![](https://img.laitimes.com/img/__Qf2AjLwojIjJCLyojI0JCLiAzLcBTM0MDMyYDOxMTMvwFMvwFajRXYt9FcwF2c3VmbvwVbvNmLn1Wa0dmLzdXZul2Lc9CX6MHc0RHaiojIsJye.jpg)
Today is space with you [No. 1403]
As the network becomes more and more developed
A lot of people every day
It will take a lot of time
Wander in the online world
The web is already a part of our lives
But there are always some people
It's restlessness
You have to "toss around" on the Internet.
Again, I advise you on titanium powder
"Circumventing the wall" is dangerous
Beware of falling "to pieces"
To ensure the safety of the network
The following behaviors must not be done
Downloads of YouTube, Chrome,
FaceBook, Twitter, Google Services, etc
Apps and software
Use is strictly prohibited
Vpn proxy service function
FOXAE, Google, etc
Network acceleration engine
and search service engine
Downloads and use of game accelerators are strictly prohibited
Play the international version of the online game
Downloading and using suspicious software is strictly prohibited
Platforms & Resources
Registration and purchase are strictly prohibited
and use the Circumvention plug-in
Tools and software
The use of any Circumvention tool is strictly prohibited
Browse overseas websites
Forwarding propagation of information
Sign up for a social account
Join a chat group
"Over the wall" gambling?
"Over the wall" to play the game?
"Circumventing the wall" to browse bad websites?
Do you dare to continue to "commit crimes"?
Let's see
How harmful are these acts!
The app shown in the following figure
Don't touch it!
How to self-examine the "circumvention" behavior?
1. Check the APP list
See if there is an installation
Circumvention software
See if you have installed software tools for "circumvention" on your phone (such as ExpressVPN, VyprVPN, NordVPN, Shadowsocket, etc.), or whether you have installed overseas apps (such as Google, Twitter, Facebook, YouTube, etc.).
2. Check your phone settings
Look at the VPN settings
Whether there is account information
If you are a mobile device, focus on checking whether there is account information in the VPN settings (using PPTP, LT2P, IPSec, OpenVPN or SSTP).
3. Check your browser history
See if there is browsing to watch
Obscene pornography
Check browser history, player playback records, or memory storage records to see if there are any cases of downloading, storing, browsing, or watching obscene pornographic content. In particular, the focus is on checking for errors and installing download or playback plug-ins provided by pornographic websites.
4. Check the game accelerator
See if you can log in to the outer server
Check the type of mobile game on the mobile phone to see if there is a situation of logging in to a foreign game server, and focus on checking whether the game accelerator for external service acceleration is installed.
5. Check the contents of the mailbox
See if there is a registration outside the domain
Account Information
Generally, the circumvention wall is carried out through third-party software, and the third-party software must be registered when it is used, and the registration needs to be through the mailbox or mobile phone, then the corresponding through the mailbox and mobile phone SMS can be seen whether there is a phenomenon of registering a third-party VPN. In particular, it is important to check whether there are any overseas social accounts such as Twitter, Facebook, and Instagram that have been registered.
What are the hazards of "circumvention"?
1. Fall into a political trap
Violating the border and "climbing over the wall" to surf the Internet, enthusiastically following "political wild history" and "earth-shattering secrets," being infiltrated and seduced by reactionary ideas, and becoming a "second-hander" of erroneous views.
2. Mistakenly enter the hook trap
All kinds of new network "circumvention" tools have been continuously upgraded and refurbished, with a high degree of encryption and strong secrecy, which has become an important means of attracting and plotting rebellion.
3. Fall into the trap of breaking the law
The "circumvention of the wall" of the Internet has been used by many lawbreakers and criminals to lure netizens to participate in online gambling, illegal lending, drug abuse and prostitution, causing criminal cases and suicide problems.
Entertainment for millions
Safety First
Internet access is not standardized
Relatives two lines of tears