On Sun, March 25, 2007 8:21 am, Karl Cunningham wrote:
> Tracy R Reed wrote:
>> -----BEGIN PGP SIGNED MESSAGE-----
>> Hash: SHA1
>>
>> Todd Walton wrote:
>>> In this case, they didn't search his computer.  His computer announced
>>> to the world what it's contents were.
>>
>> I wonder: Would it be possible to spoof such announcements from
>> arbitrary IP's? That would be one way to get them to stop this. You
>> don't care if ACK's get back to your or the sequence numbers are right,
>> you just want lots of bogus stuff flying past their sniffer or proxy or
>> whatever it is they are using to track this stuff.
>
> Cox techies have access to all the hardware in their system. They'd find
> out where it was coming from soon enough.
>
> Karl
>

Real question, not being contentious: what exactly do you mean here? Can
Cox penetrate past the firewall on my router (assuming no back doors
provided by d-link)?

Oh, wait a minute ... you said "THEIR hardware" -- well, Yeah!

FWIW, I have in the past run a web server and a wiki (separate apps) on
non-standard ports. When I want to reference it for someone else, I just
take:

  68.0.0.128:1234/ #<my home IP addr>:<my port>

to tinyurl.com, get a tiny URL, and send that in an email. My friends and
family can handle that, and Cox is none the wiser.

I have never served up a movie on bittorrent, but if I were to, I would
start with that classic of abstinence-only art, "Debbie Does Nothing."

-- 
Lan Barnes

SCM Analyst              Linux Guy
Tcl/Tk Enthusiast        Biodiesel Brewer


-- 
[email protected]
http://www.kernel-panic.org/cgi-bin/mailman/listinfo/kplug-list

Reply via email to