NickOlsen8390
Senior member
- Jun 19, 2007
- 387
- 0
- 0
Using torrent traffic as a example, I can spot that shit a mile away with or without encryption, Just by looking at the shear number connections to places all around the world.
And if your tunneling, I can throttle it. Encrypt it all you want, I can bring it to a 200b/s crawl.
Speaking of this.
We have a policy on our hotspot network that says no p2p usage. I see it all the time, and as long as they aren't pulling every bit of bandwidth the AP has I don't have a problem with it. The other day I had a person doing just that, I gave him a call, asked him to please stop using P2P software, as it violates the user agreement. He responded with "Make me". One click, he gets disconnected off our network, I responded with "Ok, Done". He demanded a refund or he was going to call the cops, I said please do, I love cops.
And if your tunneling, I can throttle it. Encrypt it all you want, I can bring it to a 200b/s crawl.
Speaking of this.
We have a policy on our hotspot network that says no p2p usage. I see it all the time, and as long as they aren't pulling every bit of bandwidth the AP has I don't have a problem with it. The other day I had a person doing just that, I gave him a call, asked him to please stop using P2P software, as it violates the user agreement. He responded with "Make me". One click, he gets disconnected off our network, I responded with "Ok, Done". He demanded a refund or he was going to call the cops, I said please do, I love cops.