background preloader

Computer Jazz

Facebook Twitter

Tools

Website Development. Upside-Down-Ternet. My neighbours are stealing my wireless internet access.

Upside-Down-Ternet

I could encrypt it or alternately I could have fun. I'm starting here by splitting the network into two parts, the trusted half and the untrusted half. The trusted half has one netblock, the untrusted a different netblock. 2600: The Hacker Quarterly. Your Source for Hardware Analysis and News. Ethical Hacking.