Showing posts with label Cyber Security. Show all posts
Showing posts with label Cyber Security. Show all posts

Friday, October 31, 2025

How are people downloading books, PDFs for free in India after LibGen was blocked (Nov 2025)

View All Articles on "Torrent, Tor and LibGen"


After the blocking of LibGen in India, people are still downloading free book PDFs through several alternative methods and sites. The most common ways include using LibGen mirror and proxy sites, VPNs, and alternative ebook repositories.

Accessing LibGen via Mirrors and Proxies

Although LibGen's main domain may be blocked in India, several working mirrors exist such as libgen.is, libgen.li, and gen.lib.rus.ec. People often find new working domains by searching for "library genesis proxy" or "library genesis mirror." Some users recommend using a VPN to bypass ISP-level blocks and access the original or mirror domains safely.cashify+3

Alternative Free PDF Book Sites

Users have shifted to other websites that offer free book downloads:

  • Anna’s Archive (annas-archive.org), which aggregates resources from LibGen, Z-Library, and more.reddit

  • Z-Library, another major source of free e-books, although it sometimes faces its own restrictions.techpoint+1

  • PDF Drive, for a wide variety of textbook and general PDF downloads.reddit

  • Other options like Ocean of PDF, DigiLibraries, Project Gutenberg, and ManyBooks also serve as alternatives, though their collections may be more limited or focused on legally free (public domain) works.techpoint+1

Using VPNs and Tor Browsers

People in India frequently use free VPNs (like ProtonVPN or 1.1.1.1) to access blocked sites, including LibGen and its mirrors. Some users also recommend privacy-focused browsers like Tor to navigate around ISP restrictions.reddit+1

Key Points and Cautions

  • Visiting and downloading from these sites may redirect users through popups or advertisements. Using antivirus software is recommended.

  • The legality of downloading copyrighted materials without permission is questionable in many jurisdictions, even if local enforcement focuses on distribution rather than individual downloads.reddit

In summary, despite the ban, readers in India continue to access free book PDFs by adapting quickly to new mirrors, using VPNs, trying site alternatives, and utilizing aggregation sites.librarygenesis+5

Tags: Technology,Cyber Security

Monday, August 8, 2022

Accessing Twitter API From Two Systems. One With Firewall and Second Without Firewall

This note is less about accessing Twitter API but more about Cyber Security where you run a curl command and based on the output from that command you try to figure out the firewall settings of the system.

System 1 Configuration With Strict Firewall Where Our Curl Command For Accessing Twitter API is Not Working:

(base) C:\Users\ash\Desktop>systeminfo
OS Name:                   Microsoft Windows 10 Enterprise
OS Version:                10.0.19042 N/A Build 19042

Processor(s):              1 Processor(s) Installed.
                              [01]: AMD64 Family 23 Model 24 Stepping 1 AuthenticAMD ~2100 Mhz
BIOS Version:              HP R79 Ver. 01.10.03, 3/24/2020

Network Card(s):           4 NIC(s) Installed.
                              [01]: Realtek RTL8822BE 802.11ac PCIe Adapter
                                    Connection Name: Wi-Fi
                                    DHCP Enabled:    Yes
                                    DHCP Server:     192.168.1.1
                                    IP address(es)
                                    [01]: 192.168.1.100
                                    [02]: fe80::b1b2:6d59:f669:1b96
                                    [03]: 2401:4900:47f1:b174:70f4:de28:6287:b1c9
                                    [04]: 2401:4900:47f1:b174:b1b2:6d59:f669:1b96
                              [02]: Realtek PCIe GbE Family Controller
                                    Connection Name: Ethernet
                                    Status:          Media disconnected
                              [03]: Bluetooth Device (Personal Area Network)
                                    Connection Name: Bluetooth Network Connection
                                    Status:          Media disconnected
                              [04]: Check Point Virtual Network Adapter For Endpoint VPN Client
                                    Connection Name: Ethernet 2
                                    DHCP Enabled:    Yes
                                    DHCP Server:     10.79.251.145
                                    IP address(es)
                                    [01]: 10.79.251.146
                                    [02]: fe80::3df2:2a4:b2e1:cb0
Hyper-V Requirements:      VM Monitor Mode Extensions: Yes
                              Virtualization Enabled In Firmware: Yes
                              Second Level Address Translation: Yes
                              Data Execution Prevention Available: Yes   


System 2 Without Strict Firewall Where Curl Command is Working:


C:\Users\Ashish Jain>systeminfo

Host Name:                 LAPTOP-79RV456R
OS Name:                   Microsoft Windows 10 Home Single Language
OS Version:                10.0.19043 N/A Build 19043
OS Manufacturer:           Microsoft Corporation
OS Configuration:          Standalone Workstation
OS Build Type:             Multiprocessor Free
Registered Owner:          Ashish Jain
Registered Organization:
Product ID:                00327-35105-52167-AAOEM
Original Install Date:     3/14/2021, 6:33:25 AM
System Boot Time:          7/14/2022, 5:34:13 PM
System Manufacturer:       LENOVO
System Model:              81H7
System Type:               x64-based PC
Processor(s):              1 Processor(s) Installed.
                              [01]: Intel64 Family 6 Model 78 Stepping 3 GenuineIntel ~2000 Mhz
BIOS Version:              LENOVO 8QCN26WW(V1.14), 12/29/2020
Windows Directory:         C:\WINDOWS
System Directory:          C:\WINDOWS\system32
Boot Device:               \Device\HarddiskVolume1
System Locale:             en-us;English (United States)
Input Locale:              00004009
Time Zone:                 (UTC+05:30) Chennai, Kolkata, Mumbai, New Delhi
Total Physical Memory:     12,154 MB
Available Physical Memory: 7,634 MB
Virtual Memory: Max Size:  14,010 MB
Virtual Memory: Available: 8,057 MB
Virtual Memory: In Use:    5,953 MB
Page File Location(s):     C:\pagefile.sys
Domain:                    WORKGROUP
Logon Server:              \\LAPTOP-79RV456R
Hotfix(s):                 15 Hotfix(s) Installed.
                              [01]: KB5013887
                              [02]: KB4562830
                              [03]: KB4577586
                              [04]: KB4580325
                              [05]: KB4589212
                              [06]: KB5000736
                              [07]: KB5015807
                              [08]: KB5006753
                              [09]: KB5007273
                              [10]: KB5011352
                              [11]: KB5011651
                              [12]: KB5014032
                              [13]: KB5014035
                              [14]: KB5014671
                              [15]: KB5005699
Network Card(s):           4 NIC(s) Installed.
                              [01]: VirtualBox Host-Only Ethernet Adapter
                                    Connection Name: VirtualBox Host-Only Network
                                    DHCP Enabled:    No
                                    IP address(es)
                                    [01]: 192.168.56.1
                                    [02]: fe80::f839:dc84:9a7b:3087
                              [02]: Realtek 8821CE Wireless LAN 802.11ac PCI-E NIC
                                    Connection Name: Wi-Fi
                                    Status:          Media disconnected
                              [03]: Realtek PCIe FE Family Controller
                                    Connection Name: Ethernet
                                    Status:          Media disconnected
                              [04]: Bluetooth Device (Personal Area Network)
                                    Connection Name: Bluetooth Network Connection
                                    Status:          Media disconnected
Hyper-V Requirements:      VM Monitor Mode Extensions: Yes
                              Virtualization Enabled In Firmware: Yes
                              Second Level Address Translation: Yes
                              Data Execution Prevention Available: Yes

C:\Users\Ashish Jain>

    
I was able to make a successful request from System 2:


(base) C:\Users\Ashish Jain>curl "https://api.twitter.com/2/users/by/username/vantagepoint21" -H "Authorization: Bearer A***V"

{"data":{"id":"96529689","name":"Ashish Jain","username":"vantagepoint21"}}

(base) C:\Users\Ashish Jain>curl "https://api.twitter.com/2/users/by/username/elonmusk" -H "Authorization: Bearer A***V"

{"data":{"id":"44196397","name":"Elon Musk","username":"elonmusk"}}      


The curl command is not working on the System 1.

I think there is some issue being created by Network Firewall settings in my office laptop. From which I was not able to get a response from Twitter API.

(base) C:\Users\ash\Desktop\twitter_api>curl "https://api.twitter.com/2/users/by/username/vantagepoint21" -H "Authorization: Bearer 9***2"

curl: (35) schannel: next InitializeSecurityContext failed: Unknown error (0x80092012) - The revocation function was unable to check revocation for the certificate.

On further testing the "curl" command on 'System 1' for URLs with "http" and "https" protocols:

(base) C:\Users\ash\Desktop>curl www.survival8.blogspot.com
<HTML>
<HEAD>
<TITLE>Moved Permanently</TITLE>
</HEAD>
<BODY BGCOLOR="#FFFFFF" TEXT="#000000">
<H1>Moved Permanently</H1>
The document has moved <A HREF="http://survival8.blogspot.com/">here</A>.
</BODY>
</HTML>

Success for HTTP based URL

--- (base) C:\Users\ash\Desktop>curl https://survival8.blogspot.com curl: (35) schannel: next InitializeSecurityContext failed: Unknown error (0x80092012) - The revocation function was unable to check revocation for the certificate. (base) C:\Users\ash\Desktop>curl https://survival8.blogspot.com/2022/08/lets-talk-about-whataboutery.html curl: (35) schannel: next InitializeSecurityContext failed: Unknown error (0x80092012) - The revocation function was unable to check revocation for the certificate.

Failure for HTTPS based URL.

---

Successful Testing With Another HTTP based URL:

(base) C:\Users\ash\Desktop>curl http://survival8.blogspot.com/2022/08/lets-talk-about-whataboutery.html <!DOCTYPE html> <html class='v2' dir='ltr' lang='en'> <head> <link href='https://www.blogger.com/static/v1/widgets/2975350028-css_bundle_v2.css' rel='stylesheet' type='text/css'/> <meta content='width=1100' name='viewport'/> <meta content='text/html; charset=UTF-8' http-equiv='Content-Type'/> <meta content='blogger' name='generator'/> <link href='http://survival8.blogspot.com/favicon.ico' rel='icon' type='image/x-icon'/> <link href='http://survival8.blogspot.com/2022/08/lets-talk-about-whataboutery.html' rel='canonical'/> <link rel="alternate" type="application/atom+xml" title="survival8 - Atom" href="http://survival8.blogspot.com/feeds/posts/default" /> <link rel="alternate" type="application/rss+xml" title="survival8 - RSS" href="http://survival8.blogspot.com/feeds/posts/default?alt=rss" /> <link rel="service.post" type="application/atom+xml" title="survival8 - Atom" href="https://draft.blogger.com/feeds/7823701911930369175/posts/default" /> <link rel="alternate" type="application/atom+xml" title="survival8 - Atom" href="http://survival8.blogspot.com/feeds/1169952638388485943/comments/default" /> <!--Can't find substitution for tag [blog.ieCssRetrofitLinks]--> <meta content='http://survival8.blogspot.com/2022/08/lets-talk-about-whataboutery.html' property='og:url'/> <meta content='Let’s talk about ‘Whataboutery’' property='og:title'/> <meta content=' what·about·ery [ˌwɒtəˈbaʊtəri] NOUN BRITISH the technique or practice of responding to an accusation or dif...' property='og:description'/> <title>survival8: Let’s talk about ‘Whataboutery’</title> <style id='page-skin-1' type='text/css'><!-- /* ----------------------------------------------- Blogger Template Style Name: Simple Designer: Blogger URL: www.blogger.com ----------------------------------------------- */ /* Content ----------------------------------------------- */ body { ...

Also, note that if that was Authorization failure from Twitter API, then the output would still be a JSON format informative message:

(base) C:\Users\Ashish Jain>curl "https://api.twitter.com/2/users/by/username/elonmusk" -H "Authorization: Bearer 9***INCORRECT_BEARER_TOKEN***2" { "title": "Unauthorized", "type": "about:blank", "status": 401, "detail": "Unauthorized" }

On a Side Note: Take a look at another error message from Twitter API:

(base) C:\Users\Ashish Jain>curl "https://api.twitter.com/2/users/by/username/elonmusj" -H "Authorization: Bearer A***V" { "errors": [ { "parameter":"username", "resource_id":"elonmusj", "value":"elonmusj", "detail":"User has been suspended: [elonmusj].", "title":"Forbidden", "resource_type":"user", "type":"https://api.twitter.com/2/problems/resource-not-found" } ] } Notice the typo in Elon Musk's user handle we provided in query: elonmusj

Sunday, May 22, 2022

What is this l.facebook.com in Blogger Top Referrers (2022-May-23)


1. Before Top Referer - l.facebook.com

2. Click on this blue 'learn more' button (below banner) that generates leads wrt l.facebook.com

3. Before The Link Goes Out to survival8, look at the intermediate URL

4. After Top Referrer - l.facebook.com

Tags: Technology,Cyber Security,Web Development,

Friday, May 20, 2022

Testing Anti-virus Functionality of Google Drive (2022-May-20)

1. Virus found in .zip file due to the presence of an .exe Executable file.

2. Can't download all files Suspicious files will be skipped.

3. As an owner, I can download the files individually at my own risk

4. As an owner, I can download the files individually at my own risk

5. The Deleting the Executable Files from 'CD1' Directory

Ashish Jain@LAPTOP-79RV456R MINGW64 ~/OneDrive/Desktop/CD1 $ ls 0others/ 1allaboutmba/ 2bschool/ 3writtentest/ Ashish Jain@LAPTOP-79RV456R MINGW64 ~/OneDrive/Desktop/CD1 $ cd 0others/ Ashish Jain@LAPTOP-79RV456R MINGW64 ~/OneDrive/Desktop/CD1/0others $ ls -lR | grep exe -rwxr-xr-x 1 Ashish Jain 197121 6603173 Jan 5 2000 acrobat.exe* -rw-r--r-- 1 Ashish Jain 197121 1039 Jul 20 2004 menu_link_exe.gif Ashish Jain@LAPTOP-79RV456R MINGW64 ~/OneDrive/Desktop/CD1/0others $ cd ../3writtentest/ Ashish Jain@LAPTOP-79RV456R MINGW64 ~/OneDrive/Desktop/CD1/3writtentest $ ls -lR | grep exe -rwxr-xr-x 1 Ashish Jain 197121 753664 May 7 2001 307vocabsoftware1.exe* -rwxr-xr-x 1 Ashish Jain 197121 240218 Jul 3 2004 310mathsoft.exe* -rwxr-xr-x 1 Ashish Jain 197121 1602560 Mar 2 2004 311gmattest.exe* Ashish Jain@LAPTOP-79RV456R MINGW64 ~/OneDrive/Desktop/CD1/3writtentest Logs post deletion of Executables: Ashish Jain@LAPTOP-79RV456R MINGW64 ~/OneDrive/Desktop/CD1 $ ls -lR | grep exe -rw-r--r-- 1 Ashish Jain 197121 1039 Jul 20 2004 menu_link_exe.gif
Tags: Technology,Cloud,Cyber Security,

Thursday, May 19, 2022

Full Lumen Complaint Notice from TIME Institute against survival8 Blog for CAT Preparation Content

DMCA (Copyright) Complaint to Google

Other Entities:
  • Principal

Re: Unknown

Notice Type:
DMCA
Jurisdictions
IN
Technology,Cyber Security,

Tuesday, May 17, 2022

Limitations LinkedIn puts on you when you add too many people (2022-May-17)

At 60 Invitations Sent

Nice job building your network! Tip: If it's someone you don't know yet, you can follow them to see their updates or send an InMail.

At 100

You've sent more invitations than most On LinkedIn, it's best to only connect with people you know. You can still send an InMail if you want to introduce yourself.

At 150

You're close to the weekly invitation limit To avoid overwhelming the inbox of other members, only connect with people you know. For people you don't know, consider following them or sending an InMail instead.

At 180

You're close to the weekly invitation limit To avoid overwhelming the inbox of other members, only connect with people you know. For people you don't know, consider following them or sending an InMail instead.

At 190

You're close to the weekly invitation limit To avoid overwhelming the inbox of other members, only connect with people you know. For people you don't know, consider following them or sending an InMail instead. Unable to connect to Gaurav Harbola. Try again later.

At 200

You’ve reached the weekly invitation limit Connections benefit you more when you know them personally, so we have weekly limits to encourage better networks. For people you don’t know, you can follow them to see their posts or send an InMail instead. If you’d still like to send an invitation, please try again next week.

If you continue to add people in the following week after the "Weekly Limit" is removed, your account would be temporarily blocked.

We've restricted your account temporarily We think you may be using an automation tool to send invitations. To help guard against abuse, we don’t permit the use of software tools that automate activity on LinkedIn. We showed you a warning about this previously, so for now, we have locked your account until May 28, 2022 11:27 PM PDT. Please try signing in again after this time. Please note that engaging further in such activity may result in permanent restriction of your account. For more details, please visit our Help Center.
Tags: Technology,Cyber Security,

Tuesday, January 25, 2022

SaveFrom to exit from USA (Jan 2022)



Subject: Discontinuation of Service in the United States

April 16, 2020

Dear Savefrom User:

As you may have heard, our industry has been under strenuous attacks by certain US copyright holders. Because of these attacks, it has become financially impractical for Savefrom to continue to provide services in the United States.

Accordingly, Savefrom will be terminating its services in the United States as of April 28, 2020.

We thank you for your past loyalty and patronage and wish you health and safety during the present health crisis and beyond.

Very truly yours,

Savefrom

Tags: Technology,Cyber Security,

Friday, September 3, 2021

Google Sites, Tor Exit Nodes and Captcha



Top 10 Websites

Rank - Website - Monthly Visitors - Country of Origin - Category 1 Google.com 92.5B U.S. Search Engines 2 Youtube.com 34.6B U.S. TV Movies and Streaming 3 Facebook.com 25.5B U.S. Social Networks and Online Communities 4 Twitter.com 6.6B U.S. Social Networks and Online Communities 5 Wikipedia.org 6.1B U.S. Dictionaries and Encyclopedias 6 Instagram.com 6.1B U.S. Social Networks and Online Communities 7 Baidu.com 5.6B China Search Engines 8 Yahoo.com 3.8B U.S. News and Media 9 xvideos.com 3.4B Czech Republic Adult 10 pornhub.com 3.3B Canada Adult ... 41 Walmart.com 718.6M U.S. Marketplace 42 Bilibili.com 686.0M China Animation and Comics 43 Tiktok.com 663.2M China Social Networks and Online Communities 44 Paypal.com 657.2M U.S. Financial Planning and Management 45 Google.de 624.5M Germany Search Engines 46 Amazon.co.jp 619.2M Japan Marketplace 47 Aliexpress.com 611.0M China Marketplace 48 Amazon.de 608.8M Germany Marketplace 49 Rakuten.co.jp 593.4M Japan Marketplace 50 Amazon.co.uk 579.7M United Kingdom Marketplace

Top 50 Websites

Google.com

YouTube

2021-Sep-02
2021-Aug-24

survival8.blogspot.com

Ref: visualcapitalist Tags: Technology,Cyber Security,Web Scraping,

Monday, August 23, 2021

Multifactor Authentication protects you from scrapers and automation tools (Case study of LinkedIn)



1. Linkedin Scraping and Logging Issue with MFA
2. LinkedIn Scraping - Google Auth fails as Google knows that you in an automated environment
Tags: Technology,Cyber Security,Web Scraping,

Sunday, August 8, 2021

Censorship in India, Torrenting and Tribler (Aug 2021)



1: Censorship in India (Part 1)

Your requested URL has been blocked as per the directions received from Department of Telecommunications, Government of India. Please contact administrator for more information. Note: You can still open the link the Tor Browser.

2: Censorship in India (Part 2)

Censorship of trackers (discovered using qBit)

3: Now comes in the Tribler. What's that?

4: Getting the Magnet link for a Torrent download via qBitTorrent

5: Paste the Magnet link from qBit to Tribler

Then wait for Metadata to load.

6: Trackers information in Tribler

7: Peer info in Tribler

8: Caveat: Performance Issue in Tribler

Labels: Cyber Security, Indian Politics, Politics, Technology, Web Development, Web Scraping

Saturday, July 3, 2021

Before you continue to YouTube, Google uses cookies and data to...



The above screeshot was taken from Tor Browser on 20210704. Before you continue to YouTube Google uses cookies and data to: 1. Deliver and maintain services, like tracking outages and protecting against spam, fraud, and abuse 2. Measure audience engagement and site statistics to understand how our services are used If you agree, we’ll also use cookies and data to: 1. Improve the quality of our services and develop new ones 2. Deliver and measure the effectiveness of ads 3. Show personalized content, depending on your settings 4. Show personalized or generic ads, depending on your settings, on Google and across the web For non-personalized content and ads, what you see may be influenced by things like the content you’re currently viewing and your location (ad serving is based on general location). Personalized content and ads can be based on those things and your activity like Google searches and videos you watch on YouTube. Personalized content and ads include things like more relevant results and recommendations, a customized YouTube homepage, and ads that are tailored to your interests. Click “Customize” to review options, including controls to reject the use of cookies for personalization and information about browser-level controls to reject some or all cookies for other uses. You can also visit g.co/privacytools anytime. Labels: Technology,Cyber Security,Web Development,Web Scraping,

Wednesday, June 23, 2021

Tor Browser, Anonymity and Your IP Address



1 - What is my IP Address When I Use Tor Browser
URL: WhatIsMyIPAddress.com
2 - GitHub Security Logs for IP Address on Tor Browser
3 - What is my IP address as reported by Google Search
4 - IP Address Lookup for 'whatIsMyIPAddress.com'
5 - IP Address Lookup for IP Address showed by Google search
Tags: Technology,Cyber Security,Web Development,Web Scraping,GitHub,

This is a Tor Exit Router: 156.146.58.134

Most likely you are accessing this website because you had some issue with the traffic coming from this IP. This router is part of the Tor Anonymity Network, which is dedicated to providing privacy to people who need it most: average computer users. This router IP should be generating no other traffic, unless it has been compromised.

How Tor works

Tor sees use by many important segments of the population, including whistle blowers, journalists, Chinese dissidents skirting the Great Firewall and oppressive censorship, abuse victims, stalker targets, the US military, and law enforcement, just to name a few. While Tor is not designed for malicious computer users, it is true that they can use the network for malicious ends. In reality however, the actual amount of abuse is quite low. This is largely because criminals and hackers have significantly better access to privacy and anonymity than do the regular users whom they prey upon. Criminals can and do build, sell, and trade far larger and more powerful networks than Tor on a daily basis. Thus, in the mind of this operator, the social need for easily accessible censorship-resistant private, anonymous communication trumps the risk of unskilled bad actors, who are almost always more easily uncovered by traditional police work than by extensive monitoring and surveillance anyway.

In terms of applicable law, the best way to understand Tor is to consider it a network of routers operating as common carriers, much like the Internet backbone. However, unlike the Internet backbone routers, Tor routers explicitly do not contain identifiable routing information about the source of a packet, and no single Tor node can determine both the origin and destination of a given transmission.

As such, there is little the operator of this router can do to help you track the connection further. This router maintains no logs of any of the Tor traffic, so there is little that can be done to trace either legitimate or illegitimate traffic (or to filter one from the other). Attempts to seize this router will accomplish nothing.

Furthermore, this machine also serves as a carrier of email, which means that its contents are further protected under the ECPA. 18 USC 2707 explicitly allows for civil remedies ($1000/account plus legal fees) in the event of a seizure executed without good faith or probable cause (it should be clear at this point that traffic with an originating IP address of nyc-exit.privateinternetaccess.com should not constitute probable cause to seize the machine). Similar considerations exist for 1st amendment content on this machine.

If you are a representative of a company who feels that this router is being used to violate the DMCA, please be aware that this machine does not host or contain any illegal content. Also be aware that network infrastructure maintainers are not liable for the type of content that passes over their equipment, in accordance with DMCA "safe harbor" provisions. In other words, you will have just as much luck sending a takedown notice to the Internet backbone providers. Please consult EFF's prepared response for more information on this matter.

For more information, please consult the following documentation:

  1. Tor Overview
  2. Tor Abuse FAQ
  3. Tor Legal FAQ

That being said, if you still have a complaint about the router, you may email the maintainer. If complaints are related to a particular service that is being abused, I will consider removing that service from my exit policy, which would prevent my router from allowing that traffic to exit through it. I can only do this on an IP+destination port basis, however. Common P2P ports are already blocked.

You also have the option of blocking this IP address and others on the Tor network if you so desire. The Tor project provides a web service to fetch a list of all IP addresses of Tor exit nodes that allow exiting to a specified IP:port combination, and an official DNSRBL is also available to determine if a given IP address is actually a Tor exit server. Please be considerate when using these options. It would be unfortunate to deny all Tor users access to your site indefinitely simply because of a few bad apples.