background preloader

Socket

Facebook Twitter

LuaSocket: Network support for the Lua language. What is LuaSocket? LuaSocket is a Lua extension library that is composed by two parts: a C core that provides support for the TCP and UDP transport layers, and a set of Lua modules that add support for functionality commonly needed by applications that deal with the Internet. The core support has been implemented so that it is both efficient and simple to use. It is available to any Lua application once it has been properly initialized by the interpreter in use. The code has been tested and runs well on several Windows and Unix platforms.

Among the support modules, the most commonly used implement the SMTP (sending e-mails), HTTP (WWW access) and FTP (uploading and downloading files) client protocols. The library is available under the same terms and conditions as the Lua language, the MIT license. Copyright © 2004-2007 Diego Nehab. Download LuaSocket version 2.0.2 is now available for download! The library can be downloaded in source code from the LuaSocket project page at LuaForge. LuaSocket: Index to reference manual. How to bypass strict firewalls on public wifi hotspots and restr. Public wifi hotspots and restricted internet access More and more, you can find public wireless hotspots, in cities, train stations, airports... and even some public hotspots that are available with a subscription, accessible through a web login form.

The thing is, most of the time, these hospots will have a reduced connectivity. Only some ports and protocols will be allowed. For instance, you may be restricted to HTTP, HTTPS, POP and SMTP. This also applies to protected networks, such as libraries, schools and office environments, where your access to Internet is limited, and some ports and protocols are blocked. I will explain here two different solutions to break free of these restrictions: SSH tunneling and SOCKS servers. What do we need? You do need the following: HTTPS access through the firewall. You may want to use a free shell provider such as SilenceIsDefeat as your server, but make sure you can access SSH through port 443. How does it work? Before we start Listen 443 SSH tunneling. Upside-Down-Ternet.

My neighbours are stealing my wireless internet access. I could encrypt it or alternately I could have fun. I'm starting here by splitting the network into two parts, the trusted half and the untrusted half. The trusted half has one netblock, the untrusted a different netblock. We use the DHCP server to identify mac addresses to give out the relevant addresses. /etc/dhcpd.conf IPtables is Fun! Suddenly everything is kittens! /sbin/iptables -A PREROUTING -s 192.168.0.0/255.255.255.0 -p tcp -j DNAT --to-destination 64.111.96.38 For the uninitiated, this redirects all traffic to kittenwar. For more fun, we set iptables to forward everything to a transparent squid proxy running on port 80 on the machine.

/sbin/iptables -A PREROUTING -s 192.168.0.0/255.255.255.0 -p tcp -m tcp --dport 80 -j DNAT --to-destination 192.168.0.1 That machine runs squid with a trivial redirector that downloads images, uses mogrify to turn them upside down and serves them out of its local webserver. The redirection script. Is your firewall spying on you? IT'S OBVIOUS, REALLY, that the best way of penetrating users' PCs to see what they get up to online would be to become a Firewall maker. Like, when I wanted a Firewall and was too tight to pay for one, I turned to Checkpoint's little freebie Zone Alarm. It sits there between you and the Internet and lets you know when someone's trying to sneak in through your backdoor or when a program you're running tries to connect to the Web for no apparent reason. When you're as techie as me - not very - you just have to trust it.

Of course, Checkpoint's an Israeli company and as a foreign journalist working in Israel you know the hyperactive security services here would like to keep tabs on you. And you know that they do. It has been confirmed to me by a security sources here that mobile phone conversations I have had have been listened to - and in circumstances which I won't reveal, the contents of a call I have been involved in have actually been relayed back to me. S Guide. Beej's Guide to Unix Interprocess Communication Now that you have extra-process communication going on with sockets, why not try your hand at some interprocess communication, eh? Shared memory, semaphores, signals, and memory mapped files await you! Beej's Guide to C [rough draft] This is a bit of a practice book for later when I write a real book.

Since I know C more like the back of my hand than any other language, it's a good place to start (because I don't need many references to write it!) Keep in mind that this is completely incomplete right now, and I haven't even read most of what I've written. Some of it is Just Plain Wrong. So if you see errors of any kind, and there are a lot of them, feel free to drop me a line so I can fix them. Beej's Guide to the GNU Debugger (GDB) This is a quick introduction to using GDB, GNU's famous debugger, from the command line. Beej's Guide to Photography I take photos for fun and maybe even profit (from time to time). Small Business Forum and Entrepreneur Networking at StartupNatio.