Skip to main content

产党丧心病狂了把google全部服务都封了

发信人: dylpaopao (泡泡龙), 信区: Military
标  题: 产党丧心病狂了把google全部服务都封了
发信站: BBS 未名空间站 (Mon Jun  2 18:41:49 2014, 美东)

提供中国封锁网站资讯的美国网站GreatFire.org周一(2日)表示,在六四25周年即将
来临之际,Google被中国当局严重干扰已有4日至今,Google所有的服务,包括搜索、
图片、翻译,无论是HTTP还是HTTPS,所有Google国家版本都被干扰,包括Google香港
,Google.com等。

该网站指,目前不清楚是次封锁是因六四暂时封锁,还是永久封锁,该网站估计是永久
封锁。对上一次Googel被封,是2012年,但只有12小时,他们当时估计,中国审查机构
在测试公众反应或者测试“封锁Google”按钮,或者今次封锁事件,审查机构已经获取
了足够的数据来永久封锁Google。

这是有史以来最严厉的封锁。该网站谴责中国审查机构的这种行为。

路透社引述Google发言人回应说,公司广泛地检查后,Google 一方没有出现任何错误
(导致服务停顿) 。

该网站指,Google是有方法挑战这种封锁,可以使用“内容分发网络” (CDN)来防止IP
封锁,Google还可以将反审查功能内嵌到Chrome里面,但Google选择不这样做。

目前Chrome的启始页在大陆都无法打开。

在2009年,谷歌中国为规避审查,将搜索引擎服务市场由大陆转至香港。

================
亲测全部服务,包含搜索,gmail,scholar都不能使用。产党这是丧心病狂了。没有
scholar真没法想象怎么搞科研。永久封锁google,产党得是挑战科研人员信心?http://gengwg.blogspot.com/

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...