OVERLOAD!!

Hiya! In here will be a bunch of random, various info. about some cool and not so cool things that are available. This page will be constantly updated so check back for some more stuff k?

**cool** ANONYMOUS EMAIL
**cool** PROXY SERVERS
**maybe not so cool** BIOS MANIPULATION
**cool** TELNET





ANONYMOUS EMAIL


Anonymous remailers are services that forward emails to an intended recipient 
while stripping the email of any identifying information. 
Typical emails contain headers in addition to the body of the message. These 
headers are used to pass the email from its originator to its destination, and
each server it passes through puts it's own stamp on it as it passes it along. 
In addition, it also contains the senders name and email address so that the
recipient knows who sent it. For example, take a look at the following headers:
X-F:  Fri Jun 02 01:34:25 2000
Received: from isp.com [199.29.xx.xxx] by 208.24.118.202 with ESMTP
This line tells me where the email came from - isp.com... if the email passes 
through more than one server, each one will stamp their own information on a new
line as they receive it. If there is more than one server, they will stack these 
line on top of each other, with the originating server at the bottom, and your email 
providers server at the top. This is where you would look to find out where to file
a complaint should you feel it is warrented. In this case, you would go to 
www.isp.com and look for an email address for their abuse department. Alternately 
you can just send your complaint to abuse@isp.com (most, but not all, ISP's use this 
email address for their abuse department).
(SMTPD32-4.06) id A57010F200EA; Fri, 02 Jun 2000 01:34:24 CDT
X-WM-Posted-At: isp.com; Fri, 2 Jun 00 02:24:22 -0400
X-WebMail-UserID: jonnydxxxxxx
This just shows that the user was using a webbased email service provided by isp.com
Date: Fri, 2 Jun 2000 02:24:22 -0400
This is the date and time the message was sent
Sender: Jonny Dxxxx 
From: Jonny Dxxxxxx 
Both of these lines (you will not usually see both lines in a typical header - it all
depends on the email server being used) tell the recipient who sent the message
To: "ThePsyko" 
Obviously, this line indicates to whom the email is intended
X-EXP32-SerialNo: 00000000
Subject: Re: [no subject]
Message-ID: <3941CBFC@isp.com>
Each email is stamped with a unique identifying ID code for easier tracking by the 
service providers (ISP's). This number can be handy if you have to file any complaints
to the ISP. There are other headers but you don't need to worry about them for now.
As you can see, the typical email header contains enough information to be able to not 
only file a complaint with the proper service provider, but also assists the provider 
in tracking which one of their hundreds of users sent the email. It is this information 
that is stripped from the email when an anonymous remailer is used. Recipients of 
anonymous emails can't tell WHO sent them or WHERE they came from. This is what makes
the remailers so popular, and also what seems to frighten those who are working towards
tightening up the internet. Below are some links to check out...

* ANONYMIZER

* ANONYMOUS TO

* PRIVACYX

* LUCENT PERSONALIZED WEB ASSISTANT (LPWA)

* SUBDIMENSION

BACK

PROXY SERVERS


By definition, "proxy" refers to a person or agency who has authority to act for another. So, taken literally, does that mean a "proxy server" acts in place of another server? Whatis.com's definition is that proxy servers are programs that mediate between a workstation user in a networked environment and the Internet beyond. They are associated with a "gateway," which separates the internal network from the outside; a "firewall," which screens all incoming traffic and protects the network from unwelcome intruders; and a "caching" program, which looks locally for previously downloaded web pages. If the requested page is not found, the proxy server goes out to the Net and retrieves it, almost invisibly, for the user. Apparently, this is a safe, efficient way of handling inbound and outbound traffic on a network. Now here's some info about the different kinds of proxies:

->Full anonymous prroxies. Such proxies do not change requests fields and looks like real browser. You real IP is also hided of cause.

->Anonymous proxiesss do not shows your real IP, but changes the requests fields partially. Very difficult to detect such proxies as well as full anonymous.

->Half transparent proxies also do not shows your real IP but changes the requests fields so very easy to detect that proxy while log analyzing. Nothing really matters, but some server administrators restricts the proxy requests.

->Transparent proxiiies (not anonymous) changes the requests fields including your real IP. Such proxies are not applicable for security and privacy while surfing on net. You can use them only for network speed improvement.

You can do lots of fun things through proxies...tee-hee!!! - but remember the ethics before you go willy nilly man!!

Here are some public proxy servers that should be up and running

* cache.cesnet.cz --3128
* lpwa.com --8000
* proxy.kren.nm.kr --8080
* webcache.ms.mff.cuni.cz --8080
* cache.sh.cvut.cz --3128



BACK

BIOS MANIPULATION


This is about the bios on a computer and things that you can do with it. Since this description is very long, I'm putting it on my page as a text file, okey dokey?...check it...BIOS.TXT


BACK

TELNET


What is Telnet?

  • The telnet protocol is an application that logs on to other computers to obtain information. Both computers must use/support the telnet protocol in order for telnet to work. It is like two computers using modems to connect via phone lines with a phone number, but instead, the computers use telnet to connect via the internet with a telnet address. The computer that you are connecting to via telnet will usually prompt you for a username and password; if you are not connecting to a public or general account, you will need to have your own account set up prior to your login.

    How do I use Telnet?

  • You need telnet software, like NCSA Telnet, EWAN, or others. Within the software, select "open connection" (or similar command), and give the prompt a telnet address. For specific information about your software, read the documentation that came with it.
  • Windows 95 seems to include a telnet client. You can go to the Start menu and select Run; simply type telnet. To connect to an address, type telnet and then that address. To see where that telnet app is on your hard drive, use the Find command in the start menu.
  • To see if you already have a telnet application, try to open a Telnet URL from within Netscape [I've had varied results trying the same in MS IE and AOL's web browser]. The protocol for this is to go to open a location, and type telnet://some.net.address.com ( as opposed to using http:// ). The telnet:// command only works from within your Web browser. You also have to have your Web browser configured to know where the telnet application is; under Netscape, use the [Options | General Preferences | Applications] menu to set this. For example, try the The Library of Congress, or the The IRS.
  • Compuserve and other large commercial services may not yet allow telnet access (check with your online tech help - and let me know if your service offers telnet).

    Where can I download a Telnet application?

  • NCSA Telnet for the Mac or PC DOS.
  • Macintosh users: Apple Orchard or Tucows. - I recommend NiftyTelnet!
  • Windows 3.x users: Tucows .
  • Windows 95 users: Tucows.
  • All platforms - Mac, Win, Atari, Amiga, etc.: shareware.com - select your platform, and search for the word telnet.
  • Or you can use Tera Term Pro. Download at this link: Tera Term Pro

    BACK