How to See What’s Hidden Behind a TinyURL

Heres a video introduction of how to see whats behind a TinyURL without really clicking on the link.

Last week I wrote
a blog site post about how to see whats hidden behind a Bitly shortened URL without really clicking on the link. The technique is to include “+” to the end of the Bitly URL to see whats behind it without clicking it. A few people emailed me to ask if the that dealt with other URL reducing services. The answer is it works with
TinyURLs..

The trick is to include a “+” to the end of any TinyURL address in order to arrive at a safe TinyURL page that exposes what the initial link was that got reduced. If you want to click through to the destination or not, you can then choose.
If you desire to try this with a TinyURL, tinyurl.com/emkns9a8 will lead you to the page for the Practical Ed Tech Virtual Summer Camp, but including a “+” at the end of that TinyURL will take you to the page where you can see the original link without clicking it.

Ive attempted the “+” trick with a lot of other URL shortening tools and TinyURL is the just one besides Bitly that Ive discovered it to deal with..
Whats the trick?

The technique is to add “+” to the end of the Bitly URL to see whats behind it without clicking on it. A couple of people emailed me to ask if the that worked with other URL reducing services. If you see it elsewhere, it has been utilized without approval.

Applications for EducationAs I wrote recently, building great digital citizenship and cyber safety skills is something that everyone should be assisting our trainees do. Showing them little suggestions like this one to avoid clicking on suspicious links is one of the manner ins which we can help our trainees construct their digital citizenship and cyber safety abilities.

This post originally appeared on FreeTech4Teachers.com. If you see it elsewhere, it has been utilized without approval. Sites that regularly take my (Richard Byrnes) work consist of CloudComputin, TodayHeadline, and 711Web.

You may also like...