Your IP Address: 54.80.236.48, No Proxy Detected
User Agent: CCBot/2.0 (http://commoncrawl.org/faq/)

Note: You must click allow in the browser to determine your location.

The creator.

14

Sep 2013

How to Facebook at Work or School

Posted by / in IP Address Tips, News / No comments yet

If you’re one of the many who has trouble accessing your social networking accounts while at work or at school, including Facebook, you may be in luck. The most effective method to bypass the blocked content and access restrictions on company networks is through the use of a Virtual Private Network, or VPN. The second most effective method to circumvent the social networking filter is through the use of a proxy. The third method of getting around censorship overcomes the issues with the first two methods – the secret? IP address.

Issues with VPNs

There are two major issues with using a VPN at work or at work or school. Most companies already have safeguards in place to prevent the use of VPNs. Also, the expense of a VPN may not justify its cost.

Software Requirement

Many VPNs require subscribers to download and install programs in order to access the private network. The problem with this is most employers and education institutions only allow administrators to install software on their computers.

Cost of VPNs

VPNs generally require a paid subscription for access. This makes a VPN less appealing to Internet users who simply want to use Facebook at work or school.

Issues with Proxies

Proxy connections usually require advanced knowledge of network configurations. Not only is this difficult for the average user to implement, but proxies are easily identifiable. The biggest issue with a using a proxy server at work or school is they’re banned. Proxy servers are identified in a few ways:

  1. By port number. Proxy servers usually require an outgoing connection to a suspicious port, such as 8080 or 3128.
  2. By IP address. This is difficult, but possible. Proxy lists are maintained and abundant. They’re so easy to find by users that you can imagine that network admins don’t have any trouble getting their hands on them.
  3. By domain. Proxy IP addresses may not be easy to detect on a network, but web proxies are implemented using a browser. This makes it easy for network administrators to block acces to these proxy servers.

Using Facebook IP Addresses

Most network administrators establish access restrictions according to the knowledge of the average Internet user. Many social network filters only block access to social media websites by the domain name and not the IP address.

Why? Blocking access to IP addresses is usually not a great idea. Some web servers host multiple websites. This means if access to the IP address is blocked, then access to all websites hosted on the same server would be blocked.

Actually, you could visit any website by typing the IP address directly into the browser. The only reason that domain names are used is to make web addresses easier to remember. You can find the IP address of any website by using the DNS lookup tool.

Facebook IP Address: 69.171.247.29

Type 69.171.247.29 directly into the URL bar at the top of your web browser. Happy Facebooking!

Please select the social network you want to share this page with:

14

Sep 2013

FBI Creates Malware

Posted by / in News, Security / No comments yet

Most Americans have blind faith in our government when it comes to Internet security. We even authorize the U.S. government to listen to our phone calls, read our emails, and dig through our text messages. But what does the FBI do when it encounters resistance? They build a virus.

Freedom Hosting – Anonymous Hosting Services

Freedom Hosting, founded and run by Eric Eoin Marques, is a web hosting service for websites that require large amounts of security to access. The hosting company allows access to its websites only through “Tor Networks”.

Tor Networks

Tor networks and services are used by websites to avoid surveillance or safeguard an Internet users’ privacy to an extensive degree. More often than not, the intention is to protect a user with a legitimate and legal purpose. Some examples of these websites include Human rights activists, environmentalists, and even communication involving government whistleblowers.

Tor networks also provide services to circumvent restrictions company websites have on competitors. For example, if you work for an Internet technology company, your company website may divulge strategy information to most users. However, your company also cloaks this information when your website is viewed by a known competitor. Tor exists to get around these restrictions.

Secret and Unethical Use of Tor

Freedom Hosting was not being investigated for protecting legal practice of U.S. civil rights. The company was being closely watched by the FBI for child pornography allegations. Due to the access restrictions and security for the Tor networks, the FBI found it difficult to get the evidence and information it needed.

Mozilla Firefox Provides the Solution

Mozilla confirmed the code exploited a critical memory management vulnerability in Firefox that was publicly reported on June 25, and is fixed in the latest version of the browser. – Kevin Poulsen. Wired. September 2013.

The FBI, determined to see through to the demise of Freedom Hosting, created a malware program designed to exploit a Firefox vulnerability. The attack on Internet security by the FBI was apparently first noticed in August, when websites that were hosted by Freedom Hosting, including legitimate websites, began displaying a “Down for Maintenance” message.

The source code for the maintenance webpage contained suspicious javascript code. Embedded in the JavaScript was a Windows .exe program that merely sends a MAC address and serial number to an external IP address located in Virginia.

Now, the operator of Freedom Hosting, Eric Eoin Marques, awaits extradition to the U.S as he sits in jail in Ireland. He is being charged with child-exploitation in Maryland.

Please select the social network you want to share this page with: