On 18/01/20 17:45, n952162 wrote: > What protocol doesn't use acknowledgements? > Why would an eavesdropper want to acknowledge ANYTHING? Isn't that the whole point?
Cheers, Wol > > On 2020-01-18 14:50, Wols Lists wrote: >> On 16/01/20 21:01, james wrote: >>> On 1/13/20 3:24 AM, n952162 wrote: >>>> On 2020-01-12 16:48, james wrote: >>>>> I also install and re-install, as many of the gentoo systems get >>>>> "attacked" before I can� complete a secure install, or the hackers >>>>> just read much more than I do. >>>>> I guess I'm still popular, in very negative way. >>>> >>>> Hmmm.� Is that "attacked" to be interpreted in some sort of >>>> metaphorical >>>> way or do you mean really hacked over the internet? May I ask how, and >>>> how do you know?� What's involved in a secure install? >>> >>> Monitor your connection, with a system setup that the ethernet does not >>> responds to any sort of request. The system just collects and log. NO, >>> I'm not documenting how to do this, but various ways exist, documented >>> on the internet to make *most* ethernet interface to where they are >>> *one-direction* only. HOW you achieve this? There are a myriad of ways. >>> >>> Good Hunting and *never* tell anyone how *you* do this.... >>> >> If you're handy with an ethernet crimping tool, just cut the TX wires >> and put the interface into promiscuous mode ... >> >> Just be aware that - routers especially - can swap TX and RX so they >> could possibly get round that. >> >> Cheers, >> Wol >> >> > >