At 3:37 PM -0500 8/4/06, Richard Lynch wrote:
> http://www.caida.org/publications/papers/2005/fingerprinting/
Just to be pedantic...
It's using the clock skew of the user's computer, and I don't think
that has anything to do with PC-NIC-CABLE-FIREWALL combination
communication.
Rather, it is
On Fri, August 4, 2006 1:08 pm, Jim Moseby wrote:
>>
>> Jim Moseby wrote:
>> >
>> > I recently read an article about IP fingerprinting. The
>> concept is that
>> > every PC-NIC-CABLE-FIREWALL combination has subtle, but measurable
>> > differences in the way they communicate. It was very
>> in-de
On Fri, August 4, 2006 10:25 am, Andrew Senyshyn wrote:
> I need to get local user IP, but server with apache and php is in
> another subnetwork.
> So from server environment I can get only router's IP.
> The only solution that I see - is getting with some magic algorithm
> local IP from brouser an
>
> Jim Moseby wrote:
> >
> > Found it:
> >
> > http://www.caida.org/publications/papers/2005/fingerprinting/
>
> Thanks! Interesting stuff...
>
> Regards,
> Austin.
No problem. My recollection of the technique was a bit off, but the concept
was still there. ;-)
JM
--
PHP General Mail
Jim Moseby wrote:
>
> Found it:
>
> http://www.caida.org/publications/papers/2005/fingerprinting/
Thanks! Interesting stuff...
Regards,
Austin.
signature.asc
Description: OpenPGP digital signature
Austin Denyer wrote:
> Jochem Maas wrote:
>> John Nichel wrote:
>>> Well, if you would stop using the Vic20, and upgrade!
>> how dare you call my altair a vic20. new-fangled rubbish. ;-)
>> you want real authentication? get some carrier pidgeons like us real
>> programmers.
>
> So, how many differ
tedd wrote:
At 1:26 PM -0400 8/4/06, John Nichel wrote:
tedd wrote:
At 12:55 PM -0400 8/4/06, John Nichel wrote:
Wait, are you telling me that I can't auth my customers based on IP
alone? Great, now how do I let them view their sensitive data? ;)
Okay, how do you?
Retina scan, and DNA sa
Jochem Maas wrote:
> John Nichel wrote:
>>
>>Well, if you would stop using the Vic20, and upgrade!
>
> how dare you call my altair a vic20. new-fangled rubbish. ;-)
> you want real authentication? get some carrier pidgeons like us real
> programmers.
So, how many different tunes did you get your
John Nichel wrote:
> Jochem Maas wrote:
>> Jim Moseby wrote:
Jim Moseby wrote:
> I recently read an article about IP fingerprinting. The
concept is that
> every PC-NIC-CABLE-FIREWALL combination has subtle, but measurable
> differences in the way they communicate. It was ve
Jochem Maas wrote:
Jim Moseby wrote:
Jim Moseby wrote:
I recently read an article about IP fingerprinting. The
concept is that
every PC-NIC-CABLE-FIREWALL combination has subtle, but measurable
differences in the way they communicate. It was very
in-depth, but it
worked amazingly well.
Jim Moseby wrote:
>> Jim Moseby wrote:
>>> I recently read an article about IP fingerprinting. The
>> concept is that
>>> every PC-NIC-CABLE-FIREWALL combination has subtle, but measurable
>>> differences in the way they communicate. It was very
>> in-depth, but it
>>> worked amazingly well. I
>
> Jim Moseby wrote:
> >
> > I recently read an article about IP fingerprinting. The
> concept is that
> > every PC-NIC-CABLE-FIREWALL combination has subtle, but measurable
> > differences in the way they communicate. It was very
> in-depth, but it
> > worked amazingly well. If I can find
Jim Moseby wrote:
>
> I recently read an article about IP fingerprinting. The concept is that
> every PC-NIC-CABLE-FIREWALL combination has subtle, but measurable
> differences in the way they communicate. It was very in-depth, but it
> worked amazingly well. If I can find the article, I'll pos
>
> Thanks.
>
> Not that I have done this on the net, but has anyone thought about
> using a fuzzy logic approach to the problem? While it wouldn't be a
> perfect solution, you could set a threshold you're comfortable with.
>
> Also while your DNA comment was meant to be humorous, it's not a b
At 1:26 PM -0400 8/4/06, John Nichel wrote:
tedd wrote:
At 12:55 PM -0400 8/4/06, John Nichel wrote:
Wait, are you telling me that I can't auth my customers based on IP
alone? Great, now how do I let them view their sensitive data? ;)
Okay, how do you?
Retina scan, and DNA sample.
Seriou
Jochem Maas wrote:
Andrew Senyshyn wrote:
Hi all,
I need to get local user IP, but server with apache and php is in
another subnetwork.
So from server environment I can get only router's IP.
The only solution that I see - is getting with some magic algorithm
local IP from brouser and sending it
tedd wrote:
At 12:55 PM -0400 8/4/06, John Nichel wrote:
Wait, are you telling me that I can't auth my customers based on IP
alone? Great, now how do I let them view their sensitive data? ;)
Okay, how do you?
Retina scan, and DNA sample.
Seriously though, not by IP in any way, shape or f
At 12:55 PM -0400 8/4/06, John Nichel wrote:
Wait, are you telling me that I can't auth my customers based on IP
alone? Great, now how do I let them view their sensitive data? ;)
Okay, how do you?
tedd
--
---
http://sperling.com http://ancientstones.com http://earthstones.com
--
PHP G
Andrew Senyshyn wrote:
> Hi all,
>
> I need to get local user IP, but server with apache and php is in
> another subnetwork.
> So from server environment I can get only router's IP.
> The only solution that I see - is getting with some magic algorithm
> local IP from brouser and sending it to serv
Hi all,
I need to get local user IP, but server with apache and php is in
another subnetwork.
So from server environment I can get only router's IP.
The only solution that I see - is getting with some magic algorithm
local IP from brouser and sending it to server.
My application is for intrane
20 matches
Mail list logo