• Content count

  • Joined

  • Last visited

Everything posted by Thespis

  1. Well, sorry to disappoint you, but the only people able to obtain the MAC address of that IP are the people that have a Layer 2 link to the MAC address of the computer/device that has that Layer 3 IP Address. Here's a link that might explain the difference in the different layers. If you want more information just google "osi model".
  2. you're kidding, right?
  3. I'm with you on the dislike front. They should just call it what it is...a commercial!
  4. According to the RFC, there is no minimum length. Or a required length at all. I agree there should be. So the difference in your lengths and the padding comes from the network drivers. At least that would be my guess. Only 22 Bytes are fixed, the rest is variable. Ethernet transmission layer (not necessarily accessible to the user): 48.bit: Ethernet address of destination 48.bit: Ethernet address of sender 16.bit: Protocol type = ether_type$ADDRESS_RESOLUTION Ethernet packet data: 16.bit: (ar$hrd) Hardware address space (e.g., Ethernet, Packet Radio Net.) 16.bit: (ar$pro) Protocol address space. For Ethernet hardware, this is from the set of type fields ether_typ$<protocol>. 8.bit: (ar$hln) byte length of each hardware address 8.bit: (ar$pln) byte length of each protocol address 16.bit: (ar$op) opcode (ares_op$REQUEST | ares_op$REPLY) nbytes: (ar$sha) Hardware address of sender of this packet, n from the ar$hln field. mbytes: (ar$spa) Protocol address of sender of this packet, m from the ar$pln field. nbytes: (ar$tha) Hardware address of target of this packet (if known). mbytes: (ar$tpa) Protocol address of target.
  5. Biosphear it's spelled marque, not mar-key. Also, vary != very. I'm sorry I couldn't sit back and watch you butcher the language anymore. Below are some dictionary entries for very and vary. As for the OP's topic, I have to agree with McGrewSecurity on this one. Learn on your own network. "Hacking" someone else's network is a good way to get arrested or sued. Or in Biosphear's case almost expelled from school. Is it really worth that? I think not.
  6. You haven't seen our ro and rw strings then. 8-P
  7. As I said, if you want to block the entire IP Range owned by that ISP, you would use: Because they own If you want to block just the Class B, then it's
  8. Yeah, there's a few of those in different classrooms around campus. Maybe not that type, but roughly the same idea.
  9. Class A is an 8bit subnet mask. Class B is a 16bit subnet mask and Class C is a 24bit subnet mask. The 17bit subnet mask you proposed would include half of the subnet. - If you want to block everything in the Class B, then you need a subnet mask. If you want their entire block it's going to be more than one mask since they have more than 16 and less than 32: There you go. On a side note, I finally found something that I know more about than McGrewSecurity. YAY!!! hahaha 9-)
  10. Again, what are you trying to do? Hamachi is encrypted by default. If you have two computers in a Hamachi network, any traffic that you send between them will be encrypted. Even across the Internet.
  11. Hamachi is a VPN, and it's already encrypted. I'm not sure what you're wanting to do. Can you be more specific?
  12. To find out more about Solaris, go to the source. By the way, if you're running Solaris x86, then I can see possibly having some issues. It's not as stable as the Sparc edition of Solaris.
  13. That's b/c it's really VI, and not VIM. In linux vi is aliased to vim. I grew up on VI, so I still hit escape after entering any text, even in vim. But considering 80% of my day to day job is done in Solaris I don't mind vi. I like it. Also, $ takes you to the end of a line. 0 takes you to the beginning. Crtl-D is page down and Crtl-U is page up. They should work in VIM also. As for the OP's question. Solaris is ROCK solid. The only time I've ever had any problem with Solaris is when hardware starts failing. The only thing you have to watch out for is that for the most part you aren't going to find installable packages. Everything is pretty much compiled. With that said, you can find binaries for Solaris. You can find good stuff at and .
  14. Pin Name Cable colour Description 1 VCC Red +5V 2 Dāˆ’ White Data āˆ’ 3 D+ Green Data + 4 GND Black Ground
  15. cr250, where are you from?
  16. Your best bet is to learn iptables and snort. Like McGrewSecurity said, setup a linux box as your router and then run snort. Write custom snort rules to catch what you're looking for and tell it to kick off a script that adds it to iptables. It's really not that bad of a project if you use tools already written for this kind of thing. But if you're wanting to write the whole thing by hand without having any real programming experience, you're going to be here a while. Hope that helps.
  17. Great, something else that can be lost with everybody's personal data on it. and it's small. UGH
  18. ask the server admin for the password.
  19. That's b/c the hdd is mounted Read-Only. Being NTFS poses problems. You'll have issues trying to write to an NTFS partition in Linux. Even if you get the Kernel extensions. It's b/c of the proprietary nature of NTFS. ..|.. Microsoft.
  20. That's just saying you have a 64 bit Memory capability. chefninja has the right idea. Unless you have some specific app that requires 64 bit, stick with 32 bit.
  21. What Does this mean? do this mean that Windows64 or linux64 bit will run on my computer Yes. You have a 64 bit P4. What the hell is this?? HT Technology enables one physical processor to appear and behave as two logical processors to the operating system. HT Technology gives you multitasking capabilities by enabling two applications to run simultaneously without slowing down the system. Always remember that Mr. Google is your best friend:
  22. I couldn't function at work without Synergy. I absolutely love it. Tunneled over SSH keeps it pretty secure. I have it running on Solaris 10, OpenSuSE 10.2, and Win2k3(why can't all web apps work in linux and firefox?). I've been using it for years.
  23. I use Hamachi all the time for Remote Desktop. I don't have any problems with it at all. Also, Hamachi is encrypted. It might be a good idea to have your Remote Desktop session encrypted when it's traveling across the Internet. If you just can't stand Hamachi, then setup a Site-to-Site VPN.
  24. Install Hamachi on all the PCs and on your PC. Create a private network with a password and install some remote control software. Or use Windows Remote Desktop.
  25. Purple, the more I look at your screen shot, I really don't think it's a problem with DSL, but a problem with your modem. The IP Address appears to be the public IP address of your modem. You have a big delay from the inside interface,, and the outside interface, I'm not sure if you know how trace route works, but basically it uses a ping packet(sorta) but increments the TTL for each packet. The TTL is the number of hops allowed before the packet is discarded. The 3 columns in your trace route show the time for each attempt to the hop. So, if there is a delay between hop 1 and hop 2, you'll always have a delay. I say replace your modem. And like McGrew said, call your ISP. They'll get it fixed.