On Sun, March 25, 2007 8:21 am, Karl Cunningham wrote: > Tracy R Reed wrote: >> -----BEGIN PGP SIGNED MESSAGE----- >> Hash: SHA1 >> >> Todd Walton wrote: >>> In this case, they didn't search his computer. His computer announced >>> to the world what it's contents were. >> >> I wonder: Would it be possible to spoof such announcements from >> arbitrary IP's? That would be one way to get them to stop this. You >> don't care if ACK's get back to your or the sequence numbers are right, >> you just want lots of bogus stuff flying past their sniffer or proxy or >> whatever it is they are using to track this stuff. > > Cox techies have access to all the hardware in their system. They'd find > out where it was coming from soon enough. > > Karl >
Real question, not being contentious: what exactly do you mean here? Can Cox penetrate past the firewall on my router (assuming no back doors provided by d-link)? Oh, wait a minute ... you said "THEIR hardware" -- well, Yeah! FWIW, I have in the past run a web server and a wiki (separate apps) on non-standard ports. When I want to reference it for someone else, I just take: 68.0.0.128:1234/ #<my home IP addr>:<my port> to tinyurl.com, get a tiny URL, and send that in an email. My friends and family can handle that, and Cox is none the wiser. I have never served up a movie on bittorrent, but if I were to, I would start with that classic of abstinence-only art, "Debbie Does Nothing." -- Lan Barnes SCM Analyst Linux Guy Tcl/Tk Enthusiast Biodiesel Brewer -- [email protected] http://www.kernel-panic.org/cgi-bin/mailman/listinfo/kplug-list
