background preloader

Upside-Down-Ternet

Upside-Down-Ternet
My neighbours are stealing my wireless internet access. I could encrypt it or alternately I could have fun. I'm starting here by splitting the network into two parts, the trusted half and the untrusted half. The trusted half has one netblock, the untrusted a different netblock. /etc/dhcpd.conf IPtables is Fun! Suddenly everything is kittens! /sbin/iptables -A PREROUTING -s 192.168.0.0/255.255.255.0 -p tcp -j DNAT --to-destination 64.111.96.38 For the uninitiated, this redirects all traffic to kittenwar. For more fun, we set iptables to forward everything to a transparent squid proxy running on port 80 on the machine. /sbin/iptables -A PREROUTING -s 192.168.0.0/255.255.255.0 -p tcp -m tcp --dport 80 -j DNAT --to-destination 192.168.0.1 That machine runs squid with a trivial redirector that downloads images, uses mogrify to turn them upside down and serves them out of its local webserver. The redirection script Then the internet looks like this! I made xkcd - how cool is that ?

How to bypass strict firewalls on public wifi hotspots and restr Public wifi hotspots and restricted internet access More and more, you can find public wireless hotspots, in cities, train stations, airports... and even some public hotspots that are available with a subscription, accessible through a web login form. The thing is, most of the time, these hospots will have a reduced connectivity. Only some ports and protocols will be allowed. This also applies to protected networks, such as libraries, schools and office environments, where your access to Internet is limited, and some ports and protocols are blocked. I will explain here two different solutions to break free of these restrictions: SSH tunneling and SOCKS servers. What do we need? You do need the following: HTTPS access through the firewall. You may want to use a free shell provider such as SilenceIsDefeat as your server, but make sure you can access SSH through port 443. How does it work? The first solution using simple SSL tunneling. Before we start Listen 443 Then restart your SSH server.

CSS Styles Tutorial - Learn how to use CSS Styles to format text in your web site What is CSS Cascading Style Sheets (CSS) are .css files that contain a collection of formatting rules that control the appearance of content in a web page. They are very useful for maintaining a web site since its appearance (controlled by properties of HTML tags) can be managed from just one file. CSS Styles also enhance your site's look, accessibility and reduces file size. Another main advantage is reusability - instead of defining the properties of fonts, backgrounds, borders, bullets, uniform tags, etc. each time you use them you can just assign the corresponding css style in the class property. You can store CSS styles directly in each document or, for more control and flexibility, in an external style sheet. Prerequisite Knowledge None. You Are Here ::: Home >> Free Tutorials >> Dreamweaver Tutorials >> CSS Styles Tutorial Types of CSS Styles There are 4 types of CSS Styles: Class - Custom CSS style: creates a customized style with the set attributes. Using CSS Styles

Is your firewall spying on you? IT'S OBVIOUS, REALLY, that the best way of penetrating users' PCs to see what they get up to online would be to become a Firewall maker. Like, when I wanted a Firewall and was too tight to pay for one, I turned to Checkpoint's little freebie Zone Alarm. It sits there between you and the Internet and lets you know when someone's trying to sneak in through your backdoor or when a program you're running tries to connect to the Web for no apparent reason. Of course, Checkpoint's an Israeli company and as a foreign journalist working in Israel you know the hyperactive security services here would like to keep tabs on you. It's part of the game - like the airport interrogation, or the surreptitious copying of your notepad while you're off having a body search. Now, the handsomely-named Mr Cringely has revealed that a colleague of his at Infoworld noticed that Zone Alarm 6.0 was sneakily sending off data to four different servers. The company says it will fix the "bug" soon.

Business Models on the Web | Professor Michael Rappa Business models are perhaps the most discussed and least understood aspect of the web. There is so much talk about how the web changes traditional business models. But there is little clear-cut evidence of exactly what this means. In the most basic sense, a business model is the method of doing business by which a company can sustain itself -- that is, generate revenue. The business model spells-out how a company makes money by specifying where it is positioned in the value chain. Some models are quite simple. Internet commerce will give rise to new kinds of business models. Business models have been defined and categorized in many different ways. The basic categories of business models discussed in the table below include: The models are implemented in a variety of ways, as described below with examples. Business models have taken on greater importance recently as a form of intellectual property that can be protected with a patent. Hear the podcast: Audio | Transcript Things to read:

s Guide Beej's Guide to Unix Interprocess Communication Now that you have extra-process communication going on with sockets, why not try your hand at some interprocess communication, eh? Shared memory, semaphores, signals, and memory mapped files await you! Beej's Guide to C [rough draft] This is a bit of a practice book for later when I write a real book. Beej's Guide to the GNU Debugger (GDB) This is a quick introduction to using GDB, GNU's famous debugger, from the command line. Beej's Guide to Photography I take photos for fun and maybe even profit (from time to time). Beej's Guide to Killing Dragons If you play Moria, this will help you slay Ancient Multi-Hued Dragons from the safety of your own home. Beej's Bit Bucket This is my programming-and-tech-related blog where I scribble down various pieces of information, as well as short programming tutorials. Contact: beej@beej.us Visit: Beej's Home Page.

Combo Library - Web Color Combinations Library Advertisements The Combo Library contains pages of color combinations (a.k.a, color schemes and color palettes) for you to choose from. Each color scheme contains the html color codes you will need when coding your website template. The hex codes can be found underneath each of the color swatches. Click on a color combinations name to test it out. The Combo Library provides a convenient way to search color schemes. You can click on individual hex color codes to view them full screen through the Combo Tester. LuaSocket: Network support for the Lua language What is LuaSocket? LuaSocket is a Lua extension library that is composed by two parts: a C core that provides support for the TCP and UDP transport layers, and a set of Lua modules that add support for functionality commonly needed by applications that deal with the Internet. The core support has been implemented so that it is both efficient and simple to use. It is available to any Lua application once it has been properly initialized by the interpreter in use. The code has been tested and runs well on several Windows and Unix platforms. Among the support modules, the most commonly used implement the SMTP (sending e-mails), HTTP (WWW access) and FTP (uploading and downloading files) client protocols. The library is available under the same terms and conditions as the Lua language, the MIT license. Copyright © 2004-2007 Diego Nehab. Download LuaSocket version 2.0.2 is now available for download! The library can be downloaded in source code from the LuaSocket project page at LuaForge.

Techcrunch Level 1 What is a portable app? | PortableApps.com - Portable software for USB drives portable - carried or moved with easeapp - a computer program like a web browser or word processor Portable App Definition (permalink) A portable app is a computer program that you can carry around with you on a portable device and use on any Windows computer. No Special Hardware - Use any USB flash drive, portable hard drive, iPod/MP3 player, etc No Additional Software - Just download, run the portable installer and go No Kidding - It's that easy Portable App Guidelines (permalink) Consider the Possibilities... Your favorite web browser with all your bookmarks close at handYour presentation AND the required software ready to go for that big meetingYour important passwords and account information securely encrypted and always with youYour antivirus program and other utilities ready to fix PC problemsYour calendar with all your appointmentsYour own email client with all your contacts and settingsYour instant messenger and your buddy listYour whole office suite along with all your documents

HOWTO bypass Internet Censorship, a tutorial on getting around filters and blocked ports DNStunnel.de - free DNS tunneling service

Related: