How to access blocked adult sites in the Middle East

AdultContentMillions of websites are available today in the Internet. In many counties government blocks some kind of websites. The restrictions are based on IP address mostly so today it is not a problem to bypass these limits.

Best ways to open blocked porn sites

We have discussed the solutions how to open blocked sites. The short list is:

  1. VPN
  2. Proxy
  3. TOR
  4. Browser extensions
  5. Translation services
  6. DNS
  7. Mobile Applications
  8. Software
  9. Wayback machine
  10. https instead of http
  11. Sites unblockers

You can use any of them but please remember that the most reliable and safe method is using vpn.

free_trial
Pornography is prohibited in the Middle East. That is why people use vpn to hide IP address and unblock adult sites.

Also many people want to be secure and anonymous and do not show anybody that they are surfing porn sites.
VPN is a great way to be private and secure because it not only hides IP address but also encrypts off the traffic sent via vpn tunnel.
You can read more about vpn here.

How to unblock sites with Sahrzad

You can use Sahrzad vpn on different devices connected to the Internet. This can be your iPad or iPhone, Android planshets, Windows computer or Mac book.
If you care about your privacy – vpn is ideal solution because you can use system features of your device and you even do not need any additional software.

Get_Started_Today_zps3fcd1764
How to unblock porn sites in ipad

  1. Setup vpn connection on your ipad
      1. Go to Settings > General > VPN
        setup vpn in iPhone/iPad 1
      2. Click Add VPN Configuration
        setup vpn in iPhone/iPad 2
      3. Choose PPTP VPN and enter you VPN account data. You will receive your VPN server, username and password in the e-mail
        Server address must be exactly as in your account data (without http://, www or any other symbols)setup vpn in iPhone/iPad 3
      4. Save your VPN configuration. Once you have created VPN connection you can switch it ON and OFF on the main settings screen
        setup vpn in iPhone/iPad 4

    Once you have created vpn connection you can switch it on and off on the main settings screen.

    2. Connect to vpn

    3. Enjoy your Internet freedom

How to unblock porn sites in Android

1. Setup vpn connection on your Android

    1. Click Settings icon

how to setup VPN in android

    1. Select Wireless & Networks and tap on VPN

how to setup VPN in android

    1. Tap Add VPN Networkhow to setup VPN in android
    2. Input connection name (Sahrzad VPN), select the type of your VPN connection – PPTP VPN, input VPN server address from your account data.
      Please be carefully – don’t use any additional symbols like spaces, http://, www, / …etc in the server address.how to setup VPN in android
    3. Input your Username and password that you received from VPN account service in e-mail.
      Save it and tap Connect

how to setup VPN in android

For connection to vpn server:

  1. Select Home > Menu > Settings
  2. Tap Wireless & networks
  3. Tap VPN settings
  4. The VPN connections you have added are present in the list
  5. Tap the VPN you wish to connect to (Sahrzad VPN)
  6. A dialog box will open asking for your credentials, enter them and click connect

When you are connected to VPN, you will see an ongoing notification in the Status bar on your Android device. If you are disconnected, you will receive a notification and an option to go back to the VPN settings section.

2. Connect to vpn

3. Enjoy your Internet freedom

How to unblock porn sites in Mac

1. Setup vpn connection on your Mac

  1. Click the Apple logo, and select System PreferencesSetup VPN in Mac OS X - 1

    2. Click on the Network icon under Internet & Network

    Setup VPN in Mac OS X - 2

    3. If you see a locked padlock in the bottom left, click on it. Otherwise skip to step 5.

    Setup VPN in Mac OS X - 3

    4. Enter your password in the dialog box

    5. Click on the little + icon just above the padlock

    Setup VPN in Mac OS X - 5

    6. Select VPN From the interface drop down.

    Setup VPN in Mac OS X - 6

    7. Select PPTP From the VPN Type drop down

    Setup VPN in Mac OS X - 7

    8. Enter the name Sahrzad and click Create

    Setup VPN in Mac OS X - 8

    9. Enter the Server Address that Sahrzad sent you, and your username.
    Server address must be exactly as in your account data (without http://, www or any other symbols)
    Also check the box that says Show VPN status in menu bar

    Setup VPN in Mac OS X - 9

    10. Click on the Authentication Settings button, and enter your password

    Setup VPN in Mac OS X - 10

    11. Click Advanced button and tick ‘Send all traffic over VPN connection’.

    Setup VPN in Mac OS X - 10

    12. Click Apply button to save all the changes.

    Setup VPN in Mac OS X - 11

    13. In the top right of your screen, click the token icon that looks like this. From that, a menu will drop down. Click on the Connect link for your company name. This will initiate the VPN connection.

    Setup VPN in Mac OS X - 12

    14. If all is well, after a few seconds you will be connected, and a timer will start showing you how long you have been connected

    Setup VPN in Mac OS X - 13

2. Connect to vpn

3. Enjoy your Internet freedom

How to unblock porn sites in Windows

1. Setup vpn connection on your Windows

To setup vpn connection in Windows 8 please follow the next steps:

1. Display the Charms bar, click Search, and then click Settings.

 

2. Type VPN into the Search box.

3. Click the Set Up a Virtual Private Network (VPN) Connection button in the Search results pane.

4. The VPN Connection wizard appears. Enter the following information:

  1. * VPN server address from your account data that you received from Sahrzad into Internet Address text box. Please be carefully – don’t use any additional symbols like spaces, http://, www, / …etc in the server address.
  2. * Destination Name. It’s just a name of your connection. For example it can be “Sahrzad VPN”.

5. Click Create.

VPN connection is created and Windows 8 displays it under the Networks heading in the Charms bar. Click on it to connect.

See others setup guides for Windows here.

2. Connect to vpn

3. Enjoy your Internet freedom

Access restricted websites in the Middle East with Sahrzad

With Sahrzad vpn you can access restricted websites in any Middle East country:

  • United Arab Emitares (Dubai, Abu Dhabi, Ajman, Sharjah, Fujairah, Ras al-Khaimah)
  • Kuwait
  • Bahrain (Manama)
  • Iraq
  • Oman (Ad Dakhiliyah
    Ad Dhahirah North
    Al Batinah North
    Al Batinah South
    Al Buraimi
    Al Wusta
    Ash Sharqiyah North
    Ash Sharqiyah South
    Dhofar
    Muscat
    Musandam)
  • Qatar
    1. Madinat ash Shamal
    2. Al Khor
    3. Umm Salal
    4. Al Daayen
    5. Al Rayyan
    6. Doha
    7. Al Wakrah
  • Pakistan: Punjab, Sindh, Khyber Pakhtunkhwa, Lahore, Faisalabad, Hyderabad, Peshawar, Rawalpindi, Islamabad, Multan, Gujranwala, Sargodha, Sialkot, Bahawalpur, Sukkur, Jhang, Sheikhupura, Abbottabad, Gujrat, Larkana
  • Saudi Arabia (KSA): Al Jawf (or Jouf), Sakaka, Northern Borders, Arar, Tabuk, Ha’il, Al Madinah, Al Qasim, Buraidah, Makkah, Mecca, Al Riyadh, Riyadh, Eastern Province, Dammam, Al Bahah (or Baha) , Asir, Abha, Jizan, Najran

 

banner 336x280 safety on-line

 

How to unblock websites in Pakistan

shutterstock_101662606Internet restrictions is Pakistan are very strict. Lots of websites are blocked due to censure. Government of the country control all information sending and receiving via the Internet.  In 2012 Pakistan made nationwide content-filtering service that blocks all sites that can harm national safety, that contains porn or anti religious materials, social networks and many others.

How to access blocked sites in Pakistan and stay safe and anonymous?

There are many different ways to resolve this problem. Let’s review the most popular and easy solutions.

  1. Use Proxy service

Many people believe that using proxy to access blocked sites in Pakistan is the simplest way. Using proxy is really simple but this solution is not very safe and besides that most of free proxy solutions are banned in Pakistan.

Can this help?

It this safe and secure?

mysliciel

  1. Use https instead of http

This solution can help you to open some blocked sites but of course it does not work for all blocked content.

  1. Use browser extension

There are many extensions for some well known browsers like Chrome and Firefox which can help you to mask your IP address and so you can try to avoid Internet filtering in Pakistan.

Does it work ?

maybe

  1. Use software

There are many software solutions which mask your IP address and in such way help to access blocked content. However using unknown software is always dangerous because you cannot be sure what this software can do on your computer.

warning-sign

Using unblocking software is not safe for your privacy!

  1. Use mobile applications

If you are using mobile devices like iPhone, iPad, Android devices you can try to install mobile vpn application like Spider VPN for example.

  1. Use wayback machine

Several years ago in works great but I am not sure it works now. However you can try. Probable this can help you.

maybe-checkmark

  1. Try Translation services

Sometime translation services like Google translate can help to bypass Internet limits when you try to translate banned page to another service. This might help to unblock websites.

maybe-333x250

  1. Use DNS

There are some smart DNS service which help to hide IP address and so go pass on-line restrictions and unblock sites in Pakistan

  1. Use websites – unblockers

Sites unblockers can help sometimes. Unfortunately most of them are blocked in Pakistan.

This can work sometimes.

no

  1. Use VPN Service

And the last but not the least is using VPN. This is the safest and securest solution you can use to unblock sites in Pakistan.

VPN service hides you IP address and also encrypts all your traffic. Under the vpn you are anonymous and can access any site you want.

Can this help? Is it safe?

Yes

Yes! This works in 100% of cases and it is 100% secure.

problemsolved504226

Try Sahzrad today and feel Internet freedom by yourself.

Get_Started_Today_zps3fcd1764

How to unblock websites in Pakistan more options.

From: http://sahrzad.net/blog/10-best-ways-to-open-blocked-sites-in-pakistan/

Is it safe to use VPN?

Internet-Security

Millions of people cannot imagine their life without Internet today. We connect to global network from anywhere: homes, schools, offices, cafés, hotels, bus stops and even public beaches.

How safe is this?

Have you ever think about your network security and privacy?
This is question is especially actual if you are using unsafe public Wi-Fi zones.
In some countries like UAE, Oman, Saudi Arabia and others Gulf countries your online privacy is not only a question of your wishes to be anonymous. This could be question of your freedom.
That is why you should not risk and rely on doubtful services.
VPN service is really a perfect solution to make you protected in the Internet. But VPN service providers can be different.

What items you should consider to select the best vpn providers for your needs?

1. Privacy policy.

You must be aware that many free vpn service collect your personal information for some unknown needs. How they use these data? It is better to read Privacy policy before using the service.

2. Data logs

Many providers have log files on their services and store this information. This means that they can review your Internet activity anytime! And see what you are doing on-line.

3. Collecting your IP Address

Some vpn providers collect your IP Address. Ask – why do they do that???
To tell the truth – some vpn provider can store your sensitive data for very long time – even longer than your Internet service provider.
What privacy are you talking about in this case???
A VPN service you can rely must wipe all data logs regularly. The best is within hours of them being created. In such case any requests for the data cannot be fulfilled.

What questions do you need to ask?

So if you are going to use a VPN service what questions should you ask in order to determine whether or not they take privacy seriously. Here’s a few suggestions.

Do they have a privacy policy?

You can be surprised to discover that some VPNs don’t even have a privacy policy.

How long do they retain logs?

The best if VPN does not keep log files over 24 hours.

Where the VPN service registered in?

Knowing what country the VPN is registered in will let you research the country’s laws pertaining to online privacy.

What kind of personal data VPN service retains?

It is great to know if your VPN provider can link your account to a real identity.

Spider VPN guarantees you

100% safety and security

with our premium personal VPN solution!

 

Proxy VS VPN – what is Better?

proxy-vs-vpn

Many people ask us:

What is proxy and what is vpn?

Are they the same?

What is difference between proxy and vpn?

What is better: proxy of vpn?

Today Sahrzad tells your about vpn and proxy and you can decide what is better for you.

Also you can read about the difference between proxy and vpn we wrote before.

First of all let’s find out what is proxy and what is vpn.

According to Wikipedia:

 Proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource available from a different server and the proxy server evaluates the request as a way to simplify and control its complexity. Proxies were invented to add structure and encapsulation to distributed systems.

If the destination server filters content based on the origin of the request, the use of a proxy can circumvent this filter. For example, a server using IP-based geolocation to restrict its service to a certain country can be accessed using a proxy located in that country to access the service.

Web proxies are the most common means of bypassing government censorship, although no more than 3% of Internet users use any circumvention tools.

In some cases users can circumvent proxies which filter using blacklists using services designed to proxy information from a non-blacklisted location

An anonymous proxy server (sometimes called a web proxy) generally attempts to anonymize web surfing. There are different varieties of anonymizers. The destination server (the server that ultimately satisfies the web request) receives requests from the anonymizing proxy server, and thus does not receive information about the end user’s address. The requests are not anonymous to the anonymizing proxy server, however, and so a degree of trust is present between the proxy server and the user. Many proxy servers are funded through a continued advertising link to the user.

A proxy can keep the internal network structure of a company secret by using network address translation, which can help the security of the internal network. This makes requests from machines and users on the local network anonymous. Proxies can also be combined with firewalls.

An incorrectly configured proxy can provide access to a network otherwise isolated from the Internet.

 

In simple words: proxy is some computer that pass through all your traffic.

Proxy is the simplest way to hide your IP address and avoid Internet filtering.

However proxy works only for your browser. If you need it only for surfing – you can use Proxy.

The next level of secure can be reached by VPN.

And again, smart Wikipedia sais about VPN:

virtual private network (VPN) extends a private network across a public network, such as the Internet. It enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network, and thus are benefiting from the functionality, security and management policies of the private network. A VPN is created by establishing a virtual point-to-point connection through the use of dedicated connections, virtual tunneling protocols, or traffic encryption.

A VPN spanning the Internet is similar to a wide area network (WAN). From a user perspective, the extended network resources are accessed in the same way as resources available within the private network. Traditional VPNs are characterized by a point-to-point topology, and they do not tend to support or connect broadcast domains.

VPNs allow employees to securely access the corporate intranet while traveling outside the office. Similarly, VPNs securely connect geographically separated offices of an organization, creating one cohesive network. VPN technology is also used by individual Internet users to secure their wireless transactions, to circumvent geo restrictions and censorship, and to connect to proxy servers for the purpose of protecting personal identity and location.

VPN may be classified by:

  • The protocols used to tunnel the traffic
  • The tunnel’s termination point location, e.g., on the customeredge or network-provider edge
  • Whether they offer site-to-site or network-to-network connectivity
  • The levels of security provided

VPN services cannot make online connections absolutely anonymous, but they can increase privacy and security.

The VPN security model provides:

  • Confidentiality such that even if the network traffic is sniffed at the packet level : hacker can only see some encrypted data
  • Sender authentication to prevent unauthorized users from accessing the VPN
  • Message integrity to detect any instances of tampering with transmitted messages

Tunneling protocols can operate in a point-to-point network topology that would theoretically not be considered a VPN, because a VPN by definition is expected to support arbitrary and changing sets of network nodes. But since most router implementations support a software-defined tunnel interface, customer-provisioned VPNs often are simply defined tunnels running conventional routing protocols.

shutterstock_101662606

Why VPN Better than Proxy?

VPN provides you:

  • better privacy and security
  • faster speed
  • best stability
  • Works on all systems (Windows, Mac, iOS, Android, Linux, Routers) while proxy works only for browser.
  • Unblock all restrictions.

What you can do with VPN and cannot do with most proxies:

  1. Access any blocked sites worldwide
  2. Stay safe with VPN outside your browser
  3. Encrypt your Internet connection
  4. Stay protected from phishing and malware
  5. Fastest surfing and watching videos
  6. Be anonymous is applications and games

To summarize all written above I would like to say that VPN wins!

It is much more secure in conparison with proxy.

 

Security Risks in Mobile Networks: is VPN a solution?

mobile-security

Without a doubt, the use of mobile networks is here to say. In fact, the design of mobile phones continues to get better as mobile phone manufacturers invest a lot just to be ahead in the competition. But whether we like it or not, there are a lot of security risks while you are enjoying the advantages of this latest communication technology.

So far, the biggest security risk in mobile networks is loss of privacy and stealing of personal information, especially when you are browsing the Internet in a public Wi-Fi zone. No matter how secure your operating software is, you are still not totally safe. Smartphones may have security features against robbers, but not against hackers and online thieves.

To give you a better idea, imagine exposing yourself in a crowd of total strangers such as train station or coffee shop. Once you visit a website or make an online transaction, it’s like telling them all your personal details. As compared to using broadband network, your data via Wi-Fi is being transferred via wireless connection. Everyone is using the same network.

The problem arises when a third party tries to intercept your data. And because the network system is not capable of detecting interceptors, your online activities are exposed. As an additional problem, you and everyone in that area don’t have any idea that your data can be stolen. This is why you should use a VPN (Virtual Private Network).

As the name suggests, VPN allows users to use a public network privately. It hides your real IP address by assigning a temporary IP address while you are using the network. But unlike other ways to browse the web anonymously, VPN traffic is highly encrypted. This means that no third party can easily intercept your data and you are now secured.

In case you are not yet aware, many business owners use VPN to protect their vital information. They allow their employees to access their data while working in remote areas using Wi-Fi. But if you also plan to use VPN, you should know which type of VPN is applicable for your needs. You don’t want to spend money for something you will not use.

And although you can use a free VPN, don’t expect the same quality of service you can get from the premium ones. First of all, free VPNs also need money to maintain their service and they get it via advertisements while you are using their service. You should not also expect a free VPN to have a stable and fast connection, as well as great customer service.

Again, the use of smartphone is now becoming a part of our daily lives.  It is also a necessity for faster communication and searching for information. On the other hand, online safety should not be taken for granted. So far, VPN is still the best way to secure your data. Just like the old saying goes, “Prevention is better than cure.”

free_trial

How to access blocked sites in Dubai on ipad (or iphone)

unblock sites in ipad or iphone

We often receive questions from our customers like:
How to access blocked sites on ipad or iphone when you are in Dubai?

We have answered them several times already and we continue to answer.

Taking into account severe Cyber Crime Law in the United Arab Emirates we highly recommend using only reliable and safe solution like vpn (virtual private network) .

This is complete secure and 100% reliable way to be anonymous and open blocked sites in Dubai.

Actually you don’t even need any additional soft to use vpn on your iOS device. All you need is setup vpn connection following simple steps below:

To make a new vpn connection in your iOS device you need to do the next:

  1. Go to Settings > General > VPN
    setup vpn in iPhone/iPad 1
  2. Click Add VPN Configuration
    setup vpn in iPhone/iPad 2
  3. Choose PPTP VPN and enter you VPN account data. You will receive your VPN server, username and password in the e-mail
    Server address must be exactly as in your account data (without http://, www or any other symbols)setup vpn in iPhone/iPad 3
  4. Save your VPN configuration. Once you have created VPN connection you can switch it ON and OFF on the main settings screen
    setup vpn in iPhone/iPad 4

Once you have created vpn connection you can switch it on and off on the main settings screen.

Under the vpn connection you can access any blocked website and be absolutely sure that you are safe and secure.

Legacy of Pornography in the World 2015

pornography in the world

The map shows legacy of pornography in the world.

Green – Pornography legal
Yellow – Pornography legal under some restrictions.
Red – Pornography illegal
Gray – Data unavailable

Pornography is illegal in the following countries:

  • Saudi Arabia
  • UAE
  • Oman
  • Kuwait
  • Pakistan
  • Aghanistan
  • Iran
  • Kuwait
  • Jordan
  • Israel
  • Egypt
  • Libya
  • Algeria
  • Mali
  • Nigeria
  • Yemen
  • China

Pornography in Saudi Arabia

Kingdom of Saudi Arabia is the Islamic state. It bans all forms of pornography due to Islam’s opposition to pornography. There is Cyber Crime Law In 2000 Saudi authorities said that they were “winning the war against pornography on the internet”. If you caught on some porn website, police can deport you from the contry.
Be careful what you send on your phone or computer in Saudi Arabia.

Pornography in UAE

Cyber Crime law is very strict in United Arab Emirates and th epunishment for porno is aslo very serious.

Pornography in Iran

In Iran, the possession of any type of pornography is illegal and is charged with a fine.
Iran confirms death sentence for ‘porn site’ web programmer

Pornography in China


Possession of pornography is punishable by up to 3 years in prison, a fine of Y20,000, or up to life imprisonment for large underground distributors. In 2010 China shut down 60,000 porn sites according to Reuters, arresting almost 5,000 suspects in the process.

From: http://sahrzad.net/blog/pornography-legacy-in-the-world/

How to Access Blocked sites in UAE in Android?

android vpn

Internet filtering in UAE is a serious problem for many people living and visiting this wonderful country. A great number of websites are blocked by the government due to some reasons.

You cannot surf gambling or adult sites while you are in the United Arab Emirates. Any web resources which criticize politics or religion are strictly prohibited. You can find out long lists of sites banned in UAE.

Are there any solutions to avoid these filters?

Sure there are!

And there are many ways to open blocked sites in the Middle East. But today I want to point only the most reliable and safe solution for surfing blocked sites and this is VPN solution.

Via secured encrypted tunnel (which VPN is) you can open any site you need safe and easy. At the same time you can be sure that nobody can monitor what kind of sites you are visiting.

All the traffic is coded inside Virtual Private Network (VPN) so your anonymity is guaranteed while you are using VPN.

Today you can access blocked content even from your Android device. There are many vpn applications available on play market but we strongly recommend you to be careful installing such programs to your device. Of course, most of them will provide you a secure vpn service but also such applications can harm your device or your private info. Do you know for sure what this application do with your data? Especially if this is free vpn application?

The best way to be safe and secure is to setup vpn connection on your device using standard options. VPN is a system feature in any Android gadget so actually you do not need any application to use VPN in UAE.

Follow this simple guide and setup vpn in Android in a few moments!

How to setup VPN in Android

To create new vpn tunnel
1. Click Settings icon

2. Select Wireless & Networks and tap on VPN

3. Tap Add VPN Network

4. Input connection name (Sahrzad VPN), select the type of your VPN connection – PPTP VPN, input VPN server address from your account data.
Please be carefully – don’t use any additional symbols like spaces, http://, www, / …etc in the server address.

5. Input your Username and password that you received from VPN account service in e-mail.
Save it and tap Connect
For connection to vpn server:
Select Home > Menu > Settings
Tap Wireless & networks
Tap VPN settings
The VPN connections you have added are present in the list
Tap the VPN you wish to connect to (Sahrzad VPN)
A dialog box will open asking for your credentials, enter them and click connect
When you are connected to VPN, you will see an ongoing notification in the Status bar on your Android device. If you are disconnected, you will receive a notification and an option to go back to the VPN settings section.

After creating your vpn connection you can switch it on and off on the main settings screen.

See detailed guide here.

UAE Cyber Crime Laws – All you need to know

UAE cyber crime laws
UAE cyber crime laws

Federal Legal Decree No. 5 for 2012 on combating cyber crimes has been issued by President His Highness Sheikh Khalifa bin Zayed Al Nahyan several years ago but many people still have lots of questions regarding it.

Let’s clarify the main points of this law.

The decree protects privacy of information from any use whatsoever by electronic or IT means to forge or produce duplicates of credit cards or civil cards.

The new decree stipulates punishments on any individual for using any kind of information technology to extort or to threaten others online to force them to engage in, or, for that matter to prevent them from engaging in, a certain act.

Indecent acts

The decree criminalises activities by any person who creates or runs any electronic site to send, transmit, publish or promote online any pornographic material, gambling activities and any other indecent acts.

It also imposes punishment on any person for attempting to, and for helping others to, seduce others and solicit prostitution and to urge, induce or entice another person to engage in an act of prostitution.

It also criminalises acts by any one to insult others or to accuse others of acts which would lead to punishment or contempt by a third party, online or through any other information technology means.

Copyright issues

Federal Legal Decree No. 5/2012 also imposes punishment for anyone for using an electronic network or any information technology means for the unwarranted violation of the privacy of others by eavesdropping, intercepting, recording or disclosing conversations, communications, audio and video material; taking photographs of others, creating electronic photos of others, disclosing, copying or saving them; publishing news, electronic photographs or photographs or scenes, comments, data and information even if they are authentic.

The decree stipulates punishment for any person creating or running an electronic site to publish information online or through any information technology means with the intention to engage in trafficking in persons or the illegal trade of human organs.

It also stipulates punishments for any person creating or running an electronic site to publish, online or through any information technology means, any programmes or ideas which would promote disorder, hate, racism or sectarianism and damage national unity or social peace or damage public order and pubic decency.

The decree also stipulates punishments any person for creating or running an electronic site to publish information online or through any information technology means with the intention to engage in unauthorized trade in firearms, ammunition or explosives.

Terrorist acts

The decree further stipulates punishments for any person creating or running an electronic site to publish information online or through any information technology means to promote any terrorist groups and any unlicensed society, organisation or body, to facilitate contacts with their leaders or to solicit new members, promote the thoughts thereof, to finance their activities, to provide funds and actual help for its activities, or, for that matter, to promote the making of incendiary devices, explosives or any devices used in terrorist acts.

It also stipulates punishments for any person for creating or running an electronic site to raise, online or through any information technology means, that may call for the raising of donations without authorization from the competent authorities.

State security

It also stipulates penalties of imprisonment on any person who may create or run an electronic site or any information technology means, to deride or to damage the reputation or the stature of the state or any of its institutions, its President, the Vice President, any of the Rulers of the emirates, their Crown Princes, the Deputy Rulers, the national flag, the national anthem, the emblem of the state or any of its symbols.

It also stipulates penalties of imprisonment on any person publishing any information, news, caricatures or any other kind of pictures that would pose threats to the security of the state and to its highest interests or violate its public order.

It also stipulates penalties of imprisonment on any person creating or running an electronic site or any information technology means to engage in, or to call for, the overthrow of the system of government of the state or to seize it, or to seek to disrupt or obstruct the Constitution or the effective laws of the state, or to oppose the basic principles which constitute the foundations of the system of government of the state. The same punishment is imposed by the decree on anyone who calls for, promotes or provokes the aforementioned acts or abets or helps others to engage in them.

Demonstrations

It also stipulates penalties of imprisonment on any person using electronic sites or any information technology means to call for disobeying the laws and regulations of the state that may be in effect.

It also stipulates penalties of imprisonment on any person using electronic sites or any information technology means to call for demonstrations, marches and similar activities without a license being obtained in advance from the competent authorities.

Unauthorised trade

It also stipulates penalties of imprisonment on any person using electronic sites or any information technology means to call to engage in the unauthorised trade of antiquities and works of art.

It further stipulates penalties of imprisonment on any person using electronic sites or any information technology means to engage in the unauthorised use of, or provide unauthorized facilities to others to use, communication services or audio and video channels.

Contempt of religion

It also stipulates penalties of imprisonment for any person for using electronic sites or any information technology means to display contempt for any holy symbols, characters, figures and rituals of Islam including the Divinity (Allah, God) and the Prophets; for any other faiths or religions or any of their symbols, characters, figures and rituals; or to display contempt for or to insult any of the Divine Religions and to call for the engagement in or the promotion of sins.

Peddling

It also stipulates penalties of imprisonment for any person using electronic sites or any information technology means to engage in, promote or facilitate the illegal trade of drugs, narcotics and any psychoactive drugs.

Illegal funds and content

It also stipulates penalties of imprisonment for any person using electronic sites or any information technology means to transfer or deposit illegal funds with the intention to hide or camouflage their source, or, for that matter, to hide or camouflage the facts about illegal funds, their source, movement, ownership and the rights attached to them as well as to acquire, own or use illegal funds despite knowledge by the involved person of the illegal status of their sources.

The new decree also imposes penalties of imprisonment to any person providing any organisations, bodies, institutions or entities, online or through any information technology means with misleading, inaccurate or incorrect information which would damage the interests of the state or damage its reputation and stature.

The new decree also imposes penalties of imprisonment and fines, or either of these, on any owner or administrator of an electronic website or any information technology means or devices for storing or intentionally providing illegal content,despite his or her knowledge of the illegal nature of the content, or for not removing, or failing to prevent access to this illegal content within the period stated in a written warning sent to him by the competent authorities declaring the illegal status of the content available online or the electronic site.

Punishments

The new decree also allows for the seizure of the devices, software, programmes and any other means used in committing any of these crimes as well as the permanent or temporary closure of the involved property or the site. It also provided for the deportation of any foreigner convicted of any of these crimes upon the completion of the carrying out of any punishment.

The court may order that individuals convicted under the terms of the decree may be placed under surveillance or supervision, may be prevented from using networks or the information technology system or may be lodged in a rehabilitation centre or a treatment facility for a period considered by the court to be suitable.

Upon a request from the prosecutor general, the relevant court may mitigate the punishment of any people or exempt them from such punishment if they provided the judicial or administrative authorities with information related to any of the crimes against the security of the state stated in the decree, such information leading to the solving of the crime, the unveiling of or the confirmation of the involvement of the perpetrators or the apprehension of one of them.

Used materials form Emirates24.

UAE legal experts explanations on cyber crime law

In the UAE, the law prohibits VPNs if they are used to commit or conceal a crime, legal experts say.

“Article 9 in the UAE’s Law No.5/2012 on Combatting Cyber Crimes makes it an offense to use ‘a fraudulent computer network protocol address by using a false address or a third party address’ for the purposes of committing or concealing a crime,” said Dino Wilkinson, legal expert in Abu Dhabi.

“The focus of this type of legislation is generally on prohibiting larger-scale serious IT crime such as hacking or denial of service attacks,” he said.

Wilkinson said that it is highly unlikely the UAE law would be construed to pursue expatriates using VPNs to access online TV services.

“I am not aware of any particular enforcement actions being taken or contemplated by authorities on this type of benign personal use,” he said.

“I think there would be a bit of uproar among expats if they were stopped from watching Eastenders or the equivalent from their home countries.”

From Sahrzad’s Blog

Is it safe to buy Spider VPN service?

Many people ask us if it is safe to buy vpn from our website?
The short answer is YES! And below you can find out why.

Internet security comcept. Earth and lock on white isolated background. 3d

1. Risk Free – money back guarantee

All orders are processed via Payproglobal payment system. Your order if absolutely Risk Free.moneyback

Payproglobal guaranteed you 30 days money back.

2. Certified by MCAfeeSecure

payproglobal.com is a certified site by McAfeeSecure

  • Valid SSL certificate detected.
  • No malware found.
  • No malicious links found.
  • No phishing detected.

3. Tested and certified by VeriSign

This site is tested and certified to be secure by the world’s largest dedicated security company. Make sure you’re browsing the safe web. Choose certified sites and stay safe online.

3. All the orders are processed in a secure environment, using the SSL (Secure Sockets Layer) protocol with 128-bit encryption keys. Encryption is certified by VeriSign.

norton-seal-large
SITE NAME: secure.payproglobal.com
SSL CERTIFICATE
STATUS:
Valid (Jan 20, 2014 to Feb 7, 2016)
COMPANY/
ORGANIZATION:
PAYPRO GLOBAL, INC.
Etobicoke
OntarioCA
Encrypted Data Transmission This website can secure your private information using a SSL Certificate. Information exchanged with any address beginning with https is encrypted using SSL before transmission.
Identity Verified PAYPRO GLOBAL, INC. has been verified as the owner or operator of the website located at secure.payproglobal.com. Official records confirm PAYPRO GLOBAL, INC. as a valid business.
Malware Scan One or more sub-domains within payproglobal.com passed the malware scan on Jul 27, 2015 (UTC).
Vulnerability Assessment This website is regularly scanned for vulnerabilities and the results are reported to the owner.