT technologies.

3.1. How to configure the Opera browser to bypass blocking

When trying to get to a prohibited site, users often see this message:

This resource has been blacklisted and cannot be accessed through normal means. If Opera is your main browser, you need to configure the application correctly, which will allow you to bypass the blocking. The “Turbo” function is activated with just one click, creating a tunnel between the computer and the Opera server. The option is located in the browser menu,

and in older versions its settings are placed in the lower left corner of the application window. Other browsers do not provide similar opportunities for visiting prohibited Internet resources, but they can use other, no less effective techniques.

3.2. How to bypass Roskomnadzor restrictions: browser plugins

For all famous browsers There are a lot of plugins written, among which there are free libraries, allowing you to bypass the Roskomnadzor ban.

3.2.1. How to bypass restrictions on the Chrome browser: friGate plugin

You can download it from the Web Store; there will be no linguistic problems, since the official website and the application itself exist only in Russian.

The operating principle of the friGate plugin for Chrome is based on redirecting requests with addresses of blocked Internet resources to its servers. The exact information about the contents of the list of such sites is closed, but the developers promise that over time it will include all domestic Internet resources with multimedia content that are blocked by Roskomnadzor for “piracy.”

3.2.2. Get to prohibited sites: ZenMate VPN FireFox plugin

Small and free plugin ZenMate VPN will help FireFox users access prohibited sites.

In order to get started, after installing the ZenMate VPN plugin, you need to enter the address of your Email, to which a notification about registration in the system will be sent. The application also generates a login password that can be changed.

ZenMate VPN creates an encrypted tunnel through which all traffic is transmitted, guaranteeing not only the ability to bypass Roskomnadzor restrictions, but also maintain your anonymity when visiting Internet resources.

3.3. How to access a blocked resource: alternative networks

Setting up your system (in this article we are talking about Windows) is quite simple. To do this, use the Control Panel (or double-click on the network connection icon in the lower right corner) and select Network Connections. Then in the settings TCP-IP protocol and substitute the DNS values ​​specified in the list into the appropriate fields.

The main disadvantage of this method is the inability to configure computers at work if they are connected to the Internet through a company proxy server. However, there is a way out Alternative option even simpler, since it does not require software configuration.

3.5. How to access prohibited sites using an anonymizer

The use of anonymizers is quite common due to their extreme ease of use. The question “how to bypass the Roskomnadzor ban” disappears immediately - just copy the link into the address bar of the anonymizer and in a few seconds the blocked Internet resource will be loaded. None special knowledge this is not required, and you can find a suitable site with an anonymous redirect (redirection) in any search engine. As an example, we can recommend one of the simplest anonymizers, located outside of Russia.

4. Conclusion. What is the easiest way to bypass the Roskomnadzor ban?

If we summarize and analyze all of the above, it may seem that the most convenient and quick way- use the services of an anonymizer. This is not entirely true - the easy ways are rarely the best. Practice shows that to bypass blocking of Internet resources, it makes sense to set up a VPN using separate application or browser plugin. Yes, you will have to spend some time finding the most effective program, but after that the system will work in automatic mode and the user will forget about this problem forever.

There are many situations where you may encounter access to some . For example, some employers block access to social networks and entertainment sites, so that employees are not distracted from their duties. A similar situation occurs in educational institutions. In this article we will talk about how to access a blocked site by bypassing the blocking.

Option No. 1. Go to a blocked site using Google translator.

Google provides free online translator, which is available at translate.google.com. Main feature The advantage of this translator is that it can be used to translate not only text, but also entire web pages.

In order to translate a web page, simply enter its address in the translation field and click on the translate button. After this, the specified web page with the already translated text will load.

Typically, access to Google resources don't block, so this feature Google Translator can be used to gain access to blocked sites. Enter the address of the blocked site in the translator window and click on the “Translate” button or click on the link that appears on the right side of the page.

Once the site loads, you can use it as usual. All links will work and you will be able to navigate to other pages on the site.

Option number 2. Open a blocked site using anonymizers.

Anonymizers are sites that allow you to secretly browse other websites, playing the role of an intermediary between you and the final site. Generally this method very similar to the previous one. You go to the anonymizer’s website, enter the address of the site you need and click on the “Go” button. After this, the page you need is loaded.

The most popular anonymizers:

Option #3: View a blocked site using the search engine cache.

All search engines save a cache version of indexed pages. This feature can be used to gain access to blocked sites.

Enter search query which will lead you to desired page, after that you need to open the saved cache in the search engine results. In Goole this feature is called "Saved Copy" search engine Yandex is simply “Copy”.

Recently, most users in Russia, Ukraine and some other post-Soviet countries have questions about how to access a blocked site.

The fact is that in the CIS there are more and more laws that one way or another prohibit the use of various sites. The Russian Federation even has a whole register of such resources that are prohibited by Roskomnadzor.

In Ukraine, the most popular Russian sites, such as Yandex, VK, and so on, were recently banned.

In any case, now it would be useful for almost every user from the former USSR to know how to access blocked sites. We will consider all the most efficient methods.

1. Turbo modes

Many browsers have so-called Turbo modes. A striking example Opera is a similar program.

In many cases, to bypass the blocking, you just need to turn on this very mode. Read the help for your browser - it may also have a turbo mode.

To enable it in Opera, you need to click on “Menu” and click on “Opera Turbo”. After this, a check mark will appear next to this inscription, which indicates that the mode is enabled and working.

Rice. No. 1. Enabling Opera Turbo

2. Anonymizers

You can also access any blocked site through an anonymizer.

The principle of its operation is as simple as possible - the resource connects you to some remote computer, which stands in a distant country, even in Honduras. Thus, you are entering not from Russia or Ukraine, but from Honduras. By at least, the system will think exactly like that.

You can find it on the Internet great amount similar resources.

For example, proxfree.com is very popular. There you just need to enter the address of the blocked resource and click on the “PROXFREE” button. You can also select your country under “Server Location”.

Rice. No. 2. Using the proxfree.com anonymizer

The same principle of operation is relevant for absolutely all anonymizers. In most cases, the user will not need to specify the country, but only enter the address and press one button.

Here is a list of other popular anonymizers:

6. Psiphon

Another one interesting program, which encrypts the entire Internet connection. There are versions for Windows and Android.

For example, to use Psiphon on a Windows computer, you need to do the following:

  • Go to the official website and click on the “Psiphon for Windows” link.

Rice. No. 10. Psiphon download page

  • Install and run the program.
  • Next you need to wait until it connects to the servers and configures all its parameters. The completion of the download will be indicated by a checkmark in the green circle on the left top corner Psiphon windows.

Rice. No. 11. Psiphon is ready to go

You can now access blocked sites.

As you can see, here you can even specify exactly how the connection will occur. There are three options: SSH, SSH+ and the already familiar VPN. In most cases it is better to leave everything as is.

It is worth saying that from the point of view of connection speed, it is best to work with Psiphon and the TOR browser. In all other cases, pages take too long to load.

7. Change DNS

In addition to all of the above, you can take more stringent methods to bypass the blocking. One of them is to change the DNS server on the computer.

Now we won’t talk about what it is and how it works, because the most important thing for us is that it really works and allows you to access any blocked sites.

To change DNS, you need to go to the properties of Internet Protocol Version 4. IN different versions OS this happens in different ways:

  • In Windows 7, you need to open the “Control Panel”, then “Network and Internet” and click on “View network status...”. Then all you have to do is select the connection you are using, right-click on it and select “Properties”.
  • In Windows 8 and 10, you should do the same thing, only in the “Network and Internet” section you will need to click “Network Center...”. Then on the left panel you need to click on “Change adapter settings”. And then everything is the same - right button mouse and "Properties".
  • In Windows XP everything is even simpler. There in the “Control Panel” you need to select “ Network connections" And, again, “Properties” in the drop-down menu.

In the window that opens, click “Properties”, and in the next click on the same “Internet Protocol version 4...” and again “Properties”.

Rice. No. 12. Accessing Internet Protocol 4 Properties

Rice. No. 13. DNS Change Window

This small device is a portable Proxy that just needs to be connected to an Internet cable. Works 100%!

It costs just under $75. You can buy it. There you can find all the information about the device.

Rice. No. 14. Onion Pi