Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon.

Pages: 1-

WinSocks

Name: network noobz 2008-03-10 18:21

How do I used WinSocks to create some kind of server?  plz help thx

Name: Anonymous 2008-03-10 18:26

Obtain a rifle. Make sure the safety is off and that you have sufficient ammunition. Point it at your temple. Apply pressure to the trigger.

Name: Anonymous 2008-03-10 18:35


September 1981                                                         
                                                       Internet Protocol
                                                           Specification

    The Network Control precedence designation is intended to be used
    within a network only.  The actual use and control of that
    designation is up to each network. The Internetwork Control
    designation is intended for use by gateway control originators only.
    If the actual use of these precedence designations is of concern to
    a particular network, it is the responsibility of that network to
    control the access to, and use of, those precedence designations.

  Total Length:  16 bits

    Total Length is the length of the datagram, measured in octets,
    including internet header and data.  This field allows the length of
    a datagram to be up to 65,535 octets.  Such long datagrams are
    impractical for most hosts and networks.  All hosts must be prepared
    to accept datagrams of up to 576 octets (whether they arrive whole
    or in fragments).  It is recommended that hosts only send datagrams
    larger than 576 octets if they have assurance that the destination
    is prepared to accept the larger datagrams.

    The number 576 is selected to allow a reasonable sized data block to
    be transmitted in addition to the required header information.  For
    example, this size allows a data block of 512 octets plus 64 header
    octets to fit in a datagram.  The maximal internet header is 60
    octets, and a typical internet header is 20 octets, allowing a
    margin for headers of higher level protocols.

  Identification:  16 bits

    An identifying value assigned by the sender to aid in assembling the
    fragments of a datagram.

  Flags:  3 bits

    Various Control Flags.

      Bit 0: reserved, must be zero
      Bit 1: (DF) 0 = May Fragment,  1 = Don't Fragment.
      Bit 2: (MF) 0 = Last Fragment, 1 = More Fragments.

          0   1   2
        +---+---+---+
        |   | D | M |
        | 0 | F | F |
        +---+---+---+

  Fragment Offset:  13 bits

    This field indicates where in the datagram this fragment belongs.

Name: Anonymous 2008-03-10 19:11

>>3
IP Protocol

Name: Anonymous 2008-03-10 19:11

my first socks app was a SYN-flooder,

I just thought you should know that...

Name: Anonymous 2008-03-10 19:28

my first socks app was a ACK-flooder,
 
I just thought you should know that...

Name: Anonymous 2008-03-10 19:34

my first socks app was a RST-flooder,

I just thought you should know that...

Name: Anonymous 2008-03-10 19:41

My first app was and SYN-ACK-RST-FIN-flooder

I just thought you should know that I am an EXPERT PROGRAMMER

Name: Anonymous 2008-03-10 19:44

>>8
FIN flooder?
Damn, that's leet.

Name: Anonymous 2008-03-10 20:48

My first socks app was an echo client. My next socks app was an IRC bruteforce DoS attacker. My next was a DoS library that I then proceeded to use in all other programs to add hidden DoS functionality.

Anytime you see a linux binary on /prog/, launch it with the --dos=<flood type> --target-host=<target> --target-port=<port> <--source-port=<source port> --source-addr=<source address>>, and maybe, just maybe,, it'll bump that host off the net.

Name: Anonymous 2008-03-10 21:01

>>10
I can't take the word of somebody that doesn't.

Name: Anonymous 2008-03-10 21:01

>>11
LOL shiichan bug discovered.
I'll soon make a topic about it.

Name: Anonymous 2008-03-10 22:00

>>10
Oh, to be fourteen again.

Name: Anonymous 2008-03-12 23:20

>>1
I know 4chan is based off of Futaba
Almost.

4chan is an extensively modified version of a piece of software called Futallaby which itself is a modified version of Futaba.

I doubt this should have much impact on the porting of the Futaba extensions as the basic underlying framework resides within all three incarnations of the software.

Another thing to consider is whether the m♥♥t would allow use of such a tool.

The current extension is pretty much endorsed by 4chan administration, so it is not unreasonable to think that they retain a certain amount of control over its development and functionality (I doubt they would dedicate an entire section of the site to it).

Nonetheless, the awesomeness of the Futaba extension intrigues me, so I'll keep my eye on this thread.

Oh, and OP: Welcome to /prog/, where your other car is a cdr. I would lurk and just stick to this thread for a bit if I were you.

Name: Anonymous 2008-03-12 23:20

>>1
I know 4chan is based off of Futaba
Almost.

4chan is an extensively modified version of a piece of software called Futallaby which itself is a modified version of Futaba.

I doubt this should have much impact on the porting of the Futaba extensions as the basic underlying framework resides within all three incarnations of the software.

Another thing to consider is whether the mt would allow use of such a tool.

The current extension is pretty much endorsed by 4chan administration, so it is not unreasonable to think that they retain a certain amount of control over its development and functionality (I doubt they would dedicate an entire section of the site to it).

Nonetheless, the awesomeness of the Futaba extension intrigues me, so I'll keep my eye on this thread.

Oh, and OP: Welcome to /prog/, where your other car is a cdr. I would lurk and just stick to this thread for a bit if I were you.

Name: Anonymous 2009-03-06 10:30


Most you can do   all the exercises   as it will   also help explain   to the employers   of Real Programmers   do Accounting if   they do it   For the ANTI   cudder The Sussman   standing in the   use of my   local Waterstones last   week alongside such   masters of SF   as Dick Asimov   Heinlein Wells and.

Name: Trollbot9000 2009-07-01 8:23


Rss in my bookmarks turns out the  function and them  have those assumptions  possibly broken when.

Name: Anonymous 2010-05-06 9:32


SOCKS IN MY ANUS

Name: Anonymous 2010-05-06 9:44

>>18
i kond of loled

Name: Anonymous 2011-01-31 20:13

<-- check em dubz

Don't change these.
Name: Email:
Entire Thread Thread List