ACCESS WHAT REALLY HAPPENED NOW! > http://173.236.29.251/
Directions Below
From Mike Rivero:
This is useful to do if the Domain Name Service is hacked or simply unavailable. IF YOU ARE NOT EXPERIENCED WITH SYSTEM-LEVEL CHANGES, PLEASE CONSULT AN EXPERT SO THAT YOU DO NOT DAMAGE YOUR OPERATING SYSTEM.
I am getting emails from around the world that whatreallyhappened.com is being subject to blockages involving the DNS system.
This is consistent with the run-up to a new false-flag event. The precedent for this is that in the weeks before 9-1 the FBI was shutting down the websites of Muslim groups indie the United States to silence those voices that might suggest someone other than Muslims did 9-11. Obviously, in advance of a new false-flag, the same tactic is being employed on a larger scale, hacking the DNS router tables to block alternative media while not interfering with corporate money-making websites.
This article contains instructions for bypassing DNS entirely by adding the WRH IP and name to your systems hosts file, so that your machine maps the name to the IP without using DNS.
But as the warning above states, if you are not experienced in working with system internals, please find someone who is. If you screw up the hosts file you can disable all browsing, disable your anti-virus protections, and other problems. If you do not know what you are doing, find a friend who does.
While you are at it, you might also determine the IP of your other favorite blogs and add them to the hosts file but be aware that this method may NOT work with virtual domains sharing the same server, which requires the domain name to be sent to the server to obtain the correct page.
This is useful to do if the Domain Name Service is hacked or simply unavailable. IF YOU ARE NOT EXPERIENCED WITH SYSTEM-LEVEL CHANGES, PLEASE CONSULT AN EXPERT SO THAT YOU DO NOT DAMAGE YOUR OPERATING SYSTEM.
173.236.29.251 whatreallyhappened.com
Your windows machine will now find whatreallyhappened.com even if the DNS has been blocked or stops working.
NOTE: Windows users should verify that they are showing extensions for all file types. This will help verify that the Hosts file is named correctly. To reset Windows to show all file extensions, double click on My Computer. Go to View Menu (Win95/98/ME) or Tools Menu (Win2000/XP), and select Folder Options. Click the View tab. In the Files and Folders section, DESELECT (uncheck) the item named "Hide file extensions for known file types". Click Apply, and then click OK.
/etc/hosts
173.236.29.251 whatreallyhappened.com
/etc/host.conf
This file should have at least the line shown below:
order hosts,bind
That has host lookups use the hosts file before doing a DNS query with bind.
/etc/nsswitch.conf
Recent tests indicate that this file is required in order for the pserver to use the entry in /etc/hosts. The nsswitch.conf file should have this line for the hosts configuration:
hosts: files nisplus nis dns
There will probably already be a similar line in your version of this file. Just make sure "files" comes before whatever other methods are listed.
/etc/hosts
for those on android devices, you could recommend tor for android, as I'm not sure you can bypass dns through a hosts type file on phones without intimate knowledge and proper pc software. tor, however, will allow one to randomize their IP to get around regional blocks, assuming you're not familiar with the app or it's pc counterpart. Just a suggestion.
MIRROR of http://173.236.29.251/WRHARTICLES/hosts.php
Handy tool to see if your website is visible around the world.
MySpace Tweet Facebook Facebook
Comment
No techie...so have to ask--what about just bookmarking the ip address?
"Destroying the New World Order"
THANK YOU FOR SUPPORTING THE SITE!
© 2024 Created by truth. Powered by
You need to be a member of "What Really Happened" Radio -Web @12160 to add comments!