OVERLOAD!!
Hiya! In here will be a bunch of random, various info. about some cool and not so cool things that are available. This page will be constantly updated so check back for some more stuff k?
**cool** ANONYMOUS EMAIL
**cool** PROXY SERVERS
**maybe not so cool** BIOS MANIPULATION
**cool** TELNET
ANONYMOUS EMAIL
Anonymous remailers are services that forward emails to an intended recipient
while stripping the email of any identifying information.
Typical emails contain headers in addition to the body of the message. These
headers are used to pass the email from its originator to its destination, and
each server it passes through puts it's own stamp on it as it passes it along.
In addition, it also contains the senders name and email address so that the
recipient knows who sent it. For example, take a look at the following headers:
X-F: Fri Jun 02 01:34:25 2000
Received: from isp.com [199.29.xx.xxx] by 208.24.118.202 with ESMTP
This line tells me where the email came from - isp.com... if the email passes
through more than one server, each one will stamp their own information on a new
line as they receive it. If there is more than one server, they will stack these
line on top of each other, with the originating server at the bottom, and your email
providers server at the top. This is where you would look to find out where to file
a complaint should you feel it is warrented. In this case, you would go to
www.isp.com and look for an email address for their abuse department. Alternately
you can just send your complaint to abuse@isp.com (most, but not all, ISP's use this
email address for their abuse department).
(SMTPD32-4.06) id A57010F200EA; Fri, 02 Jun 2000 01:34:24 CDT
X-WM-Posted-At: isp.com; Fri, 2 Jun 00 02:24:22 -0400
X-WebMail-UserID: jonnydxxxxxx
This just shows that the user was using a webbased email service provided by isp.com
Date: Fri, 2 Jun 2000 02:24:22 -0400
This is the date and time the message was sent
Sender: Jonny Dxxxx
From: Jonny Dxxxxxx
Both of these lines (you will not usually see both lines in a typical header - it all
depends on the email server being used) tell the recipient who sent the message
To: "ThePsyko"
Obviously, this line indicates to whom the email is intended
X-EXP32-SerialNo: 00000000
Subject: Re: [no subject]
Message-ID: <3941CBFC@isp.com>
Each email is stamped with a unique identifying ID code for easier tracking by the
service providers (ISP's). This number can be handy if you have to file any complaints
to the ISP. There are other headers but you don't need to worry about them for now.
As you can see, the typical email header contains enough information to be able to not
only file a complaint with the proper service provider, but also assists the provider
in tracking which one of their hundreds of users sent the email. It is this information
that is stripped from the email when an anonymous remailer is used. Recipients of
anonymous emails can't tell WHO sent them or WHERE they came from. This is what makes
the remailers so popular, and also what seems to frighten those who are working towards
tightening up the internet. Below are some links to check out...
* ANONYMIZER
* ANONYMOUS TO
* PRIVACYX
* LUCENT PERSONALIZED WEB ASSISTANT (LPWA)
* SUBDIMENSION
BACK
PROXY SERVERS
By definition, "proxy" refers to a person or agency who has authority to act for another. So, taken literally, does that mean a "proxy server" acts in place of another server?
Whatis.com's definition is that proxy servers are programs that mediate between a workstation user in a networked environment and the Internet beyond. They are associated with a "gateway," which separates the internal network from the outside; a "firewall," which screens all incoming traffic and protects the network from unwelcome intruders; and a "caching" program, which looks locally for previously downloaded web pages. If the requested page is not found, the proxy server goes out to the Net and retrieves it, almost invisibly, for the user. Apparently, this is a safe, efficient way of handling inbound and outbound traffic on a network. Now here's some info about the different kinds of proxies:
->Full anonymous prroxies. Such proxies do not change requests fields and looks like real browser. You real IP is also hided of cause.
->Anonymous proxiesss do not shows your real IP, but changes the requests fields partially. Very difficult to detect such proxies as well as full anonymous.
->Half transparent proxies also do not shows your real IP but changes the requests fields so very easy to detect that proxy while log analyzing. Nothing really matters, but some server administrators restricts the proxy requests.
->Transparent proxiiies (not anonymous) changes the requests fields including your real IP. Such proxies are not applicable for security and privacy while surfing on net. You can use them only for network speed improvement.
You can do lots of fun things through proxies...tee-hee!!! - but remember the ethics before you go willy nilly man!!
Here are some public proxy servers that should be up and running
* cache.cesnet.cz --3128
* lpwa.com --8000
* proxy.kren.nm.kr --8080
* webcache.ms.mff.cuni.cz --8080
* cache.sh.cvut.cz --3128
BACK
BIOS MANIPULATION
This is about the bios on a computer and things that you can do with it. Since this description is very long, I'm putting it on my page as a text file, okey dokey?...check it...BIOS.TXT
BACK
TELNET
What is Telnet?
The telnet protocol is an application that logs on to other computers to
obtain information. Both computers must use/support the telnet protocol in order
for telnet to work. It is like two computers using modems to connect via phone
lines with a phone number, but instead, the computers use telnet to connect via
the internet with a telnet address. The computer that you are connecting to via
telnet will usually prompt you for a username and password; if you are not
connecting to a public or general account, you will need to have your own
account set up prior to your login.
How do I use Telnet?
You need telnet software, like NCSA Telnet,
EWAN, or others. Within the software, select "open connection" (or similar
command), and give the prompt a telnet address. For specific information about
your software, read the documentation that came with it.
Windows 95 seems to include a telnet client. You can go to the Start menu and
select Run; simply type telnet. To connect to an address, type telnet and then that
address. To see where that telnet app is on your hard drive, use the Find command
in the start menu.
To see if you
already have a telnet application, try to open a Telnet URL from within Netscape
[I've had varied results trying the same in MS IE and AOL's web browser]. The
protocol for this is to go to open a location, and type
telnet://some.net.address.com ( as opposed to using http:// ). The telnet://
command only works from within your Web browser. You also have to have your Web
browser configured to know where the telnet application is; under Netscape, use
the [Options | General Preferences | Applications] menu to set this. For
example, try the The Library of Congress,
or the The IRS.
Compuserve and other large commercial services may not yet allow telnet
access (check with your online tech help - and let me know if your service
offers telnet).
Where can I download a Telnet application?
NCSA Telnet for the Mac or PC DOS.
Macintosh users: Apple Orchard or Tucows. - I recommend NiftyTelnet!
Windows 3.x users: Tucows .
Windows 95 users: Tucows.
All platforms - Mac, Win, Atari, Amiga, etc.: shareware.com - select your platform, and search for the word telnet.
Or you can use Tera Term Pro. Download at this link: Tera Term Pro
BACK