A website is an HTML document that is received using the HTTP protocol from a specific URL. Simply simply, what you are now viewing. After all, blogs, microblogs, and Web 2.0 are all dependent on a website. Because it works as a form of middleware, the website structure is useful in many ways. Existing computers had to execute apps and get information, but with the advent of the internet, you can obtain information from anywhere just by using a web browser, independent of operating system or hardware. Except for the dreaded ActiveX component… Personal sites, rather than services, are increasingly losing popularity. You may build your own website or hire someone to do it for you. A lot of web firms in Korea provide website development services.

The following techniques may be used to block certain sites that you do not wish to visit, such as spam or spam sites. Making changes to the hosts file The hosts file is similar to DNS in that it allows you to block or change the connection route by registering a domain. Not all operating systems, however, have the authority to change the file. General users of the Windows operating system have the ability to alter the hosts file, so it’s worth a go. The host file is found in C:WindowsSystem32driversetc in Windows. no further time Open the file with notepad once it has been saved to your desktop and add the following content. If the domain is changed, you may also add the modified domain. 127.0.0.1 (Address of the site to be banned) Save the hosts file and place it back in C:WindowsSystem32driversetc. Restart the computer and check the connection. It is applied routinely if it is not linked. Even while GoodbyeDPI is often used to view pornographic sites, the site registered in hosts is never accessed. It’s even possible to stop it when connected to a VPN! The disadvantage is that replacing computers or setting up each computer one by one might be time consuming if you have a large number of them. Let’s modify the hosts file ahead of time, copy it to a new location, and reuse it. Use of damaging media filtering software in an unusual way Some apps, such as Momi and XKeeper, are weird enough to block websites. If the site you don’t want to visit isn’t an adult site, it won’t be banned if you merely visit it; only adult sites will be prohibited. Simply off all site filtering and other non-essential functions in the settings, then add the sites you wish to ban to your own site block list. And I’m solely using the custom site blocking feature. It’s much better if you can lock it with a password. On Android, there are mobile fences that do similar purposes. However, since these tools and apps are seldom personalized and are likely to include several inadvertent backdoors, it is preferable to avoid using them as much as possible. When utilized in conjunction with a VPN, a conflict or failure to operate may arise. Using the Internet router’s firewall functionality It is only feasible with a home-made router, not with a carrier’s router. Many situations with names like firewall or site filtering may be found in the option list. Due to issues with computing efficiency and storage capacity, most routers have a limit on the number of sites that may be blocked. There aren’t many routers that can prevent https traffic. A PC may be used to construct a router with firewall capabilities. The benefit is similar to a firewall coupled to a home-made router, and the https filtering function is robust, with no restriction on the number of sites in many circumstances, making it more helpful. If you put together a low-power PC with several LAN cards and install the router’s operating system, you’ll have a router in no time. However, the router’s operating system must support the firewall and site filtering functionalities, and some router operating systems lack these features or charge for them. When site filtering is enabled, it performs so well that bypass techniques like GoodbyeDPI are rendered useless. This drawback may be solved by combining the VPN client function with a VPN server linked to an international ISP. In this instance, it is feasible to simply disregard the vigilance committee’s decision and prohibit access to the site while customizing the permissions according to the router administrator’s wishes. Check out Software Router. Let’s inherit the (existing) DIY wireless router if you wish to utilize it. Unfortunately, blocking in a mobile network environment combining LTE and 5G is tough. To begin with, most mobile phone operating systems do not allow you to extract and fix system files by default. There is no method to stop it on a closed operating system like iOS unless you are connected to the internet. You can stop it if you root Android and corrupt the hosts file, but there are a few drawbacks, such as needing to manually upgrade the firmware. Personalization and backdoors are also hampered if the above-mentioned ‘abnormal usage of hazardous media filtering software’ is used. Even worse, the average user does not have permission to utilize the carrier’s LTE/5G router.

You can find any url in (주소모음) 주소위키

admin

Leave a Reply

Your email address will not be published.

lg