Hi Cavin, I think the whole point of the exercise is to do it all together.
And going against 1 domain, is still hitting the same harware, so please dont. (and some hosts, in some circumstances, do grant shell access. Hacking a server while you already have shell access is a different story altogether, not so.) -- rgds, Reinier Battenberg Director Mountbatten Ltd. +256 758 801 749 www.mountbatten.net On Friday 10 December 2010 10:52:18 Mugarura Cavin wrote: > Hari, > > please send me consent form and proof of ownership > my fingers are itchin ..... > > Reinier, > > The controlled environment is a good option, since with shared hosting, its > hard to do much, since no host will give you ssh access for shared hosting > connect a linux box online, and associate it with a domain name, and put > there a dummy welcome page > if you dont have idle domain names, i have a few > > McTim > > i cant access wikileaks.org (even after trying to anonymouse it ( > anonymouse.org) > so i had to use http://213.251.145.96/ to get a hold of it -- This message has been scanned for viruses and dangerous content by MailScanner, and is believed to be clean.
_______________________________________________ The Uganda Linux User Group: http://linux.or.ug Send messages to this mailing list by addressing e-mails to: [email protected] Mailing list archives: http://www.mail-archive.com/[email protected]/ Mailing list settings: http://kym.net/mailman/listinfo/lug To unsubscribe: http://kym.net/mailman/options/lug The Uganda LUG mailing list is generously hosted by INFOCOM: http://www.infocom.co.ug/ The above comments and data are owned by whoever posted them (including attachments if any). The mailing list host is not responsible for them in any way.
