<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>ikt</title>
    <description>A Misanthropic Worldview
</description>
    <link>https://ikt.id.au//</link>
    <atom:link href="https://ikt.id.au//feed.xml" rel="self" type="application/rss+xml"/>
    <pubDate>Sat, 26 Mar 2016 23:13:14 +1030</pubDate>
    <lastBuildDate>Sat, 26 Mar 2016 23:13:14 +1030</lastBuildDate>
    <generator>Jekyll v2.5.3</generator>
    
      <item>
        <title>Keep your wordpress up to date</title>
        <description>&lt;p&gt;&lt;img src=&quot;https://ikt.id.au/uploads/mail1z.1month.png&quot; alt=&quot;Spam Graph&quot; /&gt;&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;https://ikt.id.au/uploads/mail3z.1month.png&quot; alt=&quot;Spam Graph&quot; /&gt;&lt;/p&gt;

&lt;p&gt;One minute everything is nice and cozy next minute 20,000+ emails sitting in the queue waiting to delievered.&lt;/p&gt;

&lt;p&gt;I’m now cleaning up the site for the customer, so far it looks as though they managed to upload a php reverse shell and then used that to run a script which sends out masses of spam.&lt;/p&gt;
</description>
        <pubDate>Sun, 06 Dec 2015 00:00:00 +1030</pubDate>
        <link>https://ikt.id.au//2015/12/06/wordpresshack.html</link>
        <guid isPermaLink="true">https://ikt.id.au//2015/12/06/wordpresshack.html</guid>
        
        
      </item>
    
      <item>
        <title>NBN Speeds - November 2015</title>
        <description>&lt;p&gt;I currently have 2 ISP’s on the NBN which allows me to make comparisons, currently both are fairly evenly matched with Internode ahead on uploads and latency:&lt;/p&gt;

&lt;p&gt;ANT Internet (AAPT/TPG):&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;https://www.speedtest.net/result/4831436361.png&quot; alt=&quot;ANT Internet&quot; /&gt;
&lt;a href=&quot;https://www.ant.com.au/&quot;&gt;https://www.ant.com.au/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Internode:&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;https://www.speedtest.net/result/4831477209.png&quot; alt=&quot;Internode&quot; /&gt;
&lt;a href=&quot;http://www.internode.on.net/&quot;&gt;http://www.internode.on.net/&lt;/a&gt;&lt;/p&gt;
</description>
        <pubDate>Sun, 15 Nov 2015 00:00:00 +1030</pubDate>
        <link>https://ikt.id.au//2015/11/15/NBNspeeds.html</link>
        <guid isPermaLink="true">https://ikt.id.au//2015/11/15/NBNspeeds.html</guid>
        
        
      </item>
    
      <item>
        <title>State of encryption</title>
        <description>&lt;p&gt;Instant Message:&lt;br /&gt;
- Signal: &lt;a href=&quot;https://whispersystems.org/&quot;&gt;https://whispersystems.org/&lt;/a&gt;&lt;br /&gt;
- Torchat &lt;a href=&quot;https://github.com/prof7bit/TorChat&quot;&gt;https://github.com/prof7bit/TorChat&lt;/a&gt;  &lt;/p&gt;

&lt;p&gt;Web browsing:&lt;br /&gt;
- Tor: &lt;a href=&quot;https://www.torproject.org/&quot;&gt;https://www.torproject.org/&lt;/a&gt;&lt;br /&gt;
- Privacy Badger: &lt;a href=&quot;https://www.eff.org/privacybadger&quot;&gt;https://www.eff.org/privacybadger&lt;/a&gt;&lt;br /&gt;
- HTTPS Everywhere &lt;a href=&quot;https://www.eff.org/https-everywhere&quot;&gt;https://www.eff.org/https-everywhere&lt;/a&gt;  &lt;/p&gt;

&lt;p&gt;Email:&lt;br /&gt;
- Protonmail &lt;a href=&quot;https://protonmail.ch/&quot;&gt;https://protonmail.ch/&lt;/a&gt;&lt;br /&gt;
- Fastmail &lt;a href=&quot;https://www.fastmail.com/&quot;&gt;https://www.fastmail.com/&lt;/a&gt;  &lt;/p&gt;

</description>
        <pubDate>Sat, 14 Nov 2015 00:00:00 +1030</pubDate>
        <link>https://ikt.id.au//2015/11/14/encryption.html</link>
        <guid isPermaLink="true">https://ikt.id.au//2015/11/14/encryption.html</guid>
        
        
      </item>
    
      <item>
        <title>How many valid hosts/subnets in a range</title>
        <description>&lt;table&gt;
  &lt;tbody&gt;
    &lt;tr&gt;
      &lt;td&gt;128&lt;/td&gt;
      &lt;td&gt;64&lt;/td&gt;
      &lt;td&gt;32&lt;/td&gt;
      &lt;td&gt;16&lt;/td&gt;
      &lt;td&gt;8&lt;/td&gt;
      &lt;td&gt;4&lt;/td&gt;
      &lt;td&gt;2&lt;/td&gt;
      &lt;td&gt;1    &amp;lt;- hosts&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;128&lt;/td&gt;
      &lt;td&gt;192&lt;/td&gt;
      &lt;td&gt;224&lt;/td&gt;
      &lt;td&gt;240&lt;/td&gt;
      &lt;td&gt;248&lt;/td&gt;
      &lt;td&gt;252&lt;/td&gt;
      &lt;td&gt;254&lt;/td&gt;
      &lt;td&gt;255  &amp;lt;- mask&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;2&lt;/td&gt;
      &lt;td&gt;4&lt;/td&gt;
      &lt;td&gt;8&lt;/td&gt;
      &lt;td&gt;16&lt;/td&gt;
      &lt;td&gt;32&lt;/td&gt;
      &lt;td&gt;64&lt;/td&gt;
      &lt;td&gt;128&lt;/td&gt;
      &lt;td&gt;256  -&amp;gt; subnets&lt;/td&gt;
    &lt;/tr&gt;
    &lt;tr&gt;
      &lt;td&gt;/25&lt;/td&gt;
      &lt;td&gt;/26&lt;/td&gt;
      &lt;td&gt;/27&lt;/td&gt;
      &lt;td&gt;/28&lt;/td&gt;
      &lt;td&gt;/29&lt;/td&gt;
      &lt;td&gt;/30&lt;/td&gt;
      &lt;td&gt;/31&lt;/td&gt;
      &lt;td&gt;/32  &amp;lt;- short&lt;/td&gt;
    &lt;/tr&gt;
  &lt;/tbody&gt;
&lt;/table&gt;

</description>
        <pubDate>Thu, 12 Nov 2015 00:00:00 +1030</pubDate>
        <link>https://ikt.id.au//2015/11/12/validhosts.html</link>
        <guid isPermaLink="true">https://ikt.id.au//2015/11/12/validhosts.html</guid>
        
        
      </item>
    
      <item>
        <title>Subnetting fun</title>
        <description>&lt;p&gt;Hi all,&lt;/p&gt;

&lt;p&gt;I’ve received an email from one of your members asking me to post up my technique for subnetting as links to external blogs are not allowed due to forum rules. I know that he benefited from it and he wishes to help out others so here goes:&lt;/p&gt;

&lt;p&gt;First of all I need you to get rid of all of the negative thoughts surrounding subnetting. Put down all of the books that you have read about the subject and navigate away from other sites claiming to provide an easy way to subnet. This technique requires no charts, just simply the know-how to work with the powers of 2.&lt;/p&gt;

&lt;p&gt;We need to start with the fundamentals of IP addressing. An IP address is made up of 32 bits, split into 4 octets (oct = 8, yes?). Some bits are reserved for identifying the network and the other bits are left to identify the host.&lt;/p&gt;

&lt;p&gt;There are 3 main classes of IP address that we are concerned with.&lt;/p&gt;

&lt;p&gt;Class A	Range 0 - 127 in the first octet (0 and 127 are reserved)
Class B	Range 128 - 191 in the first octet
Class C	Range 192 - 223 in the first octet&lt;/p&gt;

&lt;p&gt;Below shows you how, for each class, the address is split in terms of network (N) and host (H) portions.&lt;/p&gt;

&lt;p&gt;NNNNNNNN	.	HHHHHHHH	.	HHHHHHHH	.	HHHHHHHH Class A
NNNNNNNN	.	NNNNNNNN	.	HHHHHHHH	.	HHHHHHHH Class B
NNNNNNNN	.	NNNNNNNN	.	NNNNNNNN	.	HHHHHHHH Class C&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;At each dot I like to think that there is a boundary, therefore there are boundaries after bits 8, 16, 24, and 32. This is an important concept to remember.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;We will now look at typical questions that you may see on subnetting. More often than not they ask what a host range is for a specific address or which subnet a certain address is located on. I shall run through examples of each, for each class of IP address.&lt;/p&gt;

&lt;p&gt;What subnet does 192.168.12.78/29 belong to?&lt;/p&gt;

&lt;p&gt;You may wonder where to begin. Well to start with let’s find the next boundary of this address.&lt;/p&gt;

&lt;p&gt;Our mask is a /29. The next boundary is 32. So 32 - 29 = 3. Now 2^3 = 8 which gives us our block size i.e. 2 to the power of 3 equals 8.&lt;/p&gt;

&lt;p&gt;We have borrowed from the last octet as the 29th bit is in the last octet. We start from zero and count up in our block size. Therefore it follows that the subnets are:-&lt;/p&gt;

&lt;p&gt;192.168.12.0
192.168.12.8
192.168.12.16
192.168.12.24
192.168.12.32
192.168.12.40
192.168.12.48
192.168.12.56
192.168.12.64
192.168.12.72
192.168.12.80
………….etc&lt;/p&gt;

&lt;p&gt;Our address is 192.168.12.78 so it must sit on the 192.168.12.72 subnet.&lt;/p&gt;

&lt;p&gt;What subnet does 172.16.116.4/19 sit on?&lt;/p&gt;

&lt;p&gt;Our mask is /19 and our next boundary is 24. Therefore 24 - 19 = 5. The block size is 2^5 = 32.&lt;/p&gt;

&lt;p&gt;We have borrowed into the third octet as bit 19 is in the third octet so we count up our block size in that octet. The subnets are:-&lt;/p&gt;

&lt;p&gt;172.16.0.0
172.16.32.0
172.16.64.0
172.16.96.0
172.16.128.0
172.16.160.0
………….etc&lt;/p&gt;

&lt;p&gt;Our address is 172.16.116.4 so it must sit on the 172.16.96.0 subnet. Easy eh?&lt;/p&gt;

&lt;p&gt;What subnet does 10.34.67.234/12 sit on?&lt;/p&gt;

&lt;p&gt;Our mask is 12. Our next boundary is 16. Therefore 16 - 12 = 4. 2^4 = 16 which gives us our block size.&lt;/p&gt;

&lt;p&gt;We have borrowed from the second octet as bit 12 sits in the second octet so we count up the block size in that octet. The subnets are:-&lt;/p&gt;

&lt;p&gt;10.0.0.0
10.16.0.0
10.32.0.0
10.48.0.0
………….etc&lt;/p&gt;

&lt;p&gt;Our address is 10.34.67.234 which must sit on the 10.32.0.0 subnet.&lt;/p&gt;

&lt;p&gt;Hopefully the penny is starting to drop and you are slapping the side of your head realising that you were a fool to think that subnetting was hard. We will now change the type of question so that we have to give a particular host range of a subnet.&lt;/p&gt;

&lt;p&gt;What is the valid host range of of the 4th subnet of 192.168.10.0/28?&lt;/p&gt;

&lt;p&gt;Easy as pie! The block size is 16 since 32 - 28 = 4 and 2^4 = 16. We need to count up in the block size in the last octet as bit 28 is in the last octet.&lt;/p&gt;

&lt;p&gt;192.168.10.0
192.168.10.16
192.168.10.32
192.168.10.48
192.168.10.64
……………..etc&lt;/p&gt;

&lt;p&gt;Therefore the 4th subnet is 192.168.10.48 and the host range must be 192.168.10.49 to 192.168.10.62, remembering that the subnet and broadcast address cannot be used.&lt;/p&gt;

&lt;p&gt;What is the valid host range of the 1st subnet of 172.16.0.0/17?&lt;/p&gt;

&lt;p&gt;/17 tells us that the block size is 2^(24-17) = 2^7 = 128. We are borrowing in the 3rd octet as bit 17 is in the 3rd octet. Our subnets are:-&lt;/p&gt;

&lt;p&gt;172.16.0.0
172.16.128.0&lt;/p&gt;

&lt;p&gt;The first subnet is 172.16.0.0 and the valid host range is 172.16.0.1 to 172.16.127.254. You must remember not to include the subnet address (172.16.0.0) and the broadcast address (172.16.127.255).&lt;/p&gt;

&lt;p&gt;What is the valid host range of the 7th subnet of address 10.0.0.0/14?&lt;/p&gt;

&lt;p&gt;The block size is 4, from 16 - 14 = 2 then 22 = 4. We are borrowing in the second octet so count in the block size from 0 seven times to get the seventh subnet.&lt;/p&gt;

&lt;p&gt;The seventh subnet is 10.24.0.0. Our valid host range must be 10.24.0.1 to 10.27.255.254 again remembering not to include our subnet (10.24.0.0) and the broadcast address (10.27.255.255).&lt;/p&gt;

&lt;p&gt;What if they give me the subnet mask in dotted decimal?&lt;/p&gt;

&lt;p&gt;If you’re lucky and they give you a mask in dotted decimal format then you should have an even easier time. All you need again is your block size.&lt;/p&gt;

&lt;p&gt;Let’s say they have given a mask of 255.255.255.248 and you wish to know the block size. Here’s the technique:&lt;/p&gt;

&lt;ol&gt;
  &lt;li&gt;Starting from the left of the mask find which is the first octet to NOT have 255 in it.&lt;/li&gt;
  &lt;li&gt;Subtract the number in that octet from 256 to get your block size e.g. above it is 256 - 248 = block size of 8.&lt;/li&gt;
  &lt;li&gt;Count up from zero in your block size in the octet identified in step 1 as you have learned above (the example above would be in the last octet).&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Another example is a mask of 255.255.192.0 - you would simply count up in 256 - 192 = 64 in the third octet.&lt;/p&gt;

&lt;p&gt;One more example is 255.224.0.0 - block size is 256 - 224 = 32 in the second octet.&lt;/p&gt;

&lt;p&gt;What now?&lt;/p&gt;

&lt;p&gt;Now it’s time to go and pick up those books again and go straight to the practice questions, completely by-passing any of their techniques. Use my method and you will be laughing!&lt;/p&gt;

&lt;p&gt;Happy subnetting!&lt;/p&gt;

&lt;p&gt;Source: &lt;a href=&quot;http://www.techexams.net/forums/ccna-ccent/38772-subnetting-made-easy.html&quot;&gt;http://www.techexams.net/forums/ccna-ccent/38772-subnetting-made-easy.html&lt;/a&gt;&lt;/p&gt;
</description>
        <pubDate>Sun, 09 Aug 2015 00:00:00 +0930</pubDate>
        <link>https://ikt.id.au//2015/08/09/subnetting.html</link>
        <guid isPermaLink="true">https://ikt.id.au//2015/08/09/subnetting.html</guid>
        
        
      </item>
    
      <item>
        <title>Latest happenings</title>
        <description>&lt;p&gt;4 months have blown by and every day is ending faster than the last, I started writing this post a week ago and I’m already falling asleep from another difficult day.&lt;/p&gt;

&lt;p&gt;For the record the NBN congestion in the last post was fixed about 2 weeks later, so it wasn’t too bad considering there are people who are currently getting &amp;lt;1mbit due to copper line faults.&lt;/p&gt;

&lt;p&gt;After studying on and off for over a year I got my RHCSA certificate, fairly happy with that one, quickly updated the RHCSA study guide page.&lt;/p&gt;

&lt;p&gt;I’m now in the process of studying for my CCENT and CCNA, I’m fairly certain I’m going to go for the composite exam which is both at the same time.&lt;/p&gt;

&lt;p&gt;Primary tool I’m using to study for it is http://www.subnetting.net/ but gns3 recently launched their &lt;a href=&quot;http://academy.gns3.com&quot;&gt;GNS3 Academy&lt;/a&gt; which offered a whole ton of material for $15, which I’m happy to part with, the more information I have to drink down the quicker I’ll learn.&lt;/p&gt;

&lt;p&gt;I’ve noticed that I’m incredibly inefficent at using the time I’m not at work well, it takes me a long time to snap out of work mode which means 5 days out of 7 I get nothing done but work or wasting time as I try to snap out of work, by the time I do it’s time to sleep. So I’ve got a pretty clear goal for the second half of 2015.&lt;/p&gt;

&lt;p&gt;Random link of the day: &lt;a href=&quot;https://www.fidelity.com/insights/retirement/how-to-retire-in-10-years&quot;&gt;https://www.fidelity.com/insights/retirement/how-to-retire-in-10-years&lt;/a&gt;&lt;/p&gt;
</description>
        <pubDate>Sun, 26 Jul 2015 00:00:00 +0930</pubDate>
        <link>https://ikt.id.au//2015/07/26/wherehasthetimegone.html</link>
        <guid isPermaLink="true">https://ikt.id.au//2015/07/26/wherehasthetimegone.html</guid>
        
        
      </item>
    
      <item>
        <title>This is what it sounds like, when backhaul cries</title>
        <description>&lt;p&gt;The NBN’s higher upload speeds expose the congested download speeds more than ADSL ever could:&lt;/p&gt;

&lt;p&gt;At 9pm:&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;https://ikt.id.au/uploads/4283602102.png&quot; alt=&quot;9pm Speed test&quot; /&gt;&lt;/p&gt;

&lt;p&gt;At 5am:&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;https://ikt.id.au/uploads/4297539540.png&quot; alt=&quot;5am Speed test&quot; /&gt;&lt;/p&gt;
</description>
        <pubDate>Sun, 19 Apr 2015 00:00:00 +0930</pubDate>
        <link>https://ikt.id.au//2015/04/19/congestion.html</link>
        <guid isPermaLink="true">https://ikt.id.au//2015/04/19/congestion.html</guid>
        
        
      </item>
    
      <item>
        <title>firewall after 24-48 hours blocking SSH bots</title>
        <description>&lt;p&gt;Noticed a few bots attempting to get into root on my test server, installed fail2ban set minimum ban time to 2 years and the result has surprised even me.&lt;/p&gt;

&lt;pre&gt;
Chain fail2ban-SSH (1 references)
target     prot opt source               destination         
REJECT     all  --  182.100.67.112       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  212-129-8-87.ggsmarket.net  anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  43.255.190.168       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  43.255.190.148       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  58.218.213.254       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  43.255.190.140       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  182.100.67.102       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  218.87.111.117       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  58.218.204.241       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  59.63.192.198        anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  43.255.190.90        anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  43.255.190.120       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  221.229.166.30       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  43.255.190.187       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  43.255.190.146       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  222.186.21.240       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  43.255.190.165       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  221.229.166.240      anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  58.218.211.166       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  43.255.190.131       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  117.21.174.111       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  60.173.26.8          anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  43.255.190.153       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  58.218.199.195       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  43.255.190.142       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  43.255.190.123       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  43.255.190.116       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  43.255.190.149       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  43.255.191.147       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  221.229.166.29       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  43.255.190.152       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  182.100.67.113       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  43.255.190.191       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  58.218.199.49        anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  43.255.190.161       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  182.100.67.114       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  58.218.213.212       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  43.255.190.92        anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  218.16.129.142       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  43.255.190.189       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  58.135.83.115        anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  93.174.93.45         anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  43.255.190.183       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  43.255.190.147       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  222.186.21.209       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  218.87.111.108       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  43.255.190.118       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  176.120.203.235      anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  187-49-199-157.outcenter.com.br  anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  109.63.16.12         anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  109.63.100.13        anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  212.76.143.7         anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  109.63.112.136       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  134.255.162.88       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  43.255.190.121       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  61.143.236.193       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  43.255.190.133       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  58.218.211.190       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  43.255.190.145       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  43.255.190.159       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  43.255.190.169       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  61.160.222.76        anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  43.255.190.93        anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  43.255.190.115       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  221.229.160.237      anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  109.161.216.192      anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  43.255.190.154       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  43.255.190.138       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  222.186.21.217       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  109.63.57.117        anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  109.63.102.111       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  109.63.60.194        anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  mx.vertical.ru       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  187.111.53.86        anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  134.255.160.154      anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  109.63.98.71         anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  187.84.178.56        anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  94.97.44.63          anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  109.161.250.46       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  195.208.163.250      anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  185.11.226.231       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  92-223-223-162.ip275.fastwebnet.it  anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  43.255.190.144       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  58.218.201.22        anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  177.223.103.9        anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  159.20.216.123       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  host134-73-static.15-188-b.business.telecomitalia.it  anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  43.255.190.162       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  221.229.166.28       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  221.203.3.117        anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  222.186.21.251       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  43.255.190.150       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  58.218.213.230       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  43.255.190.156       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  221.229.160.222      anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  179.189.82.5         anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  5.133.62.70          anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  81.195.177.138       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  221.229.166.254      anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  43.255.190.125       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  221.229.166.98       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  43.255.190.160       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  187-51-139-5.customer.tdatabrasil.net.br  anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  61.160.215.103       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  43.255.190.126       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  92.155-73-188.telenet.ru  anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  43.255.190.185       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  221.229.166.27       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  109.63.89.90         anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  109.63.11.210        anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  ip-176-192-111-91.bb.netbynet.ru  anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  109.63.97.165        anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  Serrana--186-219-133-22.srt.net.br  anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  147.4.161.222.adsl-pool.jlccptt.net.cn  anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  109.161.198.72       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  109.161.246.66       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  134.255.172.92       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  109.63.52.231        anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  62-76-40-216.clodo.ru  anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  178.132.32.9         anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  109.63.31.167        anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  109.161.200.101      anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  222.186.51.228       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  109.161.228.73       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  93.174.135.241       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  109.63.73.255        anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  43.255.190.190       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  109.63.113.93        anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  109.63.102.40        anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  broadband-37-110-134-54.nationalcablenetworks.ru  anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  91-228-230-228.in-linetelecom.ru  anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  109.161.138.59       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  109.63.28.197        anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  bb15c8e6.virtua.com.br  anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  84.16.157.69         anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  109.63.111.69        anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  221.229.166.16       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  109.236.24.147       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  109.63.88.254        anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  109.63.120.60        anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  187.54.115.194       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  13.104.109.187.dynamic.ampernet.com.br  anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  43.255.190.141       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  200.179.231.121      anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  109.161.154.50       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  109.161.192.236      anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  58.218.204.226       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  43.255.190.143       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  222.186.58.131       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  43.255.190.182       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  43.255.190.166       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  195-154-56-58.ggsmarket.net  anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  43.255.190.151       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  61.160.213.190       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  43.255.190.117       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  218.87.111.109       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  61.160.212.27        anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  43.255.190.124       anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  43.255.190.175       anywhere            reject-with icmp-port-unreachable 
&lt;/pre&gt;
</description>
        <pubDate>Sat, 18 Apr 2015 00:00:00 +0930</pubDate>
        <link>https://ikt.id.au//2015/04/18/sshbots.html</link>
        <guid isPermaLink="true">https://ikt.id.au//2015/04/18/sshbots.html</guid>
        
        
      </item>
    
      <item>
        <title>ignorance + arrogance =</title>
        <description>&lt;p&gt;“Arrogance, ignorance, and incompetence. Not a pretty cocktail of personality traits in the best of situations.” - Graydon Carter&lt;/p&gt;

&lt;blockquote&gt;
  &lt;p&gt;I installed Tor Browser to see what all the hype was about and now my computer is fucked.  &lt;/p&gt;

  &lt;p&gt;I can’t reboot the computer, it won’t load. It sits on the apple gray screen for hours. Everything worked fine before I installed Tor.  &lt;/p&gt;

  &lt;p&gt;I removed Tor Browser with App Zapper and it still won’t boot. I’ve been to the apple store and the genius bar checked everything and the hardware is fine, its a problem with the OS.  &lt;/p&gt;

  &lt;p&gt;I even reinstalled OSX Yosemite and it still doesn’t work. Can anybody help me remove all the shit that Tor installed that’s fucked my computer.  &lt;/p&gt;

  &lt;p&gt;Tor is garbage. I’d rather be raided by the NSA than have my computer not work.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href=&quot;http://tor.stackexchange.com/questions/6511/how-do-i-completely-remove-tor-from-osx-yosemite&quot;&gt;http://tor.stackexchange.com/questions/6511/how-do-i-completely-remove-tor-from-osx-yosemite&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;If there’s one personality type I try to avoid, I think it’s well encapsulated in the above.&lt;/p&gt;

&lt;p&gt;From what I can see his thought process is along the lines of:&lt;/p&gt;

&lt;p&gt;A) I screwed up my computer using your software&lt;br /&gt;
B) I can’t fix it and no one I complain to can fix it&lt;br /&gt;
C) Therefore you need to fix it as it’s not my fault I broke my computer&lt;br /&gt;
D) and your software is garbage for letting this happen to me  &lt;/p&gt;

&lt;p&gt;Ignoring for the moment that a 2 second google search brings up exactly how to fix this issue:&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://discussions.apple.com/thread/6300231&quot;&gt;https://discussions.apple.com/thread/6300231&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;And not saying anything about the “Genuis bar” being unable to assist with his issue, the mood and attitude behind this type of post is something I hope to never encounter in any business I run.&lt;/p&gt;

&lt;p&gt;“The good news about computers is that they do what you tell them to do. The bad news is that they do what you tell them to do.” - Ted Nelson&lt;/p&gt;

&lt;p&gt;It’s not hard to get help on the Internet, one of the best qualities about the Internet is that there is a never ending supply of people willing to help, however you will get remarkably different answers depending on how you choose to act requesting said help.&lt;/p&gt;
</description>
        <pubDate>Mon, 30 Mar 2015 00:00:00 +1030</pubDate>
        <link>https://ikt.id.au//2015/03/30/igandag.html</link>
        <guid isPermaLink="true">https://ikt.id.au//2015/03/30/igandag.html</guid>
        
        
      </item>
    
      <item>
        <title>Encrypt Everything</title>
        <description>&lt;p&gt;&lt;img src=&quot;https://ikt.id.au/uploads/nsa.png&quot; alt=&quot;Conversation with Edward Snowden&quot; /&gt;&lt;/p&gt;

&lt;p&gt;As the NSA bears down on Edward Snowden I can’t help but think:&lt;/p&gt;

&lt;p&gt;“An intelligence agency that FEARS intelligence? Historically, not awesome.”&lt;/p&gt;

&lt;p&gt;I would like to run a web host that encrypts everything stored and all traffic, my only problem is data-loss. I’m sure that’s fixable though.&lt;/p&gt;
</description>
        <pubDate>Tue, 03 Mar 2015 00:00:00 +1030</pubDate>
        <link>https://ikt.id.au//2015/03/03/encrypteverything.html</link>
        <guid isPermaLink="true">https://ikt.id.au//2015/03/03/encrypteverything.html</guid>
        
        
      </item>
    
  </channel>
</rss>
