First Let it be known that: I, Jerry Westrick, have in no way intended
to slur or impinge on the reputation of the honorable
people at Hamachi. If some feel I have done so I hear by
express my apoligies to Hamachi, and state unequivocally
that this was not and is not my intention. As far as I
Hello Zach...
All your scenarios are valid.
The program functionality COULD be perfect.
What bothers us the conflict of Secure Communications
with trust in someone who is paying lots of money for Internet
band width to provide the service for no visible reason.
I'm sorry, I just can't fit the 2
Jerry,
We are NOT paying lots of money as we do NOT relay your
traffic. It is p2p system, the bandwidth usage for us is
under few megs a day. Can you fit this together under one hat ?
Alex
PS Sorry, James, I couldn't left this unanswered.
Jerry Westrick wrote:
Hello Zach...
All your scenarios are
Alex Pankratov wrote:
Jerry,
We are NOT paying lots of money as we do NOT relay your
traffic. It is p2p system, the bandwidth usage for us is
under few megs a day. Can you fit this together under one hat ?
Alex,
No need for the tone of your last sentence. I grasp what you are doing
as I am sure
At 050303 12:53 -0500, Zach Dennis wrote:
Alex Pankratov wrote:
Jerry,
We are NOT paying lots of money as we do NOT relay your
traffic. It is p2p system, the bandwidth usage for us is
under few megs a day. Can you fit this together under one hat ?
Alex,
No need for the tone of your last sentence.
My my...
Perhaps...just what the RealVNC list needed. All the previous posts on port
forwarding, sshconverged into a simple interface.
Whilst I would assume the majority of users are not technically inclined and
putty is a great front end, the difficulties of implementing the open source
SSH
Since my last posting, I've been trying to play devil's advocate with
this technology. I've been trying to imagine legitimate scenarios for
using this technology in a business environment. So far, I haven't been
able to do it. It still seems to be a technology whose primary purpose
is to
Collins, Kevin (MindWorks) wrote:
I looked at Hamachi after a mention of it on this list yesterday, and
while it seems pretty cools, I have to ask:
Am I the only one who has at least a slight distrust of using a
mediation server in the middle of a secure connection?
Maybe I just don't get it, or
In fact, I am betting that I am not able to make a connection from work
to home through our firewall.
Anyone care to wager?
No need to get cocky. It's all in how your firewall is setup. Most
firewalls allow outgoing connections to occur, which allows you to
create a bidirectional connection
Bob Hartung wrote:
Since my last posting, I've been trying to play devil's advocate with
this technology. I've been trying to imagine legitimate scenarios for
using this technology in a business environment. So far, I haven't been
able to do it. It still seems to be a technology whose primary
Ed,
You might want to check out this long thread about Hamachi.
-Paul
-Original Message-
From: Zach Dennis [mailto:[EMAIL PROTECTED]
Sent: Wednesday, March 02, 2005 7:30 AM
To: vnc-list@realvnc.com
Subject: Re: A simple, solid and stable P2P Bidirectional NAT Traversal
technique for
While H is primarily oriented on home users (gaming, data sharing,
etc), the primarily business usage is a remote access and p2p
connectivity between remote points. Zach listed some. And while
those should be enough to get you on the track, I will give you
another one.
Say you have two sales
In only one of your examples is the IT department involved. It that
case, they could have accomplished the same as Hamachi by temporarily
opening some ports in the firewall and forwarding them to her work
computer. Or they could have e-mailed her the files she needed.
In all your other
What is your take on SHA1 being recently broken by Chinese
researchers?
As far as I understand it, it's a little premature to say that it's been
broken. The research hasn't been published formally as yet but those in
the know suggest that it's a method of producing pairs of strings with a
Bob Hartung wrote:
In only one of your examples is the IT department involved. It that
case, they could have accomplished the same as Hamachi by temporarily
opening some ports in the firewall and forwarding them to her work
computer. Or they could have e-mailed her the files she needed.
In all
Nick Kovats wrote:
What is your take on SHA1 being recently broken by Chinese researchers?
My take would be like this - 'when I win a lottery I should no more be
buying Bentleys with gold plated door handles, because they tend to get
cold in a winter time'. Ie it's not a yet problem worth worrying
John:
Heya. I know you didn't ask me, but as I'm the guy behind
the Kaboodle and KaboodleProxy stuff, I thought I'd toss in my two
coppers as well.
When we started building the echoWare and echoServer stuff
for Kaboodle, we initially looked at hole punching solutions such
as what I
Hey Scott,
Yes we do UDP hole punching, but the numbers given in the p2pnat
paper are somewhat inaccurate. See my recent posts to p2p-hackers
list for detailed statistics.
To sum it up here - with around 2 unique IPs we saw so far we
were successfully mediate 97% of requested tunnels. Which in
I looked at Hamachi after a mention of it on this list yesterday, and
while it seems pretty cools, I have to ask:
Am I the only one who has at least a slight distrust of using a
mediation server in the middle of a secure connection?
Maybe I just don't get it, or I do and am overly paranoid, but
I have to wonder what the motivation for a company offering a service
like this for free...
As a network administrator, I don't like an application that by-passes
firewalls and server-based virus scanning. They are there for a reason,
regardless whether you want to check your home PC or not.
Agreed, this type of a program makes you sit back and wonder, why?
If programs like these are freewheeling around, what is even the point of
having a firewall, also what is there to prevent them giving total access to
outsiders, even without knowing?
-Paul Haskew
-Original Message-
On Tuesday 01 March 2005 18:39, Collins, Kevin (MindWorks) wrote:
I looked at Hamachi after a mention of it on this list yesterday, and
while it seems pretty cools, I have to ask:
Am I the only one who has at least a slight distrust of using a
mediation server in the middle of a secure
I am principle designer and developer of Hamachi. I got few hits
from this maillist, checked out the comments and since we don't
have much information on the website I thought I'd offer some
answers here.
Since I just joined the list I don't have original emails, so
here's a summary with my
While I am glad to see the main designer/developer here, I do not wear tin
foil hats. :P I am just a concerned IT Admin, who will at one point will
have to make a decision about this program.
Also, about trusted outsiders, I am not worried about me setting up trusted
persons. I am worried about
Paul Haskew wrote:
While I am glad to see the main designer/developer here, I do not wear tin
foil hats. :P I am just a concerned IT Admin, who will at one point will
have to make a decision about this program.
TCP/11975 ;-)
Also, about trusted outsiders, I am not worried about me setting up
25 matches
Mail list logo