Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon.

Pages: 1-

IP Filter

Name: Anonymous 2010-10-01 18:13

Just post whatever program you use to block unwanted traffic AP2P or what ever it is. And programs or sites relevant to its working.

Also if you have tried other programs list them and a reason you prefer your current program over that.

List factors that you like and dislike about the program. The aim is that if you were having an issue with a certain aspect of your program you could look on here and see something that was a viable alternative.

Name: Anonymous 2010-10-01 18:18

iptables

Name: Anonymous 2010-10-01 18:20

Program: PeerBlock

Tools: http://iblocklist.com/

It took time to make it into what I needed it for.
Runs consistent.
Is easy to program if you know how to program as its open source.
Free to use and download.

Not sure what else to say. Well I guess I would not recommend it to someone who was just looking for a program to download click run and leave it be. Like I said its only as good as you make it.

Name: Anonymous 2010-10-01 18:21

Microsoft® Windows™ Firewall

Name: Anonymous 2010-10-01 18:21

Program: PeerBlock

Tools: http://iblocklist.com/

It took time to make it into what I needed it for.
Runs consistent.
Is easy to program if you know how to program as its open source.
Free to use and download.

Not sure what else to say. Well I guess I would not recommend it to someone who was just looking for a program to download click run and leave it be. Like I said its only as good as you make it.

Name: Anonymous 2010-10-01 18:28

iptables, but I really use it only to protect myself from too many request in a short time to prevent ssh hacks.

Name: Anonymous 2010-10-01 18:35

For iptables.
What sort of CPU does it use when operating?

It has the ability to monitor a connections state and redirect it, change and stop data packets based on the state. Is this on just the source or destination packet data content to?

Name: Anonymous 2010-10-01 18:51

BSD's ipf > *

Name: Anonymous 2010-10-01 18:53

I'm not sure what you are saying about ssh hacks but.

If you want to learn how to tunnel through ssh look here:
http://www.plenz.com/tunnel-everything

Name: Anonymous 2010-10-01 18:53

I'm not sure what you are saying about ssh hacks but.

If you want to learn how to tunnel through ssh look here:
http://www.plenz.com/tunnel-everything

Name: Anonymous 2010-10-01 23:06

I use iptables to block the whole Internet for my user that uses wine to run games from inferior OS on my Linux. That's why I'm not afraid to run *.exe from /b/ itself.

Name: Anonymous 2010-10-01 23:24

I'm not sure what you are saying about ssh hacks but.

If you want to learn how to tunnel through ssh look here:
http://www.plenz.com/tunnel-everything

Name: Anonymous 2010-10-02 0:56

>>11
IHBT

Name: Anonymous 2010-10-02 19:05

Why is someone just reposting the stuff I said?

Any particular reason?

Name: Anonymous 2010-10-02 19:17

Why is someone just reposting the stuff I said?

Any particular reason?

Name: Anonymous 2010-10-02 19:25

lol thanks

Name: sage 2010-10-02 19:26

GDS-1008D

Name: Anonymous 2010-10-02 19:27

Name: Anonymous 2010-10-02 20:00

Apparently we're /comp/ now.

Name: Anonymous 2010-10-02 21:32

>>11
because it's not like a program can't start another process, or delete files, or create files...even when running in wine...

Name: Anonymous 2010-10-15 5:35

>>20 What do you use then?

Name: Anonymous 2010-10-15 6:11

>>21
my anus

Name: Anonymous 2010-10-15 18:14

>>21
I'm not sure if I was >>20 or not, but I remember reading this thread.  as far as I know, a process in wine can still make a regular syscall (Linux, or whatever the host OS running wine is) if it knows it's running in wine, and it can try to exploit any vulnerability in wine (if one is known) to try to break out of the virtualized file system.

Name: Anonymous 2010-12-23 1:23


Don't change these.
Name: Email:
Entire Thread Thread List