How to Find a Solution if your Internet Access is Blocked

How to find a solution if your internet access is blocked?

What to do if your internet access is blocked as there are different types of blocking, from the complete shutdown of the Internet to filtering web pages or keywords. Not all ways of getting around a lock guarantee anonymity, so they can pose a risk to the user in some cases.

According to the United Nations, at least 40 countries apply some form of Internet censorship.

The closure in Turkey of services such as Twitter, YouTube or the TOR network is the latest episode of a phenomenon that has only grown and that affects dozens of countries, according to the “OpenNet” map on global filtering of Network and includes the United Nations in its Report “Freedom of Connection, Freedom of Expression”.

Although they are not the only form of Internet censorship (for example, indiscriminate surveillance and the realization of digital profiles of activists in democratic countries such as the United States can also be considered a restriction of freedom of expression), the limitations to access some type of content or online service, or to the Network itself, are the most direct methods.

To achieve this, various techniques are used, such as filtering, blocking websites, altering the speed of browsing, or even computer attacks such as “Denial of Service” (DDoS) or theft of passwords.

Internet Access is Blocked

If your internet access is blocked, restrictions can be imposed by different agents (from a public institution, such as a university or a library, to companies or governments) and apply to any point of the network. Thus, they can affect the “backbone” of the Internet (which conditions access to the Internet throughout a country), ISPs or Internet access providers (normally the filtering orders of governments are executed by them), to institutional networks or to the user’s personal computer (as with parental control programs).

How the Internet is Censored: Different Types of Blocking and Filtering

Internet access is blocked

How the Internet is censored: different types of blocking and filtering Filtering techniques generally involve the use of software to see what users are trying to do and to selectively interfere with their activities, that is, “censorship and surveillance are closely linked in practice”, as one of the most comprehensive manuals on the subject warns.

Therefore, the most effective technical countermeasures, as we will see later, will be based on the use of encryption or the use of secure services that make tracking difficult.

The different types of blocking and encryption have been (and are) used, at different times, by a large number of countries. Therefore, although some examples are mentioned below to illustrate these methods, it is advisable to consult the “country profiles” of the “OpenNet” initiative for a detailed view of each case or the report ” Enemies of the Internet “, by Reporters Without Borders. You can also use Herdict, a collaborative platform that collects censorship situations on the Internet in real-time.

URL filtering

One way for countries and other entities to block access to information on the Web is to avoid going to a full URL or part of it. Sometimes the authorities are more selective and the blocking only affects certain subdomains of a particular domain.

For example, the list of banned websites in China contemplates blocking specific sections, leaving the rest of the domain accessible. Or the case of Vietnam, where the government blocks the Vietnamese versions of the BBC and “Radio Free Asia” but not the English version.

How do I stop the firewall from blocking my internet?

Internet access is blocked

The default firewall is that of Windows. It’s called Windows Defender and can be found in Control Panel.

First, we’ll just do a test, go to Control Panel and open Windows Defender. In the window that opens, click on disable windows firewall. If your internet access is blocked then it must be deactivated in the Private network and also in the Public network.

Once done, reboot your PC and try a connection with your WiFi key.

If it works then we will adjust the traffic entering and leaving Windows Defender, failing that, and after you have verified that the Firewall is indeed disabled, we will look at your antivirus side, which may also have internet protection. In fact, we proceed by elimination.

Why is it important to use a firewall?

Having security tools is very important for all types of devices and operating systems. They protect us against possible threats that compromise computers and may put our privacy at risk. We have both free and paid programs and we can also configure different parameters to make them act correctly always with the aim of preserving security.

When we speak of firewall we refer to one of those programs that we can use to protect our systems and networks. It helps us to block dangerous connections, it allows us to close certain ports and limit the connection to certain applications that we have installed. All this with the aim of maximizing network security.

Related article: How to hide and shows folders in Windows 10

Avoid Unauthorized Users

One of the main advantages of a firewall is to prevent unauthorized users from entering our network. It is essential to keep possible intruders at risk that could put our security at risk and enter the devices that we have connected to that network.

Limit access to the application network

We can also prevent certain applications from connecting to the Internet. Basically what the firewall does is cut the connection and prevent them from working normally. Very useful if we are not interested in having programs started and consuming data, for example. It can also be useful to maintain security by allowing only the programs that interest us.

Report fraudulent connection attempts

This type of program also has the ability to inform the user, about fraudulent connection attempts. A way to alert that something strange is happening and to be able to take action before it is too late and can expose more personal information or compromise the devices.