Quote:
Originally posted by TIDE-HSV@24 April 2003 - 21:29
It may mask, through, NAT, your particular machine IP, if you have a LAN. But, if your machine accepts the connection, and they see what they want in your MSF, then they have the IP of your router, which is given out by your ISP. Whether this is given out dynamically - every time you log on - or statically (obviously an easier target), the IP can be traced back to your ISP. The only answer is to block incoming IPs that are known to be used by snoopers or ranges of IPs that may be. Peer Guardian is good, but even better is to copy those ranges into a stout firewall like ZA Pro or Syquest Pro. That's what I've done. Syquest is a little easier to work with mechanically in importing the IPs. Is this clear as mud? :blink:
Guess I need to call my Cable company and ask where they stand on this.
Quote:
My deepest concerns lay with the DCMA and its apparent interpretation, thus possibly giving holders of copyright material more power than the FBI. I am personally thinking of recording a cd about taking a shit so that via the DCMA I can freely and without a court order invade the blond chicks privacy down the street based on the fact that she may be sharing my copyrighted material (shit). The DCMA is an ugly beast, absurd, and needs to be put to rest or modified. Maybe the law man here, Tide, could suggest what course can, and possibly will be taken to do so. It worries me greatly that at the cost of sharing some files, this ammunition could lead to the loss of some of my freedom and privacy.
On another note I read somewhere that simply by having your IP and Port your SF can be viewed due to how KaZaa functions. Example type