- Feb 3, 2005
- 7,326
- 2
- 76
To be specific, can your ISP "see" what you're downloading through a website such as Rapidshare, Megaupload, etc? If so, how does this compare to P2P downloading (what they see, how strongly they monitor it, etc)?
basically - encrypt it.
Or simply don't do anything illegal or against the ISP's policy...
Also? Slightly creepy question.
so hosted services for illegal purposes is ok?They do say to not use P2P for illegal purposes, but Rapidshare and such don't really fall under that category.
so hosted services for illegal purposes is ok?since you neglected to mention that your university was your ISP, conform to their policies and you'll have nothing to worry about.
Haha. My university has fines for downloading copyrighted material, assuming they catch you doing it. I've heard that they don't actively look for people doing anything. At most, they just check people at random times. I've also heard they only do something when they've received a complaint from someone like the RIAA/MPAA.
Either way, no one really knows for sure how the school goes about checking that stuff, if they do. They do say to not use P2P for illegal purposes, but Rapidshare and such don't really fall under that category.
Or simply don't do anything illegal or against the ISP's policy...
so hosted services for illegal purposes is ok?since you neglected to mention that your university was your ISP, conform to their policies and you'll have nothing to worry about.
What about using a torrent program, can't most of them encrypt?
seems like pretty much any question about how to skirt around something or that sounds suspicious should just be locked, 90% of it is college kids trying to skirt around Uni policies and the other 10% are people who want to use wifi to borrow a neighbors internet connection. jeebus, people
Most of what you download is copyrighted.![]()
What about using a torrent program, can't most of them encrypt?
Put a packet sniffer right at your main internet line. What you see, is basically what they can see.
Accept for we have advanced application engines that automatically report on the traffic no matter what port it's running on, it can tell what it is.
Accept for we have advanced application engines that automatically report on the traffic no matter what port it's running on, it can tell what it is.
What does that actually look like from your end?
Can you see any of the traffic I put through the tunnel?
Accept for we have advanced application engines that automatically report on the traffic no matter what port it's running on, it can tell what it is.
Except that only works if it's unencrypted or your inspection tool does a MITM attack.