Welcome to Laser Pointer Forums - discuss green laser pointers, blue laser pointers, and all types of lasers

Buy Site Supporter Role (remove some ads) | LPF Donations

Links below open in new window

FrozenGate by Avery

bbshamsa and bootleg2go

Status
Not open for further replies.
Dave I already had Simon check the ip's. You're kinda late on that.

I was told that there is no way to detect annonymizers. Only Ip's and proxy's.

If you determined that there were no annonymizers being used then you must be one of the greatest hackers in the world.
 





Dave I already had Simon check the ip's. You're kinda late on that.

I was told that there is no way to detect annonymizers. Only Ip's and proxy's.

If you determined that there were no annonymizers being used then you must be one of the greatest hackers in the world.

It is actually fairly easy to tell if an annonymizer is being used. Heck, some of them even identify themselves in the server address. When one identifies itself, you can be sure it is being used ;) Others prevent the host/server from being resolved. If the host is just "not available" then you can be suspicious of the use of an annonymizer.

You cannot tell who it is that is using it. There would be no purpose for them if that were the case. However, you can usually tell that one is being used.

If you get a good identification of the host/server AND it is a known server you can be fairly sure that the IP address is legit.

Peace,
dave
 
Dave you're thinking of proxies, which are obvious. TOR or UltraSurf it is impossible to tell.

If it were as easy as you thought then arenared would not have been able to get back so often.

You really shouldn't comment on things you don't know about.
 
Dave you're thinking of proxies, which are obvious. TOR or UltraSurf it is impossible to tell.

If it were as easy as you thought then arenared would not have been able to get back so often.

You really shouldn't comment on things you don't know about.

Good to know

Peace,
dave
 
Thanks for clearing that up Dave.

It's a shame that some people on here, the minority it seems, are more interested having a go at others than much else.

I mean, "Crazy Jay", if you genuinely thought something was amiss here why not just contact an admin/moderator personally instead of raising a thread on it?

Your pathetic attempt to find an angle on me is laughable.

If you don't agree with a perfectly reasonable comment I made, why not just respond maturely and say so (without name calling, sarcasm, etc...).
 
Thanks for clearing that up Dave.

It's a shame that some people on here, the minority it seems, are more interested having a go at others than much else.

I mean, "Crazy Jay", if you genuinely thought something was amiss here why not just contact an admin/moderator personally instead of raising a thread on it?

Your pathetic attempt to find an angle on me is laughable.

If you don't agree with a perfectly reasonable comment I made, why not just respond maturely and say so (without name calling, sarcasm, etc...).

:crackup: Look at you. You have 3 red squares. With any luck you could be the next Kipkay :banned:
 
Dave you're thinking of proxies, which are obvious. TOR or UltraSurf it is impossible to tell.

If it were as easy as you thought then arenared would not have been able to get back so often.

You really shouldn't comment on things you don't know about.
Lol.... Maybe you should look up how packet switching works and get off your high horse. Arenared had a dynamic IP, he wasn't using some uber 1337 hacking service :rolleyes:
TOR is easy to tell, within a session it will use the same exit node for every packet sent to the server (LPF). And it does use proxies, IIRC TOR uses SOCKS plus virtual circuit networking-the primary purpose of TOR is to protect the user from traffic analysis, not protect them from traffic confirmation. It has limited limited true anonymizing capability. It's a glorified proxy service.

To quote you, "You really shouldn't comment on things you don't know about."
 
Lol.... Maybe you should look up how packet switching works and get off your high horse. Arenared had a dynamic IP, he wasn't using some uber 1337 hacking service :rolleyes:
TOR is easy to tell, within a session it will use the same exit node for every packet sent to the server (LPF). And it does use proxies, IIRC TOR uses SOCKS plus virtual circuit networking-the primary purpose of TOR is to protect the user from traffic analysis, not protect them from traffic confirmation. It has limited limited true anonymizing capability. It's a glorified proxy service.

To quote you, "You really shouldn't comment on things you don't know about."

iceburn894.gif
 
Lol.... Maybe you should look up how packet switching works and get off your high horse. Arenared had a dynamic IP, he wasn't using some uber 1337 hacking service :rolleyes:
TOR is easy to tell, within a session it will use the same exit node for every packet sent to the server (LPF). And it does use proxies, IIRC TOR uses SOCKS plus virtual circuit networking-the primary purpose of TOR is to protect the user from traffic analysis, not protect them from traffic confirmation. It has limited limited true anonymizing capability. It's a glorified proxy service.

To quote you, "You really shouldn't comment on things you don't know about."

Lawl maybe I dont care what you have to say. Lolz maybe I haven't even read your entire post. LAWL!!!!!one!!!

Moron...

EDIT: I actually quoted another member when I corrected Dave. And I trust that person more than I trust you willy.


PM from bbshamsa: Seriously mate.

Just take a look at yourself and realise that you need to grow up!

I mean, "Look at you. You have 3 red squares. With any luck you could be the next Kipkay".

You sound like my 11 year old cousin, yet you are 29, apparently!!

Really though, can't you see how childish that comment is? I winced for you when I read it.

Who gives a F**K about rep points?!?!?!

Do yourself a favour and learn to show respect to others, and be able to cope with others not agreeing with you."

bbshamsa I don't pm with retards sorry. And thanks for bringing up a thread that should have died just because you need to vent.
 
Last edited:
Lawl maybe I dont care what you have to say. Lolz maybe I haven't even read your entire post. LAWL!!!!!one!!!

Moron...

EDIT: I actually quoted another member when I corrected Dave. And I trust that person more than I trust you willy.
I've taken the liberty of translating this statement in to English with proper grammar, as well as converting it to white to avoid being obnoxious.

"Rather than take the time to read your post, I simply made a response filled with childish memes and broken English.

You are a moron because I didn't read your post.

EDIT:I didn't say that, my friend on the internet who you don't know about said that. He's a top secret agent and I can't tell you who he is, but trust me, he's a really good hacker and stuff."

:rolleyes:
We haven't seen this behavior before...
 
I've taken the liberty of translating this statement in to English with proper grammar, as well as converting it to white to avoid being obnoxious.

"Rather than take the time to read your post, I simply made a response filled with childish memes and broken English.

You are a moron because I didn't read your post.

EDIT:I didn't say that, my friend on the internet who you don't know about said that. He's a top secret agent and I can't tell you who he is, but trust me, he's a really good hacker and stuff."

:rolleyes:
We haven't seen this behavior before...

Wow you failed to recognize that I was making in fun of your language.

Hmm maybe I should have dumbed it down a little
 
Lol.... Maybe you should look up how packet switching works and get off your high horse. Arenared had a dynamic IP, he wasn't using some uber 1337 hacking service :rolleyes:
TOR is easy to tell, within a session it will use the same exit node for every packet sent to the server (LPF). And it does use proxies, IIRC TOR uses SOCKS plus virtual circuit networking-the primary purpose of TOR is to protect the user from traffic analysis, not protect them from traffic confirmation. It has limited limited true anonymizing capability. It's a glorified proxy service.

To quote you, "You really shouldn't comment on things you don't know about."

It's not worth the fight. A simple. "Good to know" says it all.

Peace,
dave
 
Last edited:
Will and bshwhatever you wana call it.. Chill and get off CJ's case, he made a thread it was proven that they are not, its OVER and DONE get over it and quit picking fights. Leave CJ alone and he will leave you alone, put him on ignore if you can't take it...
 
Holy shit this trolling needs to stop :(

Lock thread plz.
 
Status
Not open for further replies.





Back
Top