Page 2 of 2 FirstFirst 12
Results 11 to 17 of 17

Thread: Administering P2P

  1. #11
    Junior Member
    Join Date
    Jul 2004
    Posts
    16

    I think I should go read more about this

    That's a third party tool right sshl tunnel? I'm sorry I don't rightly know. I should read up first about this.
    With my observation though, most of the competent security officers left the country 'cause of the 'incidents' here. So administration is left to people with less than a year of experience. But I am quite sure that the software/hardware is solid, since the government here doesn't really care for expense. So it is left to the machines to 'spy' on the traffic.
    Can you please give me a small description of this ssh tunneling?

  2. #12
    Just a Virtualized Geek MrLinus's Avatar
    Join Date
    Sep 2001
    Location
    Redondo Beach, CA
    Posts
    7,323
    Google has always been my resource for finding out things. Basically, you connect to an SSH server and then through that connection, launch the application. I'll give you a simple example.

    My school doesn't allow IRC connections. So to connect to the Unerror.com irc servers, I ssh to my server at home and use the BitchX client there. Another example is when I want to ensure that my security students don't pick up on my password when logging into websites that do not have encryption for their logins. I'll ssh to my work server and launch mozilla from the server. With XWindows forwarded, I can now ensure that the connection is encrypted in the LAN area.

    In your case I'd look for an SSH server outside of the Saudi ISP range (say in the US or Europe).
    Goodbye, Mittens (1992-2008). My pillow will be cold without your purring beside my head
    Extra! Extra! Get your FREE copy of Insight Newsletter||MsMittens' HomePage

  3. #13
    Senior Member
    Join Date
    Oct 2002
    Posts
    4,055
    MsMitten's: Are you recommending one that doesn't belong to him, or..? I'm a little confused on what your suggesting when you said:

    In your case I'd look for an SSH server outside of the Saudi ISP range (say in the US or Europe).
    In either sense, I use SSH tunneling almost daily. And like MsM, I'm not allowed on a "chat device" at work (mine being AIM). So I SSH to my naim client at home on my OpenBSD box and I'm good .
    Space For Rent.. =]

  4. #14
    Just a Virtualized Geek MrLinus's Avatar
    Join Date
    Sep 2001
    Location
    Redondo Beach, CA
    Posts
    7,323
    Are you recommending one that doesn't belong to him, or..?
    No. One that he has legit access to but isn't hosted by a Saudi ISP.
    Goodbye, Mittens (1992-2008). My pillow will be cold without your purring beside my head
    Extra! Extra! Get your FREE copy of Insight Newsletter||MsMittens' HomePage

  5. #15
    Junior Member
    Join Date
    Jul 2004
    Posts
    16

    okay

    I read about ssh, and I am now aware of its capabilities, though I can't readily use one. I have downloaded putty, which says provided tunneling.
    I know next to nothing about using it though. Concerning the host name is that the ISP provider or 'proxy server' that's supposed to be keyed in? If then where do I get these servers?
    Thanks

  6. #16
    Junior Member
    Join Date
    Dec 2002
    Posts
    22
    I have spent time(and still go on vacations) to a not so distant place from Saudi-Arabia. Where the rules almost match regarding pornography and explicit content.
    The ISP's mainly dont log(or block) P2P traffic. Only http is their main concern. Everybody uses P2P as they see fit for their needs there. You can use P2P without any fear. Everyone does. Although excessive usage on your part might alaram the admin and he could chose to look into the matter. But it's always safer to not-use anything that can be tracked. Use encrypted traffic, ssh tunneling, encrypted VPN, JAP(No flame please) or any other means of secure transfers.
    Side-Note: Most people use proxies on uncommon ports to bypass certain ISP bans on pornography. That is highly advised against to you because of severe http scrutiny by the officials, or those who bring in effect the rules.

  7. #17
    Junior Member
    Join Date
    Jul 2004
    Posts
    16

    Got it

    Thanks,
    curious though if you were the network administrator, what kind of network traffic would make you suspicious?
    I have to have it in kb or mb for me to better understand.
    But anyway you're answer/advice probably answered my question altogether anyway and for that I thank you.
    Thanks guys!!(points to pips above this post)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •