This is exactly how I feel when reading the posts about the security issues of the web...
Thanks P5 for putting into meme what my words could not describe.
Ya know what they say, a meme is worth a million words
This is exactly how I feel when reading the posts about the security issues of the web...
Thanks P5 for putting into meme what my words could not describe.
Yeah, and when the bleep zapper gets crossed with the gooble farber, you better be sure to have the Ixway hummelfarbed against the stippled wangus.
That's how I'd handle it.
But then, my flip phone was way smarter than me. My smart phone is a complete waste of money. Technology not my friend...then or now.
Long as you guys keep the nitwits n knuckleheads at bay; thanks.
...And the thingamabob's connected to the doohickey. And the doohickey's connected to the hoozit. And the hoozit's connected to.....
Egads!! THERE'S the problem. The hoozit isn't connected. Lemme fetch my hoozit wrench.
B1tch in the box. That's how I know her.
That's one nice thing about the iphone. It's tailor made for us dummies.
Anybody have an issue with the banning of LR now?
Related note, Norton deserves a medal.
B1tch in the box. That's how I know her.
Me n Siri are acquainted. B1tch routinely cusses me out in five different languages.
So much for the bigscreen High Fone.
You know...like, "I'm Siri I ever bought that thang."What's a "siri"?
I've modified an IP stack for a work project and IIRC the MAC doesn't travel along w/ the IP. MAC is part of the physical (ethernet) layer. IP protocol sits on top of that and does NOT encapsulate the MAC (never remember which layer is which in the OSI model.) Each node that an ethernet packet hops through gets its MAC replaced w/ that device. I don't think an end user (the website) can ever determine the originators MAC addr. The MAC they will see is the last one from their own ISP's router the server is connected to.
y'all are hurtin my brain...
Exactly, some serious nerd talk going on. Even my man psychosteve is in on the action, WTF?y'all are hurtin my brain...
Unfortunately you've failed to apprise the affect of the transcifigal fluglezend. 7 dimensional flux packets are in play as well.Yeah, and when the bleep zapper gets crossed with the gooble farber, you better be sure to have the Ixway hummelfarbed against the stippled wangus.
No one touches my packets.
Yeah, and when the bleep zapper gets crossed with the gooble farber, you better be sure to have the Ixway hummelfarbed against the stippled wangus.
That's how I'd handle it.
But then, my flip phone was way smarter than me. My smart phone is a complete waste of money. Technology not my friend...then or now.
Long as you guys keep the nitwits n knuckleheads at bay; thanks.
I've modified an IP stack for a work project and IIRC the MAC doesn't travel along w/ the IP. MAC is part of the physical (ethernet) layer. IP protocol sits on top of that and does NOT encapsulate the MAC (never remember which layer is which in the OSI model.) Each node that an ethernet packet hops through gets its MAC replaced w/ that device. I don't think an end user (the website) can ever determine the originators MAC addr. The MAC they will see is the last one from their own ISP's router the server is connected to.
When you log in there are numbers that get associated with your account. Your IP address and your MAC (media access controller) number. When you get banned your IP and your MAC number which an individual identification number for specific device. Routers NIC's and modems all have this number. In addition to your IP address pretty much all will ID you down to who you are. So once an IP address gets a ban even if you go to a friend's house to sign up for an account you will still never be able to sign on to any devices that may be associated to your screen name.so new cell phone cable modem new router and a new computer is what it would take to get past that first layer of defense. 2nd people write in a style that is unique to them. Use of words phrases and simple grammar mistakes are hard to miss. It is not hard to root out alternative accounts once you know what to look for. Like who would not suspect a person with the Screen name of Kemosobi not suppect that it would not be the lone ranger. Humans are creatures of habit and sooner or later people slip up and give themselves away.
I hope I never see another post about a "stippled wangus"
If I ever... decide... to make... a fake account... just look for... the overuse.... of ellipses :-)
Then you need an edumacation, so you can have a basic understand of what they were talking about. Hell, you are younger than I am, but I know more about the IT world than you do?
No one touches my packets.
There had to be some XXX rated techno speak. Otherwise, the Chad and Dr Jorge wouldn't read it...I hope I never see another post about a "stippled wangus"