Circumvention Method

Some articles on methods, method, circumvention method:

Great Firewall Of China - Technical Implementation - Current Methods
... Details for some commonly used technical methods for censoring are Method Description IP blocking The access to a certain IP address is denied ... A typical circumvention method is to find proxies that have access to the target Web sites, but proxies may be jammed or blocked ... A typical circumvention method is to find a domain name server that resolves domain names correctly, but domain name servers are subject to blockage as well, especially IP blocking ...

Famous quotes containing the word method:

    A method of child-rearing is not—or should not be—a whim, a fashion or a shibboleth. It should derive from an understanding of the developing child, of his physical and mental equipment at any given stage, and, therefore, his readiness at any given stage to adapt, to learn, to regulate his behavior according to parental expectations.
    Selma H. Fraiberg (20th century)