User Manualeblocker11

eBlocker GmbH
All rights reserved. Errors and omissions reserved
eBlocker GmbH | Kaiser-Wilhelm-Str. 47 | 20355 Hamburg | Germany

 


Index                                                                      

Introduction. 5

1.1         The eBlocker Products. 6

2       Commissioning. 7

3       Activation. 8

4       Use eBlocker optimally. 9

4.1         Summary. 9

4.2         Deleting cookies, cache and browsing history. 9

4.3         Activate support for HTTPS/SSL encrypted connections. 9

4.4         Activate exceptions for apps. 9

4.5         Final recommendation. 9

5       If something may not work. 11

5.1         Connection- and network problems. 11

5.2         A website does not appear 11

5.3         The eBlocker icon does not appear on all devices. 13

5.4         The eBlocker icon is not showing on any device. 13

5.5         Removing common problems. 13

5.6         Some apps don’t work. 15

5.7         The eBlocker completely stopped operating. 15

5.8         More help: Our forum and support 15

6       Tips and Tricks. 16

6.1         The individual setup – eBlocker overtaking the DHCP server 16

6.2         Inserting the eBlocker certificate. 16

6.2.1          macOS. 16

6.2.2          Windows. 22

6.2.3          Android. 29

6.2.4          iOS. 29

7       Definition of eBlocker functions. 32

7.1         eBlocker icon. 32

7.2         eBlocker controlbar 32

7.3         +Exceptions. 32

7.4         Tracker and Ads (Tracker- and Ad-Blocker) 33

7.5         Anon (IP-Anonymization) 33

7.6         Cloaking. 34

7.7         Pause. 35

7.8         Settings. 35

7.9         Help. 35

8       The eBlocker settings. 36

8.1         General 36

8.1.1          License. 37

8.1.2          Updates. 37

8.1.3          Admin-Password. 37

8.2         Parental Control (beta) 38

8.2.1          Activate Parental Control 38

8.2.2          User and Protection profiles. 38

8.2.3          Three easy steps. 39

8.2.4          Create a new user 39

8.2.5          Change settings of a user 40

8.2.6          Remove User 41

8.2.7          Create new profile. 41

8.2.8          Deny access to categories of websites. 43

8.2.9          Restrict internet access to certain time slots a day. 44

8.2.10        Limit the maximum Internet usage per day. 44

8.2.11        Assign a user to device. 45

8.2.12        Controlbar for users with protection profiles. 46

8.2.13        What happens if the daily internet usage time is limited?. 47

8.2.14        What happens if the internet access is denied?. 48

8.2.15        Add own lists to the Blacklists. 50

8.2.16        Add whitelists to blacklist categories. 51

8.2.17        Add own whitelist categories. 53

8.2.18        Change of user through controlbar 54

8.2.19        Migration of Parental Control to eBlockerOS 1.0. 56

8.3         Devices. 56

8.3.1          Name devices. 57

8.3.2          Activate eBlocker for a device. 57

8.3.3          Activate/deactivate SSL for device. 57

8.3.4          Activate IP-Anonymization for device. 57

8.3.5          Activate eBlocker icon for device. 57

8.3.6          Discover new devices or delete a device from the list 58

8.4         SSL. 58

8.4.1          Define exemptions for end-to-end encryption. 60

8.5         Apps. 60

8.6         Set up and use the Tor network. 61

8.7         Set up alternative VPN network. 63

8.8         System.. 66

8.8.1          Reboot and Shutdown. 66

8.8.2          Time zone and language. 67

8.8.3          Events. 67

8.8.4          Logging. 68

8.8.5          Diagnostics report 68

8.8.6          Reset registration. 68

8.9         Network. 69

8.10      Experimental (beta) 70

8.10.1        WebRTC. 70

8.10.2        HTTP Referrer Header 70

8.10.3        Google Captive Portal Check. 70

8.11      Expert Tools (beta) 70

9       Quick guides. 72

9.1         Delete cookies, cache and browsing history in browser 72

9.1.1          Firefox. 72

9.1.2          Chrome. 72

9.1.3          Internet Explorer 72

10          Glossary. 73

Appendix A      Technical specifications (not valid for software licenses) 75

Appendix B      Safety notes. 75

Appendix C      Manufacturer & copyright 75

Appendix D      Technical support 75

 


 

Introduction

We are very pleased to know you are as concerned about your privacy as we are. We have been developing the eBlocker for more than three years in a team of experienced privacy and IT professionals. We still have a lot of ideas and are developing many more features that we are providing you monthly via updates. Thank you very much for supporting our idea of a free and private Internet by purchasing our eBlocker!

 

 

This manual explains all functions of eBlocker and will support you during commissioning. If there are still some questions left, please go to forum.eBlocker.com for answers and personal assistance.

 


 

1.1      The eBlocker Products

The eBlocker is available in two versions: eBlocker Pro and eBlocker Family. Both versions are based on the same technical architecture and don’t differentiate in their hardware. The difference is determined by their software, after activating the license.

Our eBlocker Pro is available already. The eBlocker Family that is based on eBlocker Pro is currently (December 2016) under development. We are planning to gradually provide all Family functions via updates till Q1 2017.

 

But whether eBlocker Pro or eBlocker Family: Now your privacy belongs to you again – and not to the Internet companies.


 

2      Commissioning

By using this user manual, you will be able to set up your eBlocker in no time. Please follow the steps one by one and put your device in operation by instructed order. In only three steps your eBlocker is ready for use:

 

1.     Connection

First, connect your eBlocker to your router or switch, with the orange LAN cable.

Then connect your eBlocker with the adapter and the power supply.

Automatic configuration

Wait for 5 minutes until your eBlocker has automatically configured itself.

Start an Internet browser and go to: http://setup.eblocker.com

Start

The eBlocker icon appears at the top right of your browser. With a click on the icon, you will be lead to the so called “controlbar”, in which you can read the most important information about the page you are currently visiting. You are able to customize the settings here.

 

The network link leads you to the network setup wizard. If the icon does not appear, you can find help in section 5.4.


 

3      Activation

Please have your serial-number of your eBlocker as well as the license key and your email address ready for the activation.

 

You can find your serial-number on the nameplate (at the bottom side of your eBlocker). It is formatted as „SNXXXXXXXX“.

 

The license key is placed on the license card, which is included in the device packaging. Please use a valid email address in the activation process. If you want to transfer your eBlocker license to another device sometime, your email address will also be needed then.


 

4      Use eBlocker optimally

4.1      Summary

After the activation process is done, we recommend you the following steps, so you can use eBlocker as optimal as possible:

<   Delete the cookies, cache and browsing history in all used browsers.

<   Activate SSL (HTTPS-Support) in your eBlocker.

<   Adopt eBlocker's certificate into your operating system and if necessary, in the browsers with their own certificate store as described in section 6.2.

<    Activate possible exception lists for specific apps, so eBlocker can’t protect these apps from third parties anymore.

<   You may define additional exceptions for encrypted connections (SSL) – for example, for websites in which eBlocker should not be active, like online-banking sites.

 

Find all detailed steps explained in the following.

4.2      Deleting cookies, cache and browsing history

eBlocker automatically blocks all data collecting cookies or other elements that identify you.

However, your browser has probably collected numerous tracking cookies of different providers already. Therefore we recommend to delete all your cookies at first, so the trackers “can lose their track”.

You can read more about how to delete cookies in your respective browser in section 9.1.

4.3      Activate support for HTTPS/SSL encrypted connections

How you can activate support for HTTPS/SSL encrypted connections, we describe in section 8.4.

4.4      Activate exceptions for apps

How you can activate exceptions for apps, we describe in section 8.5.

4.5      Final recommendation

We have developed our eBlocker very carefully and are constantly improving it. Nevertheless, our eBlocker is no “magic pill” for privacy that works under all circumstances. Apps in particular which are installed in your device/OS natively, represent an increased risk for your privacy. Therefore we recommend to not use any apps at all if possible.

Apps are very common today for accessing Internet services. However, they involve a greater risk for your privacy, as when you use the same service through a browser. Why you should avoid apps to protect your privacy, we explain below:

 

<   Attack into your privacy

Apps such as Facebook, WhatsApp or Twitter can have a direct access to your device and use their own communication protocols, which cannot be protected by your eBlocker.

<   Transfer of malware

Even the transfer of malicious software represents great danger. App stores do not only provide safe programs, but increasingly apps, that are infected with malware. These infected programs can transmit mobile data (e.g. contact details) unnoticed and without authorization or even send fee-based SMS to service numbers.

 

Use exceptions sparingly

Some apps are only compatible with eBlocker, if they are not monitored by eBlocker. Corresponding exception lists for these apps can be activated in the settings by clicking on “Apps”. They will not be analyzed by Blocker anymore. Please note that your privacy heads to the danger zone with every exception you make. Data can be collected without you noticing it.

 


 

5      If something may not work

Despite of the simple Plug & Play solution of eBlocker, some incompatibilities may appear that can have different causes. We have summarized some options below, which can help you in stressful times.

5.1      Connection- and network problems

<   Individual setup

Your eBlocker is setup in the automatic network mode by default with initial connection. This mode is compatible with most network devices. Should any connecting errors occur or your network slows down, you can setup your eBlocker individually with only a few clicks. By setting it up individually, all network problems will normally be resolved immediately. How you can setup your eBlocker individually, we describe in section 8.9.

5.2      A website does not appear

Here are some tips if your eBlocker works generally, but a problem occurs on a certain website:

<   Pause eBlocker

Click on the eBlocker icon at the top right of your browser. By clicking the function “Pause” you can pause your eBlocker for 5 minutes for the device you are currently using. Try to reload the certain website again. If you visit that site frequently and pausing your eBlocker helped loading your website, we recommend to add this site to your exception list.

<   Add exceptions (Whitelisting)

If you do not have access to a certain website or are blocked from having access, you can add this site to the exceptions. How you add these exceptions we describe in chapter 7.3.

<   Deactivate SSL completely or for individual devices

Individual websites loaded with HTTPS or apps, are not compatible with eBlocker in rare cases. This you can check easily by disabling SSL on the entire eBlocker or only for the current device you are using. To deactivate SSL completely, open the controlbar. Go to settings and click on “SSL”. Deactivate SSL with one click on the orange button, next to the words „SSL Support“.

To deactivate SSL on one particular device only, please proceed as follows.

 

Click on „Devices“ in your settings. Search for the device that you want to deactivate with SSL.

Your current device is displayed with bold type and is easy to identify.

 

Open the settings for the intended device by clicking on the according line and deactivate SSL with the shown slide switch.

 

 

<   Deactivate SSL for individual websites or apps

If the issue is resolved by turning off SSL, the corresponding site can be added on the exception list permanently. First, check on “Apps” if there is already a pre-defined list of exceptions where you can find your questionable app. See if the according website it added as well. If yes, activate the exception list. Alternatively, you can specify the site individually as an exception. For more information about how to add exceptions for individual websites, or how you can manage exception list in general, go to section 8.4.1.

5.3      The eBlocker icon does not appear on all devices

If your eBlocker works fine in general, but the eBlocker icon is not showing on all devices, we have summarized some tips that can help.

<   Activate device

Open your browser and click on the eBlocker icon. Go to settings and then click on „Devices“. On the right side you will see the list of all devices connected to your eBlocker in your home network. Check if your device or its manufacturer or IP address is displayed. How you can activate your device, we have described here 0.

5.4      The eBlocker icon is not showing on any device

<   Reboot eBlocker

If you have connected your eBlocker for the first time and you have visited http://setup.eblocker.com but still no icon shows after 5 minutes waiting: reboot your eBlocker. Disconnect the device from the power supply and wait for 30 seconds. After 30 seconds connect your eBlocker to the power supply again.

<   Delete cookies and cache and reload website

Delete the cookies and cache of your browser or press and hold the shift key while clicking on browser icon „reload page“. You can read in section 4.1 how to delete cookies.

Please note that your eBlocker needs 5 minutes after initial connection to configure itself automatically.

<   Activate device

Make sure that your device appears under „Settings/Devices“ and is activated. How you can activate devices, is described in section 8.3. If your device is activated, but the icon is not showing, please read section 5.3.

5.5      Removing common problems

<   Plug in your cable correctly

Please check your scope of supply with your delivery. Make sure that your delivery is complete and check if you are really only using the accessory cable and the power supply. Test if the cables are plugged in correctly and fully inserted.

<   Plug in cable into the right ports

Please make sure that the LAN cable is really plugged into the „LAN“ port and the power supply is plugged into the “POWER” port. The „HDMI“ and “USB” ports are for future enhancements and currently not in function.

Please note that some routers have limited LAN ports that cannot be used by the eBlocker. These port are LAN1 or LAN4/LAN5 most of the time. Please connect your eBlocker with one of the other ports of your router.

 

<   Reboot eBlocker

Open your browser and click on the eBlocker icon at the top right of your browser. Go to Settings and click on “System” afterwards.

The button „Reboot and Shutdown“ is already highlighted in orange. Click on “Reboot” and your eBlocker will reboot itself.

If the eBlocker settings cannot be accessed, you can reboot your device by disconnecting your eBlocker from your power supply. Please wait for 30 seconds before reconnecting your device to the power supply.

Please note that your eBlocker needs 5 minutes to detect the network and configuring itself after rebooting.

<   Send diagnostic report to support team

In case of error or problems, you can create an automatic diagnostic report that you can send to us (section Appendix D). Through the diagnostic report, we will know in which state your device is in and thus a quick solution can be found.

<   Reboot router

Shut down your router and reboot it afterwards. Please consider the user manual of your router. Usually it only requires to disconnect the router from the power supply and connecting it right back in after a short time.

5.6      Some apps don’t work

Unlike usual browsers, apps can have more access and possibilities on your device. While most browsers and sites work fine with your eBlocker, some incompatibilities with apps may occur. There may be problems with individual apps especially when your eBlocker is activated for encrypted connections (SSL). Usually the problems can be removed easily if the corresponding website that is communicating via SSL through an app, is excluded from the analysis by your eBlocker.

There are already prepared exception lists for some of the most common apps. You can find and activate them at “Settings/Apps“. You can also define your own exception list for more apps, or edit and complete the existing exception list.

It’s not always easy to find out which sites are actually addressed by the app. To facilitate the analysis, eBlocker provides an „Expert Tool“ to record and interpret the connection from app to website and makes suggestions as to which sites should be added to the exception list. This “Expert Tool” is described here 8.11.

But do not worry: if you are not an expert, please write a short article in our forum (forum.eblocker.com). Simply let us know which application or function of an app does not work with the eBlocker. Perhaps another member has solved exactly the same problem and can help you.

 

Please note that you cannot be protected by your eBlocker on the website you are using the exception list for. Even if you are accessing the list with a web browser and not an app.

In connection to the subject of apps, please read our recommendations in section 4.5.

5.7      The eBlocker completely stopped operating

Please make sure to activate your DHCP server.

Remove your eBlocker from your network and disconnect the eBlocker from the power supply. Now remove all other devices (your computer, notebook, smartphone, etc.) from your network and connect them again to update the DHCP lease. You can also update your DHCP lease for most of the devices, in the network settings. Your devices are now connected to the Internet again.

Remove the network cable from your computer and deactivate the Wi-Fi, if needed. Connect the eBlocker with the network cable to your computer and connect the eBlocker to the power supply. Now wait for 5 minutes. Call the emergency-IP of the eBlocker: http://169.254.94.109:3000 to get to the eBlocker settings.

Go to „Network“ and set it to „automatic“. Save the settings afterwards. The eBlocker might reboot now. Wait for the reboot and go to the eBlocker settings again. Click on „system“ and shutdown your eBlocker. Remove the device from your computer and from the power supply. Don’t forget to reconnect your computer to the network and/or to reactivate your Wi-Fi. Now connect your eBlocker to your router and to your power supply again.

5.8      More help: Our forum and support

Many useful answers to common questions can be found in our forum at http://forum.eBlocker.com

 

We are pleased to assist you via email as well (see Appendix D).

6      Tips and Tricks

6.1      The individual setup – eBlocker overtaking the DHCP server

Before you start, please make sure that your eBlocker is at least updated to the software version 0.9.3-8.

<   Find out how to deactivate the DHCP server of your router through the detailed information in your router manual.

<   Click on “Network” in your eBlocker settings and go to the network assistant.

<   Read the preparations carefully and click on the button “Next”.

<   Read the process carefully and click on the button “Next”.

<   Now please write down or print out the displayed settings. After doing so, click on the button “Next”.

<   Confirm all three steps and click on “Perform and Reboot”.

 

Your eBlocker is fully configured after the reboot. Now your router is next to be converted.

<   Log into your router as an administrator.

<   You have to change the settings for some routers (e.g. from standard to extended).

<   Deactivate the DHCP server of your router and save the settings.

<   Finally renew the so called DHCP lease for all active client devices that are located in your network (computer, notebook, smartphone, etc.).

 

It is important to renew the DHCP lease, so all client devices will not use the old network information. You will receive the new DHCP lease easily through disconnecting the network connection from the client devices, for example. Some devices also provide the button „Update DHCP lease“ in their network settings.

Note: If you want to undo this setting you have to activate the DHCP server in your router first. Deactivate the DHCP server of your eBlocker afterwards or set your eBlocker to “automatic” in the network settings.

6.2      Inserting the eBlocker certificate

We recommend our customers to add the eBlocker certificate into their operation system first. Most of the browsers and programs need to use the eBlocker certificate to have access to HTTPS sites. Several programs have their own certificate stores. How the eBlocker certificate is inserted into these certificate stores, we describe in this segment.

6.2.1       macOS

You have added the certificate with only a few clicks. Open the Safari browser.

Open the eBlocker SSL configuration site.

Click on the button add certificate, to save the eBlocker certificate.

 

<   Go to programs/applicationprograms and open the keychain Access application.

<   Choose keychain system and the category certificate.

<   Go to the menu and choose storage / import objects… .

<   Choose the downloaded eBlocker certificate for the file dialog and click on open.

<   You will eventually be asked to type the administration password.

<   Double-click on the imported eBlocker certificate.

<   Choose „always trust“ in the drop-down menu Secure Sockets Layer (SSL).

<   Close the window. Type in the administrator password, if you are asked.

 

 

The eBlocker certificate has now been added into macOS. Most of the browsers and programs can have access to the eBlocker certificate now.

Here a list of a few common browsers you can have access to the eBlocker controlbar on HTTPS sites with.

<   Safari

<   Google Chrome

<   Opera

<   Vivaldi

<   Yandex

 

The following browsers have their own certificate store. The eBlocker certificate has to be inserted into the according certificate store.

<   Firefox

<   Cliqz (based on Firefox)

<   Seamonkey

<   Thunderbird (email program)

Firefox or Cliqz

 

Open the eBlocker SSL configuration site.

Click on the button add certificate.

Make sure that the first checkbox ‚Trust this CA to identify websites’ is selected (see image below).

 

 

Click on OK to insert the eBlocker certificate in Firefox.

You can see the eBlocker controlbar now on HTTPS sites with the Firefox or Cliqz browser.

 

Seamonkey

 

Go to edit and then to settings.

Choose Privacy & Security and go to Certificates. Click on Manage Certificates.

After the Certificate Manager opens, click on Import.

 

 

Choose the eBlocker certificate from the download directory and confirm with OK.

Make sure the first checkbox ‚This certificate can identify websites‘ is selected and confirm this process with OK.

 

 

Close the Certificate Manager and the settings with a click on the button OK.

You can have access to the eBlocker controlbar on HTTPS sites now, with the Seamonkey browser.


 

Thunderbird (email program)

 

Go to the menu and click on Preferences.

 

 

Go to Advanced and click on View Certificates.

 

After the Certificate Manager opens, click on import and choose the eBlocker certificate from the downloads directory.

 

 

Open the eBlocker certificate and make sure that the first checkbox ‚Trust this CA to identify websites‘ is selected. Confirm with OK.

 

Confirm the Certificate Manager and the settings with OK.

The certificate is now inserted into the Thunderbird email program.

6.2.2       Windows

You have inserted the certificate with only a few clicks. Please use the Microsoft Internet Explorer or the Edge browser.

Open the eBlocker SSL configuration site.

Click on the button add certificate.

After the dialog appears, go to save and then click on open.

 

 

Click on Install Certificate.

 

The Certificate Import Wizard opens. Click on Next. Go to safe all certificates into the following storage and click on browse afterwards.

 

Choose the second register Trusted Root Certification Authorities and confirm this process with OK.

 

 

Click on Next in the Certificate Import Wizard and confirm the process with Finish.

Confirm the following safety warning with Yes.

The eBlocker certificate is now inserted into Windows. Most of the browsers and programs can have access to the eBlocker certificate.

Here a list of a few common browsers you can have access to the eBlocker controlbar on HTTPS sites with.

<   Microsoft Internet Explorer

<   Microsoft Edge

<   Google Chrome

<   Opera

<   Vivaldi

<   Yandex

 

The following browsers have their own certificate store. The eBlocker certificate has to be inserted in the according certificate store.

 

 

<   Firefox

<   Cliqz (based on Firefox)

<   Seamonkey

<   Thunderbird (email program)

 

 

Firefox or Cliqz

 

Open the eBlocker SSL configuration site.

Click on the button add certificate.

Make sure that the first checkbox ‚Trust this CA to identify websites’ is selected (see image below).

 

Click on OK to insert the eBlocker certificate in Firefox.

You can see the eBlocker controlbar now on HTTPS sites with the Firefox or Cliqz browser.

 

 

Seamonkey

 

Go to edit and then to settings.

Choose Privacy & Security and go to Certificates. Click on Manage Certificates.

After the Certificate Manager opens, click on Import.

 

Choose the eBlocker certificate from the download directory and confirm with OK.

Make sure the first checkbox ‚Trust this CA to identify websites‘ is selected and confirm this process with OK.

 

 

Close the Certificate Manager and the settings with a click on the button OK.

You can have access to the eBlocker controlbar on HTTPS sites, with the Seamonkey browser.

 


 

Thunderbird (email program)

 

Go to the menu and click on Options.

 

 

Go to Advanced and click on View Certificates.

 

 


 

After the Certificate Manager opens, click on Import and choose the eBlocker certificate from the downloads directory.

 

 

 

Open the eBlocker certificate and make sure that the first checkbox ‚This certificate can identify websites‘ is selected. Confirm with OK.

 

 

 

Confirm the Certificate Manager and the settings with OK.

The certificate is now inserted into the Thunderbird email program.

6.2.3       Android

You have added the certificate with only a few clicks. Open the Google Chrome browser.

 

<   Open the eBlocker SSL configuration page.

<   Click the button "Add certificate".

<   Enter your PIN if necessary

<   Give the certificate a name (for example: Tim eBlocker).

<   Select "VPN and Apps" for credential use.

<   Repeat the last steps and save the certificate at "Wi-Fi".

 

For Android versions smaller than version 6, it is sufficient to save the certificate only at "Wi-Fi".

 

If the eBlocker certificate is not opened automatically you can find it in your download folder.

 

 

 

6.2.4       iOS

You have added the certificate with only a few clicks. Open the iOS Safari browser.

 

<   Open the eBlocker SSL configuration page.

<   Click the button "Add certificate".

<   The iOS settings open automatically and the profile of the eBlocker certificate is displayed.

<   Click on "Install".

<   In the following dialog click on "Install" again.

<   Confirm by clicking on "Install" for the last time again.

<   The eBlocker certificate has now been added in iOS.

 

 

 

 

 

Starting with the iOS version 10.3 the added eBlocker certificate has to be activated again.

 

<   Open iOS Settings and navigate to "General" > "About" > "Certificate Trust Settings".

<   There you will find the previously added eBlocker certificate that you can now activate.

 

 

 

 


 

7      Definition of eBlocker functions

At daily use, you usually shouldn’t notice your eBlocker right away. Everything should work fine. A lot of sites will even load faster because advertisements and animations are blocked.

7.1      eBlocker icon

You can see if the eBlocker is working and activated by the orange translucent icon that is visible on the top right of every browser that you use.



If trackers or advertisements are blocked on the site, the total number of blocked requests will be displayed. Through a click on the eBlocker icon you can have access to the controlbar.

7.2      eBlocker controlbar

Through the controlbar you have quick access to the most important functions for the currently loaded page or for the device you are currently using.

 

 

 

You can read detailed information about the functions in the following sections.

7.3      +Exceptions

With the exception list you can specify individual sites where your eBlocker should not be active.

Click on “+Exceptions” to add the current website to the exception list. The caption will change to “x Exception.” If you click on the icon again, the website you just added, will be removed from the exception list again.

 

7.4      Tracker and Ads (Tracker- and Ad-Blocker)

One of the central and most important functions of eBlocker is to prevent third parties from monitoring your surfing habits and thus create a detailed personality profile.

To ensure your privacy, eBlocker blocks data transmission to data collectors by default and prevents the loading of advertisements from ad networks, which also analyze your surfing habits and like that create profiles about you. By taking a look at the controlbar, you can see the number of connections to data collectors and ad networks that have been prevented. With a click on the icon, you can see the list of all blocked connections.

eBlocker wants to protect your privacy but does not try to avoid any content locks of publishing houses. The Website realizes that your eBlocker also blocks ads, therefore the requested content you would like to load on that site may not be available for free anymore.

By clicking on "Ads" in the controlbar, you can deactivate the eBlocker module for filtering ads either globally, or individually for this page and then have access to the content. You can easily activate the filtering again by clicking on "Ads".

 

The tracker blocker will still be active so you will remain protected from trackers. But be careful, advertising still captures your personality profile - even if you do not click on it. Just like the module for filtering ads, the tracker module can be deactivated or activated for the filter of trackers globally or individually for a website.

 

 

7.5      Anon (IP-Anonymization)

Whenever you are surfing the net, you send your so called IP address to the requested website. This is similar to the porting process of a telephone. There is no public “phone book” for IP addresses, but your Internet service provider knows who used which IP address at what time. These data – keyword is „retention of data” – are also stored for a while and can also possibly send to authorities.

Quite regardless of that, any IP address can always be assigned to the provider and also to the geographic region. Like that, the requested website at least knows where the address comes from.

To disguise your own IP address, that means to provide additional anonymity on the Internet, you can activate the IP-Anonymization.

Once the IP-Anonymization is enabled, all HTTP requests are routed through an anonymizing network.

If SSL/HTTPS is activated in your eBlocker, HTTPS requests will also be anonymized. Starting from now on, we are providing alternative networks besides the Tor network that support the openVPN protocol.

How you can set up and use the Tor network, we describe in chapter 8.6

How you can set up and use other networks, we describe in chapter 8.7

7.6      Cloaking

When a website is called, each browser identifies itself with the so called „user agent“. This identifier provides the website information about the device, operating system and the browser.

This “user agent” is not only used to identify you and to create a personality profile, but is also used from shops, so they can offer you individual prices. For example, it may occur that you get a different price for the same product using a tablet PC as when you use a stationary PC.

With help of the eBlocker „Cloaking“ you can disguise your device and send the user agent identification of a different device to the website. Thus you can improve the protection of your privacy and ideally use dynamic pricing as an advantage.

Open the controlbar. Go to „Cloaking“ and disguise your device with a click on the device that you desire.


 

7.7      Pause

By clicking on „Pause“, you can deactivate your eBlocker for 5 minutes for the current device you are using.

7.8      Settings

Click on „Settings“ to set up your eBlocker individually. Detailed information about the eBlocker functions are described in section 8.

7.9      Help

For questions and issues you can have access to this user manual. Moreover you can go to our forum for technical matters, in which you can find many answers to common asked questions.

http://forum.eBlocker.com

We are also pleased to help you with further assistance via email (see Appendix D).

 

Unfortunately we do not offer any support via telephone at the moment.


 

8      The eBlocker settings

You can find the main functions that you need for your daily routine in the net by clicking on the eBlocker icon (at the right top of every browser site) and through your controlbar (see 7).

Some settings can be adjusted easier and sometimes only through the so called console. You can have access to the setting console by clicking on the icon “Settings” after opening the controlbar (see 7.2).

The functions of the setting console are divided into following areas:

·         General

·         Devices

·         SSL

·         Apps

·         IP-Anonymization

·         System

·         Network

·         Experimental (beta)

·         Expert Tools (beta)

 

You can have access to the requested area by clicking on one of the captions listed on the side register, which you see on the left side.

settings

You can find a detailed description for all areas in the following sections.

If you have called the setting console for the first time or if you have not activated the update license yet, the network setting assistant will appear by default. The network setting assistant will guide you through the activation process.

8.1      General

General settings and information about your eBlocker.

This site is divided into following sections:

·         License

·         Updates

·         Admin-Password

·         About

8.1.1       License

You can read details about your activation status of your license and of your eBlocker here.

By clicking on „Activate new license“ you can update your license (e.g. to lifetime license) or upgrade your license (e.g. from eBlocker Pro to eBlocker Family). Please enter your license key for that.

The link „Buy license“ leads you to our eBlocker online shop.

The link „Transfer license (from/to other device) leads you to a website where you can remove the license off your device and use it for a different device.

8.1.2       Updates

This page shows you which versions of the eBlocker software and filter rules are currently in operation.

You can enable automatic updates, if you have activated a valid license for this device. You can also determine at what time these updates should be implemented.

Automatic updates are activated by default in the general settings and are implemented in your local time between 02:00 o’clock and 03:00 o‘clock.

If you deactivate the automatic updates, you can always import updates by yourself. The eBlocker will display a notice next to the "Check for update" button, as soon as a new update is available for you.

8.1.3       Admin-Password

The eBlocker console can be reached through the general settings in your local network, by default. In many cases this is sufficient and very practical.

However, we recommend to assign an administrator password, so that important settings and information of your eBlocker are only accessible after entering this password. Once a password has been assigned, your eBlocker console can only be accessed by entering this password.

Please keep the admin-password in safe hands! In case you forget your password or mislay it, you can reset the password by clicking on the slide switch near the words “Administrator password is disabled”.

You can find some general and legal basics as well as references to your eBlocker. You can also read about how to get in touch with our support forum (see Appendix D).

8.2      Parental Control (beta)

Parental Control of the eBlocker has been significantly extended in version 1.3.

 

If you have used Parental Control already in a previous version, please consider the hints in section 8.2.19

8.2.1       Activate Parental Control

To be able to use Parental Control, assign an administrator password first to prevent others from accessing the eBlocker settings and perhaps deactivating Parental Control.

 

Assign the administrator password in "eBlocker Settings> General", "Admin password".

 

Navigate to "eBlocker Settings > Parental Control". The section “Parental Control” is divided into four subpages. We describe the functions detailed in the following sections:

 

<   User

<   User Profile

<   Website Blacklists

<   Website Whitelists

8.2.2       User and Protection profiles

In order to activate Parental Control for individual devices in your home network, all devices that should be protected must first be assigned to a user. This user will define the effective protection profile for the device. The protection profile then defined the access rules for the device. I.e. it defines, which websites are accessible or restricted and at which times and how long internet access is permitted.

 

New in release 1.3: The active user of a device - and thus the active protection profile - can now be changed at any time by entering a user PIN, so that a flexible use of the devices is possible.

 

Example 1:

The family tablet is accessible to every family member, even children can use it at any time without the parent having to attend. Therefore, the tablet should be assigned to a user with a restricted protection profile to ensure maximum protection during unattended use. If a parent wants to use the tablet, the Parental Control protection can temporarily be changed or switched off by changing the user of the device. A PIN must be entered for the user change. Once the parent has finished using the device, the user should be reset to the original owne, or the Internet access for the device should be completely blocked.

 

Example 2:

A parent's smartphone is always owned by that parent. It is also protected against unauthorized use by a system password. The children can never use this smartphone unattended. In this case, it is not necessary to assign an explicit user or a Protection profile to the device.

8.2.3       Three easy steps

The following steps must be carried out to activate Parental Control for your home network:

<   Create an eBlocker user for all family members (see section 8.2.4).

<   Assign the appropriate protection profile to each user. The eBlocker provides sample profiles that can be adapted to your needs. Or you can set up additonal protection profiles yourself (see section 8.2.7).

<   Assign a main user to all devices that should be protected by Parental Control (see section 8.2.11). It is possible to change the active user of a device at any time by entering an individual user PIN (see section 8.2.18).

8.2.4       Create a new user

Navigate to the “eBlocker Settings > Parental Control” and click on the page “User”.

 

 

If you have not used Parental Control yet, the list of users is empty. After you have created some users, the page might look like this:

 

To create a new user, click “Add User”. A dialog box (see below) opens. Enter a name and select a Protection profile. In addition, you should assign a PIN to all users who are allowed to use another device. For example, provide a PIN for all adults and the older children.

 

 

Note that any user who has received a PIN can change their own PIN over the ControlBar (s. section 8.2.18). You can also view and change all other settings at any time.

8.2.5       Change settings of a user

Click on the name of a user. The current settings and details for this user will be displayed:

 

 

You can change the name of the user, select another protection profile for the user, and specify whether the user is allowed to accept other devices by entering a PIN or not.

In addition, you can see which devices this user is assigned to as main user, and whether the user is currently active on other devices.

8.2.6       Remove User

You can remove a user with the button "Remove user" in the detailed view of the user (see above). However, the button is disabled when devices are still assigned to the user. First assign a different user to the corresponding devices to activate the button.

8.2.7       Create new profile

Navigate to the “eBlocker Settings > Parental Control” and click on the page “User Profiles”.

 

 

The eBlocker provides a default “Standard Profile” as well as a few sample profiles with Parental Control restrictions:

 

 

The Standared Profile does not contain any restrictions on Internet access. It is automatically assigned to all existing and new devices in the home network.

 

In addition, the eBlocker provides predefined Protection profiles for different requirements as examples and suggestion.

 

Click on the button "New Protection Profile" to create a new Protection profile. In order to keep your profiles apart, assign names and a brief description. Save the profile afterwards.

 

To access the settings of the profile you just created, click on it in the list.

You can change the name and description of the profile, modify site and category filters, create time constraints, or delete the profile.

 

In the profile details, you can also see to which users the profile is currently assigned.

Initially, no Parental Control restrictions are activated in a new profile and no users are assigned to it:

 



You can now adjust the following settings to create a Protection profile according to your needs:

<   Deny or allow access to certain categories of websites.

<   Allow Internet access only at certain times of the day.

<   Limit the maximum Internet usage time per day.

Details to all settings can be found in the next sections.

8.2.8       Deny access to categories of websites

To deny access to certain categories of sites, activate the site category filter by clicking the slider button.

 

 

The following Dialog box opens:

When you move the mouse over the list of categories, you will be informed of the content of the categories by a tooltip. Select the categories that should be banned for the profile and save the settings.


The filters are then generated for this profile. This may take a few seconds because some lists have literally millions of entries. You can adjust the website category filter at any time by clicking on the "Edit" button:

 

 

Further details on the category filters and how you can create your own categories of blacklisted or whitelisted websites can be found in sections 8.2.15 and 8.2.17. The eBlocker provided category filters are automatically updated daily. To disable the restrictions of the category filter completely, deactivate the corresponding sliding switch.

8.2.9       Restrict internet access to certain time slots a day

For each day of the week, you can specify one or more time slots that allow access to the Internet through this profile. Activate the sliding switch to restrict the internet access:

 

 

If no time periods have yet been defined, the following dialog box opens directly:

 

 

After adding the first time slot, the configuration is displayed like this:

 

To add more time slots, click the "Add" button. To change predefined slots, click the pencil icon next to the slot. To remove slots again, click the minus symbol next to the slot. To completely disable the restriction on time slots, deactivate the corresponding sliding switch.

8.2.10    Limit the maximum Internet usage per day

In addition to the time slots, which define the time of day, when Internet usage is generally allowed, you can set a maximum internet usage time for each day of the week. So it is for example possible to allow Internet usage in the time from 7am to 8pm, but within this time restrict the Internet usage to a maximum of one hour in total.

Activate the sliding switch to restrict the maximum daily usage time:

 

 

For a newly created Protection profile, the daily usage is set to 1 hour. Click on the "Edit" button to change the daily usage restrictions. The following dialog opens:

Set the maximum usage time for each day of the week and save the settings. Then the configuration is as follows:

Deactivate the corresponding sliding switch to disable these restrictions completely.

 

Note:

The corresponding online time is available for each user individually. It is not divided among different users of the same profile.

8.2.11    Assign a user to device

To activate Parental Control for a device, a user must be assigned to that device.

Navigate to the "eBlocker Settings > Devices" (see section 8.) and click on the device to which you want to assign a user:

 

A new device is initially not assigned to a user. Click on the according selection list and select the main owner of that device. The device will immediately be subject to the restrictions as defined by the protection profile of that user.

It is possible to assign multiple devices to the same user. Then the same filter rules apply on all these devices. The Internet usage time per day is summed up for all these devices.

8.2.12    Controlbar for users with protection profiles

If a protection profile is set for a user that contains one or more parental control restrictions, this user is provided with a modified and restricted controlbar. Via the additional menu item "Online-Times" you can see the currently remaining internet usage time as well as the allowed usage times:

 

8.2.13    What happens if the daily internet usage time is limited?

If the daily Internet usage time is limited, Internet access must be activated explicitly. Otherwise, automatic processes of the operating system or other apps on the devices would unintentionally "consume" the usage time. E.g. because the apps might regularly check for updates.
Therefore, the following page is displayed when the user tries to go to any page using an Internet browser:

 

 

 

To activate the Internet use, the sliding switch must be activated. From this moment on, the remaining usage time is correspondingly reduced. The currently remaining time is displayed to allow the user a flexible time management.

 

The current remaining usage time can always be reviewed via the eBlocker icon and the controlbar. It’s also possible to end internet usage via the controlbar in order to spare the remaining Internet usage time  (e.g, see above: “Remaining time: 39 minutes”):

 

 

The Internet access is also automatically deactivated after a few minutes, when there are no Internet  connections seen by the eBlocker. This also helps to consume the daily Internet usage time in a flexible and meaningful way.

 

8.2.14    What happens if the internet access is denied?

When Internet access is denied, while using an Internet browser, one of the following messages is displayed depending on the reason for blocking the Internet access. This message is displayed in order to make it clear why the Internet access was denied.


Please note that other applications and apps may not function as expected and may display unspecific error messages, when the Internet connection is blocked. Displaying a corresponding message by the eBlocker is in most cases not possible with such applications.

 

Restriction through category filter:
If access to a site has been disabled due to a site category filter, the user will see the following message from the eBlocker instead of the desired site:

 

Via the button "Configuration" the Parental Control settings can be accessed directly. Of course the administrator password is required to do so (see section 8.1.3).
The active user of the device can be changed via the button "Change user". If the new user is subject to another protection profile, access to the page might or might not be allowed, depending on that other profkle. In any case, the corresponding user PIN must be entered to switch to another user.

 

Restriction of access outside of allowed time slots:
If access to a website takes place outside an allowed time slot, the user will see the following message from the eBlocker instead of the desired Web site:

 

 

The "Configuration" and "Change user" buttons have the same function as described above.

 

If the maximum usage time per day has been reached:
If a maximum usage time per day is set and has already been reached, the following message is displayed:

 

The "Configuration" and "Change user" buttons have the same function as described above.

 

8.2.15    Add own lists to the Blacklists

Navigate to the "eBlocker Settings > Parental Control" menu and click on the page “Website Blacklist”:

 

 

 

The eBlocker aready  provides a set of predefined blacklist categories:

 

 

You can create additional categories with lists of disallowed websites at any time and use them in the protection profile. Click on the button "New category". The following dialog opens:

 

 

You can view, add, or remove your own blacklist categories at any time. All your own categories can be selected in the Protection profiles together with the already provided categories (see section 8.2.8.):

 

8.2.16    Add whitelists to blacklist categories

The provided blacklist categories are very comprehensive and are updated regularly. It is, of course, possible that the lists are too strict in some cases and deny access to websites that your children need and should receive access to.
To avoid having to disable the entire protection category just because of a few websites, you can define exceptions from the standard categories by defining categories of explicitly allowed websites –  also called “whitelists”


Navigate to the "eBlocker Settings > Parental Control" menu and select the page "Website Whitelists”:

 

 

Create a whitelist category with websites for which you want to explicitly allow access. Initially, the list of categories with allowed sites is empty. Click on the button "New Category" to create a new category:

 

 

Once you have created one or more categories with explicitely allowed websites, these appear as possible exceptions in the configuration of the protection profiles (see section 8.2.8):

 

Activate the exception slider switch and select the exception/whitelist categories you want to use in this profile.

 

8.2.17    Add own whitelist categories

Rather than restrict Internet access through categories of blacklists, you can also work with categories of explicitly allowed sites. Everything that is not expressly allowed is then automatically forbidden.


Navigate to the "eBlocker Settings > Parental Control" menu and click on the page "Websites Whitelists:

 

 

Create one or more categories of explicitly allowed sites:

 

You can use these whitelist categories, when creating a protection profile. In order to work with explicitly allowed websites, you must change the main policy in the access restriction dialog from "Following catagories are restricted, everything else is allowed" to "Following catagories are allowed, everything else is restricted":

 

 

 

Note that Internet access through such profiles can be very limited. So it may not be possible to load operating system updates, and many apps will likely not work as usual.

8.2.18    Change of user through controlbar

If a PIN has been assigned to one or more users (see section 8.2.4), the current user of a device can be changed via the controlbar. Through the change of the user, the respectively active protection profile might also change. Thus changing or even disabling the access restrictions of a device can be very simple.

Suppose Dad, and Mom have a user PIN, but Tim and Lara do not. Then the controlbar on Lara’s device would look like this:

 

The adults can temporarily take ownership of the device by entering the PIN and thereby temporarily remove the protection restrictions:

 

 

After the device switchover the controlbar looks like this:

 

 

The controlbar always shows the current user as well as the main user of the device. If the device is currently used ba a different user, then it can be returned to the main user by selecting “Return device”. If the main user himself has set a PIN, the PIN is required for the return. Additional functions are available to users with PIN:

<   Lock Internet access for the device. Only a user with PIN can remove the lock.

<   Change own PIN.

 

8.2.19    Migration of Parental Control to eBlockerOS 1.0

If you have already used Parental Control in eBlockerOS 1.0, you will notice that users have been created for each protection profile in use. These users have automatically been assigned to the appropriate devices.


This was necessary because the profiles are no longer directly assigned to the devices.


Nothing should have changed in your home network, due to the upgrade.


In order to make the best of Parental Control, you should rename or replace the automatically created users and add more, if necessary.

8.3      Devices

The „Device“ function shows a list of all network devices that are identified by your eBlocker in your home network.

Devices

 

The devices are determined through their IP addresses and are determined by the manufacturer as far as eBlocker can identify. For an easier identification of the devices, you can manually assign names for each device (see below).

By clicking on the device name, you can read more details about the device and make some adjustments.

devices_2

8.3.1       Name devices

We recommend to enter a name for all devices once, so you can easily recognize the device at any time (e.g. „Christian’s laptop“, „TV“, „Livingroom“ or „Sally’s smartphone“).

8.3.2       Activate eBlocker for a device

Your eBlocker is activated by default in the general setting. Only some type of devices (e.g. some IP phones and Hi-Fi components) are deactivated by default. Devices that are connected to eBlocker are displayed in orange.

You can always determine which device should be connected by your eBlocker and which not.

Once your eBlocker has been activated for a device, additional functions are available in the following.

8.3.3       Activate/deactivate SSL for device

If the SSL functions have been activated in general (see 8.4), you can also advise your eBlocker to monitor every single device for encrypted connections (SSL).

8.3.4       Activate IP-Anonymization for device

In addition, you can set whether all HTTP/HTTPS connections of the device will be routed through the Tor Network, or via a VPN connection (see section 7.5).

8.3.5       Activate eBlocker icon for device

Lastly, you can specify if your eBlocker icon (see 7.1) should be visible on your called website. You can choose between the options „ always“ „for 5 seconds“ or „never“.

8.3.6       Discover new devices or delete a device from the list

Your eBlocker detects new devices in your local network usually automatically after a short time and displays them on the device list. With a click on „Discover new devices“ at the top of the site, you can search for new devices at any time manually.

Devices that are not found by your eBlocker will not be deleted automatically. eBlocker cannot tell if the device has been switched off for a short time only, is simply offline or if that device truly does not operate anymore. You can „remove/reset“ devices that are a not in operation, but you cannot delete them from the list.

8.4      SSL

SSL stands for Secure Sockets Layer and is a protocol to encrypt the communication “end-to-end” between two communication partners. Sometimes you will also encounter the term TLS (stands for Transport Layer Security). TLS is basically the same as SSL. If the standard web protocol HTTP is encrypted with help of SSL, it is called HTTPS. Many websites, especially banking and online shops are encrypted with SSL nowadays. Thus you can be sure that you are communicating with the providing website and no third parties can change or read your typed in data. However, not only reputable shops or banks use SSL. Tracking and ad providers are collecting your data through HTTPS/SSL increasingly. Your profile data will be send to the tracking server in an encrypted code, but this will not stop the data collector to create a detailed profile of you further on. Each eBlocker generates a device unique root certificate and private key when SSL is enabled. This is used to encrypt the communication to your device when the eBlocker terminates the SSL-connection. We do not have access to the private key nor to the device itself and have taken high security measures to protect the eBlocker from hacking - but of course there is no 100% security. We've made SSL decryption an option. If you feel uncomfortable having eBlocker decrypt the SSL connecting, please do not enable this option.

As soon as SSL is enabled, eBlocker times encrypted connections, so the data stream can be analyzed. Like that, your eBlocker is the end of the “end-to-end-encryption”. Because the browser expects an encrypted connection for HTTPS, eBlocker encrypts the communication to your device.

Therefore it is necessary to adapt the security certificate of your eBlocker in all your browsers and devices for once. Sometimes this certificate is also called “certificate for certificate authorities” or as “root certificate”.

For this, click on the eBlocker icon at the top right of your browser and go to „Settings”.

Click on the area “SSL”. Activate SSL for your eBlocker by switching the button to the right.

 

A short note appears that the eBlocker will terminate all encrypted SSL/HTTPS connections and re-encrypt them towards the targeted server, so the eBlocker can monitor all SSL connections.

 

Click on “Help – how to add the certificate” below „Important notes“ to get detailed information about adding the certificate.

Please note that it is necessary to save the so-called security certificate of your eBlocker in your operating system first and then in the browsers that have their own certificate store as described in section  6.2.

 

8.4.1       Define exemptions for end-to-end encryption

If your eBlocker should not be active on specific websites that are encrypted, like online banking for example, you can add the specific website to the SSL-exemption list.

 

If you do not want your eBlocker to monitor the SSL-connection to the website of your online bank, add an exemption to the SSL-exemption list accordingly: Choose a definite domain (e.g. “Commerzbank”), enter the URL of the banking website and complete the process with clicking on the orange button named “Add domain”.

You can see an exemption list below the input fields, that has been prepared already. If you are not satisfied with one exempted domain, you can easily delete the domain by clicking on the orange trash can icon, to the right side. As soon as the domain has been deleted from the exemption list, your eBlocker will monitor this website again automatically, even if the connections are encrypted with SSL.

8.5      Apps

If individual apps are not compatible with your eBlocker, you can exclude websites that are addressed by these apps (often unnoticed in background), so they won’t be monitored by your eBlocker anymore.

Click on „Apps“ for this procedure first.

 

Apps_list

You can see a list of predefined exemptions for different apps that you activate or deactivate with one click on the slide switch at the very right side.

Some exemptions for well-known or important apps are already activated in the general setting.

Please note, that every activated exemption means you will not be protected by your eBlocker on that according website. If there is an app missing that you would like to be added to the exemption list, you can add the desired app by clicking on the field “New app definition” at the top of the site. After clicking this field, a new window will appear.

app_definition

Enter the app name and optionally write a little description to it. The app name has to be definite.

Enter one or more domains that are used by the app and should not be monitored by your eBlocker.

Enter one domain per line. You can end the line by pressing the enter/return key.

A superior domain encloses all subdomains automatically. An example: If you add the domain api.superapp.com to the exemption list, all hits to domains like login.api.superapp.com will be excluded to be monitored by your eBlocker automatically.

In rare cases, it is necessary to include IP addresses to the exemption list. You can enter IP addresses in the last field. Enter one IP address per line. Finish the process by clicking „save“.

8.6      Set up and use the Tor network

As described in section 7.5, you can disguise your actual IP address by using the anonymization network.

The eBlocker always connects to the IP-Anonymization via the Tor network

To enable the IP anonymization, open the controlbar. Go to “Anon” and click on “Enable IP anonymization”.

 

On the following page, click on "IP Anonymization" on the left side of the eBlocker console and select the "Tor network" menu item in the upper right corner.

 

 

You can choose one or many countries, from where an exit server will be chosen randomly. Click on “Apply” to confirm your choice. Open any website, click on the eBlocker icon and open the eBlocker controlbar. Click on “Anon” and activate with “Tor network” with one click.

 

 

From now on you can surf anonymously via the IP address assigned to you by the Tor network. An Internet service provider will think that you are located from one of the random chosen countries. Thus you can avoid any censorship or can have access to content that is only available in certain regions of the world.

Please note that the Tor-network is an association of volunteering Internet activists, that provide service cost-free but with no availability guarantee.

If no country is selected, an exit server of a random country will be used.

8.7      Set up alternative VPN network

Instead of the standard Tor network provided by the eBlocker, you can use a VPN connection from any other VPN provider.

VPN networks can be set up under "eBlocker Settings > IP Anonymization" and "VPN Networks". There, you can also find a link to the list of VPN providers we tested. This list is updated regularly. You can also use other VPN providers as long as they support the OpenVPN protocol.

 

 

Note:
Other VPN provider may charge additional costs. Connection speed may vary depending on the VPN provider.

 

Your VPN provider usually provides you with a username, password and a configuration file, it’s name ending on the suffix ".ovpn". This configuration file is needed to set up the connection to the VPN network.

To create a new VPN connection, click “New VPN Provider”. Now follow the wizard's instructions and upload the configuration file provided by your VPN provider.

 

 

After uploading the configuration file you have the option to upload other files, if needed. After uploading the files you will be shown details regarding ignored or unsupported options from the eBlocker.  This is generally harmless and the ignored or unsupported options will not lead to any kind of malfunction. The eBlocker can still be used optimally. Click on "Next".

 

Enter the username and password you have received from your VPN provider into the respective access data fields and click on "Next".

 

VPN-EN03

 

Enter a name and description for this VPN network. Finally, decide if you wish the VPN network to be available in the eBlocker controlbar by clicking on the switch slide. If you do not want the connection to be shown in the controlbar, it will only be visible in your settings and displayed as inactive.

You have successfully created a new VPN network and can edit, remove, or run a connection test with a click on the name.

 

 

In the eBlocker Controlbar, you will see the VPN network you have just created under the "Anon" menu item. The connection is verified by clicking on the VPN network, and a check mark is displayed to indicate successful connection to the VPN network. If the connection was not successful, no check mark would be displayed. In this case, go back to settings and verify your username and password.

 

After activating the VPN network, the Anon icon in the control bar is filled with a checked pattern to indicate it is active.

 

 

 

To disconnect, first click the Anon icon and then the VPN network. The Anon icon in the control bar will be empty and the eBlocker will automatically be connected to Tor.


Note:

A Tor connection cannot be used simultaneously with an existing VPN or another existing Tor connection.

8.8      System

By clicking on „System“ you can apply following settings:

 

 

8.8.1       Reboot and Shutdown

Through this page you can reboot and shutdown your eBlocker.

To reboot your eBlocker after shutting down, unplug the power supply from your device, wait for 30 seconds and reconnect your device to the power supply afterwards.

8.8.2       Time zone and language

Through this page you can set the time zone and language of the eBlocker controlbar and of the eBlocker console.

For setting the time zone, select the region and the main city of your country first. Click on the button “Set time zone” to save your selection.

For setting the language, select the language first and click on the button „Set language“ to save your selection.

8.8.3       Events

The eBlocker detects events like the network connection has been disconnected, or power supply has been disconnected without the eBlocker shutdown. Such events are recorded here for you as information. You will see a notification in the controlbar when a new entry is listed the event list.

 

8.8.4       Logging

Through this page you can have an insight to the log data of your eBlocker and you have the option to download them. Our support will request you to download the log data to get more information, if any errors occur that need to be fixed or need to be analyzed.

 

 

8.8.5       Diagnostics report

If an error occurs, you can generate an automatic diagnostic report that you can send to us to support@eblocker.com. This allows us to find a solution quickly. Generate the diagnostic report very easily with a click on the orange button „Generate report“ and wait for a few seconds. Afterwards you have the possibility to download the file and to send it to our support. We will come back to you as soon as possible.

8.8.6       Reset registration

 

To reset the activation and license obligation of the device, click on „Reset activation“. A new window will appear asking you, if you really want to delete the update license from your device. If you want to delete the license, please enter the email address that you used for activating your eBlocker. Please note that this process is irreversible.

 

8.9      Network

In most of all cases your eBlocker can be configured in the automatic configuration mode.

In some cases, for example if you have a special networking infrastructure, you might have to setup your eBlocker individually so you can use your device optimally.

network

 

The aim of the individual setup is to set your eBlocker as DHCP server and gateway in your local net.

For that click on the area „Manual setup wizard“. The setup wizard will help you through the process of the individual setup.

setup wizard

The implementation of the individual setup leads through the following stages:

1.     Setting of eBlocker as DHCP server and reboot.

2.     Deactivation of DHCP services in your router/Wi-Fi access point.

3.     Reboot of other network devices.

Get to know how to deactivate the DHCP service in your Internet or Wi-Fi router for step 2.

 

Do not follow this step if your eBlocker has not been set as DHCP server first.

Attention: Only use the individual setup mode if you have issues with the functionalities of your eBlocker or other network devices in the automatic mode.

8.10   Experimental (beta)

8.10.1    WebRTC

WebRTC is a browser technology that enables real time communication by establishing peer to peer connections. This is useful for applications like VolP/Internet calls and chats. Unfortunately WebRTC reveals your real IP address (and even your local LAN IP) to establish the connections. Even when using Tor (IP anonymization) your real IP address is visible when using WebRTC and it can be used to identify you. Decide with one click if you want to enable WebRTC connections.

8.10.2    HTTP Referrer Header

HTTP Referrer Header is regularly set when browsing the web. The referrer reveals the website you have been visiting before reaching the current website. By using the referrer header websites can partly track your surfing habits. Some websites use the referrer header also for internal purposes and blocking the referrer header can result in some sites not working properly. Decide with one click if you want to enable referrer header.

8.10.3    Google Captive Portal Check

Google Captive Portal Check is used by Google products like Android, Chrome, Chromebooks and Chromium to determine if you are connected to the Internet by sending a request to Google. eBlocker blocks these requests in order to hide your IP address from Google. Enable this option if your Android device drops the Wi-Fi connection frequently.

8.11   Expert Tools (beta)

"Expert Tools" is for tech savvy users only. It is used for defining domain exceptions where eBlocker should be deactivated. If an app is not compatible with eBlocker-SSL (see also section 5.6), the SSL connection requests from a device can be recorded. Afterwards eBlocker’s behavior for this connection type can be defined, tested and saved as an app definition. Proceed as follows:

First analyze the HTTPS/SSL-connections that runs directly from the app. Then you can set rules how your eBlocker should deal with these connections (activate eBlocker for connections or deactivate your eBlocker for connections). Choose the device on which you are using the app, as well as the duration of the recording, the maximum size of the recording file and start recording afterwards.

Use the app as usual. Especially test the functions that seem to not be compatible with your eBlocker. Update the list with the recorded connections afterwards.

To find the domains and IP addresses your eBlocker should not be active on, it is necessary to try out different settings. Use the switch slide ("Test temporary rule set“), so the selected rules can be effective temporarily and test the functionalities again.

Please note that the proposed rules may not always be correct, because of some connections that are recorded that do not source from the tested app.

As soon as the app runs smoothly with temporary rules, you can save these rules as a new app definition for good.


 

9      Quick guides

9.1      Delete cookies, cache and browsing history in browser

Depending on the browser you are using, you can delete cookies in many different ways. The deleting process for the most important browsers are explained in the following section. If your browser is not listed here, please follow your browser instruction how to delete cookies, cache and browsing history.

9.1.1       Firefox

Open your browser and click on the menu symbol at the right top of your browser. A new browser window with different options will appear.

Click on settings and go to “data protection”.

Click on „recent set chronicle“. A new window will open in which you can add relevant subjects that you want to have deleted afterwards. We recommend to add following subjects in order to erase your trace completely.

<   Visited websites & download chronicles

<   Cookies

<   Submitted search terms & form data

<   Offline website files

 

Through the link „Today’s chronicle“ you have the option to set a period of time. We recommend to choose every subject in order to be fully protected against trackers. Finish deleting your browsing history by clicking “delete now”.

9.1.2       Chrome

Open your browser and click on the menu icon at the right top of your browser window. Go to settings and click on “history”. Finish deleting your browsing history by clicking “delete browsing data”. Please note to state the whole period of time.

9.1.3       Internet Explorer

Click on the setting icon at the right top of your browser window. Go to „Internet Options“ and to „General“ afterwards. Finish deleting your trace by clicking „delete browsing history“.

 


 

10   Glossary

<   Content lock

Providers of (e.g.) journalistic content have a legitimate right – and of course the necessity – to make money with their offers. Many providers offer users to pay for the content directly, individually or per subscription – or just to accept that the called up site contains advertisement.

Some providers reserve the right to lock the cost-free service if the user uses an ad-blocker. This lock is also called “content lock”.

eBlocker’s aim is not to destroy the business plan of Internet providers. However, we do block ads from advertising networks for these kind of sites, because nowadays the ad banners are used for profiling. We do not help to avoid the named content lock. Instead we recommend to honor high-quality content on a fair basis, so independent quality journalism is permanently preserved for all of us.

<   Cookies

Cookies typically contain data about visited websites, that the web browser of this websites saves on your computer and uses the next time you visit the same website again. Cookies however are not fundamentally bad. They can increase the user comfort e.g. if you do not have to sign up again after already having visited the website. Cookies can also be used to recognize the same individual on different websites, so personality profiles can be generated comprehensively.

These tracking cookies are blocked from your eBlocker, so that they cannot even get into your computer.

<   DHCP server and DHCP lease

The Dynamic Host Configuration Protocol (DHCP) enables the automatic integration of network devices into all networks. A central server – in such case the router - assigns the network configuration to all devices. The lifetime of this assignment is called lease time. The administrator can choose the existence of the lifetime at the router settings. The lease time can be indicated in seconds, days or even weeks. If the DHCP server is changed during operation, all computers/devices must be disconnected from the network once, so every device can be notified by the new DHCP server and thus receives a DHCP lease.

<   Digital certificate

A digital certificate uses cryptographic methods, to verify the details to a communication partner obligatory. For example, if a certain website is actually run by the named company. Digital certificates are usually issued by trustworthy certification authorities that verified the details and take responsibility for the correctness.

<   DNS Server

The DNS server (Domain Name System) is some sort of telephone book for the Internet. It translates the server names from URLs and from email addresses to numerically IP addresses. The webserver is identified and spoken to through the IP address.

<   LAN cable

The LAN cable (Local Area Network) or also called Ethernet cable, is a network cable that is required for connecting the computer and other devices to your local net. Ethernet cables are often yellow colored. The supplied Ethernet cable of eBlocker is obviously orange colored!

<   Malicious software

Malicious software is the generic term for dangerous computer programs like viruses, worms or Trojans. Malicious software can get into your computer by visiting infected websites or by opening infected emails. Even banner ads that appear on websites which appear as trustworthy may contain the so called “malware” in short. Not every malware is immediately noticed (or at all). The best way to protect yourself from malware is to keep your system as up to date as possible; no opening of suspicious emails that are send from dubious sources; using the latest antivirus program and of course, using your eBlocker.

<   Network mask

With help of the IP address the network mask defines which other IP addresses belong to the local net. That means which addresses can be reached directly. All other IP addresses that do not belong to one network mask, do not belong to the local network and can only be reached through the router.

<   Price discrimination

Price discrimination describes a price policy on the Internet, where you get different prices for the same product depending on from which device you want to buy the product. The price is set dynamically according to the known data of the user with the aim to maximize their revenue.

<   Referrer

If you open a website, your browser sends you an according request for the website you want to visit. This request not only contains the URL, but also many other meta-files for requests. Amongst other things the browser transmits from which website the new request was send from. This indication is called „HTTP-referrer“ or in short „referrer“.

It has the legitimate right, to see insights which sites have been visited by the user and thus can optimize their offers accordingly. The referrer can also be used in a comprehensive way, so personality profiles can be created and connected.

<   Tor Network

The Tor network is used to disguise your original IP address and to provide anonymous Internet surfing. Suppose you have a certain page you want to visit and therefore you enter the URL into the web browser. Your IP address is sent directly to the page you want to visit. However, if you use Tor, you will be directed into the Tor network, which is made out of many other IP addresses from different computers. The Tor network will send an IP address to the page that it chooses randomly out of all the other IP addresses floating around the Tor network. This is how your real IP address is disguised.

<   Tracker – Data collector

Most of the time trackers are service providers for advertising industries. Every time a user opens a site that is being tracked, the tracker gets a notification that a user has been tracked successfully.

Through according cookies or other techniques, the tracker can recognize the user even through many different websites again and again and thus generate a detailed protocol of the Internet behavior. All trackers make their money by providing these personality profiles to advertising industries. The advertising industries can now generate target oriented advertisement and place them on sites that are visited frequently by the user.

<   openPVN

OpenVPN is an open-source software application that implements virtual private network (VPN) techniques for creating secure connection.

<   VPN

A virtual private network (VPN) extends a private network across a public network, and enables users to send and receive data across the public network as if their computing devices were directly connected to the private network.

 


 

Appendix A        Technical specifications
(not valid for software licenses)

<   1 x 10/100/1000 LAN RJ45

<   1 x Power supply 5V (≥ 2A)

<   1 x Wi-Fi 802.11 b/g/n

<   2 x USB 2.0 (for extensions)

<   1 x HDMI (not in use)

<   Power consumption: <10W

<   Dimensions: 9x9x9cm

<   Weight: ca. 153g

 

Appendix B        Safety notes

Please mind the following safety notes before using your eBlocker.

<   Your eBlocker does not have a power switch. A disconnection from the power supply should be possible at any time.

<   In case of wall mounting your eBlocker, please ensure that no wires or piping can be damaged behind the mounting surface.

<   Please protect your eBlocker from moisture, dust, liquids and vapors.

<   Please do not block the air vents of your eBlocker.

<   Never disconnect the power supply or network connection during an update. This can damage the eBlocker irreparably.

 

Appendix C        Manufacturer & copyright

eBlocker GmbH

Kaiser-Wilhelm-Str. 47

20355 Hamburg

Germany

www.eBlocker.com

 

Appendix D        Technical support

Web: http://forum.eBlocker.com

Email: support@eBlocker.com

 

Unfortunately we do not offer any telephone support at the moment.

 


 

Firmware-Version

eBlocker Pro 1.0.5_20170208-v27

 

 

 

 

 

 

 

 

 

eBlocker GmbH
All rights reserved. Errors and omissions reserved
eBlocker GmbH | Kaiser-Wilhelm-Str. 47 | 20355 Hamburg | Germany