From: John W. Krahn on
Tad McClellan wrote:
> Uno <merrilljensen(a)q.com> wrote:
>
>> my $socket = new IO::Socket::INET (PeerAddr => $remote_host,
>> PeerPort => $remote_port,
>> Proto => "tcp",
>> Type => SOCK_STREAM)
>> or die "scheisse mal\n";
>>
>> print $socket "data\n";
>
>
> This one is:
>
> print FILEHANDLE LIST
>
>
>> my $line = <$socket>;
>>
>> print $line;
>
> This one is:
>
> print LIST
>
>
>> q1) Can someone say a few words about the differences between the print
>> statements.
>
>
> perldoc -f print
>
>
>> Apparently, one sends a message to another machine,
>
>
> FILEHANDLE may be a scalar variable name, in which case the variable
> contains the name of or a reference to the filehandle
>
>
>> and the
>> other sends a message to mine.
>
>
> If FILEHANDLE is omitted, prints by default to standard output

If FILEHANDLE is omitted, prints to the currently selected
filehandle which by default is standard output.

perldoc -f select



John
--
The programmer is fighting against the two most
destructive forces in the universe: entropy and
human stupidity. -- Damian Conway
From: Ilya Zakharevich on
On 2010-05-19, Uno <merrilljensen(a)q.com> wrote:
> I guess I don't know who an "attacker" is. I see movies where any
> computer capability can exist, like Seth Green controlling traffic in
> Los Angeles in "The Italian Job." I admire Seth's genius (Robot
> Chicken), but don't think the situation possible.

> What would it take for another entity to suck up all my packets that I
> sent to q.com?

Google for it; it must be discussed out to the death. (IIRC MIB do
not need to suck up anything; all they need is to reply EARLIER than
your intended target - which is not hard given that they are IN
BETWEEN.)

Hope this helps,
Ilya
From: sln on
On Wed, 19 May 2010 19:16:45 +0000 (UTC), Ilya Zakharevich <nospam-abuse(a)ilyaz.org> wrote:

>On 2010-05-19, Uno <merrilljensen(a)q.com> wrote:
>> I guess I don't know who an "attacker" is. I see movies where any
>> computer capability can exist, like Seth Green controlling traffic in
>> Los Angeles in "The Italian Job." I admire Seth's genius (Robot
>> Chicken), but don't think the situation possible.
>
>> What would it take for another entity to suck up all my packets that I
>> sent to q.com?
>
>Google for it; it must be discussed out to the death. (IIRC MIB do
>not need to suck up anything; all they need is to reply EARLIER than
>your intended target - which is not hard given that they are IN
>BETWEEN.)
>

Such things are criminal, how are we to protect ourselves.

-sln
From: Uno on
On 5/19/2010 12:36 PM, sln(a)netherlands.com wrote:
> On Wed, 19 May 2010 19:16:45 +0000 (UTC), Ilya Zakharevich<nospam-abuse(a)ilyaz.org> wrote:
>
>> On 2010-05-19, Uno<merrilljensen(a)q.com> wrote:
>>> I guess I don't know who an "attacker" is. I see movies where any
>>> computer capability can exist, like Seth Green controlling traffic in
>>> Los Angeles in "The Italian Job." I admire Seth's genius (Robot
>>> Chicken), but don't think the situation possible.
>>
>>> What would it take for another entity to suck up all my packets that I
>>> sent to q.com?
>>
>> Google for it; it must be discussed out to the death. (IIRC MIB do
>> not need to suck up anything; all they need is to reply EARLIER than
>> your intended target - which is not hard given that they are IN
>> BETWEEN.)
>>
>
> Such things are criminal, how are we to protect ourselves.

I like to bore them.
--
Uno

From: Ilya Zakharevich on
On 2010-05-19, Uno <merrilljensen(a)q.com> wrote:
> I guess I don't know who an "attacker" is. I see movies where any
> computer capability can exist, like Seth Green controlling traffic in
> Los Angeles in "The Italian Job." I admire Seth's genius (Robot
> Chicken), but don't think the situation possible.

In my other reply to this message, I forgot about another example with
"real life Italian Job". According to comp.risks, there exists an
available-off-the-shelf router which does exactly what people fear all
the time, but think is technically impossible:

a) this router is advertised as having something like "smart firewall";

b1) to implement this "smartness", the install program for the
router inserts a fake certificate into the trust chain which
allows the router to impersonate any site;

b2) using this "breach of authentication trust", the router DOES
impersonate all the SSL targets, and decrypts all the
communications passing through it. Then the firewall acts
basing on the decrypted contents.

Hope this helps,
Ilya