How to set up smartphones and PCs. Informational portal
  • home
  • Windows Phone
  • "Removing StarForce protection of any version". How to send giant files

"Removing StarForce protection of any version". How to send giant files

TOP-7 ways to bypass the "ban" of sites. Use any of them to gain access to web resources that have been censored or blocked.

Situations when a web page is unavailable due to the fact that you are in the "wrong region" or when access to it is denied system administrator your firm or your internet service provider are fairly common.

In 2014, the Russian government instructed Roskomnadzor to create a list of sites that could be dangerous for "state policy." As a result, about 70,000 websites, almost all torrent trackers, were threatened with a ban for residents of the Russian Federation, and such popular opposition pages as Echo Moskvy, Kasparov.ru and Yozh.ru were immediately blocked. A number of sites have been blocked in Belarus.
There are often cases when company management instructs system administrators to "ban" social networks and blogs so that employees are not distracted from their main responsibilities.
So how do you open a blocked site? Go to rutracker.org or another blocked torrent. We will bring seven simple ways, how to do it.

Perhaps this is the easiest way. But it is only intended for those users who have a web browser or (alternative link) installed. Just activate "Turbo" and inaccessible online resources will become available.
Initially, the mode was intended for accelerated loading pages when the speed of the Internet connection drops. But since it is based on transmitting traffic through the browser's servers, where it is compressed and optimized, for the provider it also looks like a stream of data from harmless servers. Thus, the browser servers act as proxy anonymizers.
True, in the case of Yandex Browser, such a trick may not always work, since its servers are located on the territory of the Russian Federation.

Extensions such as Hola, Zenmate, Stealthy and Frigate are instantly integrated into the browser and provide a seamless surfing experience on any site. They work on the same principle - they automatically change the user's IP address, thereby distorting information about where he is.
Stealthy and Frigate can be installed for and, Hola, besides it supports IE (there is also a version a separate program Hola - it is useful for those who use, for example, a browser).
Zenmate can integrate into Chrome, Firefox and (to install this add-on, you need to go to the developer's page, since it is not in the extension store).

Another way to open a blocked Vkontakte, Facebook, YouTube or any other resource is to use special anonymizing sites. Their principle of operation is based on redirecting traffic to thousands of proxy servers, which allows you to hide the user's IP.
Among these resources, the most popular are hidemy.name, Zenmate, Nord VPN, Vpn.express, HotspotShield, Speedify VPN. It is enough to paste the link to the page where you are denied access in the corresponding field on the anonymizing site, and the page you wanted to get to will open in a new tab.

The last method, which will help to open any blocked site, is useful for especially cautious users. It is actively used by spies, Reporters Without Borders. It was also used by the notorious Edward Snowden to search for facts exposing high-ranking officials.
Tails is Linux distribution, which can be downloaded to a USB flash drive or SD card. To run it on Windows, you have to use the program or. The software includes a Tor browser, an i2p client, and special cryptographic tools.
After downloading Tails, you can go to any sites, while all information about your online presence will be deleted as soon as you close the program (which looks like user interface Windows), remove the USB flash drive or memory card from the connector.

It is also possible to bypass the "ban" from smartphones and tablets. NordVPN (Android), NordVPN (iOS), and e provide Turbo mode which works in the same way as in PC versions of browsers.

Besides, in Play Market and iTunes, Hola, TunnelBear, and Zenmate are available, allowing you to choose locations from Germany or Britain to Hong Kong and the United States. Such services work not only in the browser, they are compatible with all installed programs... For example, with their help, you can use clients blocked in Ukraine for social networks VKontakte, Odnoklassniki and applications from Yandex and Mail.Ru.

The browser has special function « Free VPN”, It allows you to access the destination page using a proxy server. A similar operating principle is used in

Hello everyone, every day, different states restrict access to the sites that we are used to using. The government claims that it protects us from something, but it is not easier for us from this. Today I will tell you about everything known on this moment ways to bypass site blocking.

Changing DNS servers

The easiest way to get around most blocking is to change the DNS servers. Providers most often block various sites at the level DNS servers... DNS servers translate the IP address of the site into the URL with which the site is opened. If you block the IP address of a site at the DNS server level, then the IP will not turn into a URL (site address) and thus access will be limited.

But it is very easy to bypass this blocking, in network settings you need to use public DNS servers. Let's go, control panel - network control center - change adapter parameters - choose your network connection - right click, properties - find Ipv4 in the list - click properties - put a period, use the following DNS addresses- enter DNSs 8.8.8.8 and 8.8.4.4 (you can also enter any other public DNS servers). Next, you need to clear the DNS cache on your computer. This can be done, for example, through (check the box DNS cache and carry out cleaning) or after command line on behalf of the admin:

  • ipconfig / flushdns and press Enter.
  • ipconfig / registerdns and press Enter.
  • ipconfig / release and press Enter.
  • ipconfig / renew and press Enter.


If you have a router, then it is advisable to make these settings on the router itself, do all the settings of the router very carefully... In the address bar of your browser, write 192.168.0.1 or 192.168.1.1 and press Enter. Enter your username and password to access the router. Next, find the section WAN settings connections and manually enter the DNS servers there - 8.8.8.8 and 8.8.4.4 On different routers, this can be done in different ways, and if in doubt, don't go there.



I want to note that not all providers will have such a focus, some providers do not allow changing the DNS server. But there is another way out for this.

Unblock access to the site through the HOSTS file

If the provider does not allow changing the DNS server, then you can easily change hosts file on the own computer... I showed how to do this in my very old video - https://www.youtube.com/watch?v=KxrWGhXyNHA... In order to unblock a site, you need to know its IP address, this service will help us with this. Just go to the service and enter the address of the site you need, so you will find out the IP. Next, you need to edit your hosts file and insert a line with the correspondence between the IP of the site and the site address, it will look like this:



Thus, the computer will not connect to any third party DNS servers, but will take information from your host file... This can be said to be your personal DNS server. And since blocking sites most often takes place at the level of DNS servers, then you yourself will adjust these parameters and get access to any sites you need!

But it happens that providers block full access to sites and changing DNS, and the host file does not help. Then there are other options for bypassing site blocking.

Using browsers with turbo mode or built-in VPN

There are many browsers that can be used for this, but I'll only cover two: Opera and. In the Opera browser, you can use turbo mode, turn on in the settings or use the built-in VPN browser service. You can enable it like this:

  • Open the opera: // settings / page in the browser address bar
  • Go to the Security section in the left navigation menu
  • Scroll down to the VPN section
  • Check the box Enable VPN

After that, the browser will work in VPN mode and you will be able to access any sites.

In the Yandex browser, you need to activate the turbo mode:



This mode will also get access to blocked sites.

Using browser plugins

You can install plugins in your browser: friGate, ZenMate, Browsec or Data Saver. These plugins work by VPN principle but only for the browser. These plugins can easily open access to blocked sites, this is the most easy way bypass blocking. I'll tell you about VPN below.

Using VPN services

Using the Tor browser

Another good way to bypass the blocking of sites - use a web browser. The Tor browser creates an anonymous network that encrypts all transmitted data, including from the provider, also uses servers different countries to connect to the internet. To ensure user privacy, multi-layer encryption and routing of your network traffic over a distributed network.

This technology prevents an outside observer of your Internet connection from finding out which websites you are visiting, prevents websites from knowing your physical location, and also allows you to access blocked web resources.

But Tor has a disadvantage that low speed connections. The browser can be used absolutely free of charge and without restrictions. I talked about him in more detail.

I will tell you more about bypassing site blocking in my video:


Anonymizers

To go to any sites you can use special services anonymizers, they change Url the site you need, so you can access any site. The best and known to me anonymizers are: Chameleon and noblockme.ru, you can google the rest yourself. Just go to the anonymizer site and write the site you need in the line, it will open in anonymous mode.

I hope it helps you to bypass site blocking using one of the methods described above. if you know any other methods, write them in the comments and I will add this method to the article!


It was originally assumed that the Internet is global network that connects the whole world. However, in reality, many web resources can be blocked in certain regions according to legislative initiatives. What if you still need to access a blocked site? We have collected several reliable and effective ways to bypass the blocking of prohibited resources.

1. Opera web browser

Another reliable way to bypass blocking - use a web browser Tor browser based Mozilla Firefox. Tor Browser represents client application for the eponymous anonymous network... To ensure user privacy, multi-layer encryption is used and your network traffic is routed over a WAN.

This technology prevents an outside observer of your Internet connection from finding out which websites you are visiting, prevents websites from knowing your physical location, and also allows you to access blocked web resources.

The main disadvantage using Tor- low connection speed. However, you are paying for the anonymity and confidentiality of personal data. The browser can be used absolutely free of charge and without restrictions.

Some blocking can be done by changing the DNS settings. In this case, to bypass the blocking, it is enough to change the DNS server on the computer or on the router. When trying to visit a blocked site, third party DNS server will redirect your traffic through the tunnel. Remote server considers that you are accessing from the respective country, and the site will work.

When setting up DNS on the router, sites will be unblocked on all devices in home network... That being said, you don't have to constantly change your DNS settings. The connection will be stable for all your traffic.

Google Public DNS - Free global service Domain Name System (DNS), used as an alternative to your ISP's DNS. Advantages: increased speed, reliability and security of the Internet connection.
Cloudflare DNS - "1.1.1.1" service is focused on speed and privacy protection, providing fast and secure web surfing on the Internet.

Using the following services and instructions, you can build and run own VPN or a proxy server.

Outline VPN is a service that allows anyone to create and run their own VPN server and provide other users with access to this server.
3proxy on FreeBSD - ready-made configuration script and step-by-step instruction for rent and quick setup virtual server for proxy.

Found a typo? Press Ctrl + Enter

Hello dear visitors and blog readers!

Today we will discuss such current topic, how blacklists of sites and methods for bypassing blocking. As you know, in the fall in Russia came into force a Government Decree on amending Federal Law No. 139-FZ "On the Protection of Children from Information Harmful to Their Health and Development", and the so-called "Registry of Prohibited Sites" was created. It would seem, what's wrong with that? After all, this is good intentions, there is nothing to post drug addiction, suicide and porn with minors on the Internet. But not everything is so simple with this "register" and the law.

  • Firstly, I am an adult, and I am annoyed by the very fact that they tell me what to do, how to do, what to read and what to be interested in.
  • Secondly, because of this innovation and imperfection of the blocking methods themselves, they fall under the distribution completely harmless sites.

According to resource statistics RosKomSvoboda, as of mid-April 2013, the picture with locks looks something like this:

This is due to the fact that if the regulatory authorities decide that there is prohibited information on a particular site, then this resource is easily blocked by its IP address. And after all, they do not think that in addition to the "harmful" site, there may be more dozens and hundreds of other sites!

With this article, I in no way urge you to visit sites with drug propaganda, sites promoting suicide and other "prohibited". But those who are mistakenly included in this register are easy!

To begin with, let's take a quick look at how the Internet works in general from the point of view of the user's access to a particular site (server).

Sites, in addition to the main domain name (for example, a website), also have a specific IP address. which can be either individual, dedicated or general. The site can be accessed not only by entering the domain name in address bar browser, but also by entering the IP address. But this is completely inconvenient. Just imagine if instead of www.yandex.ru we constantly had to dial 213.180.193.3. Extremely inconvenient.

So that we do not need to remember the IP addresses of all known sites, and there is a DNS, which deals with the distribution of addresses on the Internet.

DNS - Domain Name System, i.e. domain name system.

So, when we drive into the address bar of the browser, for example, google.com, our computer first connects to the provider's DNS server to find out exactly where the resource we need is located. And after that, the browser already receives the IP-address of the site, connects to it directly and in the browser window we see our favorite search engine. Schematically, it can be depicted something like this:

So "blacklists of sites", that is, the Registry of prohibited sites consists of two types of entries:

  1. Blocking the domain name of the site
  2. Site blocking by IP address

And to bypass domain blocking, just use public DNS, For example:

  • Google Public DNS: 8.8.8.8 / 8.8.4.4
  • OpenDNS: 208.67.222.222 / 208.67.220.220
  • Comodo Secure DNS: 8.26.56.26 / 8.20.247.20

How to register DNS in Windows

In order to register public DNS, you need to go to the settings of the "Network Control Center and general access". To do this, just left-click (LMB) on your connection icon (number 1 in the figure), and then select" Network and Sharing Center "(number 2):

Also, this "Control Center ..." can be accessed through the "Control Panel". Next, you need to select the connection through which we access the Internet, and click LMB on it:

Then a dialog box of the connection status will appear, where you need to click on the "Properties" button.

Next, we will see the properties window of our connection, where you need to select the item " Internet Protocol 4 (TCP / IPv4)". We click on it twice with LMB and we see a new window with the properties of this protocol. This is our final goal. Check the box" Use following addresses DNS servers "and manually register the preferred and alternate DNS server(the figure shows an example of using Google DNS servers, you can use any public DNS)

Well, in general, that's all. Do not forget to click "OK" when closing the properties windows.

Thus, if some resource is included in blacklist of sites by domain name , then by changing your provider's DNS servers to public ones, you will most likely be able to access this resource, despite its blocking. In general, I recommend using public DNS servers not only to bypass blacklisting sites, but also in daily work... From now on, you already know how to register DNS.

Now let's consider the second option for blocking resources - by IP address.

How to Bypass the Registry of Banned Sites Blocked by IP

Ways to get around similar blocking not a little, and they consist in the fact that if we are not allowed to directly connect to some server (site), then we will do this using an intermediate server from which access to this site is allowed. This becomes possible because these intermediate servers are located, as a rule, outside the direct jurisdiction of the Russian Federation, i.e. outside the country, and our laws cannot affect the routing and access to some resources through these servers. Schematically, it might look something like this:

So we'll talk about these intermediate servers. The easiest (but not recommended) way to get around blacklisting sites is to use online anonymizers.

Anonymizers (Web proxies)

To get to a blocked site using an online anonymizer (sometimes they are also called - anonymizer, which is not entirely correct), first of all you need to go to this anonymizing site. There are a sufficient number of them on the network, but I do not recommend using little-known services, and even more so if, when entering such a site, the antivirus starts to "swear". The most famous anonymizers are, perhaps:

Just go to any of them, and in the field for entering the site address, enter the required one. For example, on the HideMe.ru website, I typed whoer.net into the line to see if my IP address and country will change.

And here is the required result:

Thus, any resource placed in blacklist of sites, we can visit and read with ease. But do not forget that anonymizers are not means real anonymization, and if you plan to use them for something so bad, then in no case should you do this.

It is also worth noting that many online anonymizers also provide additional paid services, such as elite proxies, VPNs, and more.

A small lyrical digression. Most often, I use http://whoer.net to find the IP address. They position themselves as a service for checking anonymity. Those. checks for what kind of information your PC is pouring into the network. In particular, apart from standard checks to drain from JS, Java, Flash, you can also check whether the possibility of data leakage through the "hole" in the WebRTC protocol is closed in your browser (sure it's not closed ...) ... So, this "feature" of WebRTC is too tricky to forget about it. And there are very, very few services for checking browsers for this "vulnerability" on the entire Internet. So use it to your health.

Browser extensions

Some online anonymizers have special browser extensions. For example, the HideMyAss service has add-ons for Chrome and Firefox.

Consider the functions of this extension on example chrome... We follow the link that is indicated above (or independently search in Chrome Web Store, just enter Hide My Ass in the search) and install this add-on. After installation, the configuration page will open. In principle, there is no need to change anything, everything will work like that. At the bottom we are looking for the "Save settings" button, and press it, thereby saving the settings. Now a button like this has appeared in your browser:

If you click on it on any open page, then the same page will open through the proxy server. And if you click on an empty tab, you will see a field like this:

We enter the desired address, and it also opens through a proxy. Everything is very simple and done in one click. Extension for Mozilla Firefox works the same way... If you are not satisfied with the Hide My Ass service, you can search in Chrome Web Store other similar extensions. Or just follow the link: Web Proxy for Chrome.

Added later: V Lately ZenMate extensions (for Chrome, Firefox, Opera, and mobile app for Android and iOS) and friGate (for Chrome and Mozilla). Highly recommend.

Built-in Browser Functions (Turbo Mode)

The simplest option for visiting any resource that is blacklisted is Opera browser... Rather, its function is Opera Turbo .

Initially, this function was designed to save user traffic, because all visited pages are first loaded on Opera servers, the pages are compressed and only then passed to the browser for display. And this function turned out to be very useful after the introduction of these very blacklists, tk. it acts as a proxy server.

Opera Turbo is very easy to use. We launch the browser, and in the lower left corner we are looking for such an icon, as shown in the figure:

Click on this button (you can not configure anything), and turn on Turbo mode. The button will turn blue, and the browser will notify you that the mode is on. Let's now see what whoer.net "tells" us about our location and IP address.

In this mode, it sometimes happens that, for example, CSS is not loaded at all, but "naked" html is loaded. Loading speed can be very slow, and if your site takes too long to load, try disabling Turbo mode and re-enabling it. Thus, the server will change, and the download may speed up. This method, as well as anonymizers, does not provide you with any anonymity, and your real IP is visible behind the proxy server.

Turbo mode is also available in the browser from I Ndex. But in order to bypass blacklists of sites, it is not very suitable, since Russian IP addresses, servers and routes are used. But, in fairness, it should be noted that most of the blocked sites in the Turbo mode of I Ndex still open.

Added:"Turbo mode" is also available in Google chrome for mobile OS.

All of these are the simplest ways to bypass the blacklist of sites that are intended only for such purposes, because they absolutely do not provide any security and anonymity. In the following, we will briefly look at more dramatic, protected and anonymous methods... But within the framework of this article, only superficially, tk. the topic is very extensive, and separate articles and manuals will be devoted to it.

Proxy servers

Proxy server Is a complex certain programs allowing remote clients make various requests to other network services. Actually, all sorts of online anonymizers are also a kind of proxy, only with a web interface (that is, a site where we can enter and use the services). We need to register the proxy in the network settings ourselves. If you do everything with pens, then you can go in different ways.

Browsers that use system network settings - Chrome, Safari, Internet Explorer.

It is enough to configure one of these browsers to work through a proxy, and all Internet connections in the browsers will be proxified (unless otherwise configured separately). You can register a proxy like this (for example, Chrome): Settings - Show additional settings- Network - Change proxy server settings ... The standard Windows Internet properties will open. You need to click on the "Connections" tab on "Network Settings". The settings window will open local network... Register the proxy server IP address and port.

Do not forget to click on the "OK" buttons after these manipulations.

Proxies can also be registered through the control panel: Start - Control Panel - Browser Options - "Connections" tab. And we will see the same window that we saw when we configured proxies through Chrome.

Browsers like Mozilla Firefox and allow you to work through a proxy without using system settings networks. That is, if you register a proxy server in Mozilla, then all other browsers will use the usual direct connection, and in Mozilla there is a proxy. It's pretty convenient. After all, we, as a rule, do not need to constantly work through a proxy.

In the picture, I indicated the procedure with arrows and numbers in order to proxify Mozilla Firefox. At Opere, the principle is the same.

Free proxies have significant disadvantages:

  • usually low speed
  • they usually do not "live" long, and they often have to be changed

By the way, I have not forgotten to say yet: when using public proxies, anonymizers, etc. - do not use internet banking, etc. You never know what kind of software is installed on a server unknown to us, and who owns this server.

How to choose the proxy server we need?

Since our current goal is "", we are not interested in Russian proxies, we choose foreign ones. We look at the "Speed" parameter - the lower it is, the better. We will not look at the column of anonymity in today's context. After all, we want to get to an unlawfully blocked site, on which there is no illegal information, and, therefore, we also have nothing to hide. In general, in the screenshot (proxy list from the HideMe.ru website) I have highlighted the most suitable proxies:

For now, that's all about the proxy. I repeat, this topic is very extensive, and I will return to it later. I will just say that there are also browser extensions for quick change proxy; proxy checker programs that check proxy lists for validity; programs that are able to build whole chains of proxies (for example, JAP), etc. In general, proxies (especially elite and chains) are mainly used for various illegal actions on the net, cybercriminals and all sorts of politically objectionable people (such as oppositionists who want to remain anonymous).

VPN (Virtual Private Network) - Virtual private network

Actually VPN (Virtual Privat Network, i.e. virtual private network) very useful technology... It is used both on corporate level(various organizations to create their own secure tunnel) and ordinary respectable users.

For example, I highly recommend using a VPN connection if you are in public network Wi-Fi, since such networks are very often "sniffed", i.e. various hackers and cybercriminals using special software scan all traffic in such networks to identify various credentials: passwords, logins, Internet banking data, etc. Therefore, the VPN tunnel in open networks is simply necessary, tk. all traffic that passes through it is encrypted and becomes completely inaccessible.

VPN has a number of advantages regarding previous ways bypass blacklisting sites:

  • very decent connection speed;
  • fully encrypted traffic;
  • very high anonymity, if you use a service that does not store any logs, and even if it does, then what is it to us? We are not criminals, no one will be interested in us.

Disadvantages include the fact that VPN is 99% payable service... But prices don't always bite. They fluctuate depending on the tariff plan and configuration. And we don't need fancy configurations, so if you decide to use a VPN service, choose the cheapest first tariff plan... We will also return to the VPN topic several times on the pages of this site.

Tor (The Onion Router) - very high level of anonymity

At Tor help, you can also bypass any blockage... Moreover, the level of anonymity is very decent, there is encryption, and if no one is interested in you ( law enforcement, special services), then you don't have to worry about your anonymity at all. It is quite difficult to track down a particular user using the Tor network. I recently published the news "", it says that they caught one hacker, who was caught for a long time. And such cases, although rare, are still not isolated.

In short and figuratively, the Tor network is huge network computers around the world on which a special software package is installed that allows all users of this network to use each other as an "intermediate server" (this function can be disabled in the settings so that your computer is not used for these purposes). Moreover, the chains of connections are selected at random.

The main disadvantage to using Tor for legal purposes is the very slow speed (note: at the moment, after a year from the writing of this article, the speed in Tor networks is already high enough). But this drawback, as a rule, is ignored by those who use it in illegal acts, because low speed pales before all the possibilities of this network. For greater anonymity and security, Tor is sometimes used over VPN. Or vice versa.

You can download Tor on the official website. Now there is such a package as Tor Browser Bundle , having downloaded and installed which, you can immediately start working.

Many other projects are based on Tor, for example, OperaTor, OS Tails, Liberte, Whonix, etc.

I2P (Invisible Internet Project) - maximum degree of anonymity

I2P is almost impenetrable anonymity... In general, the implementation is similar to Tor, but with some "improvements". In general, everything there is simply "rotated" primarily on encryption. Everything that is possible is encrypted, every packet, and even more than once. Also, the network has very complex routing of these encrypted packets, which can change every N-minutes. Deanonymizing someone on this network is probably unrealistic.

I2P is, of course, more likely for hackers, cyber and other criminals than for the common man in the street.

Added: in connection with the recent tight control over the Runet, more and more sites began to have their own "mirrors" in the i2p network. And more and more ordinary people became interested in this technology.

Virtual machines

By virtual machines there will also be more than one article on my blog, tk. I think (and I'm not the only one) that they are very useful for all those who, in one way or another, are connected with computers and the Internet. Now I'll just mention one thing, on purpose the compiled distribution the GNU / Linux family (Debian), focused on security and anonymity - this is Whonix.

The distribution consists of two images for a virtual machine:

  • Whonix-gateway acting as a gateway through which all network connections go;
  • Whonix-workstation- in fact, the distribution itself

The advantage of this assembly is that a special gateway is used, and any traffic goes only through him and the traffic itself is directed to Tor. And since not all applications in the same Windows, for example, can be launched through Tor, and traffic can sometimes leak through a regular connection, this threatens anonymity. In Whonix this is excluded.

This is how, for example, my virtual machines now look like with running Whonix

That's all for now, friends. I hope the article was interesting and useful. In the future, I will analyze in more detail what is described here, since I believe that all those who are not indifferent to the fate of the Internet should know this. After all, I am sure that soon in Russia, under the pretext of combating extremism, drug addiction and pornography, any resources undesirable to someone will be blocked. (note: unfortunately) ... Mechanism started ...

And you should never forget that such giants as Google, Facebook, Ya NDEX, etc., every second monitor every click of each user of the network. And it is not known how all this may turn out in the future. So, do not neglect the means of anonymization, but do not overuse them either. Because if you constantly use an encrypted channel (VPN, Tor, etc.), then this may raise suspicions from your provider.

Now it's your turn, brothers;) Tell us, have you ever had a need to use such services? What exactly did you use? It's very interesting to hear about it. And don't forget to subscribe to blog updates if you are interested in this topic. You can also suggest some ideas for what articles you would like to see on your blog pages. After all, a blog is created for you - for readers and visitors.

Thank you for your attention and see you soon!

Often used to protect multimedia, business, corporate programs as well as document protection StarForce program... Today, users ask many questions that are related to bypassing the protection system. To carry out this operation, you need, first of all, to install the appropriate software... The Alcohol 120% program must be downloaded and installed on your computer.

You will need

  • Personal computer, software

Instructions

  • You will also need Daemon-tools version 4.0.

    You install this program on a computer in the same way. During installation, you need to restart your computer.

  • Turn on Alcohol. Go to "File". Go to "Settings". Go to the sections "Emulation" and "Extra-emulation". Check the boxes everywhere. Insert a disc that is protected. Go to "File" to the section "Create an image". Find the drive with the disc being loaded. Click the checkboxes where it says "Reading subchannel data ..." and "Measuring positioning data". Click "Next". Please select high speed measurements. When the image is complete, disconnect your computer and your CDROM and DVDROM drives. Then you turn on only the computer.
  • In the Toolbar, you will see the icon Daemon-tools programs... Click on it right key mice. Select "Emulation". Check the box above the word "RMPS". From the Virtual CD / DVD-ROM menu, select your virtual drive... Then find Mount image and your virtual drive. Next, start the disc.
  • In order to bypass document protection, you need to use the FreeWord and Excel password9rd program recovery wizard... To work with it, you need a utility such as Microsoft.NET. Run the program and click "select file". Next, select the file to which you want to guess the password. Open the "dictionary recovery" tab. You can specify a text with possible options protection.
  • In this way, its own dictionary is formed: “c: programfileswww.freewordexcelpassword.comfree word excel password wizarddictionary.txt ". Please select Extra options... In the item "brute force recovery" type all possible symbols or numbers. Please indicate maximum length and the minimum password length. When you have set all the possible parameters, press the "go" button. Now you need to wait for a while while the program picks up the password.
  • If you want to access archive file, use the Picozip program Recovery tool... Run the program. Next, specify the location of the file you want to access. Type in characters and put their number. Then click "start". You should now be able to view all required documents that are protected.
  • Top related articles