Unconfigured Ad Widget

Collapse

IP address ban

Collapse
X
 
  • Time
  • Show
Clear All
new posts
  • Fjold
    I need a LIFE!!
    • Oct 2005
    • 22926

    IP address ban

    I'm not internet or computer savvy.

    I'm in New Zealand right now and logged in on my only Calguns account.

    If I would have created a new login account and logged into Calguns from here in Auckland, would anyone be able to trace it back to me?
    Frank

    One rifle, one planet, Holland's 375




    Life Member NRA, CRPA and SAF
  • #2
    G-Man WC
    In Memoriam
    • Oct 2005
    • 10991

    Ban! I'm contacting Kes now!
    If ever time should come, when vain and aspiring men shall possess the highest seats in Government, our country will stand in need of its experienced patriots to prevent its ruin.
    -Samuel Adams

    Comment

    • #3
      2DoorImpala
      Veteran Member
      • Jun 2009
      • 4698

      No, but if you logged in with your 1st screen name it now has your NZ ip in their logs and can see if you created another account using that same ip.

      Comment

      • #4
        bksa
        Senior Member
        • Dec 2011
        • 2012

        the mods don't care, as long as they suspect two accounts belong to the same person they will ban.

        two individuals behind the same router are out of luck

        Comment

        • #5
          lazyworm
          Senior Member
          • Jan 2006
          • 1641

          there are multiple ways. No I'm not telling.

          Comment

          • #6
            Satex
            CGN/CGSSA Contributor
            CGN Contributor
            • Feb 2006
            • 3501

            Originally posted by Fjold
            I'm not internet or computer savvy.

            I'm in New Zealand right now and logged in on my only Calguns account.

            If I would have created a new login account and logged into Calguns from here in Auckland, would anyone be able to trace it back to me?
            Why would you create a new calguns login just because you are not home?
            Users are expected to login from different IP address based on using different computers, different networks, etc. It's expected and acceptable.

            However, I believe the moderators frown upon one person using multiple logins. That usually suggests nefarious activities.

            Comment

            • #7
              the86d
              Calguns Addict
              • Jul 2011
              • 9587

              Use https://*, instead of http://* whenever you can...

              Comment

              • #8
                lasbrg
                Veteran Member
                • Nov 2012
                • 4240

                Originally posted by Fjold
                I'm not internet or computer savvy.

                I'm in New Zealand right now and logged in on my only Calguns account.

                If I would have created a new login account and logged into Calguns from here in Auckland, would anyone be able to trace it back to me?
                The info that shows up below in my sig jpg is what can be seen by any website you visit.

                As a side note, there seems to be an increase in "web bugs" on Calguns where a new user shows up posting nonsense, with an image imbedded in their post or sig that does not display anything and which collects the IP addresses of everyone who views the page. The ones I have seen have been png images from a domain ending in ".ga". This is a permaban offense and any of these posts you see should be reported.

                Comment

                • #9
                  monk
                  Veteran Member
                  • Jul 2011
                  • 4454

                  Originally posted by lazyworm
                  there are multiple ways. No I'm not telling.
                  The only sure fire way to avoid calguns detection is to initiate a massive DDoS on DHS and CIA servers, while at the same time hacking into the core router at the SSA (they're all old people over they're anyway). Once in, create a static route into calguns. Problem solved.



                  How long do you guys think i have before DHS is on me? Lol.


                  NRA Member
                  SAF Member


                  A tyrant will always find a pretext for his tyranny.

                  Comment

                  • #10
                    msternin
                    CGN/CGSSA Contributor
                    CGN Contributor
                    • Jan 2015
                    • 881

                    Originally posted by monk
                    The only sure fire way to avoid calguns detection is to initiate a massive DDoS on DHS and CIA servers, while at the same time hacking into the core router at the SSA (they're all old people over they're anyway). Once in, create a static route into calguns. Problem solved.



                    How long do you guys think i have before DHS is on me? Lol.
                    Do any of you really understand how IP routing works, how BGP works on the internet, autonomous systems, etc...? If your traffic is going to be sniffed it will be a man-in-the-middle sniff, far removed from your local ISP or CGNs ISP. If you are that parranoid, configure a TOR. If you don't know what that is, look it up, as I'm not going to tell you since if you don't know, you really don't need one.

                    As one poster said, logging from various locations is an internet norm. You will have different IPs. Another poster said, use HTTPS whenever and wherever possible. I've never tried CGN via HTTPS since I don't care who sniffs that traffic. Once I post, it's posted and then index by a variety of engines, indexers, spiders, etc...

                    Comment

                    • #11
                      Deimos887
                      Senior Member
                      • Oct 2013
                      • 1673

                      Originally posted by msternin
                      ... Another poster said, use HTTPS whenever and wherever possible.
                      I'll just drop this here...

                      for Firefox and Chrome users, browser mod that forces connection to any web sites (if otherwise unrestricted) alternate SSL server if it exists.
                      You no longer need HTTPS Everywhere to set HTTPS by default! Major browsers now offer native support for an HTTPS only mode. Learn how to turn it on.Read more about the sunset of HTTPS Everywhere.Since we started offering HTTPS Everywhere, the battle to encrypt the web has made leaps and bounds....

                      Comment

                      • #12
                        msternin
                        CGN/CGSSA Contributor
                        CGN Contributor
                        • Jan 2015
                        • 881

                        Originally posted by Deimos887
                        I'll just drop this here...

                        for Firefox and Chrome users, browser mod that forces connection to any web sites (if otherwise unrestricted) alternate SSL server if it exists.
                        https://www.eff.org/https-everywhere
                        Seems like a good little add-on. Of course in reality, if the site(s) you access are complying with a FISA warrant, which you'd never know, they've already provided the Government with an export of the private SSL keys. In that case, it doesn't matter what protocol you use.

                        Comment

                        • #13
                          Deimos887
                          Senior Member
                          • Oct 2013
                          • 1673

                          Originally posted by msternin
                          Seems like a good little add-on. Of course in reality, if the site(s) you access are complying with a FISA warrant, which you'd never know, they've already provided the Government with an export of the private SSL keys. In that case, it doesn't matter what protocol you use.
                          I think most here would find that add-on useful for general privacy and security purposes more so than exploiting for illegal activity.

                          TOR implements that very add-on btw.

                          Never cared for TOR personally, too slow... too overkill.

                          Comment

                          • #14
                            msternin
                            CGN/CGSSA Contributor
                            CGN Contributor
                            • Jan 2015
                            • 881

                            Originally posted by Deimos887
                            I think most here would find that add-on useful for general privacy and security purposes more so than exploiting for illegal activity.

                            TOR implements that very add-on btw.

                            Never cared for TOR personally, too slow... too overkill.
                            I don't use one either, nor have I ever since I have no need to obsufacte my location.

                            Comment

                            • #15
                              the_natterjack
                              Senior Member
                              • Dec 2006
                              • 1056

                              TOR, wasn't that created by the US Navy?

                              Doesn't the FBI own a whole mess of TOR routers and have used them to catch a bunch of criminal types?

                              - Brian


                              Originally posted by Deimos887
                              I think most here would find that add-on useful for general privacy and security purposes more so than exploiting for illegal activity.

                              TOR implements that very add-on btw.

                              Never cared for TOR personally, too slow... too overkill.

                              Comment

                              Working...
                              UA-8071174-1