The Easiest Tricks for Bypassing YouTube’s Annoying Age Restrictions on NSFW Videos

YouTube is the first place I go to watch funny videos online—me and about a billion other people. But one thing that always annoys me is having to sign in time after time to view age-restricted videos.There should be a function to designate me as an “Explicit Is Legit” user, so I only have to enter in my information once as long as I am on the same computer or device. I will sadly be older than 18 for the rest of my life, so having to confirm this more than once is a little annoying.

Luckily, there is a simple trick that bypasses this small annoyance. Thanks to a couple crafty Redditors, we have two very useful tricks for getting around this.

Method #1: Staying on YouTube

If you want to stay on the official YouTube site, you can just remove the ‘watch?‘ in the URL and replace the ‘=’ sign with a ‘/’. For example:

youtube.com/watch?v=1223445

…becomes…

youtube.com/v/1223445

This bypasses the restriction and lets you go straight to watching the video without the age confirmation.

Method #2: Going Off YouTube

If you don’t mind being redirected to a different site, you can instead add “nsfw” in front of YouTube in the URL.

youtube.com/watch?v=1223445

…becomes…

nsfwyoutube.com/watch?v=1223445

This takes you to a site dedicated, as the name suggests, to letting you watch YouTube’s NSFW side to your heart’s content.

source: http://internet.wonderhowto.com


How to Remain Anonymous and Chat Securely with Cryptocat

I’m sure we’ve all heard about MSN and Yahoo! Messenger, right? They can be useful, but the setup can be quite time consuming for those who need to use it just once or twice—and the privacy statements are a real bother. For example, we must provide our real details. You could use Fake Name Generator, but if you get caught, you will have your account suspended. I don’t have a law degree, but to my understanding the United States recently passed legislation that gives the authorities the power to charge people for providing false information to websites that require you to use real details.This is why I don’t recommend the big name instant messengers above. Others big name ones that require real details are, but not limited to the following:

Did you know the government is watching our Skype conversations? Personally, I have nothing wrong with that because it is more about catching the bad guys. However, it can be a little creepy, and potentially embarrassing.

So, the question is—what is the solution to having maximum privacy andsecurity? Wire Storm Technologies presents Cryptocat.

How to Set Up Cryptocat and Use It

Do you want to remain anonymous when using this chat room? I suggest installing TOR and setting it up to use the hidden service located here. This also works on your iPhone, Android and BlackBerry device.

The first step is to enter your name. To remain anonymous, never use your real name. I suggest using Fake Name Generator and selecting a country and gender that doesn’t represent you in anyway. Cryptocat also has translations for the following languages: French, Catalan, Basque, Italian, German, Portuguese, Russian and Swedish.

How to Remain Anonymous and Chat Securely with Cryptocat

When you have entered your name and pressed enter, you will get the following prompt. For Chrome users, I suggest installing the recommended extension.

How to Remain Anonymous and Chat Securely with Cryptocat

You will now be prompted to enter your nickname.

How to Remain Anonymous and Chat Securely with Cryptocat

When you have entered your nickname, you will be required to type as randomly as possible in the box presented in order to create your keys.

How to Remain Anonymous and Chat Securely with Cryptocat

Now, you will finally be in the chat room. But lets take a look around and see all the options first. First things first, there is a 256 character limit (which sucks), but it is better than nothing. You can add as many people as you want to the chat room using the link at the bottom of the chat room.

How to Remain Anonymous and Chat Securely with Cryptocat

You can also click on any of the people who are in the chat room to view more details. For example, it will tell you how to send them a direct message that no one else in the chat room will see. In my case, it was @mrunknowns. You can also choose whether to accept or block messages from that person and you can verify their identity using the fingerprints.

How to Remain Anonymous and Chat Securely with Cryptocat

Here is an example of a private message.

How to Remain Anonymous and Chat Securely with Cryptocat

The circled button is how you widen the chat room (I took the shot with it widened) and the arrow points to the upload button which we will talk about more in the next image.

How to Remain Anonymous and Chat Securely with Cryptocat

You can also send encrypted images to selected recipients. The maximum size as shown below is 512kb and documents aren’t allowed.

How to Remain Anonymous and Chat Securely with Cryptocat

Lastly, you should always make sure your bar includes “HTTPS”.

source: http://ws-technologies.wonderhowto.com


How to Monitor Your Mac’s Connections with Little Snitch

Your computer, regardless of if you’re using it or not, is constantly communicating with the Internet. All of these conversations – held in the background – help keep your system and applications running at tip top shape. But some times there are some applications that just don’t need to communicate with the Internet, or even worse, some apps that send information about your computer and how you use the app without your permission or even knowledge. Little Snitch is an advance firewall application exclusively for OS X that allows you to control where an application can communicate to on the Internet. You can get Little Snitch from Objective Development for € 29.95.


Firewall?

A firewall is a virtual door controlled by an application on your computer that lies between your computer and the internet. Based on your rules, and its assumptions it will allow and deny connections through that door. This helps keep unwanted network connections from entering your computer, or in some cases, leaving it.

Testing for open ports in Terminal

However, there isn’t just one door for every single network connection to go through, there are hundreds! Each of these doors is called a port, and each port is used for different purposes. For example, normal web browsing is done through port 80, secure web browsing is done through port 443, and file transfer is done through 21.

Doesn’t OS X have a firewall?

While it is true that OS X has a built in firewall, it’s only half as good as Little Snitch. The default firewall only covers incoming connections, but allows all applications to make outgoing connections without restriction. This is where Little Snitch defines itself, by letting you control all connections, rather than half.


Setting up Little Snitch

It’s not hard to set up Little Snitch, just a simple download and install. However, you will need to restart your system after installing. This is because Little Snitch replaces a program called iptables, which is used for system networking. Don’t worry, Little Snitch doesn’t overwrite that program, it just replaces it.

The Configuration Window

When you load up Little Snitch for the first time, you will see that there are already a lot of rules created for you. Most of these rules have a lock on them, and are required for normal system operation. while you can disable them, you cannot (and should not) delete them. Selecting a locked rule will show a description of why it’s locked on the side.

SNITCH_RulesThe Rule list in Little Snitch

On the left hand side of the Configuration Window, you will see the rule filters. Check these every now and again for redundant or invalid rules.

Creating Filters

By now, you’ve probably seen the Automatic Rule Creation dialog. This will come up every time a new application wants to make a connection, and there isn’t a rule regarding it. The new rule dialog will show you the application’s name, icon, and where it’s trying to connect to. You can allow or deny the connection:

  • Forever
  • Once
  • Until you quit the application
  • Until you log out
  • Until you restart
  • For 15 Minutes
  • For 30 Minutes
  • For 1 Hour
  • For 2 Hours

You can go even further by controlling where the application can connect:

  • Any Connection
  • Only a specific port
  • Only a specific domain
  • Only a specific domain and port

With all of these controls, you can create a virtually unlimited number of rules for your apps.

Creating rules in Little Snitch

When creating filters, ask yourself “What does this application need to do?”. For example, a web browser like Google Chrome, Safari, or FireFox will need to connect to multiple domains and ports. Therefore, giving it a fully open rule would be the smart decision. From there, you can block specific domains if you need to. If you use any peer-to-peer applications like Transmission or uTorrent, you will need to allow it full network access for it to operate normally.

Manually Creating Rules

If you need a little more robust control when creating rules, or can’t launch the application until a rule has been made, you can create rules manually through the Little Snitch Configuration Window. To do this, open Little Snitch and select New Rule. The New Rule sheet will drop down.

At the very top, you can control if you want to block or allow incoming or outgoing connections. You can then choose the application, or set a global rule that applies to all processes. Below that is the fine tuning controls for how you want this rule to work. You will notice that there are a lot more controls than the automatic rule sheet, so go ahead and play around with them!

Manually creating rules in Little Snitch

Following Up

So now that you got the basics down of Little Snitch, you’re all set to go out and take control of your privacy when using your Mac. There are plenty of programs out there that send tracking information without your consent. What are some applications that you discovered that are sending info back home?

http://mac.tutsplus.com


Update Your Iphone 2G To Latest Firmware IOS 6.0

Since Apple has downgraded the support of latest firmware for iPhone 2G and iPod Touch 1G after releasing iOS4 firmware, users of iPhone 2G will not get updated their phone to iOS 4 or latest. This new firmware has several improved features as well as it fixes some bugs. However no need to get disappointed because there are many tech-freaks who developed new way to update iPhone 2G to iOS 6.

An Italian application developer creates new firmware named, Whited00r which enables you update your iPhone 2G to iOS 6 firmware easily. It means now you are able to get latest features of iOS 6 firmware in your iPhone 2G easily. The latest developed firmware by Italian developer is build to update iOS 3.1.3 firmware. However you can update your iPhone 2G to iOS 6 easily with this firmware and get all genuine features of iOS 6 firmware on your iPhone 2G.

In order to update your iPhone 2G to iOS 6 using Whited00r firmware, you need to download and install Whited00r firmware on your computer. Now get the full guide to update your iPhone 2G to iOS 6 from here. You just need to follow given steps systematically and you will get updated your iPhone2G.