Question:
workaround for URL redirect on LAN?
?
2011-05-27 19:22:44 UTC
At work, our LAN administrator has somehow implemented URL redirects for various websites (e.g., Twitter, Facebook, eBay, etc.) regardless of browser used. Entries of those URLs now redirect to our company website when surfing through our LAN.

It was set up at the request of the company owner in response to one former employee who was abusing access to those sites and the redirects have never been removed even though the offending employee has long since left.

I want to either disable or at least subvert the redirects just on my own workstation.

Is there a common procedure the LAN admin would have used to put the redirects in place? Any suggestions on finding out how it was done and how I can regain access to those sites?

Thanks in advance for any assistance.
Three answers:
Kev P
2011-05-27 19:28:20 UTC
It depends if they are using a proxy server or just simply adding DNS entries to redirect "www.twitter.com" to whatever. Try connecting to the sites via IP



199.59.148.10 would take you to twitter (type this in the address bar)



If they are using a proxy server its not as simple. The easiest thing would be to find a web proxy redirect to bounce your searches off of. The they actually know what they are doing you probably won't get around it.
La Verdad
2011-05-27 19:25:43 UTC
There are plenty of ways:

1)Try using HTTPS instead of HTTP

2)Enter the IP address

3)Obscure the URL using URL encoding or simply changing the case

4) Use a proxy website

5)Use a software proxy like JAP

6) VPN or SSH to a server or computer at your house
gilbert
2016-10-02 12:45:24 UTC
you are able to desire to flow in and edit the default 404 internet site on the server and positioned a redirect url in it. Then every time the server returns a 404, it is going anyplace the redirect is desperate to. The pages are contained in the C:WINDOWShelpiisHelpcommon itemizing.


This content was originally posted on Y! Answers, a Q&A website that shut down in 2021.
Loading...