enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. VPN blocking - Wikipedia

    en.wikipedia.org/wiki/VPN_blocking

    VPN blocking is a technique used to block the encrypted protocol tunneling communications methods used by virtual private network (VPN) systems. Often used by large organizations such as national governments or corporations, it can act as a tool for computer security or Internet censorship by preventing the use of VPNs to bypass network ...

  3. Internet censorship in Iran - Wikipedia

    en.wikipedia.org/wiki/Internet_censorship_in_Iran

    Following the 2009 election protests, Iran ratified the Computer Crimes Law (CCL) in 2010. [30] The CCL established legal regulations for internet censorship. Notable provisions of the CCL include the following: Article 10, which effectively prohibits internet users and companies from using encryption or protecting data in a manner that would "deny access of authorized individuals to data ...

  4. Government censorship of Telegram - Wikipedia

    en.wikipedia.org/wiki/Government_censorship_of...

    Iranian MP Mahmoud Sadeghi noted that during the two weeks that Telegram was blocked in January 2018, 30 million Iranians (75% of Telegram's users in Iran) did not start using local messaging apps, but instead turned to VPN services to circumvent the block, rendering the blockade ineffective. [49] Telegram was blocked by the government on 1 May ...

  5. Great Firewall - Wikipedia

    en.wikipedia.org/wiki/Great_Firewall

    The Great Firewall (GFW; simplified Chinese: 防火长城; traditional Chinese: 防火長城; pinyin: Fánghuǒ Chángchéng) is the combination of legislative actions and technologies enforced by the People's Republic of China to regulate the Internet domestically. [1] Its role in internet censorship in China is to block access to selected ...

  6. Internet censorship - Wikipedia

    en.wikipedia.org/wiki/Internet_censorship

    Internet censorship is the legal control or suppression of what can be accessed, published, or viewed on the Internet. Censorship is most often applied to specific internet domains (such as Wikipedia.org, for example) but exceptionally may extend to all Internet resources located outside the jurisdiction of the censoring state.

  7. Shadowsocks - Wikipedia

    en.wikipedia.org/wiki/Shadowsocks

    Shadowsocks is a free and open-source encryption protocol project, widely used in China to circumvent Internet censorship. It was created in 2012 by a Chinese programmer named "clowwindy", and multiple implementations of the protocol have been made available since. [7][8] Shadowsocks is not a proxy on its own, but (typically) is the client ...

  8. Censorship in Iran - Wikipedia

    en.wikipedia.org/wiki/Censorship_in_Iran

    Censorship in Iran is not just an act by an individual. It is a process that involves interaction and negotiation. The complexity and ambiguity of the system stimulate self-censorship and create a culture of censorship. [25] However, not everything is negotiable. Criticism of the Supreme Leader, for example, is strictly prohibited.

  9. Deep packet inspection - Wikipedia

    en.wikipedia.org/wiki/Deep_packet_inspection

    Singapore. United States (FCC) v. t. e. Deep packet inspection (DPI) is a type of data processing that inspects in detail the data being sent over a computer network, and may take actions such as alerting, blocking, re-routing, or logging it accordingly. Deep packet inspection is often used for baselining application behavior, analyzing network ...