This wikiHow teaches you how to visit blocked websites (and other content) on a restricted computer, or on a mobile device if you are using a virtual private network (VPN).
Steps
Method 1 of 4: Use a web-based proxy

Step 1. Open a web browser
Click or double-click the icon of the application that is used as the default Internet browser on your library computer.

Step 2. Go to a proxy site
There are countless proxy sites available, but here are some of the most popular:
- ProxFree:
- HideMe:
- CroxyProxy:
- In case access to all those proxies is blocked on your network, type free proxy online in a search engine and then open the most relevant results until you find a proxy that is not blocked.

Step 3. Find the address bar and click on it
These sites generally include a text box in the middle of the page that says "URL" or "Website".

Step 4. Enter a web address
Type the web address of a blocked site (for example, "www.facebook.com") in the text box.
In most proxies, it is not possible to search by entering keywords in the search bar. However, you can open a standard search engine (eg Google) from the proxy and then search for keywords from there

Step 5. Press ↵ Enter
Doing so will cause the proxy to start loading the website.
Since proxies do not use direct paths from the computer to the server, this may take a few seconds longer than normal

Step 6. Browse without restrictions
Using the proxy tab, you will be able to access any of the sites that were previously blocked. Keep in mind that, to do this, you will have to stay in the proxy tab. If you open a new tab or window in your browser and try to access blocked content from there, you will not succeed.
Method 2 of 4: Use UltraSurf

Step 1. Understand how to use UltraSurf
UltraSurf is a program that does not need installation, which means that it can be used even on computers with strict restrictions. When you open UltraSurf, it will connect to the closest proxy using your computer's default browser and then open an incognito (or private) window in that browser. Thus, you can use it to visit blocked or restricted sites.
Unfortunately, UltraSurf is only available for Windows computers

Step 2. Open the UltraSurf website
Go to https://www.techspot.com/downloads/5711-ultrasurf.html in your computer's web browser.
If you cannot download the program using the restricted computer, you can download it at home and copy it to a USB stick. Then you can run the program from memory

Step 3. Click Download Now
It's a blue button in the upper-left corner of the page. As you do so, UltraSurf will start downloading to your computer.
UltraSurf will download in a ZIP folder

Step 4. Extract the ZIP folder from UltraSurf
To do so, follow these steps:
- Double click on the ZIP folder.
- Click on the tab Extract.
- Click on Remove all.
- Click on Extract.

Step 5. Open UltraSurf
Double click on the icon u1704 in the extracted folder. UltraSurf will start running immediately.
If you downloaded UltraSurf to a USB stick, first plug the stick into the restricted computer and open it

Step 6. Wait for your default web browser to open
UltraSurf will take a few seconds to connect to the most optimal proxy server that is not blocked on your network.

Step 7. Browse without restrictions
Once the browser window opens, you can use it to search for restricted content or access blocked sites.
Method 3 of 4: Use a VPN

Step 1. Select a VPN
As with proxies, there are countless virtual private network (or VPN) services available. Some of the most popular are NordVPN and ExpressVPN, but you can choose the one that best suits your needs (and your budget if you decide to pay for a membership).
- If the firewall or Internet filter that you will try to bypass is on a computer in a library, at work or at a school, it is most likely that you cannot use a VPN since you need to change some settings to do so.
- Unlike proxies, VPNs hide all online browsing while they are active.
- Most VPNs can be tried for free, but they might eventually charge you a small monthly fee (or a discounted yearly one).

Step 2. Subscribe to a VPN
For most VPNs, you need to create an account in order to sign up. Doing so will give you a server address, password, username, and any other information you need to connect.
If your VPN uses a different type of network than the default, they will also provide you with all the information about it

Step 3. Open the VPN settings page on your computer or phone
The steps to do this will depend on the operating system you use. They will also depend on whether you use a computer or a mobile device:
- Windows: open
Windowsstart Beginning, click
Windowssettings Setting, Then in Internet and network, then in the tab VPN and then click Add a VPN connection at the top of the page.
- Mac: open the apple menu
Macapple1 , click System preferences…, Then in Net, then at the sign + in the lower left corner, then in the "Interface" drop-down box and then choose VPN.
- iPhone: open
Iphonesettingsappicon Setting, scroll down and tap general, scroll down and tap VPN and then touch Add VPN configuration.
- Android: open Setting, touch Plus Under the "Wireless & networks" section, tap VPN and later + or ADD VPN.

Step 4. Enter your VPN details
This section varies depending on the type of VPN you are using, the type of authentication it requires, and other factors.
If you have any questions about what information to use, read the "Help" page for the VPN you chose

Step 5. Save your VPN settings
Once you've finished entering your VPN information, do the following:
- Windows: click Keep at the bottom of the page.
- Mac: click Create, finish setting up your VPN according to the instructions provided, and click Apply.
- iPhone: tap Ready in the upper right corner of the screen.
- Android: tap SAVE.

Step 6. Connect to the VPN
Again, the steps vary according to the platform you use:
- Windows: Select the VPN on the "VPN" page, click Connect below it and enter the required data.
- Mac: Select the VPN, then click Connect and enter the required data.
- iPhone: Tap the white switch to the right of the VPN name and enter the required information if necessary.
- Android: Select the VPN name on your VPN page, tap CONNECT and enter the required data.

Step 7. Browse without restrictions
Once you have connected to the VPN, you will be able to use any online service without restrictions.
Method 4 of 4: Use a smartphone as an access point

Step 1. Make sure your operator allows you to use "tethering"
The "tethering" function consists of using your smartphone's cellular data as a Wi-Fi connection on your computer. Not all carriers allow this, although some do unlock this feature if you ask (in some cases, for a fee).
The easiest way to make sure if you can use tethering on your smartphone is by calling your operator and asking

Step 2. Disable Wi-Fi on your smartphone
To do so, follow these steps:
- iPhone: open
Iphonesettingsappicon Setting, touch Wifi, then tap the green switch next to the "Wi-Fi" option
Iphoneswitchonicon1 - Android: swipe down from the top, press and hold the icon
Android7wifi Wifi and uncheck the "Wi-Fi" box or disable that option.

Step 3. Connect your smartphone charger to the computer
Insert the rectangular side with the USB 3.0 connector of your smartphone charger into one of the USB ports on your computer.
If you are using a Mac computer with a Thunderbolt 3 (USB Type-C) connector, you will need a USB 3.0 to USB Type-C adapter to connect the charger cable

Step 4. Connect your smartphone to the charger cable
Plug the other end of the charger cable into the bottom of your iPhone or Android.

Step 5. Enable tethering and Wi-Fi zone on your smartphone
The steps to do this vary depending on whether you use an iPhone or Android:
- iPhone: open
Iphonesettingsappicon Setting, touch Share internet, then tap the white switch next to the "Internet Sharing" option
Iphoneswitchofficon - Android: Swipe down from the top, tap the
Android7settings Setting, touch Plus Under the "Wireless & networks" heading, tap "Tethering and hotspot" and check or enable the "USB tethering" option.

Step 6. Select your smartphone as a means of connection to the Internet
On most computers, your smartphone connection will be immediately prioritized as an Ethernet network; if not, click on the "Wi-Fi" icon

(Windows) or

(Mac) and then select the name of your phone.
Unlike wireless tethering, you do not need to enter a password (which appears in the tethering menu) to connect to your phone

Step 7. Browse without restrictions
As you are going to connect to a cellular network and not to the Internet service of your current location, you will be able to bypass any restrictions.
Keep in mind that tethering consumes a lot of cellular data, which means it could include charges on your bill if you download files, stream online videos, or spend too much time browsing
Advice
- If you can install programs on the computer from which you are going to bypass the firewall or computer restrictions, you can install TeamViewer on both the current computer and your home computer to access the desktop of the latter. Although this method is somewhat slow, you will be able to use the Wi-Fi connection and the browsers of your home computer.
- Some computers block file downloads at the system level. If the restricted computer blocks certain types of files, no matter how hard you use the proxy, you will not be able to download the files in question.
- Typing "https" instead of "http" at the beginning of a website address (for example, "https://www.any URL.com") is sometimes enough to access some blocked sites. Please note that not all sites support secure connections and some filtering programs block secure websites.
Warnings
- In some regions (such as the UK and Singapore), bypassing firewalls and Internet restrictions is illegal and can even lead to imprisonment.
- Many schools and other organizations record all network data. Your organization's IT department will be able to track your activity, which means that everything you do could be recorded.
- Especially in the case of schools, it is common for them to physically monitor the content on the screen. If they do it with your computer, it will not matter that you exceed the restrictions if the administrator decides to close your session.