Reply to Re: Fake Files, a confirmed source.....

Your name:

Reply:


Posted by speeder on 09/08/05 03:20

On Wed, 7 Sep 2005 09:08:13 -0500, "FeMaster" <FeMaster @ hotmail .
com> wrote:

>What is it that we are using to block these IP addresses? Are they just
>being tossed into a users software firewall, router, other program?? Would
>like to participate, but want to be sure that I am setting things up
>correctly...
>
>Thanks
>

Yes, you can do it in a number of ways. With firewalls, in p2p apps,
using specific programs and even in your router. Depending on the
number of IPs you want to block and the flexibility you want to manage
them, one or the other would be indicated.

These two specific programs are widely used by p2p enthusiasts:

Peerguardian
http://methlabs.org/projects/

Protowall
http://www.bluetack.co.uk/index.php

They provide lists with millions of chartered anti-p2p IPs. They are
also an interesting layer in your security setup against spyware,
trojans and other crap.

[Back to original message]


Удаленная работа для программистов  •  Как заработать на Google AdSense  •  статьи на английском  •  England, UK  •  PHP MySQL CMS Apache Oscommerce  •  Online Business Knowledge Base  •  IT news, forums, messages
Home  •  Search  •  Site Map  •  Set as Homepage  •  Add to Favourites
Разработано в студии "Webous"