![]() |
anyone in here familiar with Ihub? I was thinking about going that route... |
Quote:
but its been in use for a number of years, especially in europe and there hasn't been any arrests reported |
:lol at all the idiots who jumped on IKS and couldnt wait. I'm gonna wait for a true "fix" if there ever is one. Please read below.... Microsoft Host Tracker Technology May End IKS A must read for all IKS users!!!...the warnings are out there...it's up to you to understand them. c/p Microsoft will unveil its new host tracker platform officially at SIGCOMM 2009 in Barcelona, Spain. The software can find Host servers regardless of how often the IP address changes with an accuracy of 95%. There has been several reports that this system has been used under a test agreement with "Charlie". In a defense effort against IKS. The goal is to find IKS servers & simply shut them down. If IKS systems have no server their encryption is secure. No Server no IKS. Coincidentally you probably have noticed reports of server issues with many IKS systems..... Hmmm! You may also note , that suggestions of an IKS hack and an N3 Hack originated in Barcelona Spain. Look were this new platform is being released at. You guessed it Barcelona Spain. Here are a few excepts from the proposed release. In a paper to be presented next week at SIGCOMM 2009 in Barcelona, Spain, three researchers from Microsoft's research center in Mountain View, CA,demonstrate a way to remove the shield of anonymity from such shadowy attackers. Using a new software tool, the three computer scientists were able to identify the machines responsible for malicious activity, even when the host's IP address changed frequently. Host Tracker resolves the conflicts by cross referencing the data to identify proxy servers, which allow several hosts to appear as a single IP address, and to determine when a guest was using a legitimate host. "The fact that we are able to trace malicious traffic to the proxy itself is an improvement because we are able to pinpoint the exact origin," Xie says. The researchers also created a way to automatically blacklist traffic from a particular IP address, once the Host Tracker system has determined that the host at that address is compromised. Using this method in simulation, the researchers were able to block malicious traffic with an error rate of five percent--in other words, 5 out of 100 IP addresses classified as malicious were actually legitimate. Using additional information to identify good user behavior reduced that false-positive rate to less than one percent. "We want to separate the two notions. The accountability that we are talking about is the ability to identify the hosts." So it may forebode problems for the future of IKS. |
that sounds like a really nifty piece of software but wouldnt that be considered illegal? privacy issues |
Quote:
Microsoft Team Traces Malicious Users Three researchers find a way to trace compromised machines used to attack other computers. Anonymity on the Internet can be both a blessing and a curse. While the ability to hide behind anonymous proxies and fast-changing Internet protocol (IP) addresses has enabled freer speech in nations with repressive regimes, the same technologies allow cybercriminals to hide their tracks and pass off malicious code and spam for legitimate communications. In a paper to be presented next week at SIGCOMM 2009 in Barcelona, Spain, three researchers from Microsoft's research center in Mountain View, CA, demonstrate a way to remove the shield of anonymity from such shadowy attackers. Using a new software tool, the three computer scientists were able to identify the machines responsible for malicious activity, even when the host's IP address changed frequently. "What we are really trying to get at is the host responsible for an attack," said Yinglian Xie, a member of the Microsoft team. "We are not trying to track those identifiers but associate them with a particular host." The prototype system, dubbed HostTracker, could result in better defenses against online attacks and spam campaigns. Security firms could, for example, build a better picture of which Internet hosts should be blocked from sending traffic to their clients, and cybercriminals would have a harder time camouflaging their activities as legitimate traffic. Xie and her colleagues, Fang Yu and Martin Abadi, analyzed a month's worth of data--330 gigabytes--collected from a large e-mail service provider, in an attempt to determine which users were responsible for sending out spam. To trace the origins of multiple spam outbreaks, the scientists studied records including more than 550 million user IDs, 220 million IP addresses, and a time stamp for events such as sending a message or logging into an account. Tracing the origins of messages--a key task for tracking spam and other kinds of Internet attack--involved reconstructing relationships between account IDs and the hosts from which users connected to the e-mail service. To do this, the researchers clumped together all the IDs accessed from different hosts over a certain time period. The HostTracker software then combed through this data to resolve any conflicts. For example, sometimes more than one user appeared to originate from the same IP address or a single user had multiple ID addresses during overlapping periods of time. HostTracker resolves the conflicts by cross referencing the data to identify proxy servers, which allow several hosts to appear as a single IP address, and to determine when a guest was using a legitimate host. "The fact that we are able to trace malicious traffic to the proxy itself is an improvement because we are able to pinpoint the exact origin," Xie says. The researchers also created a way to automatically blacklist traffic from a particular IP address, once the HostTracker system has determined that the host at that address is compromised. Using this method in simulation, the researchers were able to block malicious traffic with an error rate of five percent--in other words, 5 out of 100 IP addresses classified as malicious were actually legitimate. Using additional information to identify good user behavior reduced that false-positive rate to less than one percent. The results suggest that HostTracker would be a good way to refine the current way of defending against distributed denial-of-service attacks and spam campaigns, says Gunter Ollmann, vice president of research and development at Damballa, a firm that helps companies find and eliminate compromised hosts in a computer network. "Using this technique will help find botnets that have a high frequency of traffic, such as spam campaigns, DDoS attacks, and maybe click-through attacks," Ollmann says. "Other attacks, such as password-stealing and banking trojans, where the attack is more host-centric--this sort of technique would not be as effective." Xie acknowledges that while the technique is useful for creating lists of hosts to track, it may be less useful for law enforcement agencies attempting to identify the attackers behind online crime. "The accountability we are talking about is not court accountability," she says. "We want to separate the two notions. The accountability that we are talking about is the ability to identify the hosts." read more here: http://fcw.com/articles/2009/08/19/m...anonymity.aspx http://mcpmag.com/articles/2009/08/1...-internet.aspx |
all i read was blah blah blah. so many complaints about iks yet people still use "torrents". |
Honestly if you go with public IKS, you deserve to be caught. Sharing keys between a few select friends is not hard and very hard to get caught;) Honestly if Microsoft has the ability to real time crack SSH packets, the world as we know it will end. |
So I just got Dish Network using my cousins account who's down in LA. I paid him about $400 for 6 months for all the channels excluding PPV. |
I went back to Shaw today :(. Will wait for a proper fix before going back to FTA. |
well the view sats coders came out with a new statement saying they've got a new team continuing the work on the crack and says they're almost there Quote:
|
^ Yup, as long as you know someone in the US with a Dish or Direct account you can buy a receiver from eBay, have it shipped over and add the receiver to their account. All you need is the person’s information and Skype so you can call Dish or Direct from Canada to activate your box and you get whatever channels that person is subscription too. |
The thing with Dishnetwork is if you have mulitple receivers and it's not all hooked up to a phone line, they will cut off the all the receiver except for the primary one on the account. I had 2 and both worked for about 4 months and then one day one of them stopped working. I went back to the broker and they called up Dishnetwork for me from their Vancouver downtown location and they bascially said hook it up to a phone line or you only get one receiver working. Of course I can't hook it up to a phone line from Canada so now I only have one receiver on the account :cry: . And since I'm in Canada, I never got subsidized equipment and had to buy it all straight up so that was a waste of money. They know about account sharing which is why they do that. |
Quote:
|
I'm not talking about those kind of brokers where they hook everyone up with one account. The broker I went to has a satellite store in Washington state and everything is done through that store. He will provide you with your own account with an American address and you pay with your credit card every month straight to Dishnetwork. I just have to pay him $100/year to keep the American address. Congrats on the HD box deal :thumbsup: |
Quote:
|
Its coming... anytime now ANYTIME |
Quote:
|
hehe well the VS site says anytime now and they closed their forums but its been like that a couple days now |
Quote:
|
macncheese ftw... |
Quote:
I hope this is true... 2 more days! :) |
THE FIX IS OUT!!!!!!!!!! NOT, I knew they were BSING everyone, if a fix was out it would just come out. Putting a date on the fix is just to sell units to the dumbasses to went out to get their box :lol |
Why anyone would get a VS box before the fix is out is beyond me. Yeah I didnt think it would be out today too. Ohh well.... |
they didn't put a date out though, officially. I read some rumors where they say its going to be out this week or a week later ;) ah well |
Quote:
|
All times are GMT -8. The time now is 11:40 AM. |
Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2025, vBulletin Solutions Inc.
SEO by vBSEO ©2011, Crawlability, Inc.
Revscene.net cannot be held accountable for the actions of its members nor does the opinions of the members represent that of Revscene.net