0 Members and 1 Guest are viewing this topic.
Bearded BlunderNot a silly question at all.It would make perfect sense if they used the same method of connection as you or I do. The truth is they dont use the new peer caches nor did they use the old front code ones for that matter to get connected. In theory with the correct software and a known list of current primary connection to the network thats all they need to get on the WPN. How they get their list of primary connections I dont know exactly, but they are very successful in what ever method it is. Its not hard to come up with the technology to do this.The best way to get them off of the WPN is to have an accurate list of the IPs they use, something we have the technology to do, and to make sure all primaries are using this list to keep them from connecting to them. This can be accomplished with Peerguardian, Sherwood, Protowall, your firewall or our patch the 1.9 .dll. as long as you include the list of known IPs they use on the WPN. This list can be found here:https://www.winmxworld.com/tutorials/block_the_riaa.htmlAlong with instructions for adding it to your PeerGuardian.Sherwood uses virtually the same list already.They also ,as your aware maybe, do not make primary connection to users, they connect via a secondary connection to these known primaries for this reason there is no need to block them from your third party chat servers because these make what is known as a 'fake' primary connection. Basically just means they dont support actual network traffic or secondaries.They are capable of jamming up your ports with massive connection attempts and therefore could cause you to loose a room of people on a Third party chat server, if your running WinMx for them to find you with in the first place. After all that is the whole reason we push folks to block them so much, the DOS attacks they perform on primaries.As far as your Pg2, that was a known issue with the original PG, but if your having problems with it just let us know if you need information on an alternative approach.