Adding WHAT REALLY HAPPENED to a local hosts file. (MIRROR)

ACCESS WHAT REALLY HAPPENED NOW!  > http://173.236.29.251/

Directions Below

From Mike Rivero:

This is useful to do if the Domain Name Service is hacked or simply unavailable. IF YOU ARE NOT EXPERIENCED WITH SYSTEM-LEVEL CHANGES, PLEASE CONSULT AN EXPERT SO THAT YOU DO NOT DAMAGE YOUR OPERATING SYSTEM.

I am getting emails from around the world that whatreallyhappened.com is being subject to blockages involving the DNS system.



This is consistent with the run-up to a new false-flag event. The precedent for this is that in the weeks before 9-1 the FBI was shutting down the websites of Muslim groups indie the United States to silence those voices that might suggest someone other than Muslims did 9-11. Obviously, in advance of a new false-flag, the same tactic is being employed on a larger scale, hacking the DNS router tables to block alternative media while not interfering with corporate money-making websites.

This article contains instructions for bypassing DNS entirely by adding the WRH IP and name to your systems hosts file, so that your machine maps the name to the IP without using DNS.

But as the warning above states, if you are not experienced in working with system internals, please find someone who is. If you screw up the hosts file you can disable all browsing, disable your anti-virus protections, and other problems. If you do not know what you are doing, find a friend who does.

While you are at it, you might also determine the IP of your other favorite blogs and add them to the hosts file but be aware that this method may NOT work with virtual domains sharing the same server, which requires the domain name to be sent to the server to obtain the correct page.

 

Adding WRH to a local hosts file.

This is useful to do if the Domain Name Service is hacked or simply unavailable. IF YOU ARE NOT EXPERIENCED WITH SYSTEM-LEVEL CHANGES, PLEASE CONSULT AN EXPERT SO THAT YOU DO NOT DAMAGE YOUR OPERATING SYSTEM.

  • Windows
    • Set a restore point. Start->All Programs->Accesories->System Tools->System Restore
    • Locate the file "Hosts" on your computer:

      Windows 95/98/Me  c:\windows\hosts
      Windows NT� C:\winnt\system32\drivers\etc\hosts
      Windows 2000/XP c:\windows\system32\drivers\etc\hosts
      Windows XP Home c:\windows\system32\drivers\etc\hosts
      Windows 7 c:\windows\system32\drivers\etc\hosts
      (On some OEM versions of Windows 7 the hosts file is in a different location, so you will need to use the search tool to find it.)
      (you may need administrator access for Windows NT/2000/XP/7)

      NOTE: Hosts is the name of the hosts file and not another directory name. It does not have an extension (extensions are the .exe, .txt, .doc, etc. endings to filenames) and so appears to be another directory in the example above.

      You may have a file called "Hosts.sam". This file is a sample Hosts file (the .sam stands for sample) and can be used by removing the .sam extension so the name is just "Hosts". This file should be edited with a plain text editor, such as Notepad, and not a word processor, such as Microsoft Word. If in doubt, consult a windows expert.
    • Add this line to the Hosts file:

      173.236.29.251 whatreallyhappened.com

    • Save your changes.
    • Reboot your computer.
    • Your windows machine will now find whatreallyhappened.com even if the DNS has been blocked or stops working.

    • NOTE: Windows users should verify that they are showing extensions for all file types. This will help verify that the Hosts file is named correctly. To reset Windows to show all file extensions, double click on My Computer. Go to View Menu (Win95/98/ME) or Tools Menu (Win2000/XP), and select Folder Options. Click the View tab. In the Files and Folders section, DESELECT (uncheck) the item named "Hide file extensions for known file types". Click Apply, and then click OK.

  • Linux

    • Edit the hosts file on your system. The hosts file is usually found in

      /etc/hosts

    • Add this entry to the Hosts file:

      173.236.29.251 whatreallyhappened.com

    • Now make sure this file is used for host name lookups. This is done in two files. First is:

      /etc/host.conf

      This file should have at least the line shown below:

      order hosts,bind

      That has host lookups use the hosts file before doing a DNS query with bind.

    • The next file is:

      /etc/nsswitch.conf

      Recent tests indicate that this file is required in order for the pserver to use the entry in /etc/hosts. The nsswitch.conf file should have this line for the hosts configuration:

      hosts: files nisplus nis dns

      There will probably already be a similar line in your version of this file. Just make sure "files" comes before whatever other methods are listed.

    • Reboot your computer
  • Macintosh OS X

    • With Macintosh OS X, the procedure is similar to Linux above. The hosts file can be found in

      /etc/hosts

    • Reader suggestion for smartphone users

      for those on android devices, you could recommend tor for android, as I'm not sure you can bypass dns through a hosts type file on phones without intimate knowledge and proper pc software. tor, however, will allow one to randomize their IP to get around regional blocks, assuming you're not familiar with the app or it's pc counterpart. Just a suggestion.

MIRROR of http://173.236.29.251/WRHARTICLES/hosts.php

 

Handy tool to see if your website is visible around the world.

WRH being blocked via DNS hack in Dallas and Sydney

Comment

You need to be a member of "What Really Happened" Radio -Web @12160 to add comments!

Comment by Libby Bell on September 20, 2012 at 4:10pm

No techie...so have to ask--what about just bookmarking the ip address?  

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

Doc Vega posted blog posts
11 hours ago
rlionhearted_3 commented on Doc Vega's blog post Let us Never Forget Who Was Responsible for the Wildfires that Devastated Los Angeles and Northern California
"Something fishy for sure!"
yesterday
Doc Vega posted blog posts
Wednesday
Doc Vega commented on Doc Vega's blog post A Whimsical Look at the Sudden Change in the Winds of Politics and Economic Reality!
"In third world Countries so-called political leaders that do this usually end up executed by firing…"
Wednesday
tjdavis posted photos
Wednesday
tjdavis posted a video
Wednesday
cheeki kea commented on cheeki kea's photo
Thumbnail

Waste runs deep

"One things for sure if the Trump train turns up at your station it won't be there for a joy…"
Tuesday
cheeki kea posted photos
Tuesday
cheeki kea commented on tjdavis's blog post Law & Disorder Soros Report
"The report is a great expose' it's a long but good practice and insight for what ever…"
Tuesday
Doc Vega posted a blog post

Measuring Rads

By the time I crawled out of my wishing wellLost my grip and stumbled into your living hellIt’s…See More
Monday
Doc Vega favorited tjdavis's blog post Law & Disorder Soros Report
Monday
Doc Vega commented on tjdavis's blog post Law & Disorder Soros Report
"We know all these things from sound bytes and bits and pieces of articles but to read something…"
Monday
cheeki kea favorited tjdavis's blog post Law & Disorder Soros Report
Monday
tjdavis posted a blog post
Feb 16
tjdavis posted a video

The Coup - "The Guillotine"

"The Guillotine" by The Coup from the new album 'Sorry To Bother You,' out nowProduced and Directed by Beau Patrick CoulonDP & Edit - Shawn ButcherAC - Danie...
Feb 15
Doc Vega posted blog posts
Feb 14
cheeki kea posted a blog post
Feb 14
Less Prone favorited GeneralCarlosQ17's blog post Reuters was paid millions of dollars by the US government for “large scale social deception”
Feb 14
cheeki kea favorited GeneralCarlosQ17's blog post Reuters was paid millions of dollars by the US government for “large scale social deception”
Feb 14
tjdavis posted photos
Feb 13

© 2025   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted