Internet Connection Sharing. Using IP Masquerading
Results 1 to 9 of 9

Thread: Internet Connection Sharing. Using IP Masquerading

  1. #1
    Senior Member
    Join Date
    Sep 2003
    Posts
    554

    Internet Connection Sharing. Using IP Masquerading



    I think that these two people need to grow up.

    Ie cyru5_nuk3
    reset_button

    so i have taken the tutorial off.
    As things were getting a lil heated.

    MsMittens you can neg me if you want, at the moment im 2 upset to care because obvioulsy i've done the wrong thing, and i've just wasted 3 days putting that together.
    With the help of others.

    Anyhow bye and have a good day everyone.

    peace i'm out.


  2. #2
    Senior Member
    Join Date
    Sep 2003
    Posts
    279
    Very Nice Job
    AntiOnline Quick Forum Version 2b Click Here
    10010101000000110010001100111

  3. #3
    Just a Virtualized Geek MrLinus's Avatar
    Join Date
    Sep 2001
    Location
    Redondo Beach, CA
    Posts
    7,324
    **Moved from Tutorials to Antionline General Chit Chat**

    Interesting how it's word-for-word (with minor name changes) of http://www.unixgeeks.org/security/ne...sc/ipmasq.html , Published in 2001. You forgot to remove some of the "munk" references.
    Goodbye, Mittens (1992-2008). My pillow will be cold without your purring beside my head
    Extra! Extra! Get your FREE copy of Insight Newsletter||MsMittens' HomePage

  4. #4
    Senior Member
    Join Date
    May 2003
    Posts
    747
    Nothing gets past Ms.Mittens.

  5. #5
    Senior Member
    Join Date
    Sep 2003
    Posts
    554
    Ms Mittens i have compiled the information from various places.

    I have included all the links to were i got the information from, and i am not saying that i thought of every single piece of writing in it.

    I did get help from others.
    I did get help with collection of the information.

    Anyhow cheers

  6. #6
    Just a Virtualized Geek MrLinus's Avatar
    Join Date
    Sep 2001
    Location
    Redondo Beach, CA
    Posts
    7,324
    Well, my first feedback is if you are submitting it as an assignment, you will (or should) be nailed for plagarism. This is not original work, which is what is asked of when submitting to the Tutorials section.

    Second, this is all from one source (the one I linked) it is word for word except for minor changes (where you put in kriz reid instead of "Modified by Andrey V. Savochkin and others" and win98 instead of win95).

    I would humbly suggest that for future reference when you submit a tutorial you write it yourself (majority of it) and what sections you use to support the tutorial (howtos etc) you reference at the end (like a proper paper).
    Goodbye, Mittens (1992-2008). My pillow will be cold without your purring beside my head
    Extra! Extra! Get your FREE copy of Insight Newsletter||MsMittens' HomePage

  7. #7
    I'd rather be fishing DjM's Avatar
    Join Date
    Aug 2001
    Location
    The Great White North
    Posts
    1,867
    Back to you MsM, given your a Professor and creative_32X_mx is claiming this to be
    my final Assignment for a course
    what grade would you assign to his/her work?


    Cheers:


    /edit
    OK never mind, I think you prety much answered it before I could post.
    DjM

  8. #8
    Just a Virtualized Geek MrLinus's Avatar
    Join Date
    Sep 2001
    Location
    Redondo Beach, CA
    Posts
    7,324
    If a student submitted this to me, the grade would be a 0 and a report of "cheating" to the Dean. This in turn would end up on the student's permanent record. 2nd offense would be explusion. The college's policy is strict on it and I adhere to that because taking someone else's work and claiming it as your own really cheats you more than anyone else. You learn nothing by C&Ping someone elses work. But that's my opinion, for what it's worth.
    Goodbye, Mittens (1992-2008). My pillow will be cold without your purring beside my head
    Extra! Extra! Get your FREE copy of Insight Newsletter||MsMittens' HomePage

  9. #9
    Banned
    Join Date
    Sep 2003
    Posts
    61
    Hey creative
    Thumbs up for that effort.

    And why are you picking on her Msmittens?

    I could tell the difference, and she has not commited no crime, as you could clearly see at the bottom of the page she has admitted to recieving help, and that she COMPILED the INFORMATION + she has INCLUDED LINKS to were she got the info

    Anyhow i don't care if it resembles another tutorial somewere else.
    Because it's the first an original tut here,
    There first tutorial covering this subject

    Unlike most of the others lying around here.
    Witch have been cut an pasted and re threaded.

    SO who care's if it looks like another tut
    Anyhow cheers
    And good luck with handing it in creative, PM
    when you get the results

    Online Linux Firewall / Security Sites

    There are numerous sources of help for setting up your firewall under linux, whether for masquerading or otherwise.

    The Original Firemasq Site - the home of the original 'firemasq' script used in this article.
    HMMM HERE'S A LINK TO WERE THE FIREMASQ SCRIPT CAME FROM

    The Linux IP Masquerade Resource - the home of IP Masquerading on the internet!
    HMMM THERE'S ANOTHER ONE
    FAQ: Firewall Forensics (What am I seeing?) - a good site on interpreting your firewall logs.
    OOPPS AND ANOTHER
    Linux Security Administrator's Guide - similar to the NAG, but with emphasis on general security - worth a skim read at least.
    DAMMN AND ANOTHER
    Total Simplicity Security Scan - test your firewall setup with this online scanner.
    **** THIS HERE'S ANOTHER






    MSMITTENS YOU OBVIOUSLY NEED TO READ BEFORE YOU CRITICE.

    INFACT THAT TUTORIAL WAS BETTER THEN ANY THAT YOU'VE EVER DONE.
    AND CREATIVE IS STILL A NOOBIE TO COMPUTERS

    AND WHAT YOUR A PROFESSOR

    HMMMM LOOKS LIKE A NOOBIE PUT A GOOD TUT IN THIS DECAYIN SITE.
    AND YOUR A LIL SHITTY BECAUSE YOU DIDN'T GET TO POST IT?

    HMMM ISN'T THAT TYPICAL THOUGH, YOU SENIOR ****S BAG OUT US NOOBS WHEN WE TRY AND YET WHEN ONE SENIOR GETS BUSTED RIPPIN PEOPLES TUTORIALS FROM OTHER SITES THEY GET AWAY WITH IT.




    FOR EXAMPLE NOODLES!
    NOW ALL HE'S TUTORIALS ARE STOLEN FROM WWW.HACKERTHREADS.ORG

    BUT HE GET'S AWAY WITH THAT?

    AND YET CREATIVE ACTUALLY SPENT 3 DAYS ON THAT AND YOU SHOOT TO KILL AT THE FIRST CHANCE YOU GOT?

    AND WHY THE **** DID YOU MOVE THE THREAD INTO THIS FORUM?

    MAYBE YOU DONE THIS SO SOMEONE LIKE PWARNING WOULD SEE THIS AND NEG CREATIVE FOR POSTING IN THE WRONG FORUM?

    I THINK THAT MIGHT JUST BE THE CASE,

    IM GLAD IVE WOKEN UP TO YOU LOT,. AND FOR NOW ON IM GONNA SPEAK WHAT'S ON MY MIND AND IF THAT GETS ME BANNED THEN
    BIG LOSE

    AND BESIDES HAVENT ANYOF YOU' GEEKS NOTICED THAT THIS SITE IS STILL MIRRORED FROM BEING ATTACK NOT THAT LONG AGO.

    YEAH SHOW HOW MUCH OU REALLY KNOW ABOUT YOUR BELOVED ANTIONLINE.

    HMMM WITCH REMINDS ME THERES A SITE CALLED ANTIOFFLINE
    WHAT ARE YOU LOT GONNA GANG UP ON THAT PLACE AND THROW YOU LIL RED DOTS AT IT, THEN CRITICE IT FOR BEING NAMED SIMILAR TO THIS SITE?

    AND WHAT ABOUT JP'S KNEW SITE HOW ****ED IS THAT SITE, GOD I THOUGHT THIS PLACE COULD GET BORING **** I WAS WRONG

    DONT WORRY MS MITTENS YOU CAN DELETE ME BUT I GOT THE POWERS OF CUT AN PAST
    TO BAD IF I PAST THIS IN FORUM AFTER FORUM HUH MAYBE IN EVERYROOM
    LETS SEE YOU STOP THAT YOU IDIOT

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •