-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Interesting. Something like: wget --user-agent=AvantGo
--referer=http://avantgo.com http://space.com/syn/avantgo/
No, space.com is actually doing something a bit smarter than that,
in fact. They appear to be looking at REMOTE_ADDR, and determining if the
request comes from an allowed set of addresses in the AvantGo.com netblock.
If not, the request is denied.
There's a way around it, but it's not an easy path, mangling the
packet itself, but you'll never see the data coming back, since a forged
REMOTE_ADDR would send the response to the request off to the address you're
forging, i.e. AvantGo somewhere.
The other option is to hack a root DNS server to point that IP and
netblock back to you. I don't recommend this approach, however =)
There's a third approach, but I'm not going to discuss it on a
public mailing list out in the open, where members and employees of AvantGo
are most-certainly subscribed and listening.
d.
perldoc -qa.j | perl -lpe '($_)=m((.*))'
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.1.92 (GNU/Linux)
iD8DBQE9j5urkRQERnB1rkoRAklKAKDGnCBvjWagd253WXB5OWb34oZ4xQCgrAsq
rOvDxNZc4BcJRJrLWxWMv6k=
=NrLV
-END PGP SIGNATURE-
___
plucker-list mailing list
[EMAIL PROTECTED]
http://lists.rubberchicken.org/mailman/listinfo/plucker-list