2015 - Apna Netgyan

Post Top Ad

Friday, 18 December 2015

What Is Anonymous And How Big It Is?

December 18, 2015
 Anonymous is a decentralized hacktivist group that has been into existence since 2003. It is hard to predict the actual size of the group as most of its activities are not commenced in the daylight. Yevgeny Golovchenko, a research student at the University of Copenhagen, did make his efforts to approximate the number of members in the group.



Anonymous, a self-declared collective that has been associated with taking down government websites and fighting ISIS. This question – how big is Anonymous? – is still uncertain as the actual size of the widely distributed group, or a “movement” as it is called now, is hard to predict. And we can’t rely on mere calculations regarding the actual number of members who title themselves as Anonymous.
The collective group has been working on a global platform and the Anonymous members are referred to as “Anons”. LulzSec, founded in May 2011 and AntiSec. which came into existence in June 2011, are two well-known subgroups to Anonymous. Another associated group GhostSec has been in the news after the Charlie Hebdo attacks.
An aggregate sack of flesh – meshed together by wires transistors and Wi-Fi signals – replete with miles of tubes pumping blood, pounds of viscera-filled with vital fluids, an array of live signalling wires, propped up by a skeletal structure with muscular pistons fastened to it, and ruled from a cavernous dome holding a restless control centre, the analog of these fabulously grotesque and chaotically precise systems that, if picked apart, become what we call people.
— this is Anonymous as described by Gabriella Coleman, Professor at McGill University and an anthropologist. She has been a regular observant and a media commentator in accordance to various operations by Anonymous.

The Initial Imprint (2003-2013)

In 2003, the very first sightings of Anonymous’ activities were images posted by unknown users tagged as Anonymous on the /b/ board of 4chan website, and they become quite popular. Further, their operations advanced to raiding websites, one famous case was of a Finnish social network website Habbo Hotel, where they blocked access to regular users, given the reason, “closed due to fail and AIDS”.
The users at 4chan started the use of IRC (internet Relay Chat) to play offline pranks as the internet traffic exploded on 4chan. Such acts did attract media attention – a news report was aired on KTTV, a Los Angeles-based unit of FOX network, branded Anonymous as “domestic terrorists” and “internet hate machine”.
In their initial days, Anonymous all was all about mass pranks, trolling eventsand actions against the internet communities who supported anti-piracy acts. Encyclopedia Dramatica, that came into existence in 2004, served as a platform for the satirical motivations fulfilled by Anonymous.
It was in 2008, when Anonymous tasted the very first bite of hacktivism. Operation Chanology or Project Chanology, a protest against the Church of Scientology was initiated which included a series of digital attacks. 4Chan users were involved in acts of prank-calling Church’s hotline, repeated DDoS attacks, and sending black faxes that led to wastage of ink cartridges, all as a retaliation to the copyright infringement letter published by the church, after a video featuring “Tom Cruise practicing Scientology” surfaced on a blog named Gawker on January 15, 2008.
Eventually, their engagement with the Church of Scientology faded down and the group’s activities nowhere to be noticed by the start of 2010. It was in September 2010 when Anonymous got an opportunity to fine tune their hacking muscles, launched a DDoS and took down the website of Aiplex Software. Aiplex was an Indian company which partnered with film studios and specialised in launching DDoS attacks against websites like The Pirate Bay, which hosted pirated content.
Subsequently, the websites of the Motion Pictures Association of America (MPAA) and the Recording Industry Association of America (RIAA) were also taken down as the part of the protest against the anti-piracy norms. An operation titled “Payback Is a Bitch” launched on September 19, 2010, in which the Mustafa-Al-Bassam( Known as Tflow) and other Anons hacked the website of the anti-piracy group, Copyright Alliance. The following statement was issued after the takedown:
Anonymous is tired of corporate interests controlling the internet and silencing the people’s rights to spread information, but more importantly, the right to SHARE with one another. The RIAA and the MPAA feign to aid the artists and their cause, yet they do no such thing. In their eyes is not hope, only dollar signs. Anonymous will not stand this any longer. The websites of Australian Federation Against Copyright Theft, the U.S. Copyright Office, a British law firm ACS: Law, and many more, were taken down as a part of the Payback operation.
The horizon of the Payback operation was expanded to include “Operation Avenge Assange”, which was in response to the boycott of WikiLeaks by various companies like Amazon, Paypal, MasterCard, and VISA, as the consequence of classified cables concerning the U.S. government were released by WikiLeaks. DDoS attacks were launched against Paypal, PostFinanace and EveryDNS, who denied service to WikiLeaks. The attack also included the website of U.S. Senator Joe Leiberman, who supported the denial of access against WikiLeaks.
In 2009, YouTube allegedly suspended the account of a user Luckywes1234 for having abusive languages in some videos. As a protest, Anonymous in collaboration with eBaum’s World declared March 20, 2009, as the YouTube Porn Day and uploaded numerous videos featuring “hank panky acts”. They repeated the same in 2010.
The succeeding years marked the commencement of Operation Tunisia (2011), which was to support the Arab Spring movements. It also included defacing Tunisian government websites led by various Anons like Sabu, and providing protected access to normal internet users with the help of a script written by Tflow. Another protest, Operation Egypt, was carried out in order facilitate access to websites banned by the government, which was done in collaboration with an activist group called Telecomix.
Another major protest which gained worldwide recognition, included compromising user data of over 100 million Sony accounts, all done in retaliation for making efforts to prevent the hacking of PS3. The attack led to the close-down of Sony’s Play Station Network and Qriocity services for about a month.
Aside of their online presence, Anonymous has also presented themselves in the real world. It was on November 5, 2013, when numerous Anonymous protesters wearing Guy Fawkes Masks, gathered in 400 cities around the world for the commencement of Million Mask March.

Recent Work of Anonymous:

Anonymous and its Anons have continuously signified their presence through various operations and protest actions they’ve conducted from time to time. But in the last couple of years, there is no doubt about the fact that Anonymous has matured from a mere prank-playing group, no matter ISIS calls them idiots, but they’ve imparted their efforts.

#OpOK (2013)

This initiative was focused on helping the victims of Oklahoma Hurricane Sandy disaster in 2013. A widespread mission was initiated which included gathering any sort of information that could be used to identify and find lost victims.
This is an urgent message concerning the absolutely devastating impact of the tornadoes that left a trail of destruction through Oklahoma on 5/20/2013. A new Anonymous operation is being launched known as #OpOK in an effort to assist with the clean-up/recovery effort. There is no limit to who you can help or what you can do… however we ask that you please do something.

#OpSafeWinter

Another operation led by Anonymous, which concerned the homeless people on the streets. The aim of the mission was to raise awareness among various social welfare groups so that any sort of help could be provided to the homeless people.
Laurine Murphy writes for the DailyDot,
“Do something amazing this winter… that’s the point.”
So said the administrator of @OpSafeWinter, the Twitter account heading up public relations for Anonymous’ most ambitious project for 2013 and 2014. We spoke to the Anonymous member via Twitter direct message for an exclusive interview on the umbrella project dubbed #OpSafeWinter. The goal is to get Anons and “civilians” out into the streets all over the world to save lives by giving the homeless and the critically poor the tools they need to survive at least one more season.

Michael Brown & Tamir Rice Shootout (2014)

Anonymous did admit their protest in the two police shootouts, one of Michael Brown, an African American in Ferguson, Missouri and another of Tamir Rice in Cleveland, Ohio. They launched new twitter handles and threatened to take down federal websites if any of the protestors was harmed by the police. In the Tamir case, Anonymous used BeenVerified to disclose the phone number and identity of the involved police officer.

#OpCharlieHebdo (2015)

On the cold day of January 7, 2015, 12 people were shot dead in a death massacre at the office of Charlie Hebdo. Anonymous having intentions tocompletely “erase” ISIS from the internet, released a video through their Belgian YouTube account in which they promised a response to “al-Qaeda, the Islamic State and other terrorists”. In the video, a man wearing the Guy Fawkes Mask was quoted saying, “We are declaring war against you, the terrorists”, in an electronically distorted voice.

#OpCyberPrivacy (2015)

Another act of vengeance covered in the protest list of Anonymous was in response to the Anti-Terrorism Act, 2015 or C-51 Bill passed by the Parliament of Canada which accorded more powers to the Canadian Intelligence Agencies in order to fight terrorism. They claimed the responsibility of defacing federal websites on June 17, 2015.
A snippet from the video,
Greetings citizens of the world, We are Anonymous. This is Operation Cyber Privacy. This statement is an urgent call to action. As indicated in our most recent video, we have joined forces with Operation C51, as well as our comrades in France, the UK, and beyond. As part of this union, we are calling for a global March of solidarity with Operation C51 on May 30th. Multiple cities in Canada and the United States have already established protests, and you can join them by contacting us on Twitter. If you can’t find a protest in your area – organize one.

#OpKKK (2015)

In this operation, Anonymous announced the revelation of about 1000 names and emails concerning the members of Ku Klux Klan (KKK) and its affiliates. They said in a press release, “You are terrorists that hide your identities beneath sheets and infiltrate society on every level. The privacy of the Ku Klux Klan no longer exists in cyberspace.”
On November 2, 2015, a list of 57 phone numbers and 23 e-mails was published, but Anonymous denied involvement in the same by a tweet made through @Operation_KKK, “#ICYMI #OpKKK was in no way involved with today’s release of information that incorrectly outed several politicians.”

Anonymous Vs. ISIS

Apart from their numerous take-down events from time to time, the hacktivist group has also been in the news for their worldwide cyber-attacks against the Islamic State. The collective also announced its offensive hacking motives to kill ISIS online.
One of the recent attacks was a couple of weeks ago, in which they hacked an ISIS propaganda website and trolled ISIS by posting Viagra ads concerning to a company CoinRx, which promotes itself as the “#1 Bitcoin online pharmacy”. The following message was displayed on the website,
Too Much ISIS. Enhance your calm. Too many people are into this ISIS-stuff. Please gaze upon this lovely ad so we can upgrade our infrastructure to give you ISIS content you all so desperately crave.
The credit for hacking the ISIS Darknet website was bagged by GhostSec, a scion to the Anonymous collective formed to declare a war against ISIS. GhostSec came into light after the Charlie Hebdo terrorist attacks and claimed to have taken down thousands of ISIS twitter accounts and websites. However, they’ve cooperated with the intelligence agencies in the name #OpISIS, but eventually, it was known that their operation backfired a little bit as most of the Twitter account they closed belonged to normal people, not the ISIS.
Anonymous chose December 11, 2015, as the “Anti-ISIS day of Rage”. On this day, the collective has planned to fill the feed of ISIS Twitter handles with pictures of dead ISIS terrorists. This step of Anonymous is being seen as the continuation of its efforts to attack ISIS in response to the Paris attacks.
Greg Housh is one of the publically known Anonymous members. These days he is sort of semi-retired from his hacking stuff. Talking to The Washington Post, he told more about what Anonymous is and how it operates.
Housh said that everyone loves to call it “hacking”, but Anonymous also does tons of “research, identifying and monitoring everything out there that ISIS might use to communicate and recruit, and trying to get those channels shut down, be it Twitter accounts, Facebook pages, telegram channels”.
Replying to a question – If you report ISIS accounts, and social media companies shut them down, won’t they just open others? – Housh said that it’s very hard to get followers on Twitter and influencing people once again is difficult.

#OpParis (November 2015)

Anonymous from all over the world will hunt you down. You should know that we will find you and we will not let you go.
A declaration made by Anonymous after the series of bomb attacks of the city of Paris in November 2015. The hacktivist group was quick to issue a warning to its long-time foe ISIS. The group released two videos that warn ISIS and ask them to “expect a total mobilization on their part.”
Anonymous has already leaked more than 1000 ISIS Twitter Accounts as a part of the #OpParis campaign.
Recommended Read: The “Secret ISIS Cybersecurity Guide” Was Just A Simple Security Guide In Arabic

How big is Anonymous?

It is a well-known fact that Anonymous is not a registered organisation nor they’ve any formal structure to account for their operations. Making assumptions about the actual size of the decentralized group spread all around the world only contributes to a vague notion.
However, a commendable effort was made by Yevgeny Golovchenko, a research student at the University of Copenhagen. In a study conducted about six months ago, Golovchenko did arrive at a conclusion only to fathom that the actual size of the collective is far more than what the world has perceived.
On March 29, 2015, Golochenko used a software called Netvizz to harness all the publically available data referring to the probable connections possessed by Anonymous on the internet. It was a collection of 2,770 Facebook pages with 51,764 connections gathered after Golovchenko manually trimmed down from a set of 5,470 Facebook pages with 123,625 connections via likes. It is the “absolute minimum size of the page network”, as assumed by the research student.
One could argue that getting Likes is easier for 2,770 pages than for instance 1 page. Hypothetically, the same person could have “Liked” most of the Anonymous pages – although such an endeavour would take hours if not days. Similarly, the same person can use more than one account to Like pages or even Facebook bots. For this reason, the 22.5 million Likes do not necessarily represent 22.5 million people. These challenges occur when counting the number of Likes for any page on Facebook. However, even if only a third of the Likes represent actual Facebook users, the network is surprisingly immense – even to the members of Anonymous who have commented on this paper’s results. Only few mainstream media can match the movement’s enormous internet infrastructure.
— explained Golovchenko.
For the trimming operation, Golovchenko chose three criteria, one of which was to be fulfilled by a page in order to associate it with Anonymous:
  1. Direct association with the movement (“We are Anonymous“)
  2. Direct promotion of the movement’s cause
  3. Use of symbols that characterize the movement
According to Golovchenko, a mere display of the Guy Fawkes Mask is not a criterion enough to qualify as an Anonymous page, the V for Vendetta fame mask is quite popular among the general public.
David Gilbert writes for the IBTimes,
Having gathered all the data, the graduate student set out to visualise his finding, with each point (node) in the graph representing a Facebook page that is associated with Anonymous. If page A gives page B a Like, they become connected with a line. The node size represents the amount of Likes received from others in the network. Colours show different communities.
Analysis of the data shows that while Anonymous really is a global movement, regional groups typically connect with other groups in that region (Europe, Asia, Africa) and while much of the media attention is focused on Anonymous in the US, there are also major nodes in places like Germany, Portugal, Spain, Greece, Brazil and Canada.

Final Words:

The group or movement titled as Anonymous is in existent since 11 years and has been subject to a worldwide criticism by various federal organisations. They describe themselves as “an internet gathering”, and collectively work on various social issues. The notion, whether they’re right or wrong is only a perception that needs to be individualised. And the fact that they’re working against numerous terrorist activities, should be praised for the unintentional efforts they’re contributing.

As far as the legality of their acts is concerned, it is the decision of our lawmakers, whether they put aside a sincere group of people working for social issues, or they coordinate their operations with Anonymous and make this world a better place.
Read More

Sunday, 6 December 2015

What is VPN (Virtual Private Network)? How it Works?

December 06, 2015
VPN is a technology used to setup a private network over the internet to share the resources of a corporate intranet with remote users and other office locations of the company. 




Virtual Private Network or simply VPN is a personal network created over the internet, so that the devices connected over it can have an uninterrupted communication, regardless of any physical or digital barriers in the mid-way. 

How it works?

The working of VPN is not a tough deal to understand, though it is. But, before that, you need to get an idea about the protocols or set of rules in laymen terms, used by VPN in providing a secure personal network. Let’s tell you more about it:SSL (Secured Socket Layer): It uses a 3-way handshake method for assuring proper authentication between the client and server machines. The authentication process is based on cryptography where certificates behaving as cryptographic keys already stored in the client and server, are used for initiating the connection.
IPSec (IP Security): This protocol can work on transport mode or tunnelling mode, so that it can do its job of securing the VPN connection. The difference between the two is, transport mode only encrypts the Payload in the data i.e. only the message present in the data, whereas tunnelling mode encrypts the whole data to be transmitted.
PPTP (Point-To-Point Transfer Protocol): It connects a user located at some remote location to a private server in a VPN network, and also uses the tunnelling mode for its operations. Its low maintenance and simple working makes it the most widely adopted VPN protocol, further credit goes to the inbuilt support provided by Microsoft Windows.
L2TP (Layer Two Tunnelling Protocol): It facilitates the tunnelling of data between two geographical sites over the VPN network, often used in combination with the IPSec protocol which further aids to the security layer of the communication.
So, you have a rough idea about the various protocols used in a VPN. We shall proceed further and see how it works. When you are connected to a public network such as internet, you can assume that all your data is flowing through a big tunnel along with the data of other users.
So, anyone who wants to spy on you, can easily sniff your data packets from the network. When VPN comes into the scene, it actually provides you a personal tunnel inside that big tunnel. And all your data is transformed into garbage values, so no one can recognize it.

Setting up a VPN Connection involves Three Phases:

Authentication: In this phase, data packets are first encapsulated, basically wrapped inside another packet and some headers and other stuff are attached, all done to conceal the identity of the data packets. Now, your device initiates the connection by sending a Hello request to the VPN server, which replies with an acknowledgement and asks for the user credentials to clarify the authenticity of the user.
Tunnelling: After the authentication phase is finished, what we say, an imaginary tunnel is created which provides a direct point to point connection through the internet. We can send whatever data we want to via that tunnel.
Encryption: After we’ve successfully created the tunnel, we can send whatever information we want to, but that information is still not safe if we are connected to a free VPN service, which is also used by other people. So, we encrypt the data packets before sending them over the tunnel, thus barring any other user to peep into our packets, as he will only see some unrecognisable rubbish data flowing through the tunnel.
Say, you want to access a website, your device will send the access request to the VPN server which will then forward the request to the website in its name and receive the data from it. This data will then be transferred back to your device. And the website will think, the VPN server is the user and will find no trace of your device as the actual user.

Uses of VPN:



Remote User Access: A VPN connection is used to provide direct access of a corporate network to a user who is not in the geographical coverage of the corporate network. Logically, the remote user is connected just like a normal user who is using the network within the corporate premises.
Site to Site: VPN is also used to provide a homogenous network environment to a corporate firm having its office locations in different parts of the world. Thus, creating an uninterrupted sharing of resources bypassing the geographical hurdles.
Other uses include, accessing those services on the internet which are not available in a particular country or region, accessing censored content or if a user simply wants to remain anonymous on the internet.

Pros and Cons:

The biggest advantage of using a VPN is the cost effectiveness it facilitates in providing a single private network in comparison to using separate leased lines which can burn the pockets of corporate firms. All credited goes to the internet, for acting as the medium for uninterrupted VPN connections.
Apart from all the good things VPN does for us, it has its weak sides too. Not having a streamlined procedure for ensuring Quality of Service (QoS) over the internet, is the biggest incapacity VPN technology has in its possession. Furthermore, the level of security and authenticity outside the private network is beyond the purview of VPN technology. The incompatibility between different vendors only adds to its bunch of drawbacks.

Popular VPN services:

HideMyAss, PureVPN, VyprVPN, all these are well known the QoS and security they provide in their VPN connections.
Cyber Ghost, Surf Easy, Tunnel Bear are some free VPN services you can use if you don’t want to shell out your pocket. But you’ll have to satisfy yourself with less features, download limits, or advertisements. Also, these free services can’t beat the paid services, note that.

VPN on Android:

You can also setup a VPN connection on your smartphones running on Android OS. This allows you to access your company’s private network right on your Android Devices. VPN also facilitates the network administrator to control your device, add or delete data and track your usage.

Winding Up:

VPN has so far equipped us with an extraordinary level of security and anonymity we can accomplish while sharing our confidential data over the internet. Corporate giants have always admired the ease and uniformity they can engineer in their network while using VPN. Though, it has its limitations, but so far it has outperformed our expectations and should be praised for the cost effectiveness it provides in its operations.
Writing is a good habit, if you use your creative mind and write some good stuff, it would make you sound more intelligent among your friends. So, don’t wait, just use your keyboard and type your imagination in the comments section below.

Other articles

This Malware Deletes Your Chrome Browser and Replaces It With a Fake One

How to Get Faster Internet Speed Using DNS Hack

Read More

Thursday, 19 November 2015

Top iPhone and Android apps you should have on your smartphone .

November 19, 2015

Top iPhone and Android Apps to keep you busy and get the best out of your smartphone

Top iPhone and Android Apps


Google and Apple keep on adding innumerable apps and games to their respective App stores. While most of these apps and games go unnoticed; however we have been informing our readers about the best of the new iPhone and Android apps that you may have missed. Our team has picked up few interesting iPhone, Android, Mac and Web apps which we believe are a must and you would want to give them a try.

Google Photos App

It has been seen that certain apps are just bloatware where you cannot store unlimited photos and videos which adds up as a burden to your data. Google Photos App is a powerful app designed for storing photos where you can upload unlimited photos and videos. This app features machine learning technology which recognizes what is in your photos and also you can search and sort your photos in a flash.
You can download the Google Photos App for Android from here and for iPhone/iPad from here or you can try out the online version here.

Sunrise

Sunrise is a free calendar gorgeous App which has a new Keyboard that lets you easily schedule appointments without opening the app.It has a new “Meet” keyboard feature which gives you to access a quick view of your calendar and even lets you select and send along your availability all from within your favorite messaging or email app.
You can download the Sunrise App for Android from here and for iPhone/iPad from here.

Duet Display (paid App)

For the first time, Duet Display App helps you to connect your iPad to your Mac and your computer as well. This app uses your iPad’s Lightning cord for the connection due to which there is a Zero lag and you can change the iPad’s refresh rate for a performance gain if your computer has become old. The price is $15.99 (IOS, Mac & PC).
You can download Duet Display for iPhone/iPad from here, Mac version from here and the Windows version from here.

Branch

The Branch app is very exciting and simple. It is a puzzle game where you try to survive as long as possible as you travel along a branch made of polygons. To keep from falling off, you simply have to tap the screen to rotate the branch so you can prevent the smaller branches.
You can download the Branch for iPhone/iPad from here.

Redacted (paid App)

Redacted app is a very crucial app and is perfect if you want to post a screenshot or photo of an essential document or email and also helps in hiding any sensitive information which you do not want to share. The Mac app effortlessly helps to add black bars, blur, or pixelate lines of text. The price is $6.99 and can be downloaded for Mac from here.

MovieQu

MovieQu app is awesome for those who enjoys movies. This app listens to what is playing on the screen and quickly brings up all the important information and also adds the film’s release date to your favorite calendar app automatically. The price is going to be unveiled soon and you can sign up for the updates here.

Moleskine’s Timepage (paid App)

Moleskine’s new calendar and Timepage app both is very elegant and simple and use. The app organizes your appointments in list and it also incorporates weather forecasts and lets you quickly hail an Uber right from within the app. The price is $4.99 (IOS).

Periscope

As per market research, Periscope has officially unveiled an Android version of its live streaming app and it has a couple of exclusive features. You can mention the kinds of notifications you would like to receive and there is “Return to Broadcast” button if you leave and re-open the app so that you can go back into the broadcast you were watching. Its free of cost and can be download for your Android from here and iPhone/iPad from here.

Paper

Paper is the best sketching app and its new feature helps to create perfect shapes, diagrams and charts even if you have horrible writing.The Paper App is free of cost and can be downloaded for iOS from here.

Uber for Tailors

George Zimmer, the founder of Men’s wearhouse has brought a new app called zTailors that wants to bring a tailor to your home or office. The app’s tailors have minimum of five years of experience and they can adjust your shirts, pants, jackets, jeans, coats, dresses, skirts and give it back within a week’s time with free pickup and delivery. It costs $20 to taper a shirt and getting a pair of pants hemmed costs $16. The web version is available here and Apps will be launched soon.

Pixelmator (paid App)

Pixelmator is a powerful photo editing tool for your iPhone and iPad. It is easy to use but packs serious power under its hood allowing you to enhance, edit, frame, paint, sketch and transform your photos into beautiful works of arts. The price is $4.99 (iOS).
The above iPhone and Android apps would help users to enhance the performance of their device, organize themselves in much better way, aid in their entertainment, help them in their connectivity, allows them to play mind boggling games and last but not the least help foodies to get more recipes. Readers might feel there are some other more important and useful apps in the Google Play Store, please feel free to mention that in the comments so as to benefit other readers.
Read More

Wednesday, 11 November 2015

How to Get Faster Internet Speed Using DNS Hack

November 11, 2015
How to Get Faster Internet Speed Using DNS Hack

There are many ways to get a faster internet speed in Microsoft Windows. Today, I am going to show you a simple DNS hack that can speed up your Web Browsing  dramatically. First, I need to remind you an obvious thing that happens with most of us when we are using a slow internet connection. The only thing we blame is our Internet Service Provider (ISP) for slow internet connection, but this isn’t the only case all the time. Sometimes, the problem lie with our DNS (Domain Name System). So, first let me explain you something about DNS before telling you the method to get a faster internet speed.

What is DNS?

DNS – Domain Name System (Service/Server) – is something that converts your domain names into IP addresses.
The domain names are usually alphabetic for us to remember easily, but in actuality the Internet works on IP addresses. The DNS converts the domain name into its corresponding IP address, each time it is used as such. The DNS has a network of its own i.e. one DNS server can ask other DNS servers about translating a specific domain name to its corresponding IP address till it gets the correct result.
Computers and other devices make use of IP address to route the traffic and it is very much similar to dialing a phone number. DNS acts as an intelligent operator that bypasses the infinite address book of IP addresses. Your DNS manages this huge task.

How an Alternative DNS Service Will Speed Up Your Browsing?

As I mentioned earlier, your tortoise internet speed isn’t always your Internet Service Provider’s fault, instead it may be your DNS’s fault. So why not use an alternative DNS service? As the present web pages continue to become more and more complex by inculcating innumerable things, so clients go for multiple DNS lookups for rendering one single web page. With the continuous growth in web, the existing DNS infrastructure is under more load each day.
Now I’ll tell you to use a free public DNS service that will tell your computer to use that service instead of using your ISP prescribed service and will help you to get a faster internet speed

How To Speed Up Web Browsing Using DNS Hack?

To get a faster internet speed, I’ll tell you about free OpenDNS service. You can also use Google DNS for speeding up your internet. OpenDNS is one of the most popular free DNS services that was started to provide an alternative method to those who were discontented with their existing DNS. Ahead I’m mentioning about OpenDNS; find Google DNS after that.
By following these simple steps, you can tell your computer to use OpenDNS’s DNS servers instead of the ones your service provider automatically uses:

Open DNS:

Step 1:
To get a faster internet speed using OpenDNS, first open Control panel.
Step 2:
Go to Network and Internet options
How to Get Faster Internet Speed Using DNS Hack

Step 3:
Now click on Network and Sharing Center.
How to Get Faster Internet Speed Using DNS Hack



Step 4:
Click on your Internet Connection and then click on Properties.
How to Get Faster Internet Speed Using DNS Hack



Step 5:
Highlight the Internet Protocol Version 4 (TCP/IPv4) and click on Properties.
How to Get Faster Internet Speed Using DNS Hack



Step 6:
Now choose the following DNS server addresses to get a faster internet speed:
Preferred DNS server: 208.67.222.222
Alternate DNS server: 208.67.220.220
How to Get Faster Internet Speed Using DNS Hack


You are using OpenDNS’s servers now which helps you to to get a faster internet speed.
To Configure IPv6:
Highlight the Internet Protocol Version 6 (TCP/IPv6) and click on Properties, and choose the following DNS server addresses:
Preferred DNS server: 2620:0:ccc::2
Alternate DNS server: 2620:0:ccd::2

How to Get Faster Internet Speed Using DNS Hack

Google DNS:

Replace those addresses with the IP addresses of the Google DNS servers in step 6.
For IPv4: 8.8.8.8 and/or 8.8.4.4.
For IPv6: 2001:4860:4860::8888 and/or 2001:4860:4860::8844

Conclusion:

There are more benefits of OpenDNS and Google DNS other than getting a faster internet speed. Usually if the DNS server of your service provider goes down you become unable to use the internet, but with OpenDNS and Google DNS method, even if the service providers DNS server is down, you can surf the internet normally.
Both Google DNS and OpenDNS work just fine but people prefer Google DNS these days. You can choose to go for any of these and see if your internet speeds up.
Did you like this method to get a faster internet speed using simple DNS hack? Tell us in comments!


Read More

Post Top Ad