1 |
On 18/01/20 17:45, n952162 wrote: |
2 |
> What protocol doesn't use acknowledgements? |
3 |
> |
4 |
Why would an eavesdropper want to acknowledge ANYTHING? Isn't that the |
5 |
whole point? |
6 |
|
7 |
Cheers, |
8 |
Wol |
9 |
> |
10 |
> On 2020-01-18 14:50, Wols Lists wrote: |
11 |
>> On 16/01/20 21:01, james wrote: |
12 |
>>> On 1/13/20 3:24 AM, n952162 wrote: |
13 |
>>>> On 2020-01-12 16:48, james wrote: |
14 |
>>>>> I also install and re-install, as many of the gentoo systems get |
15 |
>>>>> "attacked" before I can� complete a secure install, or the hackers |
16 |
>>>>> just read much more than I do. |
17 |
>>>>> I guess I'm still popular, in very negative way. |
18 |
>>>> |
19 |
>>>> Hmmm.� Is that "attacked" to be interpreted in some sort of |
20 |
>>>> metaphorical |
21 |
>>>> way or do you mean really hacked over the internet? May I ask how, and |
22 |
>>>> how do you know?� What's involved in a secure install? |
23 |
>>> |
24 |
>>> Monitor your connection, with a system setup that the ethernet does not |
25 |
>>> responds to any sort of request. The system just collects and log. NO, |
26 |
>>> I'm not documenting how to do this, but various ways exist, documented |
27 |
>>> on the internet to make *most* ethernet interface to where they are |
28 |
>>> *one-direction* only. HOW you achieve this? There are a myriad of ways. |
29 |
>>> |
30 |
>>> Good Hunting and *never* tell anyone how *you* do this.... |
31 |
>>> |
32 |
>> If you're handy with an ethernet crimping tool, just cut the TX wires |
33 |
>> and put the interface into promiscuous mode ... |
34 |
>> |
35 |
>> Just be aware that - routers especially - can swap TX and RX so they |
36 |
>> could possibly get round that. |
37 |
>> |
38 |
>> Cheers, |
39 |
>> Wol |
40 |
>> |
41 |
>> |
42 |
> |
43 |
> |