Jump to content
  • Sign Up

DOPE WARS


Recommended Posts

Oh, if you have netbios installed with your tcp/ip adapter and you have sharing enabled then ppl can just type in net use x://127.0.0.1 and get access to your computer...you can set it up for read only access and only on directories you want to share with us...I reckon this would be really cool if you guys want to share some mp3's or sumthin with me...I've got a lot of kewl tunes...and some comedy...usage of the phuck word is hilarious...pm me if your interested...I'll guide you through how to setup your computer...you might need your windows cd though....cheers..

 

putard

Link to comment
Share on other sites

Urbanhog...a port is a place in where the data from your modem goes into your computers memory...programs sit there and wait for stuff to come in and they chuck stuff out too..

 

TCP is transmission control protocol...basically it has all sorts of traffic rules builtin...ie. if it doesn't get a response in 1 sec it'll wait another 2 before trying etc..but it guarantees a response - even if it is a timeout.

UDP uniform datagram protocol or packets is a method of transfer that doesn't guarantee a response it just sends the data at a set rate and doesn't check for a response..

Interestingly the ADFA recently rewrote tcp so they could use it with radio...isn't that neat??? I'd luv to have that...oh well...there's always ham radio...never tried that though..I think that's internet protocol over citizens band or sumthin...out

Oh yeah, incase yur wondering...all that udp and tcp/ip stuff sits underneath those ports...basically the chain goes like this:-

 

you -> interaction <-> program <-> port <-> tcp or udp <-> your isp <-> internet <-> their isp <-> tcp or udp <-> port <-> program <-> interaction <- them

 

if your a voracious reader like me you might want to read about the OSI model - that's the open system interconection model...it has 7 layers...

Edited by Mr Putard
Link to comment
Share on other sites

Guest Urbanhog

Many thanks Putard,

 

Now I understand a lot clearer.... liked that "you -> interaction <-> program <-> port <-> tcp or udp <-> your isp <-> internet <-> their isp <-> tcp or udp <-> port <-> program <-> interaction <- them" explaniation...very straightforward. :o

 

Cool, thanks for ya time :o

 

Urbanhog lol

Link to comment
Share on other sites

Like using a sprinkler system, one tap and many outlets (one PC, many ports), only the outlets also work as inlets and there is a danger that some of them could bring a poison (virus/trojan) into the system and spread it around through the other outlets and back up through the tap to harm everything it waters (your PC & internet).

 

Putard, I realise that this is a very loose explanation and open to a lot of correction, I'm just trying to put it in plain English, difficult enough at the best of times when dealing with a pack of stoners. :lol:

 

http://www.gamers-forums.com/smilies/contrib/ruinkai/coolgleamA.gif http://64.207.13.28/mysmilies/otn/glasses/smokin.gif

Link to comment
Share on other sites

That's correct...hackers usually target the programs that serve data through those ports or listen on them.. Most get in from vulnerabilities in software...so it's also a good idea to keep your ear to the ground for security updates and fixes that various software companies release..especially microsoft..
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Restore formatting

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...

Important Information

By using the community in any way you agree to our Terms of Use and We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.