TSTT Forum: darkane - Viewing Profile

Jump to content

darkane's Profile User Rating: -----

Reputation: 0 Neutral
Group:
Members
Active Posts:
3 (0 per day)
Most Active In:
High Speed ADSL (3 posts)
Joined:
13-June 07
Profile Views:
1,523
Last Active:
User is offline Aug 31 2007 04:25 PM
Currently:
Offline

Latest Visitors

Icon   darkane has not set their status

Posts I've Made

  1. In Topic: proper Bridging to facilitate MAC filtering Paradyne 6218

    Posted 4 Jul 2007

    you are the best .. guys with all this response
    i was out of town sorry for not replying soon
    now i will answer your questions

    Quote

    I think he was reffering to using the default 255.255.255.0 subnet mask, but different IP ranges (ie 192.168.1.* & 192.168.2.*). But yeah, I'm still trying to figure out what the point of subnets really is

    i was referring to that exactly and the point is the malicious user will get into the internal LAN behind the speedtouch but will not be able to get on the internet since there is still the Paradyne router , he can't intercept that how can he intercept something outside the internal network
    something that is between the speedtouch and the paradyne , Srnoth what you said in the first was exactly what i thought about why do you all now think it is wrong do i a have a misconception?

    Quote

    the last part is very interesting, how are u sharing the internet through wire or wireless

    well it is wired i have 4 or 5 unmanaged switches up linked to the router covering few building and wireless feature is actually disabled I don't need it for many reasons the best of them is that my neighbours don't have wireless cards

    Quote

    if he already knows how to spoof IPs, that means he will most probably know how to spoof MAC addresses too, so even if you ban his current MAC address, he'll just change it and do the same thing all over again

    although i was warned about this point by many articles and it is very logic i was surprised that along my very long hunt of this guy he simply never ever did change his MAC we did take 5 -6
    hours plugging / unplugging cables on different switches on roofs of building while i was at the pc watching the users getting off and on it was so cool btw like a suspense movie , the usual suspects teens were clear one by one one and we were pulling our hair till the bad guy turned out to be a big man supposed to be respectable
    my friend the administrator cut off the link and all was good for weeks when it all started again
    and Part II was even uglier than part one because the idea I read about virtual MAcs used by switches made feel frustrated this is beyond me we are talking about layer 2 termonology
    and btw i dont make money from this the administrator who owns the network makes money from it i am just a user but since I'm an addict to the internet and i know better than the admin I do it as volunteer i just want the connection to work for all of us
    I think that the malicious user have managed to get hooked through another neighbor or perhaps moved on and somehow fooled the admin so he got back on track in an inconvenient way even to him since he is not doing it in the light so he gave up like we did 2 weeks ago
    my friend tells me that everything was working perfect when i was out and i m here it looks very stable that was the news but I was wondering can anyone comment on the tutorial on searchnetworking.com
    http://searchnetwork... m/tip...1069224,00.html
    regarding our SOHO networks?? i appreciate it
  2. In Topic: proper Bridging to facilitate MAC filtering Paradyne 6218

    Posted 20 Jun 2007

    Quote

    which you wish to use to control access to your internet connection. Is this correct?

    yes it is correct

    Quote

    Then using a network cable connect the WAN/Internet port on the new router to a LAN port on the old router.

    this is what confuses me because WAN port suits phone jack while LAN port needs RJ45 jack how can this work? it either needs a weirdly suitable cable or my routers don't have the ports needed to perform this setup , I understand the second part about IP hopefully I will use it if i get to connect the ports right

    Quote

    One question though, what environment are you using this setup in? Is it a large network like in a school or something? And are you trying to prevent unauthorized users from getting access to the internet by plugging in to the network? Just wondering, cus I've never heard of this situation before.

    actually it is a neighborhood network LOL I got like 20 neighbor connected and the real problem can be described as losing connection at most PCs while the router is working fine after investigating the router and network i noticed a certain MAC address spoofing IPs like what happend in ARP poisoning which is probably the case he steals people's IPs and take the whole network for himself it got pretty hard to determine who he is or maybe it is even a switch problem i read once on "searchnetworking.com" that sometimes switches may use virtual MAC addresses for certain purposes whatever it is I know the MAC that gives me problems I ban it I save myself the headache i am having everyday
    thanks for your response Stephen , how do you find my paragraphs this time btw ? :)

My Information

Member Title:
Newbie
Age:
Age Unknown
Birthday:
Birthday Unknown

Contact Information

E-mail:
Private

Friends

darkane hasn't added any friends yet.

Comments

darkane has no profile comments yet. Why not say hello?