Page 2 of 2

Posted: September 16th, 2007, 21:37
by cheeseandham
Explain to him what he's done and what he's doing and that it could cost you (and therefore him?) money/slow internet, he may be reasonable.

If not, here's a :ninja: approach

1) Make sure you change/have secret the router username and password and also try to change the ADSL password with your provider. This'll stop him removing your equipment and authenticating with other stuff.

2) Your router has got a Filters page, you can specify ports to block. e.g. common p2p ports

3a) If you have access to his PC, go through his website history, look for the p2p or other high bandwidth sites he's going to, make a list and also add all the other potential ones he would go to.

3b)Add these names to his hosts file and point them to 127.0.0.1

3c) Ping these websites, note down their IP's, and add persistent (-p) and nonsensical routes to them.

3d) You can add these websites/IP's to the router too and block them there, especially if you don't use them. (Page35 of your manual)

4) If he's on wireless, note down his MAC address so you can block his ass completely until your account gets back to a reasonable level.

Posted: September 16th, 2007, 22:37
by FatherJack
Do 3a and show them to Mum. I bet they're all dirty ones, but if not stick a few of your own in.

Posted: September 16th, 2007, 23:00
by HereComesPete
1) Sick and twisted methodical serial killer mind you have there :cheese: :ham: I likes it!

2)Do what FJ said, if he's not been pr0nning, make it look like he has, tubgirl, lemonparty, goatse, you know the score, some nasty barnyard sex shit, He'll never get near your bandwidth again.

3)Explain it's for his own good as he gets dragged away to a behavioural psychologist.

4)...

5) Profit!

Posted: September 16th, 2007, 23:01
by Dr. kitteny berk
all suggestions above are good. :)

Posted: September 17th, 2007, 7:50
by Mr. Johnson
i agree with berk.
thanks for the tips!

Posted: September 17th, 2007, 10:30
by cheeseandham
HereComesPete wrote:1) Sick and twisted methodical serial killer mind you have there :cheese: :ham: I likes it!
/me bows

Thank you, thank you, I'll be here all week.

Posted: September 17th, 2007, 13:35
by Lee
I decided to check my bandwidth usage after seeing this topic. I have an "unlimited" connection but thought I'd check anyway. The router said I'd used 888mb so far that day and it was steadily rising which I thought was a bit wierd considering neither me or my brother had downloaded anything big. Turns out there was 3 other computers stealing our interwebs, last time I reset the router I didn't bother setting up any security...

I've now renamed my router to "Pay for it yourself thieves" and enabled every security feature under the sun :)

Posted: September 17th, 2007, 13:37
by Dr. kitteny berk
Lee wrote:I've now renamed my router to "Pay for it yourself thieves" and enabled every security feature under the sun :)
:lol:

Posted: September 17th, 2007, 13:49
by FatherJack
SSID broadcast is too much fun to turn off. Haven't had many attempts on "Psychonet" or "BigBastardWithTheGuns".

Posted: September 17th, 2007, 14:14
by Fear
Schedule this batch file to run when you know he's using the computer:

Code: Select all

if not exist c:\netstat md c:\netstat
netstat -a > c:\netstat\z.txt
cd c:\netstat
for /F "tokens=1-4 delims=:., " %%a in ("%TIME%") do set T=%%a%%b%%c%%d
for /F "tokens=1-4 delims=/- " %%A in ('date/T') do set D=%%A%%B%%C%%D
ren z.txt %D%_%T%.txt
Every 10 minutes should be enough to catch him out - it'll log every connection in and out of the computer.

Then on your return just read the files in c:\netstat in notepad and look for connections to www.bigandbouncey.com, and such.

Posted: September 17th, 2007, 14:23
by cheeseandham
Lee wrote:I've now renamed my router to "Pay for it yourself thieves" and enabled every security feature under the sun :)
Shame, as this would have been fun for a while. :)
(non-code types:don't be scared, just ignore the code, he explains everything else)

Oh and Fear, you bastard! :ahoy:

Posted: September 17th, 2007, 15:13
by pixie pie
cheeseandham wrote:
Shame, as this would have been fun for a while. :)
That is pure genius! What would it do if they were using a program like .. *thinks of example*.. Windoze updater? Would they get the information? Or would it do a spack? *Tempted to try it out on sister for a few days/when I leave*.

Posted: September 17th, 2007, 15:42
by HereComesPete
:x :x rrraaaaargh, twice I've tried to post here, fucking 5punk keeps breaking on me! I had some moderately funny line about the blurry thing, it boiled down to "use the blurry thing, its fucked up." :x :x

Posted: September 17th, 2007, 16:16
by cheeseandham
pixie pie wrote:That is pure genius! What would it do if they were using a program like .. *thinks of example*.. Windoze updater? Would they get the information? Or would it do a spack? *Tempted to try it out on sister for a few days/when I leave*.
I'm fairly sure it just processes jpgs and gifs when served via http.
Since Windows Updates sends out the files all rolled up into packages and signed, it wouldn't process them. (Which is a shame, a Windows Update that turned your Start Button upside down would be a blast.)