background preloader


Facebook Twitter

LuaSocket: Network support for the Lua language. What is LuaSocket?

LuaSocket: Network support for the Lua language

LuaSocket is a Lua extension library that is composed by two parts: a C core that provides support for the TCP and UDP transport layers, and a set of Lua modules that add support for functionality commonly needed by applications that deal with the Internet. The core support has been implemented so that it is both efficient and simple to use. It is available to any Lua application once it has been properly initialized by the interpreter in use. The code has been tested and runs well on several Windows and Unix platforms. Among the support modules, the most commonly used implement the SMTP (sending e-mails), HTTP (WWW access) and FTP (uploading and downloading files) client protocols.

The library is available under the same terms and conditions as the Lua language, the MIT license. Copyright © 2004-2007 Diego Nehab. Download LuaSocket version 2.0.2 is now available for download! The library can be downloaded in source code from the LuaSocket project page at LuaForge. LuaSocket: Index to reference manual. How to bypass strict firewalls on public wifi hotspots and restr. Public wifi hotspots and restricted internet access More and more, you can find public wireless hotspots, in cities, train stations, airports... and even some public hotspots that are available with a subscription, accessible through a web login form.

How to bypass strict firewalls on public wifi hotspots and restr

The thing is, most of the time, these hospots will have a reduced connectivity. Only some ports and protocols will be allowed. For instance, you may be restricted to HTTP, HTTPS, POP and SMTP. Not the best combination when one primarily uses SSH! This also applies to protected networks, such as libraries, schools and office environments, where your access to Internet is limited, and some ports and protocols are blocked. I will explain here two different solutions to break free of these restrictions: SSH tunneling and SOCKS servers. What do we need? You do need the following: HTTPS access through the firewall. You may want to use a free shell provider such as SilenceIsDefeat as your server, but make sure you can access SSH through port 443. Upside-Down-Ternet.

My neighbours are stealing my wireless internet access.


I could encrypt it or alternately I could have fun. I'm starting here by splitting the network into two parts, the trusted half and the untrusted half. The trusted half has one netblock, the untrusted a different netblock. We use the DHCP server to identify mac addresses to give out the relevant addresses. /etc/dhcpd.conf IPtables is Fun! Suddenly everything is kittens! Is your firewall spying on you? IT'S OBVIOUS, REALLY, that the best way of penetrating users' PCs to see what they get up to online would be to become a Firewall maker.

Is your firewall spying on you?

Like, when I wanted a Firewall and was too tight to pay for one, I turned to Checkpoint's little freebie Zone Alarm. It sits there between you and the Internet and lets you know when someone's trying to sneak in through your backdoor or when a program you're running tries to connect to the Web for no apparent reason. When you're as techie as me - not very - you just have to trust it. Of course, Checkpoint's an Israeli company and as a foreign journalist working in Israel you know the hyperactive security services here would like to keep tabs on you.

And you know that they do. It's part of the game - like the airport interrogation, or the surreptitious copying of your notepad while you're off having a body search. S Guide. Small Business Forum and Entrepreneur Networking at StartupNatio.