Home
| Calendar
| Mail Lists
| List Archives
| Desktop SIG
| Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU |
On Friday 10 January 2003 02:44 pm, Nathan Meyers wrote: > My approach to this (which isn't pretty :-) would be to interpose a relay > - such as a Jabber server - through which your progeny would connect, > and hack that relay to take over the protocol stream to do a sign-off. > This isn't a trivial problem - there's some reverse engineering to be > pulled off, although all the necessary protocol knowledge is probably > embedded somewhere in Jabber code. > > This is form of man-in-the-middle attack, and will look great on your > hacking credentials. ... And would almost certainly be a DMCA violation, if you care about that sort of thing. ---------------------------------------------------------------------------- DDDD David Kramer david at thekramers.net http://thekramers.net DK KD DKK D You don't usually hear "hydraulics" and "simplicity" DK KD in the same sentence. DDDD Cathy Rogers, Junkyard Wars
BLU is a member of BostonUserGroups | |
We also thank MIT for the use of their facilities. |