2015 Banned Member Amnesty Program

The #1 community for Gun Owners of the Northeast

Member Benefits:

  • No ad networks!
  • Discuss all aspects of firearm ownership
  • Discuss anti-gun legislation
  • Buy, sell, and trade in the classified section
  • Chat with Local gun shops, ranges, trainers & other businesses
  • Discover free outdoor shooting areas
  • View up to date on firearm-related events
  • Share photos & video with other members
  • ...and so much more!
  • Status
    Not open for further replies.

    protegeV

    Ready to go
    Apr 3, 2011
    46,880
    TX
    When you log in there are numbers that get associated with your account. Your IP address and your MAC (media access controller) number. When you get banned your IP and your MAC number which an individual identification number for specific device. Routers NIC's and modems all have this number. In addition to your IP address pretty much all will ID you down to who you are. So once an IP address gets a ban even if you go to a friend's house to sign up for an account you will still never be able to sign on to any devices that may be associated to your screen name.so new cell phone cable modem new router and a new computer is what it would take to get past that first layer of defense. 2nd people write in a style that is unique to them. Use of words phrases and simple grammar mistakes are hard to miss. It is not hard to root out alternative accounts once you know what to look for. Like who would not suspect a person with the Screen name of Kemosobi not suppect that it would not be the lone ranger. Humans are creatures of habit and sooner or later people slip up and give themselves away.

    LR seems a little too persistent. He may be visiting the library soon...
     

    swinokur

    In a State of Bliss
    Patriot Picket
    Apr 15, 2009
    55,525
    Westminster USA
    If he does, a DNS query of the IP will show it as a county govt address. how would he visit regularly?

    it might work once. Norton and the mods are not stupid.
     

    Alea Jacta Est

    Extinguished member
    MDS Supporter
    Good God you folks are entertaining........:lol2:

    vBulletin has more holes in it than a wedge of cheap Swiss cheese.....:DI have ample alternate id's to lurk for a very long time........

    I make some obvious just to toy with Norton......sad part is that some folks are being banned that are not me.....like user Kemosabi.....can't take credit for that one.....

    MERRY CHRISTMAS to all!!!!!

    Hi Ho Silver away..................................
    Ego...a vice that you just cannot ever be rid of.
     

    protegeV

    Ready to go
    Apr 3, 2011
    46,880
    TX
    Good God you folks are entertaining........:lol2:

    vBulletin has more holes in it than a wedge of cheap Swiss cheese.....:DI have ample alternate id's to lurk for a very long time........

    I make some obvious just to toy with Norton......sad part is that some folks are being banned that are not me.....like user Kemosabi.....can't take credit for that one.....

    MERRY CHRISTMAS to all!!!!!

    Hi Ho Silver away..................................

    2879313.jpg
     

    smdub

    Ultimate Member
    MDS Supporter
    Nov 14, 2012
    4,693
    MoCo
    When you log in there are numbers that get associated with your account. Your IP address and your MAC (media access controller) number. When you get banned your IP and your MAC number which an individual identification number for specific device.

    I've modified an IP stack for a work project and IIRC the MAC doesn't travel along w/ the IP. MAC is part of the physical (ethernet) layer. IP protocol sits on top of that and does NOT encapsulate the MAC (never remember which layer is which in the OSI model.) Each node that an ethernet packet hops through gets its MAC replaced w/ that device. I don't think an end user (the website) can ever determine the originators MAC addr. The MAC they will see is the last one from their own ISP's router the server is connected to.
     

    webb297

    Ultimate Member
    Dec 29, 2010
    2,801
    Bowie
    So back to the original point of this thread, was this years effort of self-flagellation as successful as last years?
     

    psycosteve

    Meme magic works!!!
    Sep 3, 2012
    4,724
    Gentrfying the Hagersbush.
    I've modified an IP stack for a work project and IIRC the MAC doesn't travel along w/ the IP. MAC is part of the physical (ethernet) layer. IP protocol sits on top of that and does NOT encapsulate the MAC (never remember which layer is which in the OSI model.) Each node that an ethernet packet hops through gets its MAC replaced w/ that device. I don't think an end user (the website) can ever determine the originators MAC addr. The MAC they will see is the last one from their own ISP's router the server is connected to.

    I was intentionally vague about some details of the whole packet. This has something to do with the header information of FTP where it shows where the information is to be forwarded to. Looking at the packets is how most alt accounts will be found.
     

    swinokur

    In a State of Bliss
    Patriot Picket
    Apr 15, 2009
    55,525
    Westminster USA
    I've modified an IP stack for a work project and IIRC the MAC doesn't travel along w/ the IP. MAC is part of the physical (ethernet) layer. IP protocol sits on top of that and does NOT encapsulate the MAC (never remember which layer is which in the OSI model.) Each node that an ethernet packet hops through gets its MAC replaced w/ that device. I don't think an end user (the website) can ever determine the originators MAC addr. The MAC they will see is the last one from their own ISP's router the server is connected to.


    ^^^^

    this.

    MAC addresses are stipped off at the gateway router of the physical network and put back at the destination network
     

    Brooklyn

    I stand with John Locke.
    Jan 20, 2013
    13,095
    Plan D? Not worth the hassle.
    I've modified an IP stack for a work project and IIRC the MAC doesn't travel along w/ the IP. MAC is part of the physical (ethernet) layer. IP protocol sits on top of that and does NOT encapsulate the MAC (never remember which layer is which in the OSI model.) Each node that an ethernet packet hops through gets its MAC replaced w/ that device. I don't think an end user (the website) can ever determine the originators MAC addr. The MAC they will see is the last one from their own ISP's router the server is connected to.

    Yes. But the general point is true..

    Its a physical layer address.. and its easy to spoof..
    Any php based system is vulnerable as well.
    Not my area of experience..

    Only a muli factor log in would be up to the challenge...
     

    Alea Jacta Est

    Extinguished member
    MDS Supporter
    Yes. But the general point is true..

    Its a physical layer address.. and its easy to spoof..
    Any php based system is vulnerable as well.
    Not my area of experience..

    Only a muli factor log in would be up to the challenge...
    Yeah, and when the bleep zapper gets crossed with the gooble farber, you better be sure to have the Ixway hummelfarbed against the stippled wangus.

    That's how I'd handle it.

    But then, my flip phone was way smarter than me. My smart phone is a complete waste of money. Technology not my friend...then or now.

    Long as you guys keep the nitwits n knuckleheads at bay; thanks.
     
    Status
    Not open for further replies.

    Users who are viewing this thread

    Latest posts

    Forum statistics

    Threads
    276,034
    Messages
    7,305,526
    Members
    33,560
    Latest member
    JackW

    Latest threads

    Top Bottom