Bypassing school security

This tutorial will walk you through some methods for bypassing basic school security (the kind that stops you from accessing certain websites, or downloading certain files.)
Bypassing the restriction to download .exe files
  1. Simply google the file you want, only in zip format. For example, instead of searching for openoffice.exe, search for openoffice.zip or openoffice.rar
Bypassing blocked keywords

  1. If your school doesn't allow you to search certain keywords like torrents, porn, etc. simply drop a letter from your keyword search. For example, instead of typing Harry Potter torrents, search Harry Potter torren
Bypassing blocked websites
  1. Most people know this one by now. If there is a certain website you want to access but it is blocked, try searching the website in google, and instead of click on the website itself, click on the cached button. This should load the website without the block.
  2. The alternative is to use a proxy if you can. Refer to the Protect yourself section of this app to find the proxy guide. You can also google search proxy websites.
Use facebook or other blocked apps w/ iPhone or iPad on school WiFi
  1. Send an email to promotion@vpnod.com with the subject vpnod (There doesn't have to be an text in the body, wait for a reply, then follow the instructions at http://www.vpnod.com/setup/ios/
Run a TOR browser off a USB stick (TOR is an anonymous browser.. you can also view things with it you couldn't normally. View their website or do a google search for details)
  1. Download this folder: https://www.torproject.org/dist/torbrowser/tor-browser-2.2.32-4_en-US.exe
  2. Then copy it onto a USB stick, and simply plug it into your schools computer and run the program called Start Tor Browser
As always, this tutorial is for educational purposes only. Use at your own risk.

Related Posts:

  • How to hack a Website More people have access to the internet than ever before. This has prompted many organizations to develop web based applications that users can use online to interact with the organization. Poorly written code for web app… Read More
  • 5 Of The World’s Most Famous Hackers & What Happened To Them There are two types of hackers. First, you’ve got the kind that is so often portrayed by Hollywood as an anti-social nerd with a chip on his shoulder out to dominate the cyberworld by breaking into secure networks and mess… Read More
  • Remote password stealer This popular stealer is back due to popular demand with new modifications and limitations. It decrypts all stored passwords in the internet browser. It works on Windows Vista and Windows 7 machines and it is in beta and o… Read More
  • Phishing This guide will walk you through making a fake email login page, facebook, or any other service which you can send to someone. Once they log in, you will have their password and they will never know. What this requi… Read More
  • 5 People Who Became Memes, And How They Reacted The Internet has made it easier than ever for ordinary people to become famous, and sometimes it even happens by accident. These five people are great case studies for what happens when you go from Average Joe to Internet M… Read More
Web Hosting