Adding WHAT REALLY HAPPENED to a local hosts file. (MIRROR)

ACCESS WHAT REALLY HAPPENED NOW!  > http://173.236.29.251/

Directions Below

From Mike Rivero:

This is useful to do if the Domain Name Service is hacked or simply unavailable. IF YOU ARE NOT EXPERIENCED WITH SYSTEM-LEVEL CHANGES, PLEASE CONSULT AN EXPERT SO THAT YOU DO NOT DAMAGE YOUR OPERATING SYSTEM.

I am getting emails from around the world that whatreallyhappened.com is being subject to blockages involving the DNS system.



This is consistent with the run-up to a new false-flag event. The precedent for this is that in the weeks before 9-1 the FBI was shutting down the websites of Muslim groups indie the United States to silence those voices that might suggest someone other than Muslims did 9-11. Obviously, in advance of a new false-flag, the same tactic is being employed on a larger scale, hacking the DNS router tables to block alternative media while not interfering with corporate money-making websites.

This article contains instructions for bypassing DNS entirely by adding the WRH IP and name to your systems hosts file, so that your machine maps the name to the IP without using DNS.

But as the warning above states, if you are not experienced in working with system internals, please find someone who is. If you screw up the hosts file you can disable all browsing, disable your anti-virus protections, and other problems. If you do not know what you are doing, find a friend who does.

While you are at it, you might also determine the IP of your other favorite blogs and add them to the hosts file but be aware that this method may NOT work with virtual domains sharing the same server, which requires the domain name to be sent to the server to obtain the correct page.

 

Adding WRH to a local hosts file.

This is useful to do if the Domain Name Service is hacked or simply unavailable. IF YOU ARE NOT EXPERIENCED WITH SYSTEM-LEVEL CHANGES, PLEASE CONSULT AN EXPERT SO THAT YOU DO NOT DAMAGE YOUR OPERATING SYSTEM.

  • Windows
    • Set a restore point. Start->All Programs->Accesories->System Tools->System Restore
    • Locate the file "Hosts" on your computer:

      Windows 95/98/Me  c:\windows\hosts
      Windows NT� C:\winnt\system32\drivers\etc\hosts
      Windows 2000/XP c:\windows\system32\drivers\etc\hosts
      Windows XP Home c:\windows\system32\drivers\etc\hosts
      Windows 7 c:\windows\system32\drivers\etc\hosts
      (On some OEM versions of Windows 7 the hosts file is in a different location, so you will need to use the search tool to find it.)
      (you may need administrator access for Windows NT/2000/XP/7)

      NOTE: Hosts is the name of the hosts file and not another directory name. It does not have an extension (extensions are the .exe, .txt, .doc, etc. endings to filenames) and so appears to be another directory in the example above.

      You may have a file called "Hosts.sam". This file is a sample Hosts file (the .sam stands for sample) and can be used by removing the .sam extension so the name is just "Hosts". This file should be edited with a plain text editor, such as Notepad, and not a word processor, such as Microsoft Word. If in doubt, consult a windows expert.
    • Add this line to the Hosts file:

      173.236.29.251 whatreallyhappened.com

    • Save your changes.
    • Reboot your computer.
    • Your windows machine will now find whatreallyhappened.com even if the DNS has been blocked or stops working.

    • NOTE: Windows users should verify that they are showing extensions for all file types. This will help verify that the Hosts file is named correctly. To reset Windows to show all file extensions, double click on My Computer. Go to View Menu (Win95/98/ME) or Tools Menu (Win2000/XP), and select Folder Options. Click the View tab. In the Files and Folders section, DESELECT (uncheck) the item named "Hide file extensions for known file types". Click Apply, and then click OK.

  • Linux

    • Edit the hosts file on your system. The hosts file is usually found in

      /etc/hosts

    • Add this entry to the Hosts file:

      173.236.29.251 whatreallyhappened.com

    • Now make sure this file is used for host name lookups. This is done in two files. First is:

      /etc/host.conf

      This file should have at least the line shown below:

      order hosts,bind

      That has host lookups use the hosts file before doing a DNS query with bind.

    • The next file is:

      /etc/nsswitch.conf

      Recent tests indicate that this file is required in order for the pserver to use the entry in /etc/hosts. The nsswitch.conf file should have this line for the hosts configuration:

      hosts: files nisplus nis dns

      There will probably already be a similar line in your version of this file. Just make sure "files" comes before whatever other methods are listed.

    • Reboot your computer
  • Macintosh OS X

    • With Macintosh OS X, the procedure is similar to Linux above. The hosts file can be found in

      /etc/hosts

    • Reader suggestion for smartphone users

      for those on android devices, you could recommend tor for android, as I'm not sure you can bypass dns through a hosts type file on phones without intimate knowledge and proper pc software. tor, however, will allow one to randomize their IP to get around regional blocks, assuming you're not familiar with the app or it's pc counterpart. Just a suggestion.

MIRROR of http://173.236.29.251/WRHARTICLES/hosts.php

 

Handy tool to see if your website is visible around the world.

WRH being blocked via DNS hack in Dallas and Sydney

Comment

You need to be a member of "What Really Happened" Radio -Web @12160 to add comments!

Comment by Libby Bell on September 20, 2012 at 4:10pm

No techie...so have to ask--what about just bookmarking the ip address?  

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

Less Prone commented on tjdavis's photo
Thumbnail

Shabby Road

"Total disregard of public places. Import it to the west and call it enrichment. "
9 hours ago
tjdavis posted a photo
14 hours ago
Doc Vega posted a blog post
yesterday
Less Prone favorited Doc Vega's photo
Friday
Less Prone commented on rlionhearted_3's photo
Thumbnail

What the fuck?

"When will the perverts picked out of the government and positions of power for thorough…"
Friday
Less Prone favorited Doc Vega's blog post The Re-Evaluation of our Current Reality
Friday
Less Prone favorited Doc Vega's blog post Former Naval Physicist and Photo Analyst Bruce Maccabee’s Wife Sees Alien Predator!
Friday
Doc Vega's 6 blog posts were featured
Friday
cheeki kea's blog post was featured
Friday
james will's 2 blog posts were featured
Friday
Less Prone left a comment for Роман
"Welcome on board. Your input is welcome, but could you provide a translation in…"
Friday
Less Prone left a comment for Tina Sullivan
"Did you lose the password= As far as I know we have changed nothing her. Continue as Sullivan."
Friday
Doc Vega posted a blog post

Death of an F-106 Pilot in Pursuit of the Unknown

 The year in between 1970 and 1972 on July 14 on a single night when a series of events led to the…See More
Thursday
Tina Sullivan left a comment for Less Prone
"Hey, buddy!  You're right, I can't get into my account!  "
Thursday
rlionhearted_3 posted photos
Thursday
Doc Vega posted a blog post

The Re-Evaluation of our Current Reality

 Surprisingly, there has been talk of mankind being enveloped in an artificial reality for decades…See More
Wednesday
tjdavis posted videos
Wednesday
Sandy posted a video

Source: Havana Syndrome investigation is "a massive CIA cover-up" | 60 Minutes

For years, the U.S. government has doubted the stories of those suffering from AHI, commonly called Havana Syndrome. Now, victims hope that reports of a newl...
Wednesday
Doc Vega posted a blog post

Regrets That Cling to Me

Talking with my shadow in the nightI know it sounds contriteA vacuum without the lightThe silence…See More
Mar 9
tjdavis posted a photo
Mar 8

© 2026   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted