Cable Packet Shaping Causing Slowdowns 356
knorthern knight writes "To counter P2P programs that encrypt their traffic to evade detection, Rogers Cable in Canada has apparently started degrading all encrypted IP traffic, according to a post on Michael Geist's blog. How many of you log in to work over a VPN or ssh-tunnel? How many get usenet news or email over an encrypted connection? This could be a problem for Rogers Cable customers. Geist, who teaches at U of Ottawa, has 'been advised that the University computer help desk has received a steady stream of complaints from Rogers customers about off-campus email service.'"
Don't forget the ball team! (Score:3, Funny)
And the Blue Jays - the only product of theirs I like.
This is Cute (Score:5, Funny)
Michael Geist
This site is temporarily unavailable. Please notify the System Administrator
And just how are you supposed to to that?
That's not as efficient as my method, here. (Score:0, Funny)
An inexpensive method that everyone can use is the one that I implemented... Use an old 10BaseT Network Adapter, preferably USB 1.0, and at Half Duplex, for those certain bandwidth-hogging programs to discretely direct their packets through and use. The separate 10BaseT adapter needs nothing special and is to co-exist as plugged-in to the same hub that the primary Network Adapter is using. Then with their routes decided other than the same used by Telnet and SSH, attach about 100 feet of CAT3 cable rolled in a giant loop just to make the data slow down for having to travel through all that extra wire with all the "loop" inductance. We're not done yet, make sure you use the opposite of ferrite cores, somthing effective as "Twisty Ties" or better is a common 150-watt Heat Lamp that would cause enough radiation onto the cable to slow down the data; this is so we can make the CAT3 very noisy to cause the Network Adapter to detect the errors at the Physical Layer (not the Link Layer) where it automatically re-sends packets without disturbing the Application with faulty data. The Application will only see a slow connection, and no bad data will return.
On-topic to the actual Article, I encrypt all my data in binary-text. I use this method all the time when surfing slashdot. I have a computer running a daemon at another side of the country that receives the text binary and then converts it to text text; all this looks like is an application sending text'coded binary, kind of like hiding messages in Spam eMail.
Enjoy.
Re:This is Cute (Score:5, Funny)
Post it to slashdot. Obviously the sysadmin is slacking off, so that probably means he is reading slashdot.