|
Posted by FinnTroll on 10/09/05 15:47
"Hammerer" <hammerer@hotmail.com> skrev i meddelandet
news:43491fde$0$49010$14726298@news.sunsite.dk...
>
> "George Hester" <hesterloli@hotmail.com> wrote in message
> news:X372f.33480$K91.13584@twister.nyroc.rr.com...
>>
>> "FinnTroll" <yab@roll.uc> wrote in message
>> news:rL42f.147996$dP1.505605@newsc.telia.net...
>>
>> > I mean, we've been discussing different methods that the
>> > RIAA uses to affect the WinMX communion and maybe
>> > that by keeping these videos in my share I can be able to
>> > sort of out those RIAA and put their IP in the "hall of shame"-hosts
> file :-)
>> >
>>
>> Not sure what you mean by the "hall of shame"-hosts file.
>> The hosts is a redirector that is used only when you fire up
>> the client and connect or lose your host. After that it is not used.
>>
>
> Yes, George. But it's used when, as you say, you fire up the client and
> connect. What Finntroll is saying is that he could theoretically enter any
> offending IP's into his Hosts file and presumably redirect them to 127.0.0.1
> (the localhost) so that the next time he connects THEY wouldn't be able to.
> To be honest, he'd be better off using PeerGuardian, or entering them
> directly into his firewall. Of course, there's always anti-leeching tools.
> Hi, George!
>
thx Hammerer ... you explained my line of thoughts alot better than I could. Your
suggestion on the other ways sounds like they would be easier to do though. I
don't use PG, but feeding the routers firewall with the bad IP's sounds like a
solution. I will check into that.
Navigation:
[Reply to this message]
|