Jump to content
Strawberry Orange Banana Lime Leaf Slate Sky Blueberry Grape Watermelon Chocolate Marble
Strawberry Orange Banana Lime Leaf Slate Sky Blueberry Grape Watermelon Chocolate Marble

MSFN is made available via donations, subscriptions and advertising revenue. The use of ad-blocking software hurts the site. Please disable ad-blocking software or set an exception for MSFN. Alternatively, register and become a site sponsor/subscriber and ads will be disabled automatically. 


PROBLEMCHYLD

Member
  • Content Count

    2,775
  • Donations

    $0.00 
  • Joined

  • Days Won

    4

Everything posted by PROBLEMCHYLD

  1. I have Silverlight installed, never gotten NF to run on Pale Moon Linux or Windows. Works in FF though. Nonetheless, water under the bridge.
  2. Well, as you say it's not PM, what's all the talk about copyright and trademarks etc....????
  3. As I said before, I have never gotten Pale Moon to work on Netflix with Windows or Linux.
  4. O.k., give you that, but I have to use Firefox in order to use NF. I'll investigate on my end.
  5. When you get NETFLIX working then you can have something to brag about. I'm the one-liner assassin, this ain't what you want.
  6. So, in other words you are a follower? I understand you're NOT a trendsetter and you only do what you see others do....My son is 3 and he sets his own path NOT follow. As I said before, step it up or fallback slim. There is NO solution for this problem you might endure!!
  7. If you and moonchild did a better job, then there would be no need for unofficial versions... Step your game up or get out of the wayyyyy.......
  8. This is why I slipstreamed mines. 32 + 64 bit. A clean install only about 50 to 60 updates to have a fully patched system.
  9. I read this on Google news. It's sad!! I don't mind advertisement but show me stuff I'm interested in.
  10. 1. Disable Windows Firewall and Security Center. 2. Create a folder in C:\Program Files\Firewall. 3. Run MMC from run-box in the Start Menu. Create a Snap-in from Microsoft Console Root with IP Security Monitor + IP Security Polices on Local Computer. 4. Name Snap-in IPSECCMD.MSC. 5. Place the Snap-in file C:\Program Files\Firewall and create a shortcut from it. Name it Windows Firewall. 6. Extract or copy FIREWALL.CAB contents to C:\Program Files\Firewall. 7. Edit IPSECCMD.BAT to your likes, then run it. 8. Run Windows Firewall shortcut and click IP Security Polices on Local Computer. Right-click to Assign the Policies. (Activate/Turn on). 9. Use IPSECCMD.HTA to monitor your network. Credit goes to http://www.ericphelps.com/scripting/samples/Netstat/index.html
  11. Yeah, I'm using it as we speak. I'll release what I have and maybe someone can improve on it.
  12. All the patches in the world couldn't keep Windows 9x alive, XP is NO different. I'll do a clean install once support ends. HNY!!!
  13. Some years back, I would use MalwareBytes & MSE to clean family and friends computers slaving the HDD. Great combination and never conflicted with each other.
  14. Well, I haven't use a Virus Scanner or Malwarebytes in years. What are you guys gonna do when the definitions stop or become incompatible?
  15. My rules come from here in case you're wondering. https://www.wilderssecurity.com/threads/tutorial-expert-linux-firewalling.376935/
  16. I just switched my Slackware Linux to Wifi Hotspot and it respects the iptables rules. Here are my rules, might help you if nothing else. iptables -P OUTPUT DROP iptables -P INPUT DROP iptables -P FORWARD DROP iptables -A INPUT -p tcp -m tcp ! --tcp-flags SYN,RST,ACK SYN -m state --state NEW -j DROP iptables -A OUTPUT -p tcp -m tcp ! --tcp-flags SYN,RST,ACK SYN -m state --state NEW -j DROP iptables -N drop_invalid iptables -A OUTPUT -m state --state INVALID -j drop_invalid iptables -A INPUT -m state --state INVALID -j drop_invalid iptables -A INPUT -p tcp -m tcp --sport 1:65535 --tcp-flags FIN,SYN,RST,PSH,ACK,URG NONE -j drop_invalid iptables -A drop_invalid -j LOG --log-level debug --log-prefix "INVALID state -- DENY" iptables -A drop_invalid -j DROP iptables -N RULE_0 iptables -A INPUT -i wlan0 -s darkstar -j RULE_0 iptables -A RULE_0 -j LOG --log-level info --log-prefix "RULE 0 -- DENY" iptables -A RULE_0 -j DROP iptables -N RULE_1 iptables -A INPUT -p icmp -m icmp --icmp-type any -j RULE_1 iptables -A RULE_1 -j LOG --log-level info --log-prefix "RULE 1 -- DENY" iptables -A RULE_1 -j DROP iptables -N RULE_2 iptables -A INPUT -p tcp -m tcp --dport 43 -j RULE_2 iptables -A RULE_2 -j LOG --log-level info --log-prefix "RULE 2 -- DENY" iptables -A RULE_2 -j DROP iptables -N RULE_3 iptables -A INPUT -p tcp -m tcp --tcp-flags ALL URG,PSH,FIN -j RULE_3 iptables -A RULE_3 -j LOG --log-level info --log-prefix "RULE 3 -- DENY" iptables -A RULE_3 -j DROP iptables -N RULE_4 iptables -A INPUT -p tcp -m tcp --tcp-flags ALL URG,ACK,PSH,RST,SYN,FIN -j RULE_4 iptables -A RULE_4 -j LOG --log-level info --log-prefix "RULE 4 -- DENY" iptables -A RULE_4 -j DROP iptables -N RULE_5 iptables -A INPUT -p all -f -j RULE_5 iptables -A RULE_5 -j LOG --log-level info --log-prefix "RULE 5 -- DENY" iptables -A RULE_5 -j DROP iptables -N RULE_6 iptables -A INPUT -p udp -m udp --dport 513 -j RULE_6 iptables -A RULE_6 -j LOG --log-level info --log-prefix "RULE 6 -- DENY" iptables -A RULE_6 -j DROP iptables -N RULE_7 iptables -A INPUT -p udp -m udp --dport 33434:33524 -j RULE_7 iptables -A RULE_7 -j LOG --log-level info --log-prefix "RULE 7 -- DENY" iptables -A RULE_7 -j DROP iptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT iptables -A INPUT -i lo -j ACCEPT iptables -A OUTPUT -o lo -j ACCEPT iptables -A FORWARD -o lo -j ACCEPT iptables -A OUTPUT -p tcp -m tcp ! --tcp-flags SYN,RST,ACK SYN -m state --state NEW -j DROP iptables -A OUTPUT -m state --state ESTABLISHED,RELATED -j ACCEPT iptables -A OUTPUT -p tcp -m tcp --dport 21 -m state --state NEW -j ACCEPT iptables -A OUTPUT -p udp -m udp --dport 53 -m state --state NEW -j ACCEPT iptables -A OUTPUT -p udp -m udp --sport 67 --dport 68 -m state --state NEW -j ACCEPT iptables -A OUTPUT -p udp -m udp --sport 123 --dport 123 -m state --state NEW -j ACCEPT iptables -A OUTPUT -p tcp -m multiport --dports 25,110,143,465,587,993,995 -m state --state NEW -j ACCEPT iptables -A OUTPUT -p tcp -m multiport --dports 80,443 -m state --state NEW -j ACCEPT iptables -A OUTPUT -p udp -m multiport --dports 500,1701,4500 -m state --state NEW -j ACCEPT iptables -A OUTPUT -p tcp -m multiport --dports 6667,6697 -m state --state NEW -j ACCEPT iptables -N RULE_9 iptables -A OUTPUT -s 192.168.0.0/24 -d 192.168.0.0/24 -j RULE_9 iptables -A INPUT -s 192.168.0.0/24 -d 192.168.0.0/24 -j RULE_9 iptables -A RULE_9 -j LOG --log-level info --log-prefix "RULE 9 -- ACCEPT" iptables -A RULE_9 -j ACCEPT iptables -N RULE_10 iptables -A OUTPUT -p 47 -j RULE_10 iptables -A INPUT -p 47 -j RULE_10 iptables -A OUTPUT -p tcp -m tcp --dport 1723 -j RULE_10 iptables -A RULE_10 -j LOG --log-level info --log-prefix "RULE 10 -- ACCEPT" iptables -A RULE_10 -j ACCEPT iptables -N RULE_11 iptables -A OUTPUT -p tcp -m tcp --dport 3389 -j RULE_11 iptables -A OUTPUT -p udp -m udp --dport 3389 -j RULE_11 iptables -A RULE_11 -j LOG --log-level info --log-prefix "RULE 11 -- ACCEPT" iptables -A RULE_11 -j ACCEPT iptables -N RULE_12 iptables -A OUTPUT -p tcp -m multiport --dports 43772,1024:65535 -j RULE_12 iptables -A OUTPUT -p udp -m multiport --dports 43772,1024:65535 -j RULE_12 iptables -A RULE_12 -j LOG --log-level info --log-prefix "RULE 12 -- ACCEPT" iptables -A RULE_12 -j ACCEPT iptables -N RULE_13 iptables -A OUTPUT -p udp -m udp -j RULE_13 iptables -A INPUT -p udp -m udp -j RULE_13 iptables -A RULE_13 -j LOG --log-level info --log-prefix "RULE 13 -- DENY" iptables -A RULE_13 -j DROP iptables -N RULE_14 iptables -A OUTPUT -p tcp -m tcp -j RULE_14 iptables -A INPUT -p tcp -m tcp -j RULE_14 iptables -A RULE_14 -j LOG --log-level info --log-prefix "RULE 14 -- DENY" iptables -A RULE_14 -j DROP iptables -N RULE_15 iptables -A OUTPUT -d darkstar -j RULE_15 iptables -A INPUT -j RULE_15 iptables -A RULE_15 -j LOG --log-level info --log-prefix "RULE 15 -- DENY" iptables -A RULE_15 -j DROP
  17. This type of tactic is gonna force people to upgrade all computer and devices just to fatten the pockets of the greedy giants. I'll go back to a flip phone before I keep flushing my hard-earned money down the drain. This generation needs to learn what boycott means.
  18. Interesting article jaclaz, but I believe its a smoke screen. Why are some many vendors killing off support for older OS? We all know that Microsoft is here to make money. The Linux + Windows combination propaganda is for the blinded sheep. If Microsoft is not benefiting from it, I don't see involvement from them. Being optimistic, anything is possible... Microsoft is about making billions of dollars, that's it, that's all !!! For Linux to be free and open source, their pockets are nowhere near MS and Apple. In other words, MS ain't going or giving anything away for free. These are facts. I see Apple capitalizing off Microsoft downfall, its surely happening now as we speak.
  19. @ FranceBB, Some say the best things in life are free, I disagree. I see myself in the future becoming an Apple NUT, if Microsoft don't get it together. I do have until the death of Win 7. Hopefully by then Microsoft would've gotten the message. Nonetheless, Skype does allow me to communicate with my family when I'm away from home, which is a major PLUS+ for me.
×
×
  • Create New...