User Manualeblocker11

eBlocker GmbH
All rights reserved. Errors and omissions reserved
eBlocker GmbH | Kaiser-Wilhelm-Str. 47 | 20355 Hamburg | Germany



Introduction. 5

1.1         The eBlocker Products. 6

1.2         The eBlocker Versions. 6

1.2.1          eBlocker Base. 6

1.2.2          eBlocker Pro. 7

1.2.3          eBlocker Family. 7

2       Commissioning. 9

3       Activation. 10

4       Use eBlocker optimally. 11

4.1         Summary. 11

4.2         Deleting cookies, cache and browsing history. 11

4.3         Activate support for HTTPS/SSL encrypted connections. 11

4.4         Activate exceptions for apps. 11

4.5         Final recommendation. 11

5       If something may not work. 13

5.1         Connection- and network problems. 13

5.2         A website is not displayed. 13

5.3         The eBlocker icon does not displayed on all devices. 15

5.4         The eBlocker icon is not showing on any device. 16

5.5         Removing common problems. 16

5.6         Some apps don’t work. 18

5.7         The eBlocker completely stopped operating. 18

5.8         More help: Our forum and support 19

6       Tips and Tricks. 20

6.1         The individual setup – eBlocker overtaking the DHCP server 20

6.2         Inserting the eBlocker certificate. 20

6.2.1          macOS. 20

6.2.2          Windows. 24

6.2.3          Android. 31

6.2.4          iOS. 31

7       Definition of eBlocker functions. 34

7.1         eBlocker icon. 34

7.2         eBlocker Controlbar BASE, Pro, Family. 34

7.3         Dashboard. 35

7.4         Tracker and Ads (Tracker- and Ad-Blocker) 35

7.5         Anon (IP-Anonymization) 37

7.6         Cloaking. 37

7.7         Pause. 38

7.8         Settings. 38

7.9         Help. 39

8       The eBlocker settings. 40

8.1         General 41

8.1.1          License. 41

8.1.2          Updates. 41

8.1.3          Admin-Password. 41

8.2         Parental Control (beta) 42

8.2.1          Activate Parental Control 42

8.2.2          User and Protection profiles. 42

8.2.3          Three easy steps. 43

8.2.4          Create a new user 43

8.2.5          Change settings of a user 44

8.2.6          Remove User 45

8.2.7          Create new profile. 45

8.2.8          Deny access to categories of websites. 47

8.2.9          Restrict internet access to certain time slots a day. 48

8.2.10        Limit the maximum Internet usage per day. 49

8.2.11        Assign a user to device. 50

8.2.12        Controlbar for users with protection profiles. 51

8.2.13        What happens if the daily internet usage time is limited?. 52

8.2.14        What happens if the internet access is denied?. 53

8.2.15        Add own lists to the Blacklists. 55

8.2.16        Add whitelists to blacklist categories. 56

8.2.17        Add own whitelist categories. 58

8.2.18        Change of user through controlbar 59

8.2.19        Migration of Parental Control to eBlockerOS 1.0. 60

8.3         Devices. 61

8.3.1          Devices – General 62

8.3.2          Devices - General - Name. 62

8.3.3          Devices - General - Activate eBlocker 62

8.3.4          Devices - General - Enable SSL. 62

8.3.5          Show Device Icon. 62

8.3.6          Devices – Anonymization. 63

8.3.7          Devices – Messages. 65

8.3.8          Devices - Discover new devices or remove devices from the list 65

8.4         SSL. 66

8.4.1          SSL Status. 66

8.4.2          SSL Connection Error 67

8.4.3 SSL Certificate. 68

8.4.4 Trusted Apps. 69

8.4.5 Trusted Websites. 70

8.5         IP-Anon. 70

8.5.1          Set up and use the Tor network. 71

8.5.2          Set up alternative VPN network. 73

8.5.3          Set up the VPN-network from Perfecty Privacy. 76

8.5.4          DNS. 80

8.6         System.. 81

8.6.1          Reboot and Shutdown. 81

8.6.2          Time zone and language. 81

8.6.3          Events. 82

8.6.4          Diagnostics report 82

8.6.5          Reset registration. 83

8.6.6          Factory Settings. 83

8.7         Network. 84

8.7.1          eBlocker Mobile (beta) 85

8.8         Advanced. 87

8.8.1          WebRTC. 87

8.8.2          HTTP Referrer Header 87

8.8.3          Google Captive Portal Check. 87

8.8.4          Do Not Track. 87

8.8.5          Compression. 87

8.9         Expert Tools (beta) 88

9       Quick guides. 90

9.1         Delete cookies, cache and browsing history in browser 90

9.1.1          Firefox. 90

9.1.2          Chrome. 90

9.1.3          Internet Explorer 90

10          Glossary. 91

Appendix A      Technical specifications (not valid for software licenses) 94

Appendix B      Safety notes. 94

Appendix C      Manufacturer & copyright 94

Appendix D      Technical support 94



We are very pleased to know you are as concerned about your privacy as we are. We have been developing the eBlocker for more than three years in a team of experienced privacy and IT professionals. We still have a lot of ideas and are developing many more features that we are providing you monthly via updates. Thank you very much for supporting our idea of a free and private Internet by purchasing our eBlocker!



This manual explains all functions of eBlocker and will support you during commissioning. If there are still some questions left, please go to for answers and personal assistance.



1.1      The eBlocker Products

The eBlocker is available in two versions: eBlocker Pro and eBlocker Family. Both versions are based on the same technical architecture and don’t differentiate in their hardware. The difference is determined by their software, after activating the license.


Whether eBlocker Base, eBlocker Pro or eBlocker Family: Now your privacy belongs to you again – and not to the Internet companies.

1.2      The eBlocker Versions

1.2.1        eBlocker Base

The eBlocker Base Is the simple protection of your privacy where your IP address is effectively anonymized when browsing. It can be upgraded to the eBlocker Pro or eBlocker Family at any time.

1.2.2       eBlocker Pro

The eBlocker Pro includes the eBlocker Base features and blocks data collectors and data collecting ads on all devices and browsers - even when you are on the road. The eBlocker Pro can be upgraded to the eBlocker Family at any time.


1.2.3       eBlocker Family

The eBlocker Family expands eBlocker Pro with individual multi-user support and parental controls. Thus, eBlocker protects all family members individually – and your kids from inappropriate content.


The three eBlocker versions have the same hardware and are based on the same software. The features are available in the settings depending on the eBlocker version, or the feature points out for which eBlocker version it is available for.


2      Commissioning

By following this user manual, you will be able to set up your eBlocker in no time.

Please follow the steps to put your device in operation.

Starting from serial number 11000 the eBlocker has an LED installed. The LED is located in the back of the casing and signals the condition of your eBlocker.

<   The LED lights up blue when the eBlocker is connected to the power supply and its system starts running.

<   The LED lights up orange when the eBlocker has automatically configured itself after about 5 minutes. The interface can be reached via the website

In only three steps your eBlocker is ready for use:


1.     Connection

First, connect your eBlocker to your router or switch, with the orange LAN cable.

Then connect your eBlocker with the adapter cable and the power supply.

Automatic configuration

Wait for 5 minutes until your eBlocker has automatically configure itself.

Start an Internet browser and go to:


The eBlocker icon appears at the top right of your browser. With a click on the icon, you will be lead to the so called “controlbar”, in which you can view the most important information about the page you are currently visiting. You are able to customize the eBlocker settings here.


The network link leads you to the network setup wizard. If the icon does not appear, you can find help in section 0.


3      Activation

Please have your serial-number of your eBlocker as well as the license key and your email address ready for the activation.


Find the serial number on the type plate at the bottom of the package and at the bottom of the device. It has the format “SNXXXXXXXX”.


The license key is placed on the license card, which is included in the device packaging. Please use a valid email address in the activation process. If you want to transfer your eBlocker license to another device sometime, your email address will also be needed then.


4      Use eBlocker optimally

4.1      Summary

After the activation process is done, we recommend you the following steps, so you can use eBlocker as optimal as possible:

<   Delete the cookies, cache and browsing history in all used browsers.

<   Activate SSL (HTTPS-Support) in your eBlocker.

<   Adopt eBlocker's certificate into your operating system and if necessary, in the browsers with their own certificate store as described in section 6.2.

<    Activate possible exception lists for specific apps, so eBlocker can’t protect these apps from third parties anymore.

<   You may define additional exceptions for encrypted connections (SSL) – for example, for websites in which eBlocker should not be active, like online-banking sites.


Find all detailed steps explained in the following.

4.2      Deleting cookies, cache and browsing history

eBlocker automatically blocks all data collecting cookies or other elements that identify you.

However, your browser has probably collected numerous tracking cookies of different providers already. Therefore we recommend to delete all your cookies at first, so the trackers “can lose their track”.

You can read more about how to delete cookies in your respective browser in section 9.1.

4.3      Activate support for HTTPS/SSL encrypted connections

How you can activate support for HTTPS/SSL encrypted connections, we describe in section 8.4.

4.4      Activate exceptions for apps

How you can activate exceptions for apps, we describe in section Fehler! Verweisquelle konnte nicht gefunden werden..

4.5      Final recommendation

We have developed our eBlocker very carefully and are constantly improving it. Nevertheless, our eBlocker is no “magic pill” for privacy that works under all circumstances. Apps in particular which are installed in your device/OS natively, represent an increased risk for your privacy. Therefore we recommend to not use any apps at all if possible.

Apps are very common today for accessing Internet services. However, they involve a greater risk for your privacy, as when you use the same service through a browser. Why you should avoid apps to protect your privacy, we explain below:


<   Attack into your privacy

Apps such as Facebook, WhatsApp or Twitter can have a direct access to your device and use their own communication protocols, which cannot be protected by your eBlocker.

<   Transfer of malware

Even the transfer of malicious software represents great danger. App stores do not only provide safe programs, but increasingly apps, that are infected with malware. These infected programs can transmit mobile data (e.g. contact details) unnoticed and without authorization or even send fee-based SMS to service numbers.


Use exceptions sparingly

Some apps are only compatible with eBlocker, if they are not monitored by eBlocker. Corresponding exception lists for these apps can be activated in the settings by clicking on “Apps”. They will not be analyzed by Blocker anymore. Please note that your privacy heads to the danger zone with every exception you make. Data can be collected without you noticing it.



5      If something may not work

Despite of the simple Plug & Play solution of eBlocker, some incompatibilities may appear that can have different causes. We have summarized some options below, which can help you in stressful times.

5.1      Connection- and network problems

<   Individual setup

Your eBlocker is setup in the automatic network mode by default with initial connection. This mode is compatible with most network devices. Should any connecting errors occur or your network slows down, you can setup your eBlocker individually with only a few clicks. By setting it up individually, all network problems will normally be resolved immediately. How you can setup your eBlocker individually, we describe in section 8.7.

5.2      A website is not displayed

If the eBlocker usually works but errors occur on certain websites, we have summarized some tips for help:

<   Pause eBlocker

Click on the eBlocker icon in the upper right corner of your browser window. With the "Pause" feature you can pause the eBlocker for a few minutes for the device you are using. Try to reload the according website afterwards. If the pause feature worked and you visit this website frequently, we recommend adding an exception for this website.


<   Add exceptions (Whitelisting)

Available for eBlocker Pro and eBlocker Family

If you cannot see a website or are blocked from viewing the website, you can add exceptions to this website. How to add these exceptions is described in chapter Fehler! Verweisquelle konnte nicht gefunden werden..


<   Deactivate SSL completely or for individual devices

Available for eBlocker Pro and eBlocker Family

In rare cases, it is possible that individual websites or apps that are loaded with HTTPS may not be compatible with the eBlocker. You can easily verify this by disabling SSL on the entire eBlocker or only for the current device.


To disable SSL completely open the eBlocker Controlbar. Go to Settings and then click "SSL". Deactivate SSL by clicking on the orange slide switch next to the "SSL Support" logo.


To disable SSL only on a specific device, please follow these steps. Click “Devices” in the Settings menu. Search for the device on which you want to disable SSL. Your current device is displayed in bold type and is easy to identify.



Open the settings for the device by clicking on the appropriate line and deactivate SSL for the device with the slide switch shown.



<   Disable SSL for individual websites or apps


If the problem has been solved by disabling SSL on the eBlocker, the corresponding website can be permanently added to an exception list.


First check in the menu "SSL" > tab "Trusted Apps" whether there is already a predefined list of exceptions for the app and whether the corresponding website appears in this exception list. If so, activate the exception list with its check box.


Alternatively, you can also set the website as an exception. See Section Fehler! Verweisquelle konnte nicht gefunden werden. for more information on how to set exceptions for individual websites or manage exception lists.

5.3      The eBlocker icon does not displayed on all devices

If your eBlocker works fine in general, but the eBlocker icon is not showing on all devices, we have summarized some tips that can help.

<   Activate device

Open your browser window and click on the eBlocker icon. Go to “Settings” and then select “Devices”. On the right side you will see a list of all devices connected to the eBlocker in your home network. Check whether your device, its manufacturer or IP address is displayed. For information on how to activate your device, see section 8.3.3.


<   Display the eBlocker icon

Open your browser window and click on the eBlocker icon. Go to “Settings” and then select “Devices”. On the right side you will see a list of all devices connected to the eBlocker in your home network. Click on the IP address or its manufacturer and see if the eBlocker icon is displayed for your device. You can read how to activate or deactivate the eBlocker icon for a device in chapter 8.3.5.


5.4      The eBlocker icon is not showing on any device

<   Reboot eBlocker

If you have connected your eBlocker for the first time and you have visited but still no icon shows after 5 minutes waiting: reboot your eBlocker. Disconnect the device from the power supply and wait for 30 seconds. After 30 seconds connect your eBlocker to the power supply again.

<   Delete cookies and cache and reload website

Delete the cookies and cache of your browser or press and hold the shift key while clicking on browser icon „reload page“. You can read in section 4.1 how to delete cookies.

Please note that your eBlocker needs 5 minutes after initial connection to configure itself automatically.

<   Activate device

Make sure that your device appears under „Settings/Devices“ and is activated. How you can activate devices, is described in section 8.3. If your device is activated, but the icon is not showing, please read section 5.3.

5.5      Removing common problems

<   Plug in your cable correctly

Please check your scope of supply with your delivery. Make sure that your delivery is complete and check if you are really only using the accessory cable and the power supply. Test if the cables are plugged in correctly and fully inserted.

<   Plug in cable into the right ports

Please make sure that the LAN cable is really plugged into the „LAN“ port and the power supply is plugged into the “POWER” port. The „HDMI“ and “USB” ports are for future enhancements and currently not in function.

Please note that some routers have limited LAN ports that cannot be used by the eBlocker. These port are LAN1 or LAN4/LAN5 most of the time. Please connect your eBlocker with one of the other ports of your router.

<   Reboot eBlocker

Open your browser and click on the eBlocker icon at the top right of your browser. Go to Settings and click on “System” afterwards.



The button „Reboot and Shutdown“ is already highlighted in orange. Click on “Reboot” and your eBlocker will reboot itself.

If the eBlocker settings cannot be accessed, you can reboot your device by disconnecting your eBlocker from your power supply. Please wait for 30 seconds before reconnecting your device to the power supply.

Please note that your eBlocker needs 5 minutes to detect the network and configuring itself after rebooting.

<   Send diagnostic report to support team

In case of error or problems, you can create an automatic diagnostic report that you can send to us (section Appendix D). Through the diagnostic report, we will know in which state your device is in and thus a quick solution can be found.



<   Reboot router

Shut down your router and reboot it afterwards. Please consider the user manual of your router. Usually it only requires to disconnect the router from the power supply and connecting it right back in after a short time.

5.6      Some apps don’t work

Unlike usual browsers, apps can have more access and possibilities on your device. While most browsers and sites work fine with your eBlocker, some incompatibilities with apps may occur. There may be problems with individual apps especially when your eBlocker is activated for encrypted connections (SSL). Usually the problems can be removed easily if the corresponding website that is communicating via SSL through an app, is excluded from the analysis by your eBlocker.

There are already prepared exception lists for some of the most common apps. You can find and activate them at “Settings/Apps“. You can also define your own exception list for more apps, or edit and complete the existing exception list.

It’s not always easy to find out which sites are actually addressed by the app. To facilitate the analysis, eBlocker provides an „Expert Tool“ to record and interpret the connection from app to website and makes suggestions as to which sites should be added to the exception list. This “Expert Tool” is described here 8.9.

But do not worry: if you are not an expert, please write a short article in our forum ( Simply let us know which application or function of an app does not work with the eBlocker. Perhaps another member has solved exactly the same problem and can help you.


Please note that you cannot be protected by your eBlocker on the website you are using the exception list for. Even if you are accessing the list with a web browser and not an app.

In connection to the subject of apps, please read our recommendations in section 4.5.

5.7      The eBlocker completely stopped operating

Please make sure to activate your DHCP server.

Remove your eBlocker from your network and disconnect the eBlocker from the power supply. Now remove all other devices (your computer, notebook, smartphone, etc.) from your network and connect them again to update the DHCP lease. You can also update your DHCP lease for most of the devices, in the network settings. Your devices are now connected to the Internet again.

Remove the network cable from your computer and deactivate the Wi-Fi, if needed. Connect the eBlocker with the network cable to your computer and connect the eBlocker to the power supply. Now wait for 5 minutes. Call the emergency-IP of the eBlocker: to get to the eBlocker settings.

Go to „Network“ and set it to „automatic“. Save the settings afterwards. The eBlocker might reboot now. Wait for the reboot and go to the eBlocker settings again. Click on „system“ and shutdown your eBlocker. Remove the device from your computer and from the power supply. Don’t forget to reconnect your computer to the network and/or to reactivate your Wi-Fi. Now connect your eBlocker to your router and to your power supply again.

5.8      More help: Our forum and support

Many useful answers to common questions can be found in our forum at


We are pleased to assist you via email as well (see Appendix D).




























6      Tips and Tricks

6.1      The individual setup – eBlocker overtaking the DHCP server

Available for eBlocker Base, eBlocker Pro and eBlocker Family

Before you start, please make sure that your eBlocker is at least updated to the software version 0.9.3-8.

<   Find out how to deactivate the DHCP server of your router through the detailed information in your router manual.

<   Click on “Network” in your eBlocker settings and go to the network assistant.

<   Read the preparations carefully and click on the button “Next”.

<   Read the process carefully and click on the button “Next”.

<   Now please write down or print out the displayed settings. After doing so, click on the button “Next”.

<   Confirm all three steps and click on “Perform and Reboot”.


Your eBlocker is fully configured after the reboot. Now your router is next to be converted.

<   Log into your router as an administrator.

<   You have to change the settings for some routers (e.g. from standard to extended).

<   Deactivate the DHCP server of your router and save the settings.

<   Finally renew the so called DHCP lease for all active client devices that are located in your network (computer, notebook, smartphone, etc.).


It is important to renew the DHCP lease, so all client devices will not use the old network information. You will receive the new DHCP lease easily through disconnecting the network connection from the client devices, for example. Some devices also provide the button „Update DHCP lease“ in their network settings.

Note: If you want to undo this setting you have to activate the DHCP server in your router first. Deactivate the DHCP server of your eBlocker afterwards or set your eBlocker to “automatic” in the network settings.

6.2      Inserting the eBlocker certificate

We recommend our customers to add the eBlocker certificate into their operation system first. Most of the browsers and programs need to use the eBlocker certificate to have access to HTTPS sites. Several programs have their own certificate stores. How the eBlocker certificate is inserted into these certificate stores, we describe in this segment.

6.2.1       macOS

You have added the certificate with only a few clicks. Open the Safari browser.

Open the eBlocker SSL configuration site.

Click on the button add certificate, to save the eBlocker certificate.


<   Go to programs/applicationprograms and open the keychain Access application.

<   Choose keychain system and the category certificate.

<   Go to the menu and choose storage / import objects… .

<   Choose the downloaded eBlocker certificate for the file dialog and click on open.

<   You will eventually be asked to type the administration password.

<   Double-click on the imported eBlocker certificate.

<   Choose „always trust“ in the drop-down menu Secure Sockets Layer (SSL).

<   Close the window. Type in the administrator password, if you are asked.



The eBlocker certificate has now been added into macOS. Most of the browsers and programs can have access to the eBlocker certificate now.

Here a list of a few common browsers you can have access to the eBlocker controlbar on HTTPS sites with.

<   Safari

<   Google Chrome

<   Opera

<   Vivaldi

<   Yandex


The following browsers have their own certificate store. The eBlocker certificate has to be inserted into the according certificate store.

<   Firefox

<   Cliqz (based on Firefox)

<   Seamonkey

<   Thunderbird (email program)


Firefox, Cliqz and Seamonkey


Open the eBlocker SSL configuration site.

Click on the button add certificate.

Make sure that the first checkbox ‚Trust this CA to identify websites’ is selected (see image below).



Click on OK to insert the eBlocker certificate in Firefox.

You can see the eBlocker controlbar now on HTTPS sites with the Firefox, Cliqz or Seamonkey browser.


Thunderbird (email program)


Go to the menu and click on Preferences.



Go to Advanced and click on View Certificates.


After the Certificate Manager opens, click on import and choose the eBlocker certificate from the downloads directory.



Open the eBlocker certificate and make sure that the first checkbox ‚Trust this CA to identify websites‘ is selected. Confirm with OK.


Confirm the Certificate Manager and the settings with OK.

The certificate is now inserted into the Thunderbird email program.

6.2.2       Windows

You have inserted the certificate with only a few clicks. Please use the Microsoft Internet Explorer or the Edge browser.

Open the eBlocker SSL configuration site.

Click on the button add certificate.

After the dialog appears, go to save and then click on open.



Click on Install Certificate.


The Certificate Import Wizard opens. Click on Next. Go to safe all certificates into the following storage and click on browse afterwards.


Choose the second register Trusted Root Certification Authorities and confirm this process with OK.



Click on Next in the Certificate Import Wizard and confirm the process with Finish.

Confirm the following safety warning with Yes.

The eBlocker certificate is now inserted into Windows. Most of the browsers and programs can have access to the eBlocker certificate.

Here a list of a few common browsers you can have access to the eBlocker controlbar on HTTPS sites with.

<   Microsoft Internet Explorer

<   Microsoft Edge

<   Google Chrome

<   Opera

<   Vivaldi

<   Yandex


The following browsers have their own certificate store. The eBlocker certificate has to be inserted in the according certificate store.



<   Firefox

<   Cliqz (based on Firefox)

<   Seamonkey

<   Thunderbird (email program)



Firefox, Cliqz or Seamonkey


Open the eBlocker SSL configuration site.

Click on the button add certificate.

Make sure that the first checkbox ‚Trust this CA to identify websites’ is selected (see image below).


Click on OK to insert the eBlocker certificate in Firefox.

You can see the eBlocker controlbar now on HTTPS sites with the Firefox, Cliqz or Seamonkey  browser.




Thunderbird (email program)


Go to the menu and click on Options.



Go to Advanced and click on View Certificates.




After the Certificate Manager opens, click on Import and choose the eBlocker certificate from the downloads directory.




Open the eBlocker certificate and make sure that the first checkbox ‚This certificate can identify websites‘ is selected. Confirm with OK.




Confirm the Certificate Manager and the settings with OK.

The certificate is now inserted into the Thunderbird email program.

6.2.3       Android

You have added the certificate with only a few clicks. Open the Google Chrome browser.


<   Open the eBlocker SSL configuration page.

<   Click the button "Add certificate".

<   Enter your PIN if necessary

<   Give the certificate a name (for example: Tim eBlocker).

<   Select "VPN and Apps" for credential use.

<   Repeat the last steps and save the certificate at "Wi-Fi".


For Android versions smaller than version 6, it is sufficient to save the certificate only at "Wi-Fi".


If the eBlocker certificate is not opened automatically you can find it in your download folder.




6.2.4       iOS

You have added the certificate with only a few clicks. Open the iOS Safari browser.


<   Open the eBlocker SSL configuration page.

<   Click the button "Add certificate".

<   The iOS settings open automatically and the profile of the eBlocker certificate is displayed.

<   Click on "Install".

<   In the following dialog click on "Install" again.

<   Confirm by clicking on "Install" for the last time again.

<   The eBlocker certificate has now been added in iOS.






Starting with the iOS version 10.3 the added eBlocker certificate has to be activated again.


<   Open iOS Settings and navigate to "General" > "About" > "Certificate Trust Settings".

<   There you will find the previously added eBlocker certificate that you can now activate.






7      Definition of eBlocker functions

At daily use, you usually shouldn’t notice your eBlocker right away. Everything should work fine. A lot of sites will even load faster because advertisements and animations are blocked.

7.1      eBlocker icon

You can see if the eBlocker is working and activated by the orange translucent icon that is visible on the top right of every browser that you use.

If trackers or advertisements are blocked on the site, the total number of blocked requests will be displayed. Through a click on the eBlocker icon you can have access to the controlbar.

7.2      eBlocker Controlbar BASE, Pro, Family

Through the controlbar you have quick access to the most important features for the currently loaded page or for the device you are currently using.

The features of the eBlocker Controlbar differ depending on the eBlocker version.


eBlocker Base


eBlocker Pro



eBlocker Family


You can read detailed information about the functions in the following sections.

7.3      Dashboard

With a click on "Dashboard" you open the Dashbard of the eBlocker in a new browser tab.




The Dashboard allows you to activate the pause function, get an overview of the SSL settings (available for eBlockerPro and eBlocker Family), the allowed domains (available for eBlocker Pro and eBlocker Family) and an overview of the current system messages. You can also get a quick access to the eBlocker settings.

7.4      Tracker and Ads (Tracker- and Ad-Blocker)

Available for eBlocker Pro and eBlocker Family

One of the main and most important functions of the eBlocker is to prevent third parties from analyzing your surfing behavior and thus creating a detailed personality profile of you.


The eBlocker blocks the transmission of data to data collectors by default and prevents the loading of advertisements from advertising networks, that also log your surfing behavior and compress it to profiles.


The controlbar lets you can see how many connections to data collectors and advertising networks have been prevented on each page. By clicking on the "Tracker" and "Advertisement" icons, you can view the list of all blocked connections.


eBlocker wants to protect your privacy but the eBlocker does not try to avoid possible content blockings of the publishers. Websites such as bild. de for e.g., recognize that the eBlocker also blocks advertising and may no longer provide the requested content available for free.


By clicking on "Ads" on the controlbar, you can disable the eBlocker module to filter advertising either globally, or individually for this website and then have access to the content. You can reactivate filtering just as easy. The tracker blocker is still active, so you will continue to be protected from trackers. Be careful: even if the tracker blocker is active, advertising will capture your personality profile.

Just like the module for filtering advertisements, the module for filtering trackers can be deactivated or activated globally, or individually for a website.



Websites for which you allow ads or trackers, will be listed on the eBlocker Dashboard. There you can either allow or disable the ads and trackers for the desired page as well.

7.5      Anon (IP-Anonymization)

Whenever you are on the Internet, you transmit your so-called IP address to the website you are visiting. It's kind of like the number transmission on the phone. There is no public "phonebook" for IP addresses, but your Internet provider knows who used which IP address and when. These data - keyword "data retention" - are also stored for a period of time and, if necessary, passed on to the state authorities.


Regardless of this, each IP address can always be assigned to the provider and also to a geographical region.


To disguise your own IP address, i. e. to achieve additional anonymity on the Internet, you can activate the “IP Anonymization”.


Once “IP Anonymization” is switched on, all HTTP requests are routed through an anonymization network. If SSL/HTTPS is activated on the eBlocker, HTTPS requests will also be anonymized. We are now able to support alternative networks with the OpenVPN protocol.


For information on how to set up and use the Tor network, see chapter 8.5.

For information on how to set up and use other networks, see chapter 8.5.2



With "Check connection" you can check whether a connection via a Tor anonymizing network exists or which external data is visible.


With "Configure" you can directly go to the settings "IP Anonymization".

7.6      Cloaking

Available for eBlocker Pro and eBlocker Family

Each internet browser identifies itself with the so-called "User Agent" -identification. This identifier provides the website with precise information on the end device, operating system and browser used. It is not only used to identify you and to create a personality profile but it is also used by shops very often to offer individual prices. For e.g., if you use a tablet you will may get a different price for the same product as you would by using a stationary PC.


You can use the “Device Cloaking” feature of the eBlocker to cloak your device and cause the user agent ID of another device type to be sent. This allows you to further improve the protection of your privacy and ideally to take advantage from dynamic pricing in some shops.



Open the controlbar. Go to "Cloaking" and cloak your device with a click on the device you want be cloaked.

7.7      Pause

Available for eBlocker Base, eBlocker Pro and eBlocker Family

"Pause" deactivates the eBlocker for the current device you are currently surfing with on the Internet.

The eBlocker Dashboard opens in a new browser tab as soon as you click on "Pause" in the eBlocker Controlbar. You can extend the pause in the Dashboard by 5 minutes, shorten, end the pause, or access the eBlocker settings.

7.8      Settings

Click on „Settings“ to set up your eBlocker individually. Detailed information about the eBlocker functions are described in section 8.

7.9      Help

For questions and issues you can have access to this user manual. Moreover you can go to our forum for technical matters, in which you can find many answers to common asked questions.

We are also pleased to help you with further assistance via email (see Appendix D).

Unfortunately we do not offer any support via telephone at the moment.








































8      The eBlocker settings

You can find the main functions that you need for your daily routine in the net by clicking on the eBlocker icon (at the right top of every browser site) and through your controlbar (see 7).

Some settings can be adjusted easier and sometimes only through the so called console. You can have access to the setting console by clicking on the icon “Settings” after opening the controlbar (see Fehler! Verweisquelle konnte nicht gefunden werden.).

The features of the setting console are divided into following sections:



Available for:



eBlocker Base, eBlocker Pro und eBlocker Family

Parental Control

eBlocker Family


eBlocker Base, eBlocker Pro und eBlocker Family


eBlocker Pro und eBlocker Family


eBlocker Base, eBlocker Pro und eBlocker Family


eBlocker Base, eBlocker Pro und eBlocker Family


eBlocker Base, eBlocker Pro und eBlocker Family

Experimentall (beta)

eBlocker Pro und eBlocker Family

Expert Tools (beta)

eBlocker Pro und eBlocker Family


You can have access to the requested area by clicking on one of the captions listed on the side register, which you see on the left side.


You can find a detailed description for all areas in the following sections.

If you have called the setting console for the first time or if you have not activated the update license yet, the network setting assistant will appear by default. The network setting assistant will guide you through the activation process.

8.1      General

General settings and information about your eBlocker.

This site is divided into following sections:

8.1.1       License

You can read details about your activation status of your license and of your eBlocker here.

By clicking on „Activate new license“ you can update your license (e.g. to lifetime license) or upgrade your license (e.g. from eBlocker Pro to eBlocker Family). Please enter your license key for that.

The link „Buy license“ leads you to our eBlocker online shop.

The link „Transfer license (from/to other device) leads you to a website where you can remove the license off your device and use it for a different device.

8.1.2       Updates

This page shows you which versions of the eBlocker software and filter rules are currently in operation.

You can enable automatic updates, if you have activated a valid license for this device. You can also determine at what time these updates should be implemented.

Automatic updates are activated by default in the general settings and are implemented in your local time between 02:00 o’clock and 03:00 o‘clock.

If you deactivate the automatic updates, you can always import updates by yourself. The eBlocker will display a notice next to the "Check for update" button, as soon as a new update is available for you.

8.1.3       Admin-Password

The eBlocker console can be reached through the general settings in your local network, by default. In many cases this is sufficient and very practical.

However, we recommend to assign an administrator password, so that important settings and information of your eBlocker are only accessible after entering this password. Once a password has been assigned, your eBlocker console can only be accessed by entering this password.

Please keep the admin-password in safe hands! In case you forget your password or mislay it, you can reset the password by clicking on the slide switch near the words “Administrator password is disabled”.


You can find some general and legal basics as well as references to your eBlocker. You can also read about how to get in touch with our support forum (see Appendix D).

8.2      Parental Control (beta)

Parental Control of the eBlocker has been significantly extended in version 1.3.


If you have used Parental Control already in a previous version, please consider the hints in section 8.2.19

8.2.1       Activate Parental Control

To be able to use Parental Control, assign an administrator password first to prevent others from accessing the eBlocker settings and perhaps deactivating Parental Control.


Assign the administrator password in "eBlocker Settings> General", "Admin password".


Navigate to "eBlocker Settings > Parental Control". The section “Parental Control” is divided into four subpages. We describe the functions detailed in the following sections:


<   User

<   User Profile

<   Website Blacklists

<   Website Whitelists

8.2.2       User and Protection profiles

In order to activate Parental Control for individual devices in your home network, all devices that should be protected must first be assigned to a user. This user will define the effective protection profile for the device. The protection profile then defined the access rules for the device. I.e. it defines, which websites are accessible or restricted and at which times and how long internet access is permitted.


New in release 1.3: The active user of a device - and thus the active protection profile - can now be changed at any time by entering a user PIN, so that a flexible use of the devices is possible.


Example 1:

The family tablet is accessible to every family member, even children can use it at any time without the parent having to attend. Therefore, the tablet should be assigned to a user with a restricted protection profile to ensure maximum protection during unattended use. If a parent wants to use the tablet, the Parental Control protection can temporarily be changed or switched off by changing the user of the device. A PIN must be entered for the user change. Once the parent has finished using the device, the user should be reset to the original owne, or the Internet access for the device should be completely blocked.


Example 2:

A parent's smartphone is always owned by that parent. It is also protected against unauthorized use by a system password. The children can never use this smartphone unattended. In this case, it is not necessary to assign an explicit user or a Protection profile to the device.

8.2.3       Three easy steps

The following steps must be carried out to activate Parental Control for your home network:

<   Create an eBlocker user for all family members (see section 8.2.4).

<   Assign the appropriate protection profile to each user. The eBlocker provides sample profiles that can be adapted to your needs. Or you can set up additonal protection profiles yourself (see section 8.2.7).

<   Assign a main user to all devices that should be protected by Parental Control (see section 8.2.11). It is possible to change the active user of a device at any time by entering an individual user PIN (see section 8.2.18).

8.2.4       Create a new user

Navigate to the “eBlocker Settings > Parental Control” and click on the page “User”.



If you have not used Parental Control yet, the list of users is empty. After you have created some users, the page might look like this:


To create a new user, click “Add User”. A dialog box (see below) opens. Enter a name and select a Protection profile. In addition, you should assign a PIN to all users who are allowed to use another device. For example, provide a PIN for all adults and the older children.



Note that any user who has received a PIN can change their own PIN over the ControlBar (s. section 8.2.18). You can also view and change all other settings at any time.

8.2.5       Change settings of a user

Click on the name of a user. The current settings and details for this user will be displayed:



You can change the name of the user, select another protection profile for the user, and specify whether the user is allowed to accept other devices by entering a PIN or not.

In addition, you can see which devices this user is assigned to as main user, and whether the user is currently active on other devices.

8.2.6       Remove User

You can remove a user with the button "Remove user" in the detailed view of the user (see above). However, the button is disabled when devices are still assigned to the user. First assign a different user to the corresponding devices to activate the button.

8.2.7       Create new profile

Navigate to the “eBlocker Settings > Parental Control” and click on the page “User Profiles”.



The eBlocker provides a default “Standard Profile” as well as a few sample profiles with Parental Control restrictions:



The Standared Profile does not contain any restrictions on Internet access. It is automatically assigned to all existing and new devices in the home network.


In addition, the eBlocker provides predefined Protection profiles for different requirements as examples and suggestion.


Click on the button "New Protection Profile" to create a new Protection profile. In order to keep your profiles apart, assign names and a brief description. Save the profile afterwards.


To access the settings of the profile you just created, click on it in the list.

You can change the name and description of the profile, modify site and category filters, create time constraints, or delete the profile.


In the profile details, you can also see to which users the profile is currently assigned.

Initially, no Parental Control restrictions are activated in a new profile and no users are assigned to it:


You can now adjust the following settings to create a Protection profile according to your needs:

<   Deny or allow access to certain categories of websites.

<   Allow Internet access only at certain times of the day.

<   Limit the maximum Internet usage time per day.

Details to all settings can be found in the next sections.

8.2.8       Deny access to categories of websites

To deny access to certain categories of sites, activate the site category filter by clicking the slider button.



The following Dialog box opens:

When you move the mouse over the list of categories, you will be informed of the content of the categories by a tooltip. Select the categories that should be banned for the profile and save the settings.

The filters are then generated for this profile. This may take a few seconds because some lists have literally millions of entries. You can adjust the website category filter at any time by clicking on the "Edit" button:



Further details on the category filters and how you can create your own categories of blacklisted or whitelisted websites can be found in sections 8.2.15 and 8.2.17. The eBlocker provided category filters are automatically updated daily. To disable the restrictions of the category filter completely, deactivate the corresponding sliding switch.

8.2.9       Restrict internet access to certain time slots a day

For each day of the week, you can specify one or more time slots that allow access to the Internet through this profile. Activate the sliding switch to restrict the internet access:



If no time periods have yet been defined, the following dialog box opens directly:



After adding the first time slot, the configuration is displayed like this:


To add more time slots, click the "Add" button. To change predefined slots, click the pencil icon next to the slot. To remove slots again, click the minus symbol next to the slot. To completely disable the restriction on time slots, deactivate the corresponding sliding switch.

8.2.10    Limit the maximum Internet usage per day

In addition to the time slots, which define the time of day, when Internet usage is generally allowed, you can set a maximum internet usage time for each day of the week. So it is for example possible to allow Internet usage in the time from 7am to 8pm, but within this time restrict the Internet usage to a maximum of one hour in total.

Activate the sliding switch to restrict the maximum daily usage time:



For a newly created Protection profile, the daily usage is set to 1 hour. Click on the "Edit" button to change the daily usage restrictions. The following dialog opens:

Set the maximum usage time for each day of the week and save the settings. Then the configuration is as follows:

Deactivate the corresponding sliding switch to disable these restrictions completely.



The corresponding online time is available for each user individually. It is not divided among different users of the same profile.

8.2.11    Assign a user to device

To activate Parental Control for a device, a user must be assigned to that device.

Navigate to the "eBlocker Settings > Devices" (see section 8.) and click on the device to which you want to assign a user:


A new device is initially not assigned to a user. Click on the according selection list and select the main owner of that device. The device will immediately be subject to the restrictions as defined by the protection profile of that user.

It is possible to assign multiple devices to the same user. Then the same filter rules apply on all these devices. The Internet usage time per day is summed up for all these devices.

8.2.12    Controlbar for users with protection profiles

If a protection profile is set for a user that contains one or more parental control restrictions, this user is provided with a modified and restricted controlbar. Via the additional menu item "Online-Times" you can see the currently remaining internet usage time as well as the allowed usage times:


8.2.13    What happens if the daily internet usage time is limited?

If the daily Internet usage time is limited, Internet access must be activated explicitly. Otherwise, automatic processes of the operating system or other apps on the devices would unintentionally "consume" the usage time. E.g. because the apps might regularly check for updates.
Therefore, the following page is displayed when the user tries to go to any page using an Internet browser:




To activate the Internet use, the sliding switch must be activated. From this moment on, the remaining usage time is correspondingly reduced. The currently remaining time is displayed to allow the user a flexible time management.


The current remaining usage time can always be reviewed via the eBlocker icon and the controlbar. It’s also possible to end internet usage via the controlbar in order to spare the remaining Internet usage time  (e.g, see above: “Remaining time: 39 minutes”):


The Internet access is also automatically deactivated after a few minutes, when there are no Internet  connections seen by the eBlocker. This also helps to consume the daily Internet usage time in a flexible and meaningful way.


8.2.14    What happens if the internet access is denied?

When Internet access is denied, while using an Internet browser, one of the following messages is displayed depending on the reason for blocking the Internet access. This message is displayed in order to make it clear why the Internet access was denied.

Please note that other applications and apps may not function as expected and may display unspecific error messages, when the Internet connection is blocked. Displaying a corresponding message by the eBlocker is in most cases not possible with such applications.


Restriction through category filter:
If access to a site has been disabled due to a site category filter, the user will see the following message from the eBlocker instead of the desired site:


Via the button "Configuration" the Parental Control settings can be accessed directly. Of course the administrator password is required to do so (see section 8.1.3).
The active user of the device can be changed via the button "Change user". If the new user is subject to another protection profile, access to the page might or might not be allowed, depending on that other profkle. In any case, the corresponding user PIN must be entered to switch to another user.


Restriction of access outside of allowed time slots:
If access to a website takes place outside an allowed time slot, the user will see the following message from the eBlocker instead of the desired Web site:



The "Configuration" and "Change user" buttons have the same function as described above.


If the maximum usage time per day has been reached:
If a maximum usage time per day is set and has already been reached, the following message is displayed:


The "Configuration" and "Change user" buttons have the same function as described above.


8.2.15    Add own lists to the Blacklists

Navigate to the "eBlocker Settings > Parental Control" menu and click on the page “Website Blacklist”:




The eBlocker aready  provides a set of predefined blacklist categories:



You can create additional categories with lists of disallowed websites at any time and use them in the protection profile. Click on the button "New category". The following dialog opens:



You can view, add, or remove your own blacklist categories at any time. All your own categories can be selected in the Protection profiles together with the already provided categories (see section 8.2.8.):


8.2.16    Add whitelists to blacklist categories

The provided blacklist categories are very comprehensive and are updated regularly. It is, of course, possible that the lists are too strict in some cases and deny access to websites that your children need and should receive access to.
To avoid having to disable the entire protection category just because of a few websites, you can define exceptions from the standard categories by defining categories of explicitly allowed websites –  also called “whitelists”

Navigate to the "eBlocker Settings > Parental Control" menu and select the page "Website Whitelists”:



Create a whitelist category with websites for which you want to explicitly allow access. Initially, the list of categories with allowed sites is empty. Click on the button "New Category" to create a new category:



Once you have created one or more categories with explicitely allowed websites, these appear as possible exceptions in the configuration of the protection profiles (see section 8.2.8):


Activate the exception slider switch and select the exception/whitelist categories you want to use in this profile.


8.2.17    Add own whitelist categories

Rather than restrict Internet access through categories of blacklists, you can also work with categories of explicitly allowed sites. Everything that is not expressly allowed is then automatically forbidden.

Navigate to the "eBlocker Settings > Parental Control" menu and click on the page "Websites Whitelists:



Create one or more categories of explicitly allowed sites:


You can use these whitelist categories, when creating a protection profile. In order to work with explicitly allowed websites, you must change the main policy in the access restriction dialog from "Following catagories are restricted, everything else is allowed" to "Following catagories are allowed, everything else is restricted":




Note that Internet access through such profiles can be very limited. So it may not be possible to load operating system updates, and many apps will likely not work as usual.

8.2.18    Change of user through controlbar

If a PIN has been assigned to one or more users (see section 8.2.4), the current user of a device can be changed via the controlbar. Through the change of the user, the respectively active protection profile might also change. Thus changing or even disabling the access restrictions of a device can be very simple.

Suppose Dad, and Mom have a user PIN, but Tim and Lara do not. Then the controlbar on Lara’s device would look like this:


The adults can temporarily take ownership of the device by entering the PIN and thereby temporarily remove the protection restrictions:



After the device switchover the controlbar looks like this:




The controlbar always shows the current user as well as the main user of the device. If the device is currently used ba a different user, then it can be returned to the main user by selecting “Return device”. If the main user himself has set a PIN, the PIN is required for the return. Additional functions are available to users with PIN:

<   Lock Internet access for the device. Only a user with PIN can remove the lock.

<   Change own PIN.


8.2.19    Migration of Parental Control to eBlockerOS 1.0

If you have already used Parental Control in eBlockerOS 1.0, you will notice that users have been created for each protection profile in use. These users have automatically been assigned to the appropriate devices.

This was necessary because the profiles are no longer directly assigned to the devices.

Nothing should have changed in your home network, due to the upgrade.

In order to make the best of Parental Control, you should rename or replace the automatically created users and add more, if necessary.

8.3      Devices

Available for eBlocker Base, eBlocker Pro and eBlocker Family

The „Device“ function shows a list of all network devices that are identified by your eBlocker in your home network.




The devices are initially identified by their IP address and - as far as the eBlocker can determine - by the manufacturer. By clicking on the IP address, you open further details about the device and can adjust the settings.


Your router and eBlocker have their own grey icon. You can assign an optional name to both devices, but you cannot make any other settings.


Devices with an orange icon are online are currently active on your network.


Devices with a grey icon are currently not active in your network.

8.3.1       Devices – General

8.3.2       Devices - General - Name

We recommend assigning a device name to all devices so that you can easily recognize them at any time (e. g."Christian's laptop", "Living room TV" or "Sabine's smartphone").


The IP address, the hardware address (MAC) and, if available, the manufacturer per device are also displayed here.

8.3.3       Devices - General - Activate eBlocker

By default, the eBlocker is automatically activated for most devices. Only some device types (e. g. some IP phones and Hi-Fi components) are deactivated in the default setting. Devices for which the eBlocker is activated are displayed with an orange icon.


You can define at any time whether or not the eBlocker should analyze each device individually. If the eBlocker has been activated for the device, further function are available below.

8.3.4       Devices - General - Enable SSL

If the SSL function on the eBlocker have been activated in general (see section 8.4), you can instruct the eBlocker to monitor encrypted connections (SSL) for each device individually.

8.3.5       Show Device Icon

Here you can specify whether the eBlocker icon (see section 7.1) should always, never or only briefly be displayed for five seconds on the device when you access a new web page.

Additionally, there is the option to show the eBlocker icon only in standard browsers like Microsoft Edge, Firefox, Chrome, or Safari. This also includes browsers based on Chrome or Firefox. For example, the eBlocker icon will not be displayed in apps.

8.3.6       Devices – Anonymization

Here you can set whether all HTTP/HTTPS connections of the device should be routed through the anonymization network Tor, or via a VPN connection (see section 7.5). Activate the IP anonymization and then select either Tor or a VPN connection from the selection.



You can also define the cloaking for a device. Open the selection and select one of the predefined cloaking (user agents) or enter your own user agent (see Section 7.6).


8.3.7       Devices – Messages


Here you can specify for each device whether all system messages shall be displayed by the eBlocker, only the important system messages shall be displayed by the eBlocker, or no system messages shall be displayed by the eBlocker.


All system messages are displayed by default for all.

8.3.8       Devices - Discover new devices or remove devices from the list

The eBlocker usually automatically detects new devices in your local network after a short time and displays them on the devices list. You can manually search for new devices at any time by clicking the "Discover New Devices" button at the top of the page.



However, devices that are no longer found by the eBlocker will not be removed automatically. The eBlocker does not know if the device is switched off for a short time only, is offline, or does no longer exist. At the bottom of the page you can either remove all devices that have no IP addresses, remove all offline devices or remove all devices. Select one of these options if necessary and click the "Remove Selection" button.




8.4      SSL

Available for eBlocker Pro and eBlocker Family

SSL stands for Secure Sockets Layer and is a protocol used to encrypt communication "end-to-end" between two communication partners. Sometimes you may also encounter the abbreviation TLS (TLS stands for Transport Layer Security). It is basically the same as SSL. If the standard Web protocol HTTP is encrypted using SSL, it is called HTTPS. You can recognize an encrypted loaded page by the URL starting with https:// Many browsers also display a green lock in the address bar.

Many websites, especially those of banks and online shops, are now protected with SSL encryption. This way you can be sure that you are actually communicating with the provider whose URL you have accessed and that no third party can change or read your entered data. However, not only reputable shops and banks use SSL. Tracking and advertising providers are also increasingly collecting their data via HTTPS/SSL. Your profile data is then sent to the tracking server in encrypted form, but of course this does not prevent the data collector from continuing to create a detailed profile of you.

Once SSL support is enabled in eBlocker, each eBlocker generates a unique device root certificate and a private key. This certificate is used to encrypt communication between your device and the eBlocker when the eBlocker loads an SSL-protected web page.


Once SSL is activated, the eBlocker terminates the encrypted connection so that the data stream can be analyzed. The eBlocker is the end of "end-to-end encryption". Since the browser expects an encrypted connection with HTTPS, the eBlocker then encrypts the communication to your end device. To do this, it is necessary to first include the so-called security certificate of your eBlocker in your operating system and then, if necessary, in the browsers with its own certificate store as described in Section 6.2.  This certificate is sometimes also called a certificate for certification authorities, a root certificate, or a root certificate.


We have no access to your private key or your device and have done everything to protect the eBlocker from hackers - but of course there is no 100 percent security. We offer SSL support as an option. If you feel uncomfortable with the eBlocker decrypting the SSL connection, please do not activate this option.


Or add the websites you trust and you don't want eBlocker to look into the list of trusted websites. On these pages, for example, the eBlocker cannot detect and block trackers, and the eBlocker icon cannot be displayed either (see also Section 8.4.5).

8.4.1       SSL Status

To activate SSL, click on the eBlocker icon in the upper right corner of your browser window and go to "Settings". Click on the menu item "SSL".

You are now in the "Status" tab. Activate the SSL function for your eBlocker by moving the button to the right.


Please note that the certificate must first be stored in your operating system and then, if necessary, in browsers with their own certificate store. See Chapter 6.2 "Adding the eBlocker certificate".

Click on "Help - how to add the certificate to your browser" for a detailed explanation of how to add the certificate.


Some apps or websites do not work correctly when the eBlocker monitors their encrypted communication. If you activate the "Recording connection errors" function, eBlocker records the problematic connections. These records can be very helpful in identifying affected apps and websites.

8.4.2       SSL Connection Error

If you have activated the "Recording connection errors" function, you may see a list of connection errors here.



You can easily add the found connection errors to an app exception list ("trusted app"), or set it as a "trusted website" by selecting the found domain and then selecting one of the following three options.


New Trusted App

Here you create a new exception list with the selected domains, which you will find in the tab "Trusted Apps".


Add to App

Here you add the selection of domains to an existing app exception list from the tab "Trusted Exceptions".


Add to the exception list

This adds the domain to the list of "Trusted Sites".

With the button "Delete all recordings" the list of currently found connection errors is deleted.


Tip: Pay attention to the name of the app or manufacturer when naming the domains. Usually, you can find the connection you are looking for quickly.

8.4.3 SSL Certificate


Here you can see some information about your eBlocker certificate, can add the eBlocker certificate, or renew it.



Please note that the certificate must first be stored in your operating system and then, if necessary, in browsers with their own certificate store. See Chapter 6.2 "Adding the eBlocker certificate".

Click on "Help - how to add the certificate to your browser" for a detailed explanation of how to add the certificate.


Your eBlocker certificate will be automatically renewed 4 weeks before it expires. However, you can renew the eBlocker certificate yourself at any time. Click on the button "Renew now" and follow the wizard that will help you to create the new version. Please note, however, that you must then store the new eBlocker certificate again for all devices.

8.4.4 Trusted Apps


If individual apps are not compatible with eBlocker, you can exclude websites that are addressed by these apps (often unnoticed in the background) from eBlocker protection.



Here you see a series of predefined exception lists for different apps, which you can now activate or deactivate with a click on the slide switch on the right side. Some exception lists for particularly popular or important apps are already activated by default.


Please note that any activated exception list means that you cannot be protected by eBlocker on the respective websites. If no exception list has been defined for an app you are looking for, you can add it using the "Define new app" button. After a click on the button a new window appears.



Enter the app name and optionally add a description. The app name must be unique.

Enter one or more domains to be used by the app and not to be monitored by eBlocker. Enter one domain per line. You end a line with the Enter/Return key.

A superordinate domain automatically includes all subordinate domains.

Example: If you put the domain on the exception list, calls to domains such as are automatically excluded from eBlocker monitoring.

In rare cases it is necessary to include IP addresses in the exception list. IP addresses can be entered in the bottom field. Enter one IP address per line.

Complete the process by clicking on "Save". Your new exception list will then be saved and activated for you.

8.4.5 Trusted Websites


If you do not want eBlocker to work on certain encrypted websites, for example for online banking, you can add the relevant website to the SSL exception list.



For example, if you do not want the eBlocker to monitor the SSL connections to your bank's Internet portal, create a corresponding entry in the SSL exception list.


Select a unique name (e.g. "Sparkasse Hamburg"), enter the URL of the banking portal and complete the process by pressing the orange button marked "Add Domain".


Directly below the input fields you will see an exception list that has already been prepared by us. If you do not agree with one of the exempted domains, you can easily remove it by clicking on the orange trash can on the right side. Once the domain has been removed from the exception list, the eBlocker will automatically monitor calls to this site again, even if the connections are encrypted with SSL.

Important: In this exception list you also see the domains of the exception lists of the trusted apps. You cannot delete them here.

8.5      IP-Anon

Available for eBlocker Base, eBlocker Pro and eBlocker Family

8.5.1       Set up and use the Tor network

As described in section 7.5, you can disguise your actual IP address by using the anonymization network.

The eBlocker always connects to the IP-Anonymization via the Tor network

To enable the IP anonymization, open the controlbar. Go to “Anon” and click on “Enable IP anonymization”.


On the following page, click on "IP Anonymization" on the left side of the eBlocker console and select the "Tor network" menu item in the upper right corner.



You can choose one or many countries, from where an exit server will be chosen randomly. Click on “Apply” to confirm your choice. Open any website, click on the eBlocker icon and open the eBlocker controlbar. Click on “Anon” and activate “Tor network” with one click. After activating Tor the anon icon is filled with a checked pattern to indicate it is active.


From now on you can surf anonymously via the IP address assigned to you by the Tor network. An Internet service provider will think that you are located from one of the random chosen countries. Thus you can avoid any censorship or can have access to content that is only available in certain regions of the world.

Please note that the Tor-network is an association of volunteering Internet activists, that provide service cost-free but with no availability guarantee.

If no country is selected, an exit server of a random country will be used.

With a click on "Check connection" you can check if there is a connection to the Tor Network after activating the Tor Network. We have selected three well-known websites for you.



By clicking on "Tor: Get new identity" you can switch from the controlbar to another Tor exit server of the country.

To disconnect the Tor connection click on the anon icon first and afterwards on the Tor icon. The checked pattern on the anon icon will then be removed again.

8.5.2       Set up alternative VPN network

Instead of the standard Tor network provided by the eBlocker, you can use a VPN connection from any other VPN provider.

VPN networks can be set up under "eBlocker Settings > IP Anonymization" and "VPN Networks". There, you can also find a link to the list of VPN providers we tested. This list is updated regularly. You can also use other VPN providers as long as they support the OpenVPN protocol.



Other VPN provider may charge additional costs. Connection speed may vary depending on the VPN provider.


Your VPN provider usually provides you with a username, password and a configuration file, it’s name ending on the suffix ".ovpn". This configuration file is needed to set up the connection to the VPN network.

To create a new VPN connection, click “New VPN Provider”. Now follow the wizard's instructions and upload the configuration file provided by your VPN provider.



After uploading the configuration file you have the option to upload other files, if needed. After uploading the files you will be shown details regarding ignored or unsupported options from the eBlocker.  This is generally harmless and the ignored or unsupported options will not lead to any kind of malfunction. The eBlocker can still be used optimally. Click on "Next".


Enter the username and password you have received from your VPN provider into the respective access data fields and click on "Next".



Enter a name and description for this VPN network. Finally, decide if you wish the VPN network to be available in the eBlocker controlbar by clicking on the switch slide. If you do not want the connection to be shown in the controlbar, it will only be visible in your settings and displayed as inactive.

You have successfully created a new VPN network and can edit, remove, or run a connection test with a click on the name.



In the eBlocker Controlbar, you will see the VPN network you have just created under the "Anon" menu item. The connection is verified by clicking on the VPN network, and a check mark is displayed to indicate successful connection to the VPN network. If the connection was not successful, no check mark would be displayed. In this case, go back to settings and verify your username and password.


After activating the VPN network, the Anon icon in the control bar is filled with a checked pattern to indicate it is active.

To disconnect the VPN connection click on the anon icon first and afterwards on the VPN icon. The checked pattern on the anon icon will then be removed again.



To disconnect, first click the Anon icon and then the VPN network. The Anon icon in the control bar will be empty and the eBlocker will automatically be connected to Tor.


A Tor connection cannot be used simultaneously with an existing VPN or another existing Tor connection.

8.5.3       Set up the VPN-network from Perfecty Privacy

Click the eBlocker icon and open the eBlocker controlbar. With a click on „IP-Anon“, a pulldown menu opens. Go to “configuration”.



A new site opens. Click on the tab „VPN-Network“ and then go to „VPN-Anbieter auf Kompatibilität getestet und für Sie zusammengestellt.“





You are now lead to a site where all VPN networks are listed that have been tested by us. Click on “Perfect Privacy”.



You are now visiting the website of Perfect Privacy.





Scroll down to the bottom. Type-in the exact same email address with which you have registered your eBlocker with. Click on the blue area „eBlocker Lizenz prüfen“.





A username, a password and e configuration file with the ending „.ovpn“ is now provided by your VPN provider. This configuration file is necessary to setup the VPN network connection. Download the configuration file and make a note where you have saved the file so you can easily locate it again.


Open the eBlocker controlbar and click on „Settings“.



Click on „IP-Anonymization“ on the following site that appears.




The content changes on the right side. Click on „VPN Network“.



Now click on the button „New VPN provider“.



A popup window opens. This wizard supports you with setting up VPN.




Click on „Upload configuration“ and upload your file.




After uploading the configuration file you may have the opportunity to upload more files. You will receive more information afterwards. The information contains not supported options by the eBlocker for e.g., that are usually harmless and are not marked as error. The eBlocker can be further used with no problems. Click on “weiter”.


Type-in your username and password that you have received from your VPN provider in the section

 „Zugangsdaten“. Click on „Weiter".


Assign a name and description fort he VPN network. Decide if the VPN network should be available in the controlbar.


Finish the process with „Abschließen“. You are now surfing anonymous via the VPN network of Perfect Privacy and have saved a 3 months cost free service of VPN.


The VPN network which you have just setup is now visible below the “Anon”. By clicking on the VPN network, the connection is tested first.

The successful connection to the VPN network is displayed with a tick mark. If the connection has not been successful, no tick mark will be displayed. If the connections was not successful, go back to your settings and check your username and password.


The VPN service can be individually enabled for every device.

8.5.4       DNS

If you enable this feature, you can distribute the DNS queries through your eBlocker to a list of different DNS servers, or resolve them over the Tor network. Three different options are available for this.

<   Use the default settings for the local network

<   Use a predefined list of DNS servers for availability, in sequence, or in random order

<   Use the Tor network, even if the traffic is not routed through Tor


Use the default settings for the local network


The setting of your local network is used here. This means that the DNS server is used that you have added in your router configuration.


Use a predefined list of DNS servers for availability, in sequence, or in random order


Use this option to add a list of DNS servers. This list can then be processed according to availability, in sequence, or in random order from the eBlocker.


Use the Tor network, even if the traffic is not routed through Tor


Here, the DNS requests are routed through the Tor network and are passed on to a DNS server at the starting point of the Tor network. Make sure that Tor is available. You can check this in the menu IP Anonymization > Tor Network.

8.6      System

Available for eBlocker Base, eBlocker Pro and eBlocker Family

By clicking on „System“ you can apply following settings:

8.6.1       Reboot and Shutdown

Through this page you can reboot and shutdown your eBlocker.

To reboot your eBlocker after shutting down, unplug the power supply from your device, wait for 30 seconds and reconnect your device to the power supply afterwards.

8.6.2       Time zone and language

Through this page you can set the time zone and language of the eBlocker controlbar and of the eBlocker console.

For setting the time zone, select the region and the main city of your country first. Click on the button “Set time zone” to save your selection.

For setting the language, select the language first and click on the button „Set language“ to save your selection.

8.6.3       Events

The eBlocker detects events like the network connection has been disconnected, or power supply has been disconnected without the eBlocker shutdown. Such events are recorded here for you as information. You will see a notification in the controlbar when a new entry is listed the event list.


8.6.4       Diagnostics report

If an error occurs, you can generate an automatic diagnostic report that you can send to us to This allows us to find a solution quickly. Generate the diagnostic report very easily with a click on the orange button „Generate report“ and wait for a few seconds. Afterwards you have the possibility to download the file and to send it to our support. We will come back to you as soon as possible.

8.6.5       Reset registration

To reset the activation and license obligation of the device, click on „Reset activation“. A new window will appear asking you, if you really want to delete the update license from your device. If you want to delete the license, please enter the email address that you used for activating your eBlocker. Please note that this process is irreversible.

8.6.6       Factory Settings

Here you can reset the eBlocker to the factory settings. Please note that all settings and activation will be deleted.

You can reset the license via the eBlocker license server and then reactivate your eBlocker. Please go to the website and enter the email address with which you activated the eBlocker license. Afterward you will receive an email from our license server and only need to follow the instructions of this email.

8.7      Network

Available for eBlocker Base, eBlocker Pro and eBlocker Family

In most of all cases your eBlocker can be configured in the automatic configuration mode.

In some cases, for example if you have a special networking infrastructure, you might have to setup your eBlocker individually so you can use your device optimally.


The aim of the individual setup is to set your eBlocker as DHCP server and gateway in your local net.

For that click on the area „Manual setup wizard“. The setup wizard will help you through the process of the individual setup.

The implementation of the individual setup leads through the following stages:

1.     Setting of eBlocker as DHCP server and reboot.

2.     Deactivation of DHCP services in your router/Wi-Fi access point.

3.     Reboot of other network devices.


Get to know how to deactivate the DHCP service in your Internet or Wi-Fi router for step 2.

Do not follow this step if your eBlocker has not been set as DHCP server first.

Attention: Only use the individual setup mode if you have issues with the functionalities of your eBlocker or other network devices in the automatic mode.

8.7.1       eBlocker Mobile (beta)

eBlocker Mobile is based on OpenVPN. Your eBlocker becomes a VPN server to which you can connect to from a mobile device. Once connected to the eBlocker via OpenVPN, you'll be surfing with exactly the same protection you're used to at home. This requires the installation of an OpenVPN client for your mobile device as well as the installation of the corresponding eBlocker VPN configuration file.

The eBlocker needs an individual setup so that the eBlocker can take over the DHCP server. Only then you will be able to see the eBlocker Mobile feature in the network menu.


A port forwarding must be set up in the router that connects your local network to the Internet: Port 1194 (protocol UDP) must be forwarded to the IP address of the eBlocker with the same port number 1194. We recommend assigning the eBlocker a fixed IP address in the network settings.

If you have not been assigned a fixed IP address by your provider, please use a dynamic DNS service such as or


Before you can activate the eBlocker Mobile feature, you need to enter the (DYN-)DNS name or the public IP address of your router. The activation time takes about 2 minutes.



The eBlocker Mobile feature can be activated and deactivated at any time without losing the configuration. A new activation takes place immediately.


After activating eBlocker Mobile, your eBlocker shows all devices that are connected to your home network. Select the device that you want to protect mobile. Click on the corresponding key symbol to create a certificate for the device. This is necessary for the authentication and encryption of the OpenVPN connection. Click on the arrow that is pointing down to download the OpenVPN configuration. The downloaded VPN profile can easily be stored in most OpenVPN clients. In the device overview of the eBlocker, the device connected to the eBlocker appears as "online" as soon as the device is connected via OpenVPN.



The downloaded VPN profile can be stored in most OpenVPN clients without any problems. Well-known OpenVPN-clients for Android are "OpenVPN Connect","OpenVPN Client Free" and "OpenVPN for Android". A well known OpenVPN client for iOS is "OpenVPN Client".


As soon as you connect to the eBlocker via the OpenVPN client, your mobile device is listed as online in the overview of the devices.


Any created Client VPN profiles become invalid when you reset the eBlocker Mobile feature. After the reset, all OpenVPN configurations must be recreated and stored in the clients.

You can reset individual VPN profiles by clicking on Withdraw VPN profile.


8.8      Advanced

Available for eBlocker Pro and eBlocker Family

8.8.1       WebRTC

WebRTC is a browser technology that enables real time communication by establishing peer to peer connections. This is useful for applications like VolP/Internet calls and chats. Unfortunately WebRTC reveals your real IP address (and even your local LAN IP) to establish the connections. Even when using Tor (IP anonymization) your real IP address is visible when using WebRTC and it can be used to identify you. Decide with one click if you want to enable WebRTC connections.

8.8.2       HTTP Referrer Header

HTTP Referrer Header is regularly set when browsing the web. The referrer reveals the website you have been visiting before reaching the current website. By using the referrer header websites can partly track your surfing habits. Some websites use the referrer header also for internal purposes and blocking the referrer header can result in some sites not working properly. Decide with one click if you want to enable referrer header.

8.8.3       Google Captive Portal Check

Google Captive Portal Check is used by Google products like Android, Chrome, Chromebooks and Chromium to determine if you are connected to the Internet by sending a request to Google. eBlocker blocks these requests in order to hide your IP address from Google. Enable this option if your Android device drops the Wi-Fi connection frequently.

8.8.4       Do Not Track

Do-Not-Track (DNT) is an HTTP header field that signals to a website that the visitor does not want the website to create a usage profile. Unfortunately, this wish of the user is not binding and is therefore ignored by many websites.

For most browsers, this feature can be found in the privacy or security settings.

The eBlocker makes it easier for you and, if you activate this function, sets the Do-Not-Track field automatically in all requests, unless you explicitly deactivate it here.

8.8.5       Compression

Web servers often compress the delivered web pages in order to keep the amount of data transferred on the Internet as low as possible. The eBlocker must then decompress the data to analyze the page and perform its protection functions. In your local network, re-compressing the last track to the end device would not result in any speed advantage. On the contrary: The page layout is usually even faster if no new compression and decompression is used for this last track.

Only if your device is connected via eBlocker Mobile while on the move should it be compressed to the end device.

Therefore the compression function of the eBlocker offers you three settings.

No Compression

Here the data is not compressed again for the short way between eBlocker and terminal.

Compression for eBlocker mobile devices (recommended)

As above. Only if your device connects via eBlocker Mobile while on the move, the data is compressed between eBlocker and device.

Always Compress

Here the data is always compressed during transport from the eBlocker to the end device.


8.9      Expert Tools (beta)

Available for eBlocker Pro and eBlocker Family

"Expert Tools" is for tech savvy users only. It is used for defining domain exceptions where eBlocker should be deactivated. If an app is not compatible with eBlocker-SSL (see also section 5.6), the SSL connection requests from a device can be recorded. Afterwards eBlocker’s behavior for this connection type can be defined, tested and saved as an app definition. Proceed as follows:

First analyze the HTTPS/SSL-connections that runs directly from the app. Then you can set rules how your eBlocker should deal with these connections (activate eBlocker for connections or deactivate your eBlocker for connections). Choose the device on which you are using the app, as well as the duration of the recording, the maximum size of the recording file and start recording afterwards.



Use the app as usual. Especially test the functions that seem to not be compatible with your eBlocker. Update the list with the recorded connections afterwards.

To find the domains and IP addresses your eBlocker should not be active on, it is necessary to try out different settings. Use the switch slide ("Test temporary rule set“), so the selected rules can be effective temporarily and test the functionalities again.



Please note that the proposed rules may not always be correct, because of some connections that are recorded that do not source from the tested app.

As soon as the app runs smoothly with temporary rules, you can save these rules as a new app definition for good.

9      Quick guides

9.1      Delete cookies, cache and browsing history in browser

Depending on the browser you are using, you can delete cookies in many different ways. The deleting process for the most important browsers are explained in the following section. If your browser is not listed here, please follow your browser instruction how to delete cookies, cache and browsing history.

9.1.1       Firefox

Open your browser and click on the menu symbol at the right top of your browser. A new browser window with different options will appear.

Click on settings and go to “data protection”.

Click on „recent set chronicle“. A new window will open in which you can add relevant subjects that you want to have deleted afterwards. We recommend to add following subjects in order to erase your trace completely.

<   Visited websites & download chronicles

<   Cookies

<   Submitted search terms & form data

<   Offline website files


Through the link „Today’s chronicle“ you have the option to set a period of time. We recommend to choose every subject in order to be fully protected against trackers. Finish deleting your browsing history by clicking “delete now”.

9.1.2       Chrome

Open your browser and click on the menu icon at the right top of your browser window. Go to settings and click on “history”. Finish deleting your browsing history by clicking “delete browsing data”. Please note to state the whole period of time.

9.1.3       Internet Explorer

Click on the setting icon at the right top of your browser window. Go to „Internet Options“ and to „General“ afterwards. Finish deleting your trace by clicking „delete browsing history“.



10   Glossary

<   Content lock

Providers of (e.g.) journalistic content have a legitimate right – and of course the necessity – to make money with their offers. Many providers offer users to pay for the content directly, individually or per subscription – or just to accept that the called up site contains advertisement.

Some providers reserve the right to lock the cost-free service if the user uses an ad-blocker. This lock is also called “content lock”.

eBlocker’s aim is not to destroy the business plan of Internet providers. However, we do block ads from advertising networks for these kind of sites, because nowadays the ad banners are used for profiling. We do not help to avoid the named content lock. Instead we recommend to honor high-quality content on a fair basis, so independent quality journalism is permanently preserved for all of us.

<   Cookies

Cookies typically contain data about visited websites, that the web browser of this websites saves on your computer and uses the next time you visit the same website again. Cookies however are not fundamentally bad. They can increase the user comfort e.g. if you do not have to sign up again after already having visited the website. Cookies can also be used to recognize the same individual on different websites, so personality profiles can be generated comprehensively.

These tracking cookies are blocked from your eBlocker, so that they cannot even get into your computer.

<   DHCP server and DHCP lease

The Dynamic Host Configuration Protocol (DHCP) enables the automatic integration of network devices into all networks. A central server – in such case the router - assigns the network configuration to all devices. The lifetime of this assignment is called lease time. The administrator can choose the existence of the lifetime at the router settings. The lease time can be indicated in seconds, days or even weeks. If the DHCP server is changed during operation, all computers/devices must be disconnected from the network once, so every device can be notified by the new DHCP server and thus receives a DHCP lease.

<   Digital certificate

A digital certificate uses cryptographic methods, to verify the details to a communication partner obligatory. For example, if a certain website is actually run by the named company. Digital certificates are usually issued by trustworthy certification authorities that verified the details and take responsibility for the correctness.

<   DNS Server

The DNS server (Domain Name System) is some sort of telephone book for the Internet. It translates the server names from URLs and from email addresses to numerically IP addresses. The webserver is identified and spoken to through the IP address.

<   LAN cable

The LAN cable (Local Area Network) or also called Ethernet cable, is a network cable that is required for connecting the computer and other devices to your local net. Ethernet cables are often yellow colored. The supplied Ethernet cable of eBlocker is obviously orange colored!

<   Malicious software

Malicious software is the generic term for dangerous computer programs like viruses, worms or Trojans. Malicious software can get into your computer by visiting infected websites or by opening infected emails. Even banner ads that appear on websites which appear as trustworthy may contain the so called “malware” in short. Not every malware is immediately noticed (or at all). The best way to protect yourself from malware is to keep your system as up to date as possible; no opening of suspicious emails that are send from dubious sources; using the latest antivirus program and of course, using your eBlocker.

<   Network mask

With help of the IP address the network mask defines which other IP addresses belong to the local net. That means which addresses can be reached directly. All other IP addresses that do not belong to one network mask, do not belong to the local network and can only be reached through the router.

<   Price discrimination

Price discrimination describes a price policy on the Internet, where you get different prices for the same product depending on from which device you want to buy the product. The price is set dynamically according to the known data of the user with the aim to maximize their revenue.

<   Referrer

If you open a website, your browser sends you an according request for the website you want to visit. This request not only contains the URL, but also many other meta-files for requests. Amongst other things the browser transmits from which website the new request was send from. This indication is called „HTTP-referrer“ or in short „referrer“.

It has the legitimate right, to see insights which sites have been visited by the user and thus can optimize their offers accordingly. The referrer can also be used in a comprehensive way, so personality profiles can be created and connected.

<   SSL Encryption

SSL (Secure Sockets Layer) encryption is a method of data encryption. In connection with the certificates, it ensures, that no changes can be made to the data on the way from the server to a browser and the data exchange can not be read by unauthorized persons.

If an Internet user logs into a forum or an online shop, his registration data and texts can easily be viewed and later misused when sent without SSL encryption. If the connection is protected by SSL, it would take a relatively high effort to decrypt this encryption.

<   Tor Network

The Tor network is used to disguise your original IP address and to provide anonymous Internet surfing. Suppose you have a certain page you want to visit and therefore you enter the URL into the web browser. Your IP address is sent directly to the page you want to visit. However, if you use Tor, you will be directed into the Tor network, which is made out of many other IP addresses from different computers. The Tor network will send an IP address to the page that it chooses randomly out of all the other IP addresses floating around the Tor network. This is how your real IP address is disguised.

<   Tracker – Data collector

Most of the time trackers are service providers for advertising industries. Every time a user opens a site that is being tracked, the tracker gets a notification that a user has been tracked successfully.

Through according cookies or other techniques, the tracker can recognize the user even through many different websites again and again and thus generate a detailed protocol of the Internet behavior. All trackers make their money by providing these personality profiles to advertising industries. The advertising industries can now generate target oriented advertisement and place them on sites that are visited frequently by the user.

<   openPVN

OpenVPN is an open-source software application that implements virtual private network (VPN) techniques for creating secure connection.

<   VPN

A virtual private network (VPN) extends a private network across a public network, and enables users to send and receive data across the public network as if their computing devices were directly connected to the private network.



Appendix A        Technical specifications
(not valid for software licenses)

<   1 x 10/100/1000 LAN RJ45

<   1 x Power supply 5V (≥ 2A)

<   1 x Wi-Fi 802.11 b/g/n

<   2 x USB 2.0 (for extensions)

<   1 x HDMI (not in use)

<   Power consumption: <10W

<   Dimensions: 9x9x9cm

<   Weight: ca. 153g


Appendix B        Safety notes

Please mind the following safety notes before using your eBlocker.

<   Your eBlocker does not have a power switch. A disconnection from the power supply should be possible at any time.

<   In case of wall mounting your eBlocker, please ensure that no wires or piping can be damaged behind the mounting surface.

<   Please protect your eBlocker from moisture, dust, liquids and vapors.

<   Please do not block the air vents of your eBlocker.

<   Never disconnect the power supply or network connection during an update. This can damage the eBlocker irreparably.


Appendix C        Manufacturer & copyright

eBlocker GmbH

Kaiser-Wilhelm-Str. 47

20355 Hamburg



Appendix D        Technical support




Unfortunately we do not offer any telephone support at the moment.




eBlocker Base/Pro/Family 1.14_20180522-v34










eBlocker GmbH
All rights reserved. Errors and omissions reserved
eBlocker GmbH | Kaiser-Wilhelm-Str. 47 | 20355 Hamburg | Germany