Hi Cavin,

I think the whole point of the exercise is to do it all together.

And going against 1 domain, is still hitting the same harware, so please dont.

(and some hosts, in some circumstances, do grant shell access. Hacking a 
server while you already have shell access is a different story altogether, 
not so.)

-- 
rgds,

Reinier Battenberg
Director
Mountbatten Ltd.
+256 758 801 749
www.mountbatten.net



On Friday 10 December 2010 10:52:18 Mugarura Cavin wrote:
> Hari,
> 
> please send me consent form and proof of ownership
> my fingers are itchin .....
> 
> Reinier,
> 
> The controlled environment is a good option, since with shared hosting, its
> hard to do much, since no host will give you ssh access for shared hosting
> connect a linux box online, and associate it with a domain name, and put
> there a dummy welcome page
> if you dont have idle domain names, i have a few
> 
> McTim
> 
> i cant access wikileaks.org (even after trying to anonymouse it (
> anonymouse.org)
> so i had to use http://213.251.145.96/ to get a hold of it

-- 
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.

_______________________________________________
The Uganda Linux User Group: http://linux.or.ug

Send messages to this mailing list by addressing e-mails to: [email protected]
Mailing list archives: http://www.mail-archive.com/[email protected]/
Mailing list settings: http://kym.net/mailman/listinfo/lug
To unsubscribe: http://kym.net/mailman/options/lug

The Uganda LUG mailing list is generously hosted by INFOCOM: 
http://www.infocom.co.ug/

The above comments and data are owned by whoever posted them (including 
attachments if any). The mailing list host is not responsible for them in any 
way.

Reply via email to