Jump to content

flowerpot

Elite Member
  • Posts

    1,849
  • Joined

  • Last visited

Everything posted by flowerpot

  1. Shaved this morning, had some homeless looking stuff going on. EDIT, just lol'd again.
  2. Arguably the worst things about the net: spam, adverts and excessive goverment control. In this "How To" guide I will introduce the concept of throw away email addresses. Often you come across a site or forum that you would like to view just briefly, but it requires registration. This requires giving up your personal email addy, that which you might of have had for a number of years. You know they're going to give the email and data away to their affiliates or sell the data for virtually nothing on spam lists. You know that 2 weeks later you will start receiving increased amounts of spam. And, if you try to unsubscribe, it's only a verification that someone is home at that email address, so they keep nailing you. One day you open a malicious .doc in a bogus email and you unknowingly become part of a worldwide botnet, using your own PC to attack others on behalf of a master bot herder. Why not use a throw away email address? You use the email to register on the forum and never use it again. Register with the email address, check the inbox, activate the account and forget the addy ever existed. Some throw-away accounts last for 10 minutes, others for 24 hours, it's all you need to avoid giving away that precious email account you work hard to keep spam free. Lets look at the available avenues for us: Replace the xx with tt: hxxp://www.mailinator.com/ hxxp://www.mytrashmail.com/ hxxp://www.spambox.us/ hxxp://www.mailexpire.com/ hxxp://www.guerrillamail.com/ hxxp://www.jetable.org/en/index hxxp://www.temporaryinbox.com/ hxxp://www.spamhole.com/ hxxp://www.maileater.com/ hxxp://www.spambox.us/ hxxp://www.dontreg.com/ hxxp://www.guerrillamail.com/ hxxp://10minutemail.com/ hxxp://www.spamhole.com/ hxxp://www.tempomail.fr/ hxxp://www.tempemail.net/ hxxp://www.pookmail.com/ hxxp://spamfree24.org/ hxxp://www.spammotel.com/ hxxp://greensloth.com/ hxxp://spam.la/ hxxp://www.spamspot.com/ Now use the throw-away email together with the CGI proxy!
  3. The idea of a proxy is to hide the identity of a person attempting to access the resource through the proxy, be that a website or web server of various kinds. The person wishing to hide their identity uses the proxy as a middle-man to for example, view a website without the website owner being able to identify the user by their ISP assigned IP Address. The user will appear to be coming from the IP of the proxy and not the true IP of the user. Proxies can be used to circumvent access control to a website where a user might not be permitted to visit or has in the case of a web forum been banned by IP Address and still needs to access the site. Essentially a proxy would render the user anonymous in the best case scenario. user _____________...proxy...______________website 64.3.45.66 23.2.35.7 www.myspice.com In the illustration above, the user would appear to be coming from 23.2.35.7 according to the owner and/or web logs. However the web log of the proxy server would show the successfull connection attempts from 64.3.45.66 so that if www.myspice.com were to contact the owner of the proxy and ask/force him to reveal the ip address of the user who attempted to access www.myspice.com using the proxy as an intermediate, your identity would be compromised. Types of Proxies Squid Proxy The most popular Open source proxy server is Squid proxy. By default Squid runs on port 3128. The access logs are held in the access.log file. The default implementation of squid is by default very restrictive allowing no outside connection attempts. The squid proxy must be configured with at very least the following in the squid.conf file: acl my_network 192.168.1.0 255.255.255.0 http_access allow my_network The service must be reloaded and allowed by any firewall before any connections can be made to the service. So a freshly installed Squid daemon would not be usable. Thus misconfigured Squid proxies are usually sought after and scanned for. To use a squid proxy, one must configure the web browser to utilize the proxy for any http connection requests. This is done by manually adding the IP Address and port number into your web browsers connection settings through the menu at the top of your browser. note. will add detailed instructions. ____Firefox: 1. Right click on the shortcut in start menu and select Mozilla Firefox Options. 2. Click on the Advanced category. 3. Click on Network tab. 4. Click Settings under Connection. 5. Check Manual proxy configuration. 6. Enter proxy server IP address and port number. 7. If you want, check the box that says Use this proxy server for all protocols. ____Internet Explorer: 1. Open Internet Explorer. 2. Select Tools from the menu bar of your Internet Explorer window. 3. Select Internet Options. 4. Select the Connections Tab. 5. Select LAN Settings. 6. Place a checkmark in the two tick boxes under Proxy Server (the Address and Port edit boxes will now turn white and be editable). 7. Enter your Proxy server name and the port number in their respective edit boxes. 8. Click on OK and OK until all the windows have closed. 9. Close and re-open your Internet Explorer and you should be good to go! CGI proxy Very popular, quick and easy, just visit the webpage of the cgi proxy and enter into the box the URL of the website you would like to visit. The CGI proxy will divert you through, using itself as the originating IP Address. Connection attempts would appear to come from the IP Address of the CGI proxy. These proxies are abundant, links to which will be given at the end of this talk. You will easily be able to appear as if you are coming from Saudi Arabia when you are actually in London(random town), thus removing all restrictions based on IP. This will not however remove any username bans as that is on a username basis, not IP, so a new username might be required. CGI proxies can also remove unwanted ads and scripts from the mix of the website you wish to visit having the advantage of generally less advert spam. A CGI proxy will be slower than your usual connection because you are sharing the connection with all the other users going through the proxy, or for other technical reasons. Blacklists exist for cgi proxies, often implemented in popular web forum software such as ipb, vbulletin, phpbb and others, making the need for 'fresh' proxies apparent. Resources CGI PROXIES The CGI proxy authority: h88p://www.proxy.org Visit the site, enter your desired URL into the box, select your choice of proxy from the list, and click OK. You will be sent through the proxy of your choice to the web page of your choice. h88p://www.daveproxy.co.uk Love this site, made possible by donation, same as above just enter the URL in the box and go. All your requests will be made through the daveproxy! SQUID and other manually set proxies h88p://www.samair.ru/proxy/ h88p://proxy-list.org/en/index.php You will take a proxy from the lists above and enter it using the instructions above. From then on all requests are forwarded through the proxy. Note, due to the fact that misconfigured proxies are essentially abused proxies, they often go down very quickly and the need for fresh proxies is paramount. On these web pages are often indications of uptime and such stats. Blacklists are also continually updated. NOTE: Do not check your webmail through a proxy or do your banking through a proxy. These proxies CAN view all unencrypted data which flows through them, the data can be stored for mining, impersonation etc. Use a proxy for what it is, a novel way to hide your IP on this jungle of an intarwebnet. thread notes: will add irc proxies and socks and more definitions
  4. Regarding the wall, I think it's probably your camming skills lol!
  5. How does a man(myself) hook one of these pages up?
  6. Bit weird that savwar. So you need to unplug it to turn it off, ha!
  7. Two tunes, conjured up in the last month. http://www.zshare.net/audio/1398561110e71a8e/ http://www.zshare.net/audio/14027814b578b5a6/ Have a listen fp
  8. Nice nice. Just fitted the vf700 model to one of my cards. With Arctic Silver and a good third party fan, you are so sorted. Going for a 4 monitor linux setup at home, 2 8500gt cards with dual dvi, both fitted with zalmans.
  9. Yo<br /><br />Zalman CPU fans are real quiet, and mostly come with fan speed adjuster, so you can make it even quieter. Running on the lowest fan speed shouldn't cause more that 3-5C rise in an average case. <br /><br />Use a credit card shaped object to apply the Arctic Silver or AS Ceramic to the CPU surface, an old business card should work. Not more than a rice grain and a half size of thermal paste is needed, spread evenly.<br /><br />Fans can be 7 or 5 volt modded to run slower resulting in a quieter ride, here is a random guide:<br /><a href="http://www.ocforums.com/showthread.php?t=372297" target="_blank">http://www.ocforums.com/showthread.php?t=372297</a><br /><br />Often, you can safely remove one of the fans from your box, don't remove the CPU fan. Monitor the CPU and case temps for the next 24 hours to see the temp effects, and adjust as needed.<br /><br />Cool guide.
  10. 'Above the clouds' is a great track, and 'you know my steez'.
  11. Yo man, I just got the Q6600 with 2gig DDR2 1066Mhz last weekend. Feeling the 4 cores.
  12. Hah! I like this man, you're own flavour, props. "We'll be right back, after this word!" "Bargains Bargain Bargain!" LOL
  13. Yes actually. nph CGI proxies Pop this into google: inurl:nph-proxy.cgi The results will be free cgi proxies for you to hide your skinny little ass. Remeber most of these proxies have logs of who has used them at what time, so ultimately you can still be discovered. Your speed will depend on the amount of users using the proxy at the time you requst the page, so a different proxy might be faster at certain times. There are traditional proxies running on port 80,8080,3128 out on the net(squid,netcache etc), but these are not for public ppl to use unless specifically stated. So unless you're a hacker then cgi is it mate. Example: http://enzian.gebirgsverein.at/proxy/nph-proxy.cgi Go there and enter this site: www.whatismyip.com and your IP will be different. You aren't Superman now though.
  14. Tor was initially a military project, it is still widely used by the US military and many nodes are maintained by them. Exit nodes are vulnerable to traffic analysis as the last node decrypts the data as it flows to it's final destination. I wouldn't be trusting anything tor related. Oops I farteyed.
  15. You know the amazing thing about the xbox 360, you get your moneys worth. I play everyday on this thing for 2hours and if you can find a game for you, then you will too, I played so much I broke one(even though they weren't made too well), then I took it back and got a new one for free and an extended one year assurance that if it breaks I get another new one. It keeps being updated with features too, which I love. Such a great machine! This coming from a linux guy.
  16. Ifyou wanna increase the RAM, go to the puter store and buy a 512MB DDR400 stick, open side panel, put stick in RAM slot, close side panel and start PC, check to see that total RAM has increased by 512MB.
  17. Oh interesting, looking forward to the pics, put em up!
  18. Das would be borgen her nine thou-thou.
  19. Made over the last year, album title: Data Flow [url="http://www.zshare.net/download/4863082f9b9f41/"]http://www.zshare.net/download/4863082f9b9f41/[/url]
×
×
  • Create New...