Want to pay and be paid without trouble worldwide every year, TAKE Payoneer !! !!


Amazon, the store of us all
Amazon Movers & Shakers Our biggest gainers in sales rank over the past 24 hours. Updated frequently.

Delivery in Netherlands, France, Germany, Italy, Spain, Poland, Sweden, Canada & United States
Sign up for Personal Shopper by Prime Try Before You Buy
Find the perfect fit with Prime Try Before You Buy
Bij ons GEEN advertenties
over banken,lenen, gokken, 06 of sms spelletjes, alcohol, drugs, roken of zogenaamde goede doelen !

Amazon USA UK-German-French-Canada-Japan Boeken Holland Italy World Dates World Travel
Deze site gebruikt enkel een cookie voor in en uitloggen als geregistreerde
Onze adverteerders en links gebruiken mogelijk WEL cookies Wilt U dat niet, verlaat dan deze site!

Auteur Topic: Belgische politica Tania Derveaux wil Netneutraliteit internet redden met seks !  (Read 8084 times)

0 Leden en 1 gast bekijken dit topic.

Offline admin

  • Administrator
  • Gold Member
  • *******
  • Berichten: 3.112
  • Geslacht: Man
    • De Gratis Krant van Nederland
Belgische politica Tania Derveaux wil Netneutraliteit internet redden met seks !

Zie ook
Doen politici loze beloften? In Belgie wel...

Internetcensuur

Vorig jaar stelde Tania Derveaux, het uithangbord van de politieke partij NEE, zich nog kandidaat voor de verkiezingen. Ze beloofde toen dat ze indien ze een zitje in de senaat kon bemachtigen, 40.000 mannen op een blowjob ging trakteren, naar analogie met de 40.000 jobs die andere partijen beloofden. Driewerf helaas: Tania werd niet verkozen en de blowjobs werden via een inmiddels verdwenen YouTube-filmpje virtueel uitgedeeld.

Neutraliteit internet
Maar nu is Tania terug met een nieuw initiatief: ze wil zoveel mogelijk mensen ontmaagden om het internet te redden. Zo wil Tania actie voeren tegen de aangekondigde inperking van de neutraliteit van het internet (meer uitleg in het filmpje hieronder).





Maagden kunnen zich registeren op contactbutton op de site van
Tania Derveaux van beweging NEE





dutch links:

virgin-media-netneutraliteit-is-totale-onzin
FCC-onderzoek-naar-net-neutrality-levert-29.000-bijdragen-op

britse-isps-willen-geld-zien-van-bbc-wegens-iplayer
ftc-net-neutrality-niet-nodig

google-net-neutrality-wetten-kunnen-tot-rechtszaken-leiden
webvader-waarschuwt-tegen-fragmentatie-internet

De uitvinder van het World Wide Web, Sir Tim Berners-Lee, heeft op de WWW2006-conferentie gewaarschuwd tegen pogingen in de VS om netwerkbeheerders toe te staan bepaalde content prioriteit te geven boven andere.
Hij schaart zich daarmee aan de kant van een andere internetaartsvader, TCP/IP-uitvinder Vinton Cerf, die in zijn tegenwoordige hoedanigheid van 'Internet evangelist' bij Google stelt dat consumenten en innovatie het best gediend zijn bij een vrij en neutraal aanbod van diensten op het internet.

Wikipedia:Netneutraliteit

Pentagon, Internet is de vijand

english links:

virgin-media-ceo-says-net-neutrality-is-a-load-of-bollocks

comcast-throttles-bittorrent-traffic-seeding-impossible

save_the_internet_fuck_virgin

Google:netneutrality


Wikipedia:Netneutrality

openinternetcoalition

savetheinternet


Weet U welke ISP de netneutraliteit bedreigt en bepaald verkeer blokkeert? Reply hier zodat mensen het kunnen lezen en ze kunnen boycotten .


Test your/isp ports


Detecting Ports Blocked by Your ISP

Internet service providers often block specific traffic entering their network before it reaches their customers, or after leaving their customers before it exits their network. This is sometimes done to block the exploitation of common security vulnerabilities, and sometimes to prevent their customers from offering proscribed Internet services.

As a customer, it can be useful and interesting to know which service ports, if any, an ISP has chosen to preemptively block in order to restrict their customers' global Internet traffic.

ISP port blocking can be easily tested, often quite rapidly, by arranging to allow the ShieldsUP! probe to have access to an unprotected computer. Since all non-stealth machines will respond to every open request — either affirmatively or negatively — ports appearing as STEALTH will be those blocked by your ISP, corporate firewall, or other external agency.


   If your system is unprotected, without any personal firewall or NAT router, any ports showing as stealth  are being blocked somewhere between your computer and the public Internet. This is probably being done by your ISP. Internet traffic directed to your computer at the stealth ports will be dropped before reaching your machine.
  

   If your system has a personal firewall that can be instructed to "trust" a specific remote IP, you can temporarily instruct it to trust the ShieldsUP! probe IP of [4.79.142.206]. If, after doing so, most of the service ports change to either open  or closed , you have succeeded and any which remain stealth are being blocked by your ISP.
  

   If your system is operating behind a residential "NAT" router, the router will be acting as a natural and excellent hardware firewall. But that's not what you want for the moment. You can temporarily remove your NAT router and connect an unprotected computer directly to your cable modem or DSL line. Or, if you are comfortable reconfiguring your NAT router, you may be able to point the router's "DMZ" at one of your computers which has been instructed to "trust" our probe IP of [4.79.142.206]. If, after doing so, most of the service ports change to either open  or closed , you have succeeded and any remaining stealth are being blocked by your ISP.
  

   Finally, if your Internet security system, NAT router, personal firewall, or whatever, can produce detailed logs of incoming Internet packets, you could leave your existing security in place, clear your log, run the service ports scan, then carefully inspect your log for any consistently missing port probes. We send out four sets of probing packets because individual packets are sometimes dropped along the way. Therefore, it won't be unusual to see occasional missing packets from your logs. What you're looking for is a complete lack of packets bound for a specific port. A careful and detailed examination of your log will reveal any missing ports which are being blocked before they reach your logging tool. (Note that this technique is not quite as foolproof as the other approaches since ISPs could be blocking outbound packets from their customers, which the other approaches would detect but log-watching would not.)


After completing the experiments above, remember to return your system to its previous tight security and verify that everything is safe again by re-running any of our tests.


Test your/isp ports

Test your/isp ports

Test your/isp ports

Test your/isp ports


Port numbers
Port Numbers  
« Last Edit: Juni 26, 2009, 22:32:22 pm door admin »

 


SimplePortal 2.3.7 © 2008-2024, SimplePortal