Who Wants To Steal Music?
#1
Senior Member
Thread Starter
Join Date: Dec 2001
Location: Jensen Beach, FL / Sylva, NC
Posts: 2,934
#4
Originally Posted by Jims5543' date='Sep 19 2003, 10:11 AM
I spelled steal steel oops!!!
This site is supposidly untraceable. It based in the middle east and is again supposidly outside international law. What ever that means.
This site is supposidly untraceable. It based in the middle east and is again supposidly outside international law. What ever that means.
#5
Senior Member
Thread Starter
Join Date: Dec 2001
Location: Jensen Beach, FL / Sylva, NC
Posts: 2,934
Dynamic Ports. Each ES5 node uses a randomly chosen port (unless the user chooses a specific port themselves). Therefore, ISPās will be unable to "shape" traffic based upon port numbers ö a method that some ISPās have deployed to throttle bandwidth because P2P traffic was bogging down their entire network.
User Defined Port Settings. ES5 provides users with ćone-clickä port setting options for ES5 to use port 53 (the port used by DNS) or port 37 (the port used by time service) therefore rendering all blocking attempts hopeless.
Multiple Points of Entry. ES5 uses multiple methods for connecting to the ES5 network including IP Multicast, Usenet Articles, Web Sites, Node List Files and a several other undisclosed methods that even the Forces of the Evil Empire will be unable to stop.
No Scan. No entity can scan an ES5 userās computer to determine if ES5 is running because ES5 does not use well known port numbers. The agents of the Evil Empire will be unable to effectively examine traffic at a central router to easily pinpoint ES5 traffic. To do so will require an enormous amount of time, money and effort.
UDP Not Easily Blocked by ISPs. ISPās are beginning to use the "you will not run a server" covenant in their contracts to block or throttle incoming TCP connections to stop what they consider to be P2P bandwidth wasters. They cannot block UDP (User Datagram Protocol) as easily because UDP has no "direction".
Penetrating Firewalls. UDP allows seamless penetration of firewalls without inconvenient setting of firewall parameters. For users behind firewalls, ES5 uses UDP to request a PUSH, where the behind-the-firewall computer initiates the connection back to the requested userās computer. If both computers are behind firewalls that are blocking ES5 ports, then no transport is possible between them ö however ES5ās advanced Search procedure will automatically filter out those situations so the user will never encounter this situation.
Identifying IP Addresses. ES5 does not display user IP Address information on downloading or uploading. Itās nobody's business and is information too vital to fall into enemy hands.
User Defined Port Settings. ES5 provides users with ćone-clickä port setting options for ES5 to use port 53 (the port used by DNS) or port 37 (the port used by time service) therefore rendering all blocking attempts hopeless.
Multiple Points of Entry. ES5 uses multiple methods for connecting to the ES5 network including IP Multicast, Usenet Articles, Web Sites, Node List Files and a several other undisclosed methods that even the Forces of the Evil Empire will be unable to stop.
No Scan. No entity can scan an ES5 userās computer to determine if ES5 is running because ES5 does not use well known port numbers. The agents of the Evil Empire will be unable to effectively examine traffic at a central router to easily pinpoint ES5 traffic. To do so will require an enormous amount of time, money and effort.
UDP Not Easily Blocked by ISPs. ISPās are beginning to use the "you will not run a server" covenant in their contracts to block or throttle incoming TCP connections to stop what they consider to be P2P bandwidth wasters. They cannot block UDP (User Datagram Protocol) as easily because UDP has no "direction".
Penetrating Firewalls. UDP allows seamless penetration of firewalls without inconvenient setting of firewall parameters. For users behind firewalls, ES5 uses UDP to request a PUSH, where the behind-the-firewall computer initiates the connection back to the requested userās computer. If both computers are behind firewalls that are blocking ES5 ports, then no transport is possible between them ö however ES5ās advanced Search procedure will automatically filter out those situations so the user will never encounter this situation.
Identifying IP Addresses. ES5 does not display user IP Address information on downloading or uploading. Itās nobody's business and is information too vital to fall into enemy hands.
#7
Senior Member
Thread Starter
Join Date: Dec 2001
Location: Jensen Beach, FL / Sylva, NC
Posts: 2,934
Drew (a dude in my office) just volenteered his laptop we hooked it up to the network and he is downloading a song and a Video right now.
If this is true that it is totally secure. Wow.
If this is true that it is totally secure. Wow.
#8
supposedly it's employees are americans, palastenians, isrealis, ect.
crazy stuff
it's based in palestine
I think it's the terrorists way or destryoing american economics by bankrupting our music industry.
I don't car tho, as long as it saves me money!
crazy stuff
it's based in palestine
I think it's the terrorists way or destryoing american economics by bankrupting our music industry.
I don't car tho, as long as it saves me money!
#9
Originally Posted by Jims5543' date='Sep 19 2003, 07:00 AM