http://opensores.thebunker.net/pub/sites/w...03-simplenomad/
is this of any use to anyone or is it a pointless link?
Printable View
http://opensores.thebunker.net/pub/sites/w...03-simplenomad/
is this of any use to anyone or is it a pointless link?
cough, cough
why has no-one except me replied to this post?
because people are wondering what the it is you have posted.
im not gonna test this out unless i know what it is.
oh a linux and windows version. :D
well, ncovert is the program which apparently spoofs ip's successfully within kazaa...ncovert appears on this page
paranoid?
I have no need for encryption in normal day to day internet use and I imagine it's the same for most individual surfers.
Windows 2000 already uses excellent encryption when it's needed (128bit) so one more program = added bloat and bog.
well, the reason i posted it is because if more people know they can share with effective immunity, surely the worries re: riaa will disappear?
there will be a lot less leechers if they know they're not gonna get convicted...
http://www.globetechnology.com/servlet/sto...ory/Technology/
Masking the IP won't do anything to disuade RIAA and similar. Every hop will show in a trace route and your ISP proxy will be second to last. It's a simple thing to go from there and subpoena any additional information. The ISP will know it was you, you can't mask your connection to them.
The only way to avoid it is by using an independent annonymous proxy with a program that reverses the headers to look like it was "recieved by" rather than "sent by" that proxie. There are programs that do that but I haven't bookmarked them.
why would this be given so much praise by a real 'hacker' then?
surely if it wasn't a big thing, there would not have been such a hullabaloo about it?
depends what and who you do with it I suppose.
But in this case, kazaa, I see no point. Once you've connected to the wrong user, you are toast! Netstat, Neotrace, all that kind of stuff only takes a few millisconds
"because the data holds only the addresses of the recipient and the third-party server"Quote:
Originally posted by balamm@5 September 2003 - 00:38
Netstat, Neotrace, all that kind of stuff only takes a few millisconds
tracking programs wouldn't show your ip though, only that of the server
if the server was in a country like palestine, as es5 is, then the riaa wouldn't have access to the logs on the server you used.
this would make the connection untraceable
How do you physically connect to the internet? Through a phone line or cable to your ISP. How is a connection to you initiated? Through that same phone line or cable. To a physical address on the internet, supplied by who? Your ISP. It doesn't matter what you add or subtract from your data or files, the ISP adds it's own and supplies feedback to connecting machines and providers to maintain the connection and direct the data.
Example, I have domain redirection. My url is wenpigsfly.mine.nu . Now obviously .nu is not a canadian domain extension yet if you do a trace route, it points directly to my location. It has to or you'd never get one bit of data from me.
all i'm saying is why is this program being given so much credit on the website if it's bullsh*t?
real hackers are gonna use this program
if it didn't work, surely they're not gonna risk it?
who are these real hackers. you mean people who dos attack.
the only real use of a spoofer is a one way handshake, while all other internet traffic relies on the three way handshake.
on the page i linked to earlier "simple nomad" said black hat hackers could use this program
if he was bold enough to make this claim, surely the software can actually do it?
why would he make a false claim?
Sure they can use it. But not for a file transfer such as you'd have with kazaa.
It's nothing to mask your identity in simple communication through a proxy. Getting a resumable download established the same way isn't possible or plausible.
this is another topic added to my useless topics pile then?
:P
Well, I'm sure there are some wanna be hackers around who'll find some benefit from it.