User Controls

I've come to appreciate Finny over the years.

  1. Ghost Black Hole
    You can get banned on vespiary for spelling and grammar mistakes.
  2. gadzooks Dark Matter [keratinize my mild-tasting blossoming]
    Originally posted by Ghost You can get banned on vespiary for spelling and grammar mistakes.

    That's a bit excessive. But I have never went into a thread about, say, reductive methylation, only to see a bunch of pics of Bill Krozby's cock.

    Whatever they're doing, IMO, they're doing it right.

    At least, when it comes to topical subforums.

    The rest of the site is a bit trickier.

    By all means, though, give finny a quarantined set of subforums to fuck around in, I don't care. But all the topical subforums need order, and SG... It should have order, but the occasional silly post is okay. Not in every thread (as finny did).
  3. Ghost Black Hole
    I like the idea of exponentially increasing bans up to 1 year length + only allowed to post in the mongolvoid but it's too late for any of that.

    Lanny changed his ban from 99 years to 1 year. He's doing the same thing he did to me where the 1 year ban stays and no new infractions are added for the spamming. The only difference is you used to be able to delete your account after 4 months of age so you could 'erase' your ban by just deleting the account and making sleeper cell alts but you would be forced to give up your name permanently like I did.
  4. Originally posted by gadzooks And it's seriously never occurred to you that shit like that is maybe WHAT INDUCED that radicalization?

    no, ban is.

    when lanny banned me the other day i have this sudden urge to front page flush with my my dick head pict.

    bans radicalize posters and the only thing that saved you all from my dickhead was my inherent lazyness.
  5. Ghost Black Hole
    That's why you make your spam posts in notepad months early and set up all the alts so they have no captcha and over 30 posts so all you do come Dday is ctrl+v and go through your list of alts.

    Preparation is key and coming up with funny alts is always fun. They can be utilized for good or evil.
  6. thats a lot of repetitive work.
  7. Ghost Black Hole
    Pressing ctrl+v?
  8. yea.
  9. Ghost Black Hole
    You really are lazy. Get a water bird
  10. yes, lazyness is a type of disability.
  11. Ghost Black Hole
    Disability is a type of retardation
  12. -SpectraL coward [the spuriously bluish-lilac bushman]
    What works best is CGI proxies. They're free and plentiful. Many of them have rotating IP addresses, where every connection you make gets a new IP, often from a different country, so the only way you can be pinpointed is by the fingerprint identifiers from the browser and device you are using.

    https://en.wikipedia.org/wiki/Device_fingerprint

    Active vs passive collection

    Fingerprinting methods range from passive to active. Passive fingerprinting refers to techniques which do not involve the obvious querying of the client machine. These methods rely upon precise classification of such factors as the client's TCP/IP configuration, OS fingerprint, IEEE 802.11 (wireless) settings, and hardware clock skew. Active fingerprinting assumes the client will tolerate some degree of invasive querying. The most active method is installation of executable code directly on the client machine. Such code may have access to attributes not typically available by other means, such as the MAC address, or other unique serial numbers assigned to the machine hardware. Such data is useful for fingerprinting by programs that employ digital rights management.

    OSI model fingerprints

    Passive collection of device attributes below the web-browser layer may occur at several OSI model layers. In normal operation, various network protocols transmit or broadcast packets or headers from which one may infer client configuration parameters. Sorted by layer, some examples of such protocols are:

    OSI Layer 7: SMB, FTP, HTTP, Telnet, TLS/SSL, DHCP
    OSI Layer 5: SNMP, NetBIOS
    OSI Layer 4: TCP (see TCP/IP stack fingerprinting)
    OSI Layer 3: IPv4, IPv6, ICMP, IEEE 802.11
    OSI Layer 2: CDP
  13. Soyboy V: A Cat-Girl/Boy Under Every Bed African Astronaut [my no haunted nonbeing]
    Can you even connect here using a CGI proxy?
  14. -SpectraL coward [the spuriously bluish-lilac bushman]
    Of course. Another excellent avenue is SOCKS4/5 proxies. They, too, can be configured to cycle through rotating IP addresses, although browser identifiers would have to be spoofed, which is very easily accomplished.

    http://fastproxyservers.org/socks5-servers.htm
  15. -SpectraL coward [the spuriously bluish-lilac bushman]
    TCP/IP stack fingerprinting is the passive collection of configuration attributes from a remote device during standard layer 4 network communications. The combination of parameters may then be used to infer the remote machine's operating system (aka, OS fingerprinting), or incorporated into a device fingerprint.

    Certain parameters within the TCP protocol definition are left up to the implementation. Different operating systems, and different versions of the same operating system, set different defaults for these values. By collecting and examining these values, one may differentiate among various operating systems, and implementations of TCP/IP. The TCP/IP fields that may vary include the following:

    Initial packet size (16 bits)
    Initial TTL (8 bits)
    Window size (16 bits)
    Max segment size (16 bits)
    Window scaling value (8 bits)
    "don't fragment" flag (1 bit)
    "sackOK" flag (1 bit)
    "nop" flag (1 bit)

    These values may be combined to form a 67-bit signature, or fingerprint, for the target machine. Just inspecting the Initial TTL and window size fields is often enough in order to successfully identify an operating system, which eases the task of performing manual OS fingerprinting.

    https://en.wikipedia.org/wiki/TCP/IP_stack_fingerprinting
  16. i wonder what mechanism cloudflare is employing now that it asks you to wait for 5 seconds while they check for something before letting you thru.
  17. -SpectraL coward [the spuriously bluish-lilac bushman]
    What they basically do is run some shellcode on you when you connect through standard HTTP, which creates a shell within your system they can then launch from. Then they delete everything and you're none the wiser. All of this occurs in seconds. The best way to defeat this is to use a rule-based firewall which can also handle process control. If the attacker attempts to start a process, the rule detects it and blocks it, however, if you don't approve it, you will not be able to make the connection properly.
  18. Originally posted by -SpectraL What they basically do is run some shellcode on you when you connect through standard HTTP, which creates a shell within your system they can then launch from. Then they delete everything and you're none the wiser. All of this occurs in seconds. The best way to defeat this is to use a rule-based firewall which can also handle process control. If the attacker attempts to start a process, the rule detects it and blocks it, however, if you don't approve it, you will not be able to make the connection properly.

    so in short, we're raped irregsrdless ?
  19. -SpectraL coward [the spuriously bluish-lilac bushman]
    Originally posted by vindicktive vinny so in short, we're raped irregsrdless ?

    If you are allowing all two-way traffic on an TCP-IP port, then that's a given risk right there. Legitimate companies are now using shellcode to compromise your device to hijack your CPU to mine bitcoin. Nothing is sacred these days, because there's really no solid legal restrictions in place.
  20. Originally posted by -SpectraL If you are allowing all two-way traffic on an TCP-IP port, then that's a given risk right there. Legitimate companies are now using shellcode to compromise your device to hijack your CPU to mine bitcoin. Nothing is sacred these days, because there's really no solid legal restrictions in place.

    is lanny running shellcodes on our machines ?
Jump to Top