Jump to content

LauBen

Active Members
  • Posts

    59
  • Joined

  • Last visited

Everything posted by LauBen

  1. DLSS you are spot on and right and from what you say if you want to leech we need to have a Belgium ISP :D I cant comment on the rest of Europe, but I have worked in the US and the UK and I know how a number of the ISP are starting to think. But hay, I think we have done this to death :D and like I said before DON'T LEECH
  2. Ok guys, if thats what you believe then fine, But at the end of the day if you are pulling Gigs of data down, whether its encrypted or not, then you will trigger your ISP's interest and maybe get your connection throttled. Even more so if the majority of your traffic can not be viewed by your ISP, their not stupid, they know what large amounts of SSL/encrypted traffic could mean (especially if you've not got a business package). If you don't what the risk of your connection being terminated, leagal action being taken, or your speed being caped then DON'T DL COPYWRITED STUFF.
  3. Ok thanks for that, I have to give it a try and see. Anyone got any ideas on what bits of the old Fon may need to be replaced??
  4. Hi Sparda, you are correct most ISP are not able to 'brake' SSL encrypted connections (unless aided by other outside bodies such as GCHQ ;) ) however their are a number of solutions that allow them to intercept this SSL traffic. Now this does poss a number of problems as SSL interception does have high CPU and RAM overheads, but still they do have this ability.
  5. I don't know about the US and the rest of the world but in the UK they do have this ability. I KNOW, I have tested a number of the tools they use. It's not strictly leagle even with the T&C's which we all have to sign-up too in order to get their internet service, but if you using their networks to link out to other sites and pass your connections through their infrastructure then, they do have this ability. This is simply because unless you can guarantee that at no-point during transmission, that any of your packets have been intercepted then you never really know who you are talking too/through. After all you are going over THEIR network
  6. Guys, Don't forget that even if you are using a "Secure" connection such as TLS/SSL/SSH then the ISP will still see a LARGE amount of traffic coming from and going to your modem/router. This high level of traffic is normally the first trigger for your ISP to start snooping on what you are doing. Furthermore, I would just like to say (again) even if you are using secure traffic protocols your ISP has the ability and the technology to intercept this traffic. Just think of them as the biggest 'Man-In-The-Middle' going ;) In short unless you have one wooded leg, a black patch over one eye, a parrot, and a passion for the sea, your not a PIRATE. So DON'T DOWNLOAD COPYWRITED STUFF!!!!
  7. Hi All, I have two questions :) been reading through the other posts and have run into a small problem . I set up my old Fon and had it all working with the guides from this site, but found the need for mains power to be a bit binding :( so I followed the threads and decided to build the battery pack. All went fine until I connected the pack to the Fon, first off the pack would not power the Fon, not even the lights :( I checked the Fon was working still on the mains and it did, then checked the power being supplied by the pack which was around 6 Volts. Then for some reason (aren't friends great ) the polarity of the power pack was reversed, still no joy and now the Fon will not work, even on the mains power supply. I would imagine that something has blown and needs to be replaced anyone got any ideas?? Secondly, fearing the worse I have ordered a new Fon from Dabs (a UK supplier) but the one thats turned up is a Fon+ the one with a Ethernet and Internet port a 2201 I believe. Now has anyone been able to get the 2201 working with Jasager ??
×
×
  • Create New...