How to See What’s Hidden Behind a TinyURL

Heres a video introduction of how to see whats behind a TinyURL without really clicking the link.

Applications for EducationAs I composed last week, constructing good digital citizenship and cyber safety skills is something that everybody must be helping our trainees do. Revealing them little tips like this one to avoid clicking suspicious links is among the methods that we can help our students develop their digital citizenship and cyber security skills.

The trick is to include a “+” to the end of any TinyURL address in order to land on a safe TinyURL page that exposes what the original link was that got reduced. You can then choose if you desire to click through to the destination or not.
If you wish to attempt this with a TinyURL, tinyurl.com/emkns9a8 will lead you to the page for the Practical Ed Tech Virtual Summer Camp, however adding a “+” at the end of that TinyURL will take you to the page where you can see the original link without clicking on it.

This post originally appeared on FreeTech4Teachers.com. If you see it elsewhere, it has been used without permission. Sites that regularly take my (Richard Byrnes) work include CloudComputin, TodayHeadline, and 711Web.

The technique is to add “+” to the end of the Bitly URL to see whats behind it without clicking on it. A few individuals emailed me to ask if the that worked with other URL reducing services. If you see it somewhere else, it has actually been utilized without consent.

Ive attempted the “+” technique with a bunch of other URL reducing tools and TinyURL is the only one besides Bitly that Ive discovered it to work with..
Whats the technique?

Recently I wrote
a post about how to see whats concealed behind a Bitly shortened URL without in fact clicking on the link. The trick is to add “+” to the end of the Bitly URL to see whats behind it without clicking on it. If the that worked with other URL shortening services, a few people emailed me to ask. The response is it deals with
TinyURLs..

You may also like...