<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: The Fashionista&#8217;s Guide to IP Anonymizers</title>
	<atom:link href="http://alphavilleherald.com/2008/03/the-fashionista.html/feed" rel="self" type="application/rss+xml" />
	<link>http://alphavilleherald.com/2008/03/the-fashionista.html</link>
	<description>Always Fairly Unbalanced</description>
	<lastBuildDate>Tue, 04 Oct 2016 13:18:56 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.1</generator>
	<item>
		<title>By: Just Me</title>
		<link>http://alphavilleherald.com/2008/03/the-fashionista.html/comment-page-1#comment-15140</link>
		<dc:creator>Just Me</dc:creator>
		<pubDate>Fri, 21 Mar 2008 10:54:11 +0000</pubDate>
		<guid isPermaLink="false">http://localhost/wp_2/?p=803#comment-15140</guid>
		<description>@ winter

I noticed there&#039;s a SL last name that&#039;s almost the same as my RL name and I almost used it with my RL first name ... before I knew anything about SL.  I&#039;m happy now that I didn&#039;t do it
</description>
		<content:encoded><![CDATA[<p>@ winter</p>
<p>I noticed there&#8217;s a SL last name that&#8217;s almost the same as my RL name and I almost used it with my RL first name &#8230; before I knew anything about SL.  I&#8217;m happy now that I didn&#8217;t do it</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Winter</title>
		<link>http://alphavilleherald.com/2008/03/the-fashionista.html/comment-page-1#comment-15139</link>
		<dc:creator>Winter</dc:creator>
		<pubDate>Fri, 21 Mar 2008 08:12:11 +0000</pubDate>
		<guid isPermaLink="false">http://localhost/wp_2/?p=803#comment-15139</guid>
		<description>@ winter ... you said &quot;If you don&#039;t have the conviction behind your diatribe to support it with your safety? Then it&#039;s not important enough to you to hear, let alone everyone else that has to sift through the detritus of opinions.&quot;

Then, by that arguement, I gather you used your RL name as your av name is SL too ? Maybe you should also put your phone number in your 1st Live tab of your profile while you&#039;re at it.
______________________________________________________________________________

Heh - Just Me? There IS actually someone inworld with my full RL name. I could post under that, but then pity the poor bastard who accidentally chose it. And - what&#039;s more - it would let down the ladies who thought they were getting ME instead.

;)

</description>
		<content:encoded><![CDATA[<p>@ winter &#8230; you said &#8220;If you don&#8217;t have the conviction behind your diatribe to support it with your safety? Then it&#8217;s not important enough to you to hear, let alone everyone else that has to sift through the detritus of opinions.&#8221;</p>
<p>Then, by that arguement, I gather you used your RL name as your av name is SL too ? Maybe you should also put your phone number in your 1st Live tab of your profile while you&#8217;re at it.<br />
______________________________________________________________________________</p>
<p>Heh &#8211; Just Me? There IS actually someone inworld with my full RL name. I could post under that, but then pity the poor bastard who accidentally chose it. And &#8211; what&#8217;s more &#8211; it would let down the ladies who thought they were getting ME instead.<br />
 <img src='http://alphavilleherald.com/site/wp-includes/images/smilies/icon_wink.gif' alt=';)' class='wp-smiley' /> </p>
]]></content:encoded>
	</item>
	<item>
		<title>By: d3adlyc0d3c</title>
		<link>http://alphavilleherald.com/2008/03/the-fashionista.html/comment-page-1#comment-15138</link>
		<dc:creator>d3adlyc0d3c</dc:creator>
		<pubDate>Thu, 20 Mar 2008 19:27:18 +0000</pubDate>
		<guid isPermaLink="false">http://localhost/wp_2/?p=803#comment-15138</guid>
		<description>As a sidenote my long winded post above really had nothing to do with the article. I just meant that I never had to do alot of digging for proxy software or even had the desire to do so in response to Whatever&#039;s comment.

Additionally, Tenshi made her point clear enough I don&#039;t see how discussing the technical aspects of it really has any relevance. She doesn&#039;t have to understand it completely. I understood the gist of it, we all understood it and so the article served it&#039;s purpose.


</description>
		<content:encoded><![CDATA[<p>As a sidenote my long winded post above really had nothing to do with the article. I just meant that I never had to do alot of digging for proxy software or even had the desire to do so in response to Whatever&#8217;s comment.</p>
<p>Additionally, Tenshi made her point clear enough I don&#8217;t see how discussing the technical aspects of it really has any relevance. She doesn&#8217;t have to understand it completely. I understood the gist of it, we all understood it and so the article served it&#8217;s purpose.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: d3adlyc0d3c</title>
		<link>http://alphavilleherald.com/2008/03/the-fashionista.html/comment-page-1#comment-15137</link>
		<dc:creator>d3adlyc0d3c</dc:creator>
		<pubDate>Thu, 20 Mar 2008 19:14:10 +0000</pubDate>
		<guid isPermaLink="false">http://localhost/wp_2/?p=803#comment-15137</guid>
		<description>Honestly I haven&#039;t had any need for a proxy program in a while except for griefing and we mainly used tor which can be used on Linux or Windows. I often used tor for irc as well.

I haven&#039;t been involved in anythng else since griefing, but before then I used to sell proxies installed on roots to a few shady companies back when I operated a sizeable botnet a few years ago - when rootkits and process injection was first being popularized as methods for concealing malware. At that time I was a very active member of ryan1918 and contributed alot of code, since then I check in every now and then to see whats going on but the community has gone way downhill. No one with any programming ability whatsoever hangs out there anymore and all of the mods are a bunch of counterfeits. Ryan Lee himself is just a script kiddie who hasn&#039;t even begun to crack a book and learn anything worthwhile.

I used wingates back when they were actually useful. Mainly when I needed a proxy it was for protocols other than http. Telnet, ftp and rlogin to name a few. Granted alot of the proxy software floating around can be used for those too but I didn&#039;t generally use them. I *think* THC might have written something at some point that was open source and could be used in Linux for the kind of purpose I needed but if so I never used it. I think the only software they made that I used was hydra back when bruteforce password cracking was in and even then mainly for breaking into devices on networks like ftp print servers or whatever.

The last time I did anything more illegal than the stuff I did as d3adlyc0d3c, I found a server in russia filled with terrabytes of 0day warez and rooted that and I broke into an ftp server being used by a company based out of Wisconsin (won&#039;t name the company name here) and stored alot of my source and binaries on their servers. Other than that I was not really very well known. The biggest botnet I ever operated consisted of 4 thousand infected PCs, and as you know 4k isn&#039;t much at all. Of course that was before IM spreading became such a popular method, now a 10k botnet is kinda small.
</description>
		<content:encoded><![CDATA[<p>Honestly I haven&#8217;t had any need for a proxy program in a while except for griefing and we mainly used tor which can be used on Linux or Windows. I often used tor for irc as well.</p>
<p>I haven&#8217;t been involved in anythng else since griefing, but before then I used to sell proxies installed on roots to a few shady companies back when I operated a sizeable botnet a few years ago &#8211; when rootkits and process injection was first being popularized as methods for concealing malware. At that time I was a very active member of ryan1918 and contributed alot of code, since then I check in every now and then to see whats going on but the community has gone way downhill. No one with any programming ability whatsoever hangs out there anymore and all of the mods are a bunch of counterfeits. Ryan Lee himself is just a script kiddie who hasn&#8217;t even begun to crack a book and learn anything worthwhile.</p>
<p>I used wingates back when they were actually useful. Mainly when I needed a proxy it was for protocols other than http. Telnet, ftp and rlogin to name a few. Granted alot of the proxy software floating around can be used for those too but I didn&#8217;t generally use them. I *think* THC might have written something at some point that was open source and could be used in Linux for the kind of purpose I needed but if so I never used it. I think the only software they made that I used was hydra back when bruteforce password cracking was in and even then mainly for breaking into devices on networks like ftp print servers or whatever.</p>
<p>The last time I did anything more illegal than the stuff I did as d3adlyc0d3c, I found a server in russia filled with terrabytes of 0day warez and rooted that and I broke into an ftp server being used by a company based out of Wisconsin (won&#8217;t name the company name here) and stored alot of my source and binaries on their servers. Other than that I was not really very well known. The biggest botnet I ever operated consisted of 4 thousand infected PCs, and as you know 4k isn&#8217;t much at all. Of course that was before IM spreading became such a popular method, now a 10k botnet is kinda small.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Just Me</title>
		<link>http://alphavilleherald.com/2008/03/the-fashionista.html/comment-page-1#comment-15136</link>
		<dc:creator>Just Me</dc:creator>
		<pubDate>Thu, 20 Mar 2008 09:57:43 +0000</pubDate>
		<guid isPermaLink="false">http://localhost/wp_2/?p=803#comment-15136</guid>
		<description>@ winter ... you said  &quot;If you don&#039;t have the conviction behind your diatribe to support it with your safety? Then it&#039;s not important enough to you to hear, let alone everyone else that has to sift through the detritus of opinions.&quot;

Then, by that arguement, I gather you used your RL name as your av name is SL too ?   Maybe you should also put your phone number in your 1st Live tab of your profile while you&#039;re at it.

It&#039;s an accepted convention to use an alias on a blog, message board, etc ... and no one says it needs to be the same alias everywhere.  So, yeah, my RL name is different from my SL name is different from my name here is different from my Yahoo ID, and so on.    I&#039;m just saying .. why not be consistent ?  Are people that adament about having their opinion accepted that they post under one name and then agree with themselves using three other names ?   Talk about insecure !!!
</description>
		<content:encoded><![CDATA[<p>@ winter &#8230; you said  &#8220;If you don&#8217;t have the conviction behind your diatribe to support it with your safety? Then it&#8217;s not important enough to you to hear, let alone everyone else that has to sift through the detritus of opinions.&#8221;</p>
<p>Then, by that arguement, I gather you used your RL name as your av name is SL too ?   Maybe you should also put your phone number in your 1st Live tab of your profile while you&#8217;re at it.</p>
<p>It&#8217;s an accepted convention to use an alias on a blog, message board, etc &#8230; and no one says it needs to be the same alias everywhere.  So, yeah, my RL name is different from my SL name is different from my name here is different from my Yahoo ID, and so on.    I&#8217;m just saying .. why not be consistent ?  Are people that adament about having their opinion accepted that they post under one name and then agree with themselves using three other names ?   Talk about insecure !!!</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Alyx Stoklitsky</title>
		<link>http://alphavilleherald.com/2008/03/the-fashionista.html/comment-page-1#comment-15135</link>
		<dc:creator>Alyx Stoklitsky</dc:creator>
		<pubDate>Thu, 20 Mar 2008 04:35:53 +0000</pubDate>
		<guid isPermaLink="false">http://localhost/wp_2/?p=803#comment-15135</guid>
		<description>&quot;You think I didn&#039;t know that was from a local network? It was an example IP. What do you want - a real IP to hack? Pffft. Get real.&quot;

Of course I knew, I just felt like undermining your article and annoying you. Duh.
</description>
		<content:encoded><![CDATA[<p>&#8220;You think I didn&#8217;t know that was from a local network? It was an example IP. What do you want &#8211; a real IP to hack? Pffft. Get real.&#8221;</p>
<p>Of course I knew, I just felt like undermining your article and annoying you. Duh.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Whatever</title>
		<link>http://alphavilleherald.com/2008/03/the-fashionista.html/comment-page-1#comment-15134</link>
		<dc:creator>Whatever</dc:creator>
		<pubDate>Thu, 20 Mar 2008 00:28:16 +0000</pubDate>
		<guid isPermaLink="false">http://localhost/wp_2/?p=803#comment-15134</guid>
		<description>@techguy

You don&#039;t really understand anything about the relationship between MAC addresses and IP assignment, but I suspect you already know that. That&#039;s cool, but don&#039;t pretend that you do and expect to get away with posting bullshit. Although, it&#039;s pretty clear from this article that Tenshi won&#039;t know the difference.

Maybe d3adlyc0d3c could weigh in on the open source options (hint: there are lots).
</description>
		<content:encoded><![CDATA[<p>@techguy</p>
<p>You don&#8217;t really understand anything about the relationship between MAC addresses and IP assignment, but I suspect you already know that. That&#8217;s cool, but don&#8217;t pretend that you do and expect to get away with posting bullshit. Although, it&#8217;s pretty clear from this article that Tenshi won&#8217;t know the difference.</p>
<p>Maybe d3adlyc0d3c could weigh in on the open source options (hint: there are lots).</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Angel</title>
		<link>http://alphavilleherald.com/2008/03/the-fashionista.html/comment-page-1#comment-15133</link>
		<dc:creator>Angel</dc:creator>
		<pubDate>Wed, 19 Mar 2008 21:56:45 +0000</pubDate>
		<guid isPermaLink="false">http://localhost/wp_2/?p=803#comment-15133</guid>
		<description>TechGuy... Changing your MAC does not correlate to changing your IP you tard. ie: twiddling the MSB of the MAC =/= a bigger change in IP.

All changing the MAC will do is cause your ISPs DHCP server to give you a new IP from the pool. Now if they have a large pool then you might see a big change or you might see a small change. NO Correlation and certainly no way on earth to force a big change.

For the other part of your laughable post a Proxy, such as squid, has next to no network overhead, in fact can many times improve performance.

As bad as Tenshi... Hmmm... maybe you are Tenshi&#039;s sock puppet?
</description>
		<content:encoded><![CDATA[<p>TechGuy&#8230; Changing your MAC does not correlate to changing your IP you tard. ie: twiddling the MSB of the MAC =/= a bigger change in IP.</p>
<p>All changing the MAC will do is cause your ISPs DHCP server to give you a new IP from the pool. Now if they have a large pool then you might see a big change or you might see a small change. NO Correlation and certainly no way on earth to force a big change.</p>
<p>For the other part of your laughable post a Proxy, such as squid, has next to no network overhead, in fact can many times improve performance.</p>
<p>As bad as Tenshi&#8230; Hmmm&#8230; maybe you are Tenshi&#8217;s sock puppet?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Winter</title>
		<link>http://alphavilleherald.com/2008/03/the-fashionista.html/comment-page-1#comment-15132</link>
		<dc:creator>Winter</dc:creator>
		<pubDate>Wed, 19 Mar 2008 20:36:58 +0000</pubDate>
		<guid isPermaLink="false">http://localhost/wp_2/?p=803#comment-15132</guid>
		<description>Or to the naysayers in the comments line - conversely, you could grow a pair and put yourself on the line to back up what you are saying. I&#039;ve been less than complimentary in the Herald on more than one occasion, and my name link leads you right to my inworld identity. If you don&#039;t have the conviction behind your diatribe to support it with your safety? Then it&#039;s not important enough to you to hear, let alone everyone else that has to sift through the detritus of opinions.

Use the RL/SL analogue. Would you walk up to someone and say it to their face? Several black eyes later, I can always say yes. I&#039;ve never made an anonymous phone call to do it though.

&#039;Xcept to Moe&#039;s Tavern.

</description>
		<content:encoded><![CDATA[<p>Or to the naysayers in the comments line &#8211; conversely, you could grow a pair and put yourself on the line to back up what you are saying. I&#8217;ve been less than complimentary in the Herald on more than one occasion, and my name link leads you right to my inworld identity. If you don&#8217;t have the conviction behind your diatribe to support it with your safety? Then it&#8217;s not important enough to you to hear, let alone everyone else that has to sift through the detritus of opinions.</p>
<p>Use the RL/SL analogue. Would you walk up to someone and say it to their face? Several black eyes later, I can always say yes. I&#8217;ve never made an anonymous phone call to do it though.</p>
<p>&#8216;Xcept to Moe&#8217;s Tavern.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: DinkyHockerShootsSmack!</title>
		<link>http://alphavilleherald.com/2008/03/the-fashionista.html/comment-page-1#comment-15131</link>
		<dc:creator>DinkyHockerShootsSmack!</dc:creator>
		<pubDate>Wed, 19 Mar 2008 18:01:55 +0000</pubDate>
		<guid isPermaLink="false">http://localhost/wp_2/?p=803#comment-15131</guid>
		<description>TechGuy

&#039;Dinky&#039; is a character in a novel. People who think like fourteen year olds might make the connection you&#039;re making. Colour me &#039;not surprised&#039;. It&#039;s quite evident from your posts here that you&#039;re all about prepubescent ego and not much substance.

You&#039;re right though, she didn&#039;t &#039;x&#039; anything out. She omitted a couple of zeros (192.168.1(0)(0).1)that are many times present.

Anyway, the point still stands techtoughguy. If she knew what she was talking about, she would have used an example external IP# and then simply have replaced a couple of digits with &#039;x&quot;. I&#039;ll not pretend for the sake of overblown egos that it isn&#039;t terribly obvious she mashed up a couple google searches she did on the topic to try and appear clever.

I realise though, it&#039;s much more fun for you to pretend you&#039;re a tech expert though and to look for stupid and puerile things to focus on the name I chose (simply because it titillates your adolescent mind). Well done, kiddo.

Just me --- oh I agree. This is why I started to use aliases, because these obsessive freaks like tenshi can&#039;t stand to self-examine. They can&#039;t take critiques at face value, because it hurts them inside --- even though they are constantly critiquing others themselves. So then they go trawling profiles in SL and elsewhere, cataloguing IP numbers, and so on, looking for shit to play gotcha with. Much like the punks on the wow forums and how they use the armoury, only worse. This is because they have no real argument to counter the critiques, so they grab for straws.

Funnily --- I only see this happening in three places generally, (where a lot of people use aliases) --- Prokofy&#039;s blog, this tabloid we are reading now, and Tenshi&#039;s blog (which I have never read, but apparently she has this &#039;problem&#039; as well, from all accounts).

Why is it, do you reckon, that only these certain outlets seem to draw this type of behaviour? Hint: it&#039;s because these three outlets have something in common: Self-aggrandizing and hypocritical blow-hard contributors, who think their shit smells like roses. They are really just insecure gits who are looking for affirmation from faceless people on the internet.
</description>
		<content:encoded><![CDATA[<p>TechGuy</p>
<p>&#8216;Dinky&#8217; is a character in a novel. People who think like fourteen year olds might make the connection you&#8217;re making. Colour me &#8216;not surprised&#8217;. It&#8217;s quite evident from your posts here that you&#8217;re all about prepubescent ego and not much substance.</p>
<p>You&#8217;re right though, she didn&#8217;t &#8216;x&#8217; anything out. She omitted a couple of zeros (192.168.1(0)(0).1)that are many times present.</p>
<p>Anyway, the point still stands techtoughguy. If she knew what she was talking about, she would have used an example external IP# and then simply have replaced a couple of digits with &#8216;x&#8221;. I&#8217;ll not pretend for the sake of overblown egos that it isn&#8217;t terribly obvious she mashed up a couple google searches she did on the topic to try and appear clever.</p>
<p>I realise though, it&#8217;s much more fun for you to pretend you&#8217;re a tech expert though and to look for stupid and puerile things to focus on the name I chose (simply because it titillates your adolescent mind). Well done, kiddo.</p>
<p>Just me &#8212; oh I agree. This is why I started to use aliases, because these obsessive freaks like tenshi can&#8217;t stand to self-examine. They can&#8217;t take critiques at face value, because it hurts them inside &#8212; even though they are constantly critiquing others themselves. So then they go trawling profiles in SL and elsewhere, cataloguing IP numbers, and so on, looking for shit to play gotcha with. Much like the punks on the wow forums and how they use the armoury, only worse. This is because they have no real argument to counter the critiques, so they grab for straws.</p>
<p>Funnily &#8212; I only see this happening in three places generally, (where a lot of people use aliases) &#8212; Prokofy&#8217;s blog, this tabloid we are reading now, and Tenshi&#8217;s blog (which I have never read, but apparently she has this &#8216;problem&#8217; as well, from all accounts).</p>
<p>Why is it, do you reckon, that only these certain outlets seem to draw this type of behaviour? Hint: it&#8217;s because these three outlets have something in common: Self-aggrandizing and hypocritical blow-hard contributors, who think their shit smells like roses. They are really just insecure gits who are looking for affirmation from faceless people on the internet.</p>
]]></content:encoded>
	</item>
</channel>
</rss>

