home bbs files messages ]

Forums before death by AOL, social media and spammers... "We can't have nice things"

   alt.2600.hackers      Pretty sure it ain't about the Atari...      12,449 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 10,620 of 12,449   
   zan to All   
   IP address   
   17 Feb 06 08:08:41   
   
   From: naz@rcn.com   
      
   I am Being sued (civil ) by the music industry for allegedly distributing   
   music   
   through kazaa I am representing myself do to the outrages cost of a lawyer   
   that I cannot afford. I plan to use the defense that :   
      
      
   . An Internet Service Provider (ISP) such as RCN has no way of proving an   
   identity of a computer   
   system unless they use an authentication based protocol such as PPP/OE for   
   connectivity.   
   . In the event have an authentication based protocol is used, a computer can   
   only be truly identified if   
   logs are kept by the ISP that clearly states: The time of the login, The   
   User ID that logged in, the   
   MAC Address of the computer that logged in as well as the IP Address. Even   
   if these logs are   
   adequately maintained by the ISP there is still a possibility that a hacker   
   or malicious user could of   
   taken control of the machine and performed the login.   
   . ISP's typically provide "dynamic" IP addresses (also known as DHCP) which   
   change from time to   
   time. On a cable modem or DSL network this means that one day an IP Address   
   may belong to   
   Household A, and the next day (or hours late) it could belong to Household   
   B.   
   . IP Addresses can be faked or "spoofed"   
   . MAC addresses, while hard coded into a network interface cards (aka,   
   network card, aka wireless   
   cards) can be altered using utilities that are readily available via the   
   internet.   
   . Computer hackers use unprotected computers that are connected to the   
   internet as platforms for   
   storing illegal content such as pirated software, mp3's, porn, and other   
   inappropriate materials.   
   . Wireless routers that are purchased at retail stores such as Best Buy and   
   Circuit City are "open' by   
   default. This means that any individual with a wireless enabled PC can   
   access the internet through   
   the wireless router if not properly secured.   
   . Remote Desktop is a feature of Windows 2000 and Windows XP that allows   
   remote control over a   
   PC from the internet. If this feature was enabled and no passwords were   
   defined, any individual   
   could connect   
      
   If  these  statements are put into yes or no question form and asked of the   
   plaintiffs expert witness what response should / would be received   
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca