On 18/01/20 17:45, n952162 wrote:
> What protocol doesn't use acknowledgements?
> 
Why would an eavesdropper want to acknowledge ANYTHING? Isn't that the
whole point?

Cheers,
Wol
> 
> On 2020-01-18 14:50, Wols Lists wrote:
>> On 16/01/20 21:01, james wrote:
>>> On 1/13/20 3:24 AM, n952162 wrote:
>>>> On 2020-01-12 16:48, james wrote:
>>>>> I also install and re-install, as many of the gentoo systems get
>>>>> "attacked" before I can� complete a secure install, or the hackers
>>>>> just read much more than I do.
>>>>> I guess I'm still popular, in very negative way.
>>>>
>>>> Hmmm.� Is that "attacked" to be interpreted in some sort of
>>>> metaphorical
>>>> way or do you mean really hacked over the internet? May I ask how, and
>>>> how do you know?� What's involved in a secure install?
>>>
>>> Monitor your connection, with a system setup that the ethernet does not
>>> responds to any sort of request. The system just collects and log. NO,
>>> I'm not documenting how to do this, but various ways exist, documented
>>> on the internet to make *most* ethernet interface to where they are
>>> *one-direction* only. HOW you achieve this? There are a myriad of ways.
>>>
>>> Good Hunting and *never* tell anyone how *you* do this....
>>>
>> If you're handy with an ethernet crimping tool, just cut the TX wires
>> and put the interface into promiscuous mode ...
>>
>> Just be aware that - routers especially - can swap TX and RX so they
>> could possibly get round that.
>>
>> Cheers,
>> Wol
>>
>>
> 
> 


Reply via email to