LuaSocket: Network support for the Lua language. What is LuaSocket?
LuaSocket is a Lua extension library that is composed by two parts: a C core that provides support for the TCP and UDP transport layers, and a set of Lua modules that add support for functionality commonly needed by applications that deal with the Internet. The core support has been implemented so that it is both efficient and simple to use. It is available to any Lua application once it has been properly initialized by the interpreter in use. The code has been tested and runs well on several Windows and Unix platforms. Among the support modules, the most commonly used implement the SMTP (sending e-mails), HTTP (WWW access) and FTP (uploading and downloading files) client protocols.
The library is available under the same terms and conditions as the Lua language, the MIT license. Copyright © 2004-2007 Diego Nehab. Download LuaSocket version 2.0.2 is now available for download! The library can be downloaded in source code from the LuaSocket project page at LuaForge. LuaSocket: Index to reference manual. DNS (in socket) toip, tohostname, gethostname. get, put. request. filter: chain, cycle. pump: all, step. How to bypass strict firewalls on public wifi hotspots and restr. Public wifi hotspots and restricted internet access More and more, you can find public wireless hotspots, in cities, train stations, airports... and even some public hotspots that are available with a subscription, accessible through a web login form.
The thing is, most of the time, these hospots will have a reduced connectivity. Only some ports and protocols will be allowed. For instance, you may be restricted to HTTP, HTTPS, POP and SMTP. Not the best combination when one primarily uses SSH! This also applies to protected networks, such as libraries, schools and office environments, where your access to Internet is limited, and some ports and protocols are blocked. I will explain here two different solutions to break free of these restrictions: SSH tunneling and SOCKS servers. What do we need? You do need the following: Upside-Down-Ternet. My neighbours are stealing my wireless internet access.
I could encrypt it or alternately I could have fun. I'm starting here by splitting the network into two parts, the trusted half and the untrusted half. The trusted half has one netblock, the untrusted a different netblock. We use the DHCP server to identify mac addresses to give out the relevant addresses. /etc/dhcpd.conf IPtables is Fun! Suddenly everything is kittens! /sbin/iptables -A PREROUTING -s 192.168.0.0/255.255.255.0 -p tcp -j DNAT --to-destination 184.108.40.206. Is your firewall spying on you? IT'S OBVIOUS, REALLY, that the best way of penetrating users' PCs to see what they get up to online would be to become a Firewall maker.
Like, when I wanted a Firewall and was too tight to pay for one, I turned to Checkpoint's little freebie Zone Alarm. It sits there between you and the Internet and lets you know when someone's trying to sneak in through your backdoor or when a program you're running tries to connect to the Web for no apparent reason. When you're as techie as me - not very - you just have to trust it. Of course, Checkpoint's an Israeli company and as a foreign journalist working in Israel you know the hyperactive security services here would like to keep tabs on you. And you know that they do. It's part of the game - like the airport interrogation, or the surreptitious copying of your notepad while you're off having a body search.
The company says it will fix the "bug" soon. S Guide. Beej's Guide to Unix Interprocess Communication Now that you have extra-process communication going on with sockets, why not try your hand at some interprocess communication, eh?
Shared memory, semaphores, signals, and memory mapped files await you! Beej's Guide to C [rough draft] This is a bit of a practice book for later when I write a real book. Since I know C more like the back of my hand than any other language, it's a good place to start (because I don't need many references to write it!) Keep in mind that this is completely incomplete right now, and I haven't even read most of what I've written. Some of it is Just Plain Wrong. Beej's Guide to the GNU Debugger (GDB) This is a quick introduction to using GDB, GNU's famous debugger, from the command line.
Beej's Guide to Photography I take photos for fun and maybe even profit (from time to time). Beej's Guide to Killing Dragons If you play Moria, this will help you slay Ancient Multi-Hued Dragons from the safety of your own home. Small Business Forum and Entrepreneur Networking at StartupNatio.