NoboDy KnoWs wHo I'M:Part 2:The HeLL GaTe Just OpeneD

on Monday, May 18, 2009

The truth is..UTP spent God knows how much on Symantec and Novell product. But none of it really works. We always stuck on error every now and then. Bet it,
DNS border manager error, or symantec overloaded is just normal. Either the products are faulty or the admins are dumb.

MoreOver, Our IT department think by reducing student internet usage can help fasten internet...within that they spend a lots of money to accomplish that goal,monitoring network...so for this purpose...network filter used ...NetworkBox arriveD ....yes,that system really works...but it is even make network become slower...

Guess what?the system only restrict student that qualified to be monitored..and only catch people that deserved to be caught ...what is that mean?..
They only catch idiots...idiots that don't know how to think wise...they catch idiots that don't know how to cover their track..they only catch Script kiddie that claim to be expert hacker!There was a time i heard from script kiddie said

"You know what?last week ITMS came to my house and check our connection usage..oh no...we are near to be caught",

somebody said that proudly.I just smile and walk a way,deep in my heart...
"This dumbass proud to be detected ..i wish him good luck.. -sigh-"



The problem is..IT department overlook the situation...they can get better or bigger internet bandwidth if they spend those money in right way...and use correct open source product for their internet management,which required self-setting...but then...none of them are capable doing that..so they decide to waste money for something that they can get equally for free/lower price...their egoistic also too strong...which kills the needs for asking IT expert students.

Back to the track...i start asking in forum...searching for solutions ...the first question as far as i remember is this on
1. Use Tor
2.Here's the idea: Different protocols handle data in different ways, but you can generally manage to transport the data for one protocol over another. (For example, an SSH session can be transported over HTTPS.) This is what I call protocol tunneling -- I don't think that's the actual name. If you set up a tunnel between your computer and an off-campus friend's computer, using a protocol that only transmits data in small chunks. I don't know enough about the various protocols and tools to know how one would construct this system, but it is definitely within the range of possibility.

From answer replied...i know there are 2 ways to solve my problem..first is of course using Tor. At that time there are only few people from my University know how to use tor...so the download speed is not really bad.Meanwhile...i also struggle how to speed it up ..so i learned a lots from that..like elite proxy, elite proxy switcher ,OpenDns, Local DNS cache..etc...

After a while,my interest change to second option..but i'm sorry i can't write anything relating second option because it is illegal , & can lead to academic dismissaL ..at least in my universityYOU

Own Research K!!



At first i really wish to introduce linux to my folks..i start asking around...up flayers promoting linux....sadly it turns out just few people interest with it...because many students think linux is sooooo complicated...all they want is short cut!



so i decided to move on my learning..
-a(0N3-

Then..I also wonder about hacking..what it really is..and how i'm able to be one...where can i found article or somebody to teach me? i found Nubuntu,and did explore few network software..but then it seems already arrived at the end of semester...



2o07-New Sem, New year.. 19th of February 2007, 16:21 GMT - ProtecH released...This awesome distribution really help me a lots exploring networking world..especially i'm able to compare with previous analysis related tor and tunnel...few weeks later..i become one of the moderator in protech forum.It really boost me up to explore networking in deep....Thank You P1nT4S !

Sadly...Protech main developers seems disappeared for sudden and next version hang in the middle...



few months later...Backtrack start become popular hacking distribution...many hacking video demonstrated using backtrack too...so i decided to give a try ..



(To Be ConTiNuEd) (Last ChaPteR)

0 comments: