Upside-Down-Ternet (Classic Prank and Good Wireless Security)
Apr 01, 2009, 14:31 (0 Talkback[s])
No-Size-Fits-All! An Application-Down Approach for Your Cloud Transformation REGISTER >
"Split the network
I'm starting here by splitting the network into two parts, the
trusted half and the untrusted half. The trusted half has one
netblock, the untrusted a different netblock. We use the DHCP
server to identify mac addresses to give out the relevant
"IPtables is Fun!
Suddenly everything is kittens! It's kitten net.
/sbin/iptables -A PREROUTING -s 192.168.0.0/255.255.255.0 -p tcp
-j DNAT --to-destination 126.96.36.199
"For the uninitiated, this redirects all traffic to