Upside-Down-Ternet (Classic Prank and Good Wireless Security)
Apr 01, 2009, 14:31 (0 Talkback[s])
How to Help Your Business Become an AI Early Adopter
"Split the network
I'm starting here by splitting the network into two parts, the
trusted half and the untrusted half. The trusted half has one
netblock, the untrusted a different netblock. We use the DHCP
server to identify mac addresses to give out the relevant
"IPtables is Fun!
Suddenly everything is kittens! It's kitten net.
/sbin/iptables -A PREROUTING -s 192.168.0.0/255.255.255.0 -p tcp
-j DNAT --to-destination 126.96.36.199
"For the uninitiated, this redirects all traffic to