http://opensores.thebunker.net/pub/sites/w...03-simplenomad/
is this of any use to anyone or is it a pointless link?
http://opensores.thebunker.net/pub/sites/w...03-simplenomad/
is this of any use to anyone or is it a pointless link?
<span style='font-size:14pt;line-height:100%'>BLAH</span>
<span style='font-size:14pt;line-height:100%'>Wayne Rooney - A thug and a thief</span>
cough, cough
<span style='font-size:14pt;line-height:100%'>BLAH</span>
<span style='font-size:14pt;line-height:100%'>Wayne Rooney - A thug and a thief</span>
why has no-one except me replied to this post?
<span style='font-size:14pt;line-height:100%'>BLAH</span>
<span style='font-size:14pt;line-height:100%'>Wayne Rooney - A thug and a thief</span>
because people are wondering what the it is you have posted.
im not gonna test this out unless i know what it is.
oh a linux and windows version.
well, ncovert is the program which apparently spoofs ip's successfully within kazaa...ncovert appears on this page
<span style='font-size:14pt;line-height:100%'>BLAH</span>
<span style='font-size:14pt;line-height:100%'>Wayne Rooney - A thug and a thief</span>
paranoid?
I have no need for encryption in normal day to day internet use and I imagine it's the same for most individual surfers.
Windows 2000 already uses excellent encryption when it's needed (128bit) so one more program = added bloat and bog.
well, the reason i posted it is because if more people know they can share with effective immunity, surely the worries re: riaa will disappear?
there will be a lot less leechers if they know they're not gonna get convicted...
http://www.globetechnology.com/servlet/sto...ory/Technology/
<span style='font-size:14pt;line-height:100%'>BLAH</span>
<span style='font-size:14pt;line-height:100%'>Wayne Rooney - A thug and a thief</span>
Masking the IP won't do anything to disuade RIAA and similar. Every hop will show in a trace route and your ISP proxy will be second to last. It's a simple thing to go from there and subpoena any additional information. The ISP will know it was you, you can't mask your connection to them.
The only way to avoid it is by using an independent annonymous proxy with a program that reverses the headers to look like it was "recieved by" rather than "sent by" that proxie. There are programs that do that but I haven't bookmarked them.
why would this be given so much praise by a real 'hacker' then?
surely if it wasn't a big thing, there would not have been such a hullabaloo about it?
<span style='font-size:14pt;line-height:100%'>BLAH</span>
<span style='font-size:14pt;line-height:100%'>Wayne Rooney - A thug and a thief</span>
depends what and who you do with it I suppose.
But in this case, kazaa, I see no point. Once you've connected to the wrong user, you are toast! Netstat, Neotrace, all that kind of stuff only takes a few millisconds
Bookmarks