I seriously doubt that would help him. There's a difference betweenWell, the thing is to have P2P packets identified and marked. Then you can either shape them - or drop/reject/fax them to your grandma. Identifying just by port numbers is impossible (except one wants to block any non privileged port). This is the point where ipp2p gets interesting. Am I thinking wrong?
shaping traffic and not wanting any of those traffic :-]
Cheers, Tobias
-- gentoo-user@gentoo.org mailing list