Forgot your password?
typodupeerror

Comment: Re:Misguided Intentions (Score 1) 419

by phyrexianshaw.ca (#36501758) Attached to: LulzSec Teams With Anonymous, In Operation AntiSec

When a bank gets robbed do you blame the police or the bank?

That depends strongly on what you mean by "robbed". when someone walks in with a gun and demands the bank put cash in their hand, we can all see who's at fault.

When that same bank robs people of their money and dumps all it's stored value into other markets, and just starts telling the Gov't that it "needs more money due to over-lending": people don't currently know who to blame.

People need to realize that "robbers" are on both sides of the counter.

Comment: Re:I don't see Linksys as core equipment. (Score 1) 380

by phyrexianshaw.ca (#35178504) Attached to: Cisco Linksys Routers Still Don't Support IPv6
- Load balancing two internet connections without any cooperation from the ISPs.
technically speaking, two routers with two public IP's, each with half the office behind them each is "load balancing". if you don't want a cheep hack form of load balancing (where connections are handled properly based on line load) talk to your ISP. they're happy to help.

- Making example.com:21 and example.com:80 be separate servers.
(in the cisco world) create an ACL patching each port, and set them on a route-map with the next-hop being the server(s) in question.

Conversely, making example.com:80 and example1.com:80 be one server while example.com:21 and example1.com:21 are another server.
EASY to do with a load balancer. (though many will say it's basically the same thing.)

- Transparent proxies.
already covered in the comments above. your router can easily move flows of TCP port 80 traffic to another destination.

Comment: Re:I don't see Linksys as core equipment. (Score 1) 380

by phyrexianshaw.ca (#35178360) Attached to: Cisco Linksys Routers Still Don't Support IPv6

So, how do I get transparent proxy without NAT? I need to somehow redirect the packet to the computer where the proxy software is running.

uhhhh, easy? either just forward the HTTP flows (either by just rerouting port 80 traffic, or through packet inspection) to a different host at your gateway, or transparent proxy after your gateway?

it blows my mind that people don't understand the basic idea of routing. your traffic originates from an IP, and flows where it's told it can flow. if it needs to leave the layer 2 segment, it sends the traffic to it's default gateway and awaits the return data.

any router worth it's power requirement should be able to route traffic. tell the router what internal addresses get routed where and bam!, you're done.

Comment: Re:Uh, no (Score 1) 815

by phyrexianshaw.ca (#34985152) Attached to: Italian Scientists Demonstrate Cold Fusion?
This is no different then coal, lumber, hydro, or any other form of power generation. you're saying that if you take a material that has a huge amount of potential energy and cause it to undergo a reaction that consumes that fuel, it can perform work.

in your lighter example, give me a functional use of the process. in any long term reaction, you'll eventually run out of fuel and have to start using the energy you released to bind new fuel at a net loss.

thus, you can only release as much energy as you put into a system, but likely you only get a portion of that energy while your process itself consumes a portion.

Comment: Re:Downsample..... (Score 1) 680

by phyrexianshaw.ca (#34945788) Attached to: How Do You Store Your Personal Photos?
Uhhh, last time I checked standard print density stated that a 2560X1920 image (or 5MP) can be printed to a minimum level of acceptable print detail in larger wall sizes at 175DPI.

10"x14" is not at all 30"x40".

Being somebody who captures images in a variety of forms, and produces final products from those images: 5MP is not sufficient for any semi-professional blowups. that's completely not to mention some of the interesting+useful crops you can take from those images years later after you've looked at them every night.

Comment: Re:Hmm... (Score 1) 306

by phyrexianshaw.ca (#34945506) Attached to: Facebook Images To Get Expiration Date
This!

I've worked for a number of people in my life: and I've told the ones who would reject an employee based on their youth that happen to be available on the internet to go fuck themselves.

I'm happy to take a pay cut if it'll change somebodies bad habits. I'm sick and tired of the constant attempts to prevent kids from having fun. Just because you never got to go to parties and get drunk with friends is not a valid reason to not hire people that did.

Comment: Re:Thank God.... (Score 1) 265

by phyrexianshaw.ca (#34942770) Attached to: Cybercriminals Shifting Focus To Non-Windows OSes
The point is that a LARGE portion of the world runs on linux. whether it be the embedded software running in your router, or the cache server you're pulling data from at this moment.

Linux is everywhere: the reason people don't bother exploiting it is because it's so easy to sandbox a machine and see exactly what's going on from userspace all the way to kernel land.
once you know how an attack works, it's easy to fix the issue. In the open source world, patches/fixes can be released/deployed in minutes/hours, rather then weeks/months.

The difference is not that there ARE NOT EXPLOITS, the key is that anyone can fix them.

One of the key's in what makes people target desktop users is the old saying "attack what has value". The PCN transaction machines in most major networks contain a LOT more value then the likely-already-maxed-credit-cards of most end users.

It's a poor workman who blames his tools.

Working...