User Controls
I've come to appreciate Finny over the years.
-
2019-02-20 at 6:59 AM UTCYou can get banned on vespiary for spelling and grammar mistakes.
-
2019-02-20 at 7:03 AM UTC
Originally posted by Ghost You can get banned on vespiary for spelling and grammar mistakes.
That's a bit excessive. But I have never went into a thread about, say, reductive methylation, only to see a bunch of pics of Bill Krozby's cock.
Whatever they're doing, IMO, they're doing it right.
At least, when it comes to topical subforums.
The rest of the site is a bit trickier.
By all means, though, give finny a quarantined set of subforums to fuck around in, I don't care. But all the topical subforums need order, and SG... It should have order, but the occasional silly post is okay. Not in every thread (as finny did). -
2019-02-20 at 7:24 AM UTCI like the idea of exponentially increasing bans up to 1 year length + only allowed to post in the mongolvoid but it's too late for any of that.
Lanny changed his ban from 99 years to 1 year. He's doing the same thing he did to me where the 1 year ban stays and no new infractions are added for the spamming. The only difference is you used to be able to delete your account after 4 months of age so you could 'erase' your ban by just deleting the account and making sleeper cell alts but you would be forced to give up your name permanently like I did. -
2019-02-20 at 8:06 AM UTC
Originally posted by gadzooks And it's seriously never occurred to you that shit like that is maybe WHAT INDUCED that radicalization?
no, ban is.
when lanny banned me the other day i have this sudden urge to front page flush with my my dick head pict.
bans radicalize posters and the only thing that saved you all from my dickhead was my inherent lazyness. -
2019-02-20 at 8:20 AM UTCThat's why you make your spam posts in notepad months early and set up all the alts so they have no captcha and over 30 posts so all you do come Dday is ctrl+v and go through your list of alts.
Preparation is key and coming up with funny alts is always fun. They can be utilized for good or evil. -
2019-02-20 at 8:23 AM UTCthats a lot of repetitive work.
-
2019-02-20 at 8:27 AM UTCPressing ctrl+v?
-
2019-02-20 at 8:30 AM UTCyea.
-
2019-02-20 at 8:35 AM UTCYou really are lazy. Get a water bird
-
2019-02-20 at 8:38 AM UTCyes, lazyness is a type of disability.
-
2019-02-20 at 4:01 PM UTCDisability is a type of retardation
-
2019-02-20 at 4:13 PM UTCWhat works best is CGI proxies. They're free and plentiful. Many of them have rotating IP addresses, where every connection you make gets a new IP, often from a different country, so the only way you can be pinpointed is by the fingerprint identifiers from the browser and device you are using.
https://en.wikipedia.org/wiki/Device_fingerprint
Active vs passive collection
Fingerprinting methods range from passive to active. Passive fingerprinting refers to techniques which do not involve the obvious querying of the client machine. These methods rely upon precise classification of such factors as the client's TCP/IP configuration, OS fingerprint, IEEE 802.11 (wireless) settings, and hardware clock skew. Active fingerprinting assumes the client will tolerate some degree of invasive querying. The most active method is installation of executable code directly on the client machine. Such code may have access to attributes not typically available by other means, such as the MAC address, or other unique serial numbers assigned to the machine hardware. Such data is useful for fingerprinting by programs that employ digital rights management.
OSI model fingerprints
Passive collection of device attributes below the web-browser layer may occur at several OSI model layers. In normal operation, various network protocols transmit or broadcast packets or headers from which one may infer client configuration parameters. Sorted by layer, some examples of such protocols are:
OSI Layer 7: SMB, FTP, HTTP, Telnet, TLS/SSL, DHCP
OSI Layer 5: SNMP, NetBIOS
OSI Layer 4: TCP (see TCP/IP stack fingerprinting)
OSI Layer 3: IPv4, IPv6, ICMP, IEEE 802.11
OSI Layer 2: CDP -
2019-02-20 at 4:20 PM UTCCan you even connect here using a CGI proxy?
-
2019-02-20 at 4:45 PM UTCOf course. Another excellent avenue is SOCKS4/5 proxies. They, too, can be configured to cycle through rotating IP addresses, although browser identifiers would have to be spoofed, which is very easily accomplished.
http://fastproxyservers.org/socks5-servers.htm -
2019-02-20 at 6:16 PM UTCTCP/IP stack fingerprinting is the passive collection of configuration attributes from a remote device during standard layer 4 network communications. The combination of parameters may then be used to infer the remote machine's operating system (aka, OS fingerprinting), or incorporated into a device fingerprint.
Certain parameters within the TCP protocol definition are left up to the implementation. Different operating systems, and different versions of the same operating system, set different defaults for these values. By collecting and examining these values, one may differentiate among various operating systems, and implementations of TCP/IP. The TCP/IP fields that may vary include the following:
Initial packet size (16 bits)
Initial TTL (8 bits)
Window size (16 bits)
Max segment size (16 bits)
Window scaling value (8 bits)
"don't fragment" flag (1 bit)
"sackOK" flag (1 bit)
"nop" flag (1 bit)
These values may be combined to form a 67-bit signature, or fingerprint, for the target machine. Just inspecting the Initial TTL and window size fields is often enough in order to successfully identify an operating system, which eases the task of performing manual OS fingerprinting.
https://en.wikipedia.org/wiki/TCP/IP_stack_fingerprinting -
2019-02-20 at 6:24 PM UTCi wonder what mechanism cloudflare is employing now that it asks you to wait for 5 seconds while they check for something before letting you thru.
-
2019-02-20 at 6:37 PM UTCWhat they basically do is run some shellcode on you when you connect through standard HTTP, which creates a shell within your system they can then launch from. Then they delete everything and you're none the wiser. All of this occurs in seconds. The best way to defeat this is to use a rule-based firewall which can also handle process control. If the attacker attempts to start a process, the rule detects it and blocks it, however, if you don't approve it, you will not be able to make the connection properly.
-
2019-02-20 at 6:53 PM UTC
Originally posted by -SpectraL What they basically do is run some shellcode on you when you connect through standard HTTP, which creates a shell within your system they can then launch from. Then they delete everything and you're none the wiser. All of this occurs in seconds. The best way to defeat this is to use a rule-based firewall which can also handle process control. If the attacker attempts to start a process, the rule detects it and blocks it, however, if you don't approve it, you will not be able to make the connection properly.
so in short, we're raped irregsrdless ? -
2019-02-20 at 7:03 PM UTC
Originally posted by vindicktive vinny so in short, we're raped irregsrdless ?
If you are allowing all two-way traffic on an TCP-IP port, then that's a given risk right there. Legitimate companies are now using shellcode to compromise your device to hijack your CPU to mine bitcoin. Nothing is sacred these days, because there's really no solid legal restrictions in place. -
2019-02-20 at 7:23 PM UTC
Originally posted by -SpectraL If you are allowing all two-way traffic on an TCP-IP port, then that's a given risk right there. Legitimate companies are now using shellcode to compromise your device to hijack your CPU to mine bitcoin. Nothing is sacred these days, because there's really no solid legal restrictions in place.
is lanny running shellcodes on our machines ?