{"id":157,"date":"2008-10-14T23:51:02","date_gmt":"2008-10-14T20:51:02","guid":{"rendered":"http:\/\/privacy.cyber-rights.org.tr\/?p=157"},"modified":"2008-10-14T23:53:05","modified_gmt":"2008-10-14T20:53:05","slug":"gpass-sansuru-pclerden-delmek-icin-iyi-bir-cozum","status":"publish","type":"post","link":"https:\/\/privacy.cyber-rights.org.tr\/?p=157","title":{"rendered":"Gpass &#8211; Sans\u00fcr\u00fc PC&#8217;lerden delmek i\u00e7in iyi bir \u00e7\u00f6z\u00fcm"},"content":{"rendered":"<p>\u015eimdilik sadece windows i\u00e7in&#8230;.. Kullanmas\u0131 kolay h\u0131zl\u0131 anonymous proxy server program\u0131, t\u00fcnel ayarlar\u0131n\u0131 kendi kendine yap\u0131yor, sizin u\u011fra\u015fman\u0131za gerek kalmadan.<\/p>\n<p><a href=\"http:\/\/gpass1.com\/gpass\/\"><\/p>\n<div style=\"text-align:center;\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/cyberlaw.org.uk\/wp-content\/uploads\/2008\/10\/gpass.jpg?resize=297%2C123\" alt=\"gpass.jpg\" border=\"0\" width=\"297\" height=\"123\" \/><\/div>\n<p><\/a><\/p>\n<p>Free application GPass helps you bypass censorship and blocked web sites by tunneling network traffic through encrypted proxy servers.<\/p>\n<p>After you install GPass, launching an application using the proxy is as simple as double-clicking the app from inside the GPass interface. GPass will launch the program with all the necessary tunneling in place.<\/p>\n<p>GPass is easy to use, and requires no setup on your part unless you want to do a little tweaking. It&#8217;s also impressively fast for a proxy\u2014it appears to choose the proxy server with the quickest response rate when it starts up. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u015eimdilik sadece windows i\u00e7in&#8230;.. Kullanmas\u0131 kolay h\u0131zl\u0131 anonymous proxy server program\u0131, t\u00fcnel ayarlar\u0131n\u0131 kendi kendine yap\u0131yor, sizin u\u011fra\u015fman\u0131za gerek kalmadan. Free application GPass helps you bypass censorship and blocked web sites by tunneling network traffic through encrypted proxy servers. After you install GPass, launching an application using the proxy is as simple as double-clicking the app from inside the GPass&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[21,3],"tags":[],"class_list":["post-157","post","type-post","status-publish","format-standard","hentry","category-erisim-engelleme","category-sansur"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7wjA8-2x","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/privacy.cyber-rights.org.tr\/index.php?rest_route=\/wp\/v2\/posts\/157","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/privacy.cyber-rights.org.tr\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/privacy.cyber-rights.org.tr\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/privacy.cyber-rights.org.tr\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/privacy.cyber-rights.org.tr\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=157"}],"version-history":[{"count":0,"href":"https:\/\/privacy.cyber-rights.org.tr\/index.php?rest_route=\/wp\/v2\/posts\/157\/revisions"}],"wp:attachment":[{"href":"https:\/\/privacy.cyber-rights.org.tr\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=157"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/privacy.cyber-rights.org.tr\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=157"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/privacy.cyber-rights.org.tr\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=157"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}