diff options
Diffstat (limited to 'old/published/Webmonkey/Monkey_Bites/2007/01.08.07/Fri/upside-down.txt')
-rw-r--r-- | old/published/Webmonkey/Monkey_Bites/2007/01.08.07/Fri/upside-down.txt | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/old/published/Webmonkey/Monkey_Bites/2007/01.08.07/Fri/upside-down.txt b/old/published/Webmonkey/Monkey_Bites/2007/01.08.07/Fri/upside-down.txt new file mode 100644 index 0000000..f849328 --- /dev/null +++ b/old/published/Webmonkey/Monkey_Bites/2007/01.08.07/Fri/upside-down.txt @@ -0,0 +1 @@ +If you live in a major metropolitan area and you have a wireless router chances are someone at some point has leeched your signal. If that bothers you, you could encrypt the signal, you could block unknown MAC addresses, or you could just mess with people's heads.
Pete Stevens was faced with these choices and opted for number three. Using a bit of networking know-how he split his signal into two networks, one trusted and one untrusted. He then messed with various aspects of the untrusted network including rerouting all traffic to [Kittenwar][2] and, my personal favorite, [the upside down internet][1].
Basically the upside down internet involves using iptables to run all untrusted traffic through a proxy server. The proxy server then downloads all the images from a page, inverts them and serves them out of its local webserver.
The results look like the screenshot below from Pete's site. He has the code available if you'd like to do something similar.
[Thanks to the NoEnd List for bring this to my attention.]
[1]: http://www.ex-parrot.com/~pete/upside-down-ternet.html "Upside-Down-Ternet"
[2]: http://kittenwar.com/ "Kittenwar"
\ No newline at end of file |