You are here: Re: Does WinMX now filter out ??AA spoofers? « Winmx MP3 « DVD MP3 AVI MP4 players codecs conversion help
Re: Does WinMX now filter out ??AA spoofers?

Posted by -Angela- on 10/18/35 11:29

On Sat, 15 Oct 2005 18:54:23 -0700, "DB_Story" <DB_Story@att.net>
wrote:

>Just wondered if the new WinMX peer cache system is filtering out and not
>allowing Blocklist.org sites from connecting to the network. Would be great
>if they did.
>

From someone very close and dear to me that knows a bit about these
things with the words "take it or leave it." (I don't know why he said
that)

Concerning only Primary connections:
The flooders only use the peer cache servers to find new primary
connections to add to their existing database. They don't need the
servers to connect to you if you are already on their list.
It's hard to keep track of what patch or DLL is doing what anymore.
How well do your trust something you cannot see or verify? It's only
about $4000 to settle with RIAA if they file suit against you, and
about $10,000 to $20,000 plus legal expenses if you fight and lose.
Better to have a firewall that you can see working, or just share
nothing at all and be a supernode server (Fast Primary connection with
Max. allocated bandwidth for WinMX to use).
Get a real firewall (Not Norton) and add these as incomming TCP
connection blockers. If your firewall allows IN/OUT blocking, use that
setting. Give each whatever name you like, they are all bad guys.
They (RIAA robots) will still be able to search for, and browse you,
but that is tedious and very time consumming. They'd rather just
connect to you as their primary, auto-browse you, log your shares, and
file papers on you later. It's all so automatic. To rely on a DLL to
protect you is a bit like Russian roulette- where's the block, where's
the bullet? or is it even there at all? Maybe the gun's fully loaded.

38.113.214.0 - 38.113.214.255
38.119.64.0 - 38.119.64.255

63.216.0.0 - 63.223.255.255

64.105.76.207
64.248.57.132

66.134.249.226
66.166.198.203

67.101.77.191

68.165.91.118

70.51.124.42

72.35.224.0 - 72.35.224.255

81.151.195.148
81.156.180.20
81.158.1.0 - 81.158.250.176
81.158.253.172

82.48.0.0 - 82.63.255.255

86.134.204.87

88.104.0.0 - 88.111.255.255
88.111.21.0 - 88.111.21.255

204.9.116.0 - 204.9.119.255
204.193.128.0 - 204.193.159.255

209.10.143.0 - 209.10.143.255
209.11.134.0 - 209.11.134.255
209.12.22.0 - 209.12.22.255
209.195.1.0 - 209.195.1.255
209.195.58.0 - 209.195.58.255

212.71.224.0 - 212.71.255.255

213.52.128.0 - 213.52.255.255
213.219.9.192 - 213.219.9.255

216.133.221.198
216.151.128.0 - 216.151.159.255



==========================
213.219.9.197 is the most agressive of all.
(Globix/X-works) over 3,000 attempts/day here.

 

Navigation:

[Reply to this message]


Удаленная работа для программистов  •  Как заработать на Google AdSense  •  статьи на английском  •  England, UK  •  PHP MySQL CMS Apache Oscommerce  •  Online Business Knowledge Base  •  IT news, forums, messages
Home  •  Search  •  Site Map  •  Set as Homepage  •  Add to Favourites
Разработано в студии "Webous"