Welcome to Laser Pointer Forums - discuss green laser pointers, blue laser pointers, and all types of lasers

Buy Site Supporter Role (remove some ads) | LPF Donations

Links below open in new window

FrozenGate by Avery

Lpf






Wait, so you're telling me his IP didn't change ONCE in 5 years?

I know you said it was an account ban, but aren't IPs how you detect multiple accounts?
 
Last edited:
Only VG's account was banned, he can still visit the forum or attempt to join again. IP bans only occur for bots (spammers, malicious attacks, ect.) AFAIK.

I know you said it was an account ban, but aren't IPs how you detect multiple accounts?

One of the many, many ways. I would share details of the other detection systems in place, but then people would know how to circumvent them :p

Thank God, but how did he slide under the radar for almost 5 years?

Some slip through the cracks, it's inevitable.
 
Only VG's account was banned, he can still visit the forum or attempt to join again. IP bans only occur for bots (spammers, malicious attacks, ect.) AFAIK.

One of the many, many ways. I would share details of the other detection systems in place, but then people would know how to circumvent them :p

Some slip through the cracks, it's inevitable.

Visible Green just didn't "get it" --what people were indicating to him. He had plenty of warnings and just continued with aggressive and obnoxious language and comments + the immature/angry child neg rep in response to neg rep refusing to learn from the neg rep situation.

Nice work ARG! Was long overdue.
InfinitusEquitas was 100% correct in his comments. LPF should not have to babysit disruptive/angry children--is not what LPF is about.

All's well that ends well. Thanks!
 
Last edited:
Wait, so you're telling me his IP didn't change ONCE in 5 years?

I know you said it was an account ban, but aren't IPs how you detect multiple accounts?

It depends on where he was logging in from. A lot of businesses and corporations will have static IPs. Especially if they have multiple locations with secure networks connecting them.
 
It depends on where he was logging in from. A lot of businesses and corporations will have static IPs. Especially if they have multiple locations with secure networks connecting them.

Most residential connections, I believe, use dynamic addressing (e.g. DHCP). However I noticed on my service (using DHCP) that if I never turn my modem/router off, I have the same IP address for weeks. Maybe months.
 
  • Like
Reactions: ped
Oh it's so easy to fake a different IP, I use a proxy just for privacy reasons and can log in from lots of different places in the US and abroad, but that won't necessarily stop you from being detected here if you were banned in the past, there are other ways.
 
Last edited:
It depends on where he was logging in from. A lot of businesses and corporations will have static IPs. Especially if they have multiple locations with secure networks connecting them.

True, but I doubt he'd keep using work computers to log into LPF once he was banned. He may have been immature, but he wasn't stupid.

Oh it's so easy to fake a different IP, I use a proxy just for privacy reasons and can log in from lots of different places in the US and abroad and only costs me three dollars a month, but that won't necessarily stop you from being detected here if you were banned in the past, there are other ways.

I'm really interested in finding out what these "other ways" are. If anyone wants to reply to this, please do so over PM for reasons ARG pointed out.
I'm confused as to how you can get solid evidence that a machine is the same machine that logged in under a different IP, I mean unless they tell someone or used the same email I really can't see how they'd pull it off.
 
Well, if they really wanted to, I know of a couple, but they would have to use the same machine again, but if you use authorship identification techniques, that won't help. Their writing behaviors will give them away, in time. Running a program to sort through all of the posts online to see who uses words certain ways repeatedly and they are given away. No one writes exactly the same way, some words can be used in many different orders, but individuals usually stick to one way of writing and that's the keyboard fingerprint. Of course, a far simpler way is just seeing another member repeat the same behavior & if they were a pain before, they often will be the same pain again. I would have to stop editing my posts to hide and never show an interest in beam expanders again :p
 
Last edited:
Well, if they really wanted to, I know of a couple, but they would have to use the same machine again, but if you use authorship identification techniques, that won't help. Their writing behaviors will give them away, in time. Running a program to sort through all of the posts online to see who uses words certain ways repeatedly and they are given away. No one writes exactly the same way, some words can be used in many different orders, but individuals usually stick to one way of writing and that's the keyboard finger print. Of course, a far simpler way is just seeing another member repeat the same behavior & if they were a pain before, they often will be the same pain again. I would have to stop editing my posts to hide and never show an interest in beam expanders again :p

Yes, but that's far from hard evidence. The only way that I can see that you could get that is from their IP or possibly the ISP they used to connect.

I understand that this is a forum and not the real world, and the mods don't even need a reason to ban people. But banning someone because their writing style is similar to someone else's who previously got banned seems unfair IMO.

(Poorly constructed sentence is poorly constructed.)
 
Last edited:
Yep, you wouldn't likely do that, it would need to be more in my opinion too.
 
hmm the most easy way i can think of is using TOR browser and register using a different e-mail account or use proxy like Alaskan stated or a combination of all those technique.

( i tried on a random forum where i got banned due to showing people how to carries out cyber warfare activities...)
 





Back
Top