Comcast traffic blocking: even more apps, groupware clients affected

More information about the supposed filters that Comcast has implemented to curb Bittorrent traffic on its network. Only now it looks as though the appplication suit Lotus Notes is affected. Last week, we reported on mounting evidence that Comcast is targeting and disrupting BitTorrent traffic on its network. Further digging by interested parties has turned up more indication that BitTorrent isn’t the only popular P2P protocol being tampered with by the United States’ largest ISP.

More information about the supposed filters that Comcast has implemented to curb Bittorrent traffic on its network. Only now it looks as though the appplication suit Lotus Notes is affected.

Last week, we reported on mounting evidence that Comcast is targeting and disrupting BitTorrent traffic on its network. Further digging by interested parties has turned up more indication that BitTorrent isn’t the only popular P2P protocol being tampered with by the United States’ largest ISP.

The Electronic Frontier Foundation noticed the same sort of packet forging that the AP did (and that Broadband Reports readers did some time ago), and continued its testing to see if other applications are affected. The answer is a disturbing “yes.” The results of additional testing done by the EFF indicate Comcast is sending forged reset packets with some Gnutella traffic. When the EFF ran a Gnutella node on a Comcast connection, the forged reset packets disrupted communication between the nodes.

Read the full article at arstechnica.com


Did you like this article?


0 Shares:
You May Also Like

PC World Reviews Apple OS X 10.5 (Leopard)

PC World reviews the newest release of Apple's Max OSX version 10.5 codenamed "Leopard". In this review "Edward Mendelson" states one big remark.
"First: despite minor problems, it's by far the best operating system ever written for the vast majority of consumers, with dozens of new features that have real practical value—like truly automated backups, preview images in folders, and notes and to-do lists integrated into the mail program".
I have only played with Leopard in the last few days and seen it in action on a co-workers laptop, and I'm starting to thing more and more about purchasing a Macbook Pro! <!--brea--
Read More

DIY “beatbox” drives old neighbors crazy

DIY "beatbox" drives old neighbors crazy -

Filed under:


We're pretty sure that he meant "boombox", but regardless, this funky little hack from music enthusiast Gregor Dauth will be making him a lot of new friends at the next break-dancing competition. For this feat of audiophile-DIY, Dauth gutted an old Grundig tape machine, added four 150-watt speakers, installed an amp he purchased on eBay, and flashed it all up with some blue fiber-optic lighting. The end-result? More ass-shaking low-end then you could possibly want.

[Via hackaday]

 

Read | Permalink | Email this | Comments


Office Depot Featured Gadget: Xbox 360 Platinum System Packs the power to bring games to life!

[EnGadget]
Read More

Microsoft changes mind, agrees to fix IE’s URI handler

Microsoft agrees to release a patch to fix some of the security issues but not all in Internet Explorers URI Handler. I don't understand why Microsoft has such a lazy stance on security, I want to use Internet Explorer just as securely as any other browser. One mis-typed url after a fresh install of Windows could cause malicious software to gain entry to me desktop.
Read More

Adobe says Acrobat, Reader vulnerable to hacks

This is a disturbing as most white pages and manuals ranging from automobiles and computer motherboards are in PDF format. Even eBooks could be an easy way for a hacker to gain access to your machine, illegal books put online could be a trap for unsuspecting downloaders.
Adobe says Acrobat, Reader vulnerable to hacks - BOSTON (Reuters) - Adobe Systems Inc, whose software is used by millions of people to read documents sent over the Internet, said on Wednesday some of its programs contain yet-to-be-fixed flaws that make computers vulnerable to attack. On October 5, Adobe posted a notice on its Web site that said it had unknowingly incorporated vulnerabilities into versions of Adobe Reader and Acrobat software that could allow malicious programs to get on to a PC without the user's knowledge.
Read More