|
Posted by -Angela- on 10/18/35 11:29
On Sat, 15 Oct 2005 18:54:23 -0700, "DB_Story" <DB_Story@att.net>
wrote:
>Just wondered if the new WinMX peer cache system is filtering out and not
>allowing Blocklist.org sites from connecting to the network. Would be great
>if they did.
>
From someone very close and dear to me that knows a bit about these
things with the words "take it or leave it." (I don't know why he said
that)
Concerning only Primary connections:
The flooders only use the peer cache servers to find new primary
connections to add to their existing database. They don't need the
servers to connect to you if you are already on their list.
It's hard to keep track of what patch or DLL is doing what anymore.
How well do your trust something you cannot see or verify? It's only
about $4000 to settle with RIAA if they file suit against you, and
about $10,000 to $20,000 plus legal expenses if you fight and lose.
Better to have a firewall that you can see working, or just share
nothing at all and be a supernode server (Fast Primary connection with
Max. allocated bandwidth for WinMX to use).
Get a real firewall (Not Norton) and add these as incomming TCP
connection blockers. If your firewall allows IN/OUT blocking, use that
setting. Give each whatever name you like, they are all bad guys.
They (RIAA robots) will still be able to search for, and browse you,
but that is tedious and very time consumming. They'd rather just
connect to you as their primary, auto-browse you, log your shares, and
file papers on you later. It's all so automatic. To rely on a DLL to
protect you is a bit like Russian roulette- where's the block, where's
the bullet? or is it even there at all? Maybe the gun's fully loaded.
38.113.214.0 - 38.113.214.255
38.119.64.0 - 38.119.64.255
63.216.0.0 - 63.223.255.255
64.105.76.207
64.248.57.132
66.134.249.226
66.166.198.203
67.101.77.191
68.165.91.118
70.51.124.42
72.35.224.0 - 72.35.224.255
81.151.195.148
81.156.180.20
81.158.1.0 - 81.158.250.176
81.158.253.172
82.48.0.0 - 82.63.255.255
86.134.204.87
88.104.0.0 - 88.111.255.255
88.111.21.0 - 88.111.21.255
204.9.116.0 - 204.9.119.255
204.193.128.0 - 204.193.159.255
209.10.143.0 - 209.10.143.255
209.11.134.0 - 209.11.134.255
209.12.22.0 - 209.12.22.255
209.195.1.0 - 209.195.1.255
209.195.58.0 - 209.195.58.255
212.71.224.0 - 212.71.255.255
213.52.128.0 - 213.52.255.255
213.219.9.192 - 213.219.9.255
216.133.221.198
216.151.128.0 - 216.151.159.255
==========================
213.219.9.197 is the most agressive of all.
(Globix/X-works) over 3,000 attempts/day here.
Navigation:
[Reply to this message]
|