uBlock Origin (or uBlock₀) is not an ad blocker; it’s a general-purpose blocker. uBlock₀ blocks ads through its support of the Adblock Plus filter syntax. uBlock₀ extends the syntax and is designed to work with custom rules and filters.

That said, it’s important to note that using a blocker is NOT theft. Don’t fall for this creepy idea. The ultimate logical consequence of blocking = theft is the criminalisation of the inalienable right to privacy.

Ads, “unintrusive” or not, are just the visible portions of privacy-invading apparatus entering your browser when you visit most sites nowadays. uBlock₀’s main goal is to help users neutralize such privacy-invading apparatus — in a way that welcomes those users who don’t wish to use more technical, involved means (such as µMatrix).

EasyList, Peter Lowe’s Adservers, EasyPrivacy and Malware domains are enabled by default when you install uBlock₀. Many more lists are readily available to block trackers, analytics, and more. Hosts files are also supported.

Once you install uBlock₀, you may easily un-select any of the pre-selected filter lists if you think uBlock₀ blocks too much. For reference, Adblock Plus installs with only EasyList enabled by default.

Chromium or Chrome or Edge
You can install the latest version manually, from the Chrome Web Store, or from the Opera store.

Firefox Add-ons web site, or install manually by downloading the latest uBlock0.firefox.xpi file, and by dragging the downloaded  xpi file to your add-on page.

Alternatively, you can install chrisaljoudi/uBlock (different feature set) from Firefox Add-ons homepage.

There is no support for Safari for uBlock Origin.

Best is that you install chrisaljoudi/uBlock, which has official support for Safari.


Note for all browsers
To benefit from uBlock Origin’s higher efficiency, it’s advised that you don’t use other inefficient blockers at the same time (such as AdBlock or Adblock Plus). uBlock₀ will do as well or better than most popular ad blockers.

uBlock Origin extends Adblock Plus filter syntax.

uBlock Origin can also parse HOSTS file-like resources. However, this creates an ambiguity with ABP filter syntax, which is pattern-based. For example, consider the following filter entry:

ABP filter syntax dictates that this is interpreted as “block network requests which URL contains at any position”. However if the entry comes from a HOSTS file, the interpretation must be “block network requests to the site”.

So in uBlock Origin, any entry which can be read as a valid hostname, will be assumed to be a HOSTS file entry. If ever you want such filter to be parsed as an ABP filter, just add a wildcard at the end:*

“All URLs”

The wildcard character * can be used to apply a filter to all URLs. This is not recommended though, unless you further narrow the filter using filter options. Examples:

*$third-party: block all 3rd-party network requests.
*$script, block all network requests to fetch script resources from

Usually, it is far more convenient to use dynamic filtering rules in lieu of such generic static filters.
Network filters options

document for block filters:

This will cause web pages which match the filter to be subjected to strict blocking.


This is equivalent to ~third-party. Provided strictly for convenience (


The filter option important means to ignore all exception filters (those prefixed with @@).

It applies only to network block filters. The important option will allow you to block with 100% certainty specific network requests.

Example: ||^$important,third-party will block all network requests to, disregarding any existing network exception filters. Another example: ||^$important,third-party. Etc.


To specifically disable inline script tags in a main page: ||^$inline-script.
Cosmetic filters

Entity-based cosmetic filters: Filters which are to be applied to a specific entity:


An entity is defined as follow: a formal domain name with the Public Suffix part replaced by a wildcard.

Examples: google.* will apply to all similar Google domain names:,,,, etc. Another example: facebook.* will apply to all similar Facebook domain names:,

Since the base domain name is used to derive the name of the “entity”, would not match google.*.
Special cosmetic filters


uBlock Origin supports a special cosmetic filter which purpose is to prevent the execution of specific inline script tags in a main HTML document. See “Inline script tag filtering” for further documentation.


uBlock Origin’s manifesto

Free. Open source. For users by users. No donations sought.

Without the preset lists of filters, this extension is nothing. So if ever you really do want to contribute something, think about the people working hard to maintain the filter lists you are using, which were made available to use by all for free.

Local Area

"WHERE YOU WANT TO LIVE" is the slogan, but be warned it is not a youth community.

Local | News | Owen Sound Sun Times ·  Bayshore Broadcasting News Centre Owen Sound ·  LOCAL News – The Dock ·  Police Alerts | Owen Sound Police Service · – Owen Sound ·  Global News – OWEN SOUND ·  The Post ·  Wiarton Echo ·  560 CFOS AM Radio · NEWS – OWEN SOUND ·  News Centre – Bayshore Broadcasting ·  Owen Sound announcements and obituaries ·  Country 93 CKYC 93.7 FM Owen Sound · 


Kijiji: Free Classifieds in Owen Sound…
… services, electronics, homes, boats for sale and more in Owen Sound  
Buy and sell in Owen Sound
Buy and sell items locally in Owen Sound.
Jobs in Owen Sound
Find job opportunities in Owen Sound
Real estate in Owen Sound
Looking for an apartment, condo, house or roommate.
apartments, condos in Owen …
apartments, condos in Owen Sound
Owen Sound – Job Bank ·  YMCA of Owen Sound Grey Bruce – Job Board ·  Jobs in Owen Sound, ON | ·  OWEN SOUND, ON | WowJobs ·  Owen Sound, Ontario | Workopolis ·  Owen Sound Sun Times | Owen Sound, ON | Classifieds ·  Owen Sound Jobs – ·  City Employment | City of Owen Sound ·  Jobs in Owen Sound, ON | Simply Hired · 


The Top 10 Things to Do in Owen Sound – TripAdvisor
Top Things to Do in Owen Sound, Ontario: See TripAdvisor’s 854 traveler reviews and photos of Owen Sound tourist attractions. Find what to do today,…

Owen Sound Tourism · Accommodations · Attractions … there’s plenty of opportunity to enjoy some of Owen Sound’s indoor attractions. … 


Cruise on a glass bottom boat tour to Flowerpot Island on the Bruce Peninsula. Take the Waterfall Tour in Owen Sound & Area. Collingwood & The Blue Mountains will have you exploring a labyrinth of caves before you relax on 14 kilometres of sand in Wasaga Beach

WHERE TO EAT IN OWEN SOUND   Restaurants | City of Owen Sound







Local Radio

560 CFOS AMDial-A-Deal Monday to Friday 1:30pm – 2pm :: Call them today at 519-376-7777

Mix 106.5 FM – More Music, More Variety! Serving Owen Sound, Grey, Bruce, Simcoe Huron Counties

Country 93 CKYC 93.7 FM – Country 93 plays all your favourite Country songs. We're also your gateway to outstanding Country Music concerts locally and throughout North America.

CFPS-FM – 98 The Beach 97.9 FM – Saugeen Shores – Port Elgin – Southampton Kincardine

CHGB-FM – 97.7 FM – located between Collingwood and Wasaga Beach, Ontario, serves the South Georgian Bay area.

CHWC-FM – 104.9 FM – Serving Goderich, Bayfield, Grand Bend and Ontario's West Coast is located in Canada's Prettiest Town, Goderich, Ontario.

CISO-FM – Sunshine 89 89.1 FM – the local radio station for Orillia and Muskoka.

Tor Browser

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy.

Individuals use Tor to keep websites from tracking them and their family members, or to connect to news sites, instant messaging services, or the like when these are blocked by their local Internet providers. Tor’s hidden services let users publish web sites and other services without needing to reveal the location of the site. Individuals also use Tor for socially sensitive communication: chat rooms and web forums for rape and abuse survivors, or people with illnesses.

Journalists use Tor to communicate more safely with whistleblowers and dissidents. Non-governmental organizations (NGOs) use Tor to allow their workers to connect to their home website while they’re in a foreign country, without notifying everybody nearby that they’re working with that organization.

Groups such as Indymedia recommend Tor for safeguarding their members’ online privacy and security. Activist groups like the Electronic Frontier Foundation (EFF) recommend Tor as a mechanism for maintaining civil liberties online. Corporations use Tor as a safe way to conduct competitive analysis, and to protect sensitive procurement patterns from eavesdroppers. They also use it to replace traditional VPNs, which reveal the exact amount and timing of communication. Which locations have employees working late? Which locations have employees consulting job-hunting websites? Which research divisions are communicating with the company’s patent lawyers?

A branch of the U.S. Navy uses Tor for open source intelligence gathering, and one of its teams used Tor while deployed in the Middle East recently. Law enforcement uses Tor for visiting or surveilling web sites without leaving government IP addresses in their web logs, and for security during sting operations.

The variety of people who use Tor is actually part of what makes it so secure. Tor hides you among the other users on the network, so the more populous and diverse the user base for Tor is, the more your anonymity will be protected.



Computer Malwares…what's the difference?

These days there are more hazards to surfing the internet and using your computer then people would care to think about. There are always new viruses being produced, new trojans developed, new worms pretty much on a daily basis and anti-virus/anti-spyware programs can only do so much protecting you from new threats. All these threats all cause havoc to your computer and to your life but they each do it in different ways.

Computer Virus

Basically, a computer virus is a computer program that can replicate itself. Sometimes you can tell you have a virus from the "symptoms" that you will experience, but a lot of them don't do anything that let you know you have a virus on your computer. Some don't do anything but continuously reproduce themselves in the background.

In order for the virus to begin reproducing, it has to be executed and be written into memory. A lot viruses attach themselves to an executable file that is already a part of a legitimate program. When you launch the affected program, the code from the virus is also launched along with it. From there, what happens next is dependent on the two of virus types it could be

A nonresident virus is not stored directly on your hard drive. The virus remains in an executable files that will infect your computer every time the program is accessed and run. A resident virus embeds itself into the memory of your computer and is activated whenever your computer performs a specific function and continues to infect files from there. A resident virus can spread so thoroughly in your system that it could possibly even infect antivirus programs. The fact that they are in your system memory makes it very tricky to remove and some are programmed to block any attempts to remove them.


This is a program that on the surface looks like a legitimate program but looks can be deceiving. They usually allow backdoor access to your computer to a hacker or steal your information or do other damage to your computer. Once a hacker has access to your computer, he can do everything that you can do on your computer remotely, gather any information that he wants and modify your computer any way they want. Unlike viruses, they don't make replicas of themselves on your system. Your anti-virus/anti-spyware program should be able to scan and detect these as well.

For those that like trivia, the term Trojan is derived from the story of the Trojan Horse in Greek Mythology since they appear to be harmless programs that you will install on your system where in reality they're nothing but trouble.


This is software that gathers information about you without your knowledge and sends this information, without your consent, to the individuals that wrote the software.

There are four different types of spyware: system monitors, trojans, adware, and tracking cookies. Generally, spyware is used to track and store your movements on the web and throwing up pop-up ads in your face all the time.

While spyware is used to monitor what you are doing on the internet, it could potentially collect any type of data that it wanted including your user logins and bank account information. Have you ever opened your web browser and it didn't go to your homepage but somewhere else completely? Spyware is responsible for that too.

If you have spyware on your system, you'll notice that its performance generally gets worse and can get to a point where, the computer is so slow it's almost unusable. Spyware can disable firewalls and reduce your browser security settings which makes your system more susceptible to further infections.

Anti-spyware programs are vastly available for download and a lot of anti-virus programs have added anti-spyware features to their existing products.


Worms are standalone programs that replicate themselves so that they can spread to other computers. It uses a computer network network to spread itself to others. You would typically install a worm by unknowingly opening and email attachment that contains the executable script. Once on your computer, they spontaneously generate additional emails that each have a copy of the worm. Worms almost always cause some kind of damage to a network, even if it's nothing more then consuming a lot of bandwidth.

Anti-virus and anti-spyware programs are helpful in detecting them but they must be kept up-to-date since, like viruses and the like, new ones are always being made.

Always remember that even if your anti-virus and anti-spyware programs are up-to-date it is possible to be infected. If the virus/trojan/worm/spyware is released before the company can figure out how to remove it and you download/install/open an email with one of those in it, there's nothing your program would be able to do to help you.


US – Google Public DNS=,
US – OpenDNS=,
RU – Yandex=,
US – Level 3 – A=,
US – Level 3 – B=,
US – Level 3 – C=,
US – Level 3 – D=,
US – Norton DNS=,
US – Comodo Secure=,
US – Dyn=,
US – OpenNIC=,
UK – Bulldog 1=,
UK – Bulldog 2=,
UK – Internap=,
UK – Fast Broadband=,
UK – BSO Network=,
UK – Time Warp=,
US – Advantage=,
US – Qwest=,
US – Centurytel=,
US – Sprint=,
US – SmartViper=,
US – Century=,
US – Unotelly=,
US – CenturyLink DNS=,
US – Hurricane Electric=,
DE – FoolDNS=,
BG – Mega Lan=,
AU – Exetel=,
SE – T3=,
DK – censurfridns=,
ES – PuntCAT=,
TR – TurkTelekom=,
FR – Budget Telekom=,
US – Cisco=,
FR – Anonymous DNS – 1=,
US – Anonymous DNS – 2=,
FR – Anonymous DNS – 3=,
CH – Anonymous DNS – 4=,

US – OpenDNS Family=,
US – Norton ConnectSafe – B=,
US – Norton ConnectSafe – C=,
US – Norton ConnectSafe – A=,
RU – Yandex Family=,
RU – Yandex Safe=,
US – Comodo Secure=,


Linux Users:  is base – is head (*secondary)

$ sudo vi /etc/resolvconf/resolv.conf.d/base

Then put your nameserver base address: nameserver ip.ip.ip.ip Save it.

$ sudo vi /etc/resolvconf/resolv.conf.d/head

Then put your nameserver head address: nameserver ip.ip.ip.ip Save it.

$ sudo vi /etc/dhcp/dhclient.conf 

Then add base address here prepend domain-name-servers ip.ip.ip.ip; or supersede domain-name-servers ip.ip.ip.ip; ## if the name is not resolved by ip.ip.ip.ip, ## then the request falls back on the other server.

Finally update resolvconf:

$ sudo resolvconf -u

$ sudo service network-manager restart

Choose the one that meets your needs and way you go.

Tech Support

Optimization Tools
ATFCleaner | Ccleaner 32/64 Software | Ccleaner–Portable32 | Ccleaner–Portable64 | GlaryUtilities
| AllinOne Cleaner | CleanUp452 | EventViwerCleaner | Vit-RegistryFixer | REVOUninstaller Tool

Trojan / Malware / Spyware Removal Tools
MalwareBytes Anti-Malware | Super Anti-Spyware | SuperAnti-Spyware ( Portable ) | Trojan Remover Tool | Hitman Pro–x32 | Hitman Pro –x64 | TDSS Killer | MAcafee Stinger | Adwcleaner – Adware cleaner

Internet Explorer Repair tools
FixIE Utility IE8 | FixIE for xp | Microsoft IE Fixit-1 | Microsoft IE Fixit-2 | Flash Cookies Cleaner | CIR (Complete Internet Repair tool) | Fix IE Dll’s.bat | IE i386 Folder | Java Download | FlashPlayer Download | Adobe PDF Reader | Flash cookies cleaner | SilverLight Download | Silverlight Repair Tool | Adware
Remover Tool V3.9
| Firefox | Internet Explorer – 8 | Internet Explorer – 9 | Internet Explorer – 10 | Google Chrome

Other Repair Tools
Combo Fix | Dial a fix | Process Explorer | Unhide Tool | Autoruns | LSP Fix | SD Fix | Spybot SD | MSI Cleanup Utility | Fix WU | ISeeYouXP | FixMSE | FixWin V1.2 | Quick fix for 7 | Quick Fix for XP | TMX
Process Explorer
| ShellEx View32 | ShellEx View64 | Re-Enable v2 Portable | File Association Fixes | Fix Task Manager | Restore Point Creator

Anti-Virus Softwares
MSEXP | MSE Vista/Win7 32bit | MSE Vista/win7 64bit | Avats Free Antivirus | AVG Antivirus Free | PC Tools Antivirus FREE | Kaspersky Anti-Virus | Quick Heal Anti-virus

Anti-Virus Removal Tools
Norton Removal tool | Macfee Removal tool | AVG Removal tool 32bit | AVG Removal tool 64 bit | Avast Removal tool | Comodo Removal Tool | Avira Removal tool | Kaspersky Removal tool | Zone alarm Removal tool | Panda Removal tool | BitDeffender Removal tool | CA Removal tool | F-secure Removal tool | WebRoot Removal tool | Microsoft OneCare Removal Tool | Microsoft Security Essentials Removal
| eScan removal tool

Remote Control Softwares
Ammyy Remote | Team viewer | | logmein

Host Blocking
Hosts File Editor

ONLINE Virus Scan
Avast! Virus Cleaner

Swiss File Knife

A hundred command line tools in one executable. Find and extract text in binary files, list dir tree sizes, filter and replace text, run an instant ftp server, http server for easy file transfer, find duplicate files, join many text files into one, create and verify md5 checksum lists, run a command on all files, detab text, create hexdumps from files, trace contents of a tcp connection, find dependencies between files, print colored text to terminal, locate commands in the path, print last lines of a file, convert CR/LF, hex to binary, binary to source code, split and join large files, list the contents of all .zip .jar .tar.gz and .tar.bz2 files. Fully portable, for USB stick, without installation. For Windows, Linux and Mac. Source code should compile on further platforms as well, like embedded Linux.


PeerBlock lets you control who your computer "talks to" on the Internet.  By selecting appropriate lists of "known bad" computers, you can block communication with advertising or spyware oriented servers, computers monitoring your p2p activities, computers which have been "hacked", even entire countries!  They can't get in to your computer, and your computer won't try to send them anything either.

And best of all, it's free!

What's New?

  • Port Allow List – The new "Port Settings" tab allows you to unblock ports (incoming and/or outgoing).  This means that PeerBlock will not filter any connections from/to those ports.  This can for example be used if you're running PeerBlock on a public FTP server, or if you want to ensure that outgoing SMTP mail communications are never blocked.  Many thanks to night_stalker_z for his hard work on this feature!
  • First-run Update Message – When you first run PeerBlock after upgrading, you will see a notice explaining why lists are only updating once per week.  Hopefully this will help to alleviate people's confusion about this.
  • Better Weekly List-Updating – We've made some improvements that should help ensure that free users continue to get their free weekly list-updates.
  • I-Blocklist Subscription Settings – To make it easier for you to configure PeerBlock to use an I-Blocklist Subscription, new I-Blocklist Username/PIN fields have been added to the bottom of the "Settings 1" tab.
  • Separate Settings Tabs – Instead of having one Settings tab with those silly "Next" and "Prev" buttons on it, we've broken that out into two separate "Settings 1" and "Settings 2" tabs.
  • Improved List-Update Error Handling – We've worked with I-Blocklist, who hosts the vast majority of the lists people use, to create improved error messaging for the various problems that may occur when updating lists.  If something occurs during update-checking, the error message displayed should be much more meaningful.
  • Improved List-update Error Window – Should you hit any errors while updating your lists – 429 or otherwise – we will now pop up a more informative error window, along with a button you can click to jump straight to our site to check for more information.
  • Updated Error Windows – If you encounter a catastrophic error, the message that appears will now tell you to go visit  This will redirect you to a forum-post on which the most common error-messages are displayed, to help you figure out what has gone wrong, and what can be done to fix it.
  • (Re)Load Previously Downloaded Lists – Previously, there was a problem where if you disabled and then re-enabled a list in the List Manager, that list wouldn't be reloaded until it successfully downloaded an update.  Now, if it can't update that list it will still load the last version you did successfully download.
  • Removal of Windows 2000 Support – Windows 2000 is quite old by now, we hope that nobody's still running it; if you are, you can continue using the previous PeerBlock version.  This release does support all Windows variants from Windows XP through to Windows 8.1, including server variants.  (But not Windows RT.)


Get it Here

Here it is, PeerBlock 1.2!  This file will install PeerBlock 1.2 on your machine, and is the recommended download for most users.

If for some reason the remote link does not work, no worries try the local link below.