• Content count

  • Joined

  • Last visited

  • Speed Test

    My Results


About mudmanc4

  • Rank
    TMN Seasoned Veteran
  • Birthday January 01

Contact Methods

  • AIM mudmanc4
  • MSN mudmanc4
  • Website URL
  • ICQ 330539369
  • Yahoo mudmanc4
  • Skype mudmanc4

Profile Information

  • Gender Male
  • Location In The Plex

Recent Profile Visitors

68,728 profile views
  1. Jenna McLaughlin Feb. 11 2016, 7:00 a.m. If the U.S. government tries to strong-arm American companies into ending the sale of products or applications with unbreakable encryption, the technology won’t disappear, a group of researchers conclude in a new report. It would still be widely available elsewhere. Some U.S. law enforcement officials argue that unbreakable encryption is interfering with legal surveillance of suspected criminals and terrorists. And some members of Congress are pushing for a nationwide requirement that encryption allow for law-enforcement access. But the three researchers — Bruce Schneier, a cryptologist and fellow at the Berkman Center for Internet & Society, Kathleen Seidel, an independent researcher, and Saranya Vijayakumar of Harvard — compiled a list of at least 865 hardware and software encryption products available in 55 different countries. More than 500 of them come from outside of the United States. “The report calls into question the efficacy of any U.S. mandates forcing backdoors for law-enforcement access. Anyone who wants to avoid U.S. surveillance will have 546 competing products to choose from,” Schneier wrote in a press release. “Any U.S.-only restrictions will adversely affect U.S. companies in this worldwide market,” he continued. “Criminals and terrorists will switch to more secure foreign alternatives, and the people who will be most affected are the innocent Internet users who don’t know enough to use non-backdoored alternatives,” he wrote. It’s not entirely clear which overseas encryption products are truly unbreakable, and which have been compromised by government surveillance backdoors. Even so, Schneier and his co-authors insist that “cryptography is very much a worldwide academic discipline” and “there is no reason to believe that foreign-designed or foreign-developed encryption products are any worse (or better) than their U.S. counterparts.” Source
  2. Read it for yourself in the TOS
  3. Looking for help in diagnosing slow upload speeds

    Haha, sorry not funny, but geezus!   Rather than adding a basic switch,  dropping a line through the attic, or crawl even duct,  and doing what you wish at the other end, they wanted to add a secondary drop? Do it, of course there should be no fee lol
  4. 8Mbps download speed on 150Mbps connection?

    You might want to head over to and pick the California servers. You've been testing to Dallas, which is fine, but from what you are explaining, it's obvious the tests you were taking at the other place, are not telling the complete story.    
  5. Google Safe Browsing Updated

    Posted by Lucas Ballard, Safe Browsing Team In November, we announced that Safe Browsing would protect you from social engineering attacks - deceptive tactics that try to trick you into doing something dangerous, like installing unwanted software or revealing your personal information (for example, passwords, phone numbers, or credit cards). You may have encountered social engineering in a deceptive download button, or an image ad that falsely claims your system is out of date. Today, we’re expanding Safe Browsing protection to protect you from such deceptive embedded content, like social engineering ads. Consistent with the social engineering policy we announced in November, embedded content (like ads) on a web page will be considered social engineering when they either:   Pretend to act, or look and feel, like a trusted entity — like your own device or browser, or the website itself.  Try to trick you into doing something you’d only do for a trusted entity — like sharing a password or calling tech support.   Below are some examples of deceptive content, shown via ads: This image claims that your software is out-of-date to trick you into clicking “update”.    This image mimics a dialogue from the FLV software developer -- but it does not actually originate from this developer.   These buttons seem like they will produce content that relate to the site (like a TV show or sports video stream) by mimicking the site’s look and feel. They are often not distinguishable from the rest of the page.   Our fight against unwanted software and social engineering is still just beginning. We'll continue to improve Google's Safe Browsing protection to help more people stay safe online.   Will my site be affected?   If visitors to your web site consistently see social engineering content, Google Safe Browsing may warn users when they visit the site. If your site is flagged for containing social engineering content, you should troubleshoot with Search Console. Check out our social engineering help for webmasters.
  6. How to  import an existing OpenVZ container into a running OpenVZ container?   Not doable as I understand. Yet there must be a way to take one virtual server dump and get it running in a completely different instance. Not having control over the HW node itself.   The cruft of it all if you think it will help:    
  7. iphone results waaaayyy better than pc(cable connection)

    Are any of the results within your database here at, results just after the HDD format, before installing steam and other applications?

    Hi Moidcher,  Not being familiar with the web interface of this router:  You'll have to find where to set a subnet reservation, out of the DCHP pool range. Leaving plenty for DCHP to start with. If the default is say, the assign a pool to ; this way you have  ~98 static IP addresses, and  ~156 for the DHCP, you could set it where you wish. Though, it appears as if this router may handle the specific reservations setting itself. As pictured below.   For the second router, you could turn off DHCP, assign the second router a static IP within the range of of lose DHCP addresses on the first router (that is if you intend on accessing the second router itself for any reason after initial configuration)   Otherwise, on the second router the more simply way would be to leave DHCP on the WAN set, and turn off the internal DHCP itself, and allow the first router to manage everything. On the second router, plug the cat5 into theWAN LAN, and connect this to a LAN port on the first router.   Here is the manual itself:
  9. removing test results from old Is ISP

    Hey that is awesome, I read what I could find in the time I had and how they were planning on getting rid of the cap they stated after the buyout. It's great they chose to leave it open. When I was with them there was no cap, I only heard from them if I went a bit wild and popped up in there 'high percentage of usage'. Even then they never penalized me for it.
  10. Speed test

      Hello Farhad,  You can view your test results here:   From there you can share results :   Just click 'share' then chose which way you would like to share them:     This will open a dialog with the code to copy, and paste wherever you wish: I chose 'Copy 4 Forums' :   Then highlight or copy the code, and paste it into the forum of your choice.  
  11. Best Free Anti-Virus

    Hey it's all good. That's why we have threads that last so long
  12. Best Free Anti-Virus

    Well then, bringing a post back to life from 2008, nice
  13. removing test results from old Is ISP

    I was just having a look at this myself   Not to mention the TWC cap will certainly be costly at some point. With Buckeye, after the cap is hit, it's ten bucks per 10 gig.   From what I can see, without a TWC account, they charge $1/GB over {whatever is in the contract agreement} same thing as Buckeye, if it still stands.
  14. Understanding single thread sluggishness

    Everything you have said, mainly the section on removing the switch from the equation produces the same results, I would continue submitting tickets to the ISP, they will eventually respond and send a tech.   Of course they will not be responsible for administering the local network, but with enough perseverance they should responsibly cave, and get someone out there.
  15. Understanding single thread sluggishness

    Ah, so with or without the switch, results are ~the same? Even using different workstations / laptops what have you?   If not, run: show policer