Forums before death by AOL, social media and spammers... "We can't have nice things"
|    alt.2600.hackers    |    Pretty sure it ain't about the Atari...    |    12,449 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 10,620 of 12,449    |
|    zan to All    |
|    IP address    |
|    17 Feb 06 08:08:41    |
      From: naz@rcn.com              I am Being sued (civil ) by the music industry for allegedly distributing       music       through kazaa I am representing myself do to the outrages cost of a lawyer       that I cannot afford. I plan to use the defense that :                     . An Internet Service Provider (ISP) such as RCN has no way of proving an       identity of a computer       system unless they use an authentication based protocol such as PPP/OE for       connectivity.       . In the event have an authentication based protocol is used, a computer can       only be truly identified if       logs are kept by the ISP that clearly states: The time of the login, The       User ID that logged in, the       MAC Address of the computer that logged in as well as the IP Address. Even       if these logs are       adequately maintained by the ISP there is still a possibility that a hacker       or malicious user could of       taken control of the machine and performed the login.       . ISP's typically provide "dynamic" IP addresses (also known as DHCP) which       change from time to       time. On a cable modem or DSL network this means that one day an IP Address       may belong to       Household A, and the next day (or hours late) it could belong to Household       B.       . IP Addresses can be faked or "spoofed"       . MAC addresses, while hard coded into a network interface cards (aka,       network card, aka wireless       cards) can be altered using utilities that are readily available via the       internet.       . Computer hackers use unprotected computers that are connected to the       internet as platforms for       storing illegal content such as pirated software, mp3's, porn, and other       inappropriate materials.       . Wireless routers that are purchased at retail stores such as Best Buy and       Circuit City are "open' by       default. This means that any individual with a wireless enabled PC can       access the internet through       the wireless router if not properly secured.       . Remote Desktop is a feature of Windows 2000 and Windows XP that allows       remote control over a       PC from the internet. If this feature was enabled and no passwords were       defined, any individual       could connect              If these statements are put into yes or no question form and asked of the       plaintiffs expert witness what response should / would be received              --- SoupGate-Win32 v1.05        * Origin: you cannot sedate... all the things you hate (1:229/2)    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca