Sponsored Content
Full Discussion: Cyber wall? just for me?
The Lounge What is on Your Mind? Cyber wall? just for me? Post 302994651 by jim mcnamara on Sunday 26th of March 2017 11:48:59 AM
Old 03-26-2017
I don't get what all you are asking. But part of the answer is:
Big companies geoblock all the time.
Countries where the government does not like unreviewed content, the same occurs.
To my knowledge, Britain does not geoblock every IP from Brazil. Try this to test: Google

The other possibility is that the podcast company's version of antimalware is blocking a part of the IP range you are in.

Brazil is not blacklisted on the datasets we have. Your ISP may be. And you may be dealing in the UK with a company or its subsidiary that just got a new blacklist. And, your ISP is on it.

'Underground' has a negative side:
FWIW: A lot of security people are trying to learn how to deal with 'underground' or dark net services like tor.
Unless you are really security savvy, messing around in a lot of dark net sites may get your system irreversibly trashed. So say the security guys at my company.

Instead of doing something counterproductive, see if you can find a way to email the podcast site owner, in order to see if s/he can help some way.

Last edited by jim mcnamara; 03-26-2017 at 12:56 PM..
This User Gave Thanks to jim mcnamara For This Post:
 

5 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

wall commands

I would like to know when using the wall command can I send a message to a specific user that is logged in. Thank you (1 Reply)
Discussion started by: nascar.fan
1 Replies

2. UNIX for Dummies Questions & Answers

wall

is there a command to send all terminals a message. i tired wall, but it only sends the message to who ever is logged in at a terminal. i need a command to send to every terminal no matter if someone is logged in or not. Thanks! -The DJ (11 Replies)
Discussion started by: djatwork
11 Replies

3. What is on Your Mind?

(Preprint) Human Cyber Consciousness - The Next Frontier

Preprint available at Amazon (Publication date: May 31, 2018): Preprint Cancelled. See this update. (0 Replies)
Discussion started by: Neo
0 Replies

4. What is on Your Mind?

Human Cyber Consciousness: The Next Frontier in Cybersecurity

FYI, I am planning to release the first book in a new mini-series the end of May: Pre-Order Cancelled. See this update. (Cyberspace Situational Awareness Book 1) https://www.unix.com/members/1-albums215-picture844.jpg If anyone want to write a short book for this mini-series, or... (3 Replies)
Discussion started by: Neo
3 Replies

5. What is on Your Mind?

Cyber Dystopia Teaser (720 HD)

Working on a new cybersecurity, dystopian world series and made a short 2 min teaser today. Cyber Dystopia (720 HD) https://www.youtube.com/watch?v=g9Ca07J_YC8 If anyone has any ideas for the story, please write out some story lines in the comments and join the production team! (1 Reply)
Discussion started by: Neo
1 Replies
ND(1)							      General Commands Manual							     ND(1)

NAME
nd - Tiny little command line WebDAV interface SYNOPSIS
nd [options] url DESCRIPTION
nd provides a simple command line interface to the RFC 2518 (WebDAV) server. If no option is specified, HTTP GET command is issued and writes response data to the standard output. The options are as follows: -c dest_url COPY url to the dest_url. Use lock token if -t is specified. -f Force override the content even when the MOVE or COPY target already exits. -v View property information of url by PROPFIND. With -g option, only the specified property is displayed. -p file PUT file content to the url. Use lock token if -t is specified. -g name Specify the property name for -v option. -e name=value Edit the property with name to value using PROPPATCH . -N namespace-url Specify the property namespace URL for -e or -g option. -P file POST file content to the url. -T is used for the Content-Type. -T content_type Use content_type as a Content-Type field value of the POST request. Default is `application/x-www-form-urlencoded'. -d DELETE url. Use lock token if -t is specified. -l LOCK url. Use -o as owner, -s as scope, -i as timeout. -o owner Specify lock owner. Default is USER environment variable. -s scope Specify lock scope (`exclusive' or `shared'). Default is `exclusive'. -i timeout Specify lock timeout interval. Default is `Infinite'. -u UNLOCK url. -t option is required. -t token Specify the lock token. -r Set command execution `Depth' as `Infinity'. -a realm Specify authentication realm. -A realm Specify proxy authentication realm. -k MKCOL url -m dest_url MOVE url to the dest_url. Use lock token if -t is specified. -S Print output using s-expression. ENVIRONMENT VARIABLES
http_proxy, HTTP_PROXY Specify HTTP proxy. USER When manipulating a lock without an explicit owner option, the value of USER is used to set the owner of the file lock. BUGS
A maintainer of the Debian package has implemented Digest authentication on top of the original software. However, the upstream source uses the nanoHTTP code from libxml2 to implement the HTTP transport. Due to properties inherent in that code for detecting and following redi- rected target sites, there is no way to pull out the new address in order to insert it into the hashes necessary for the Digest method. Nd will therefore incorrectly answer with 'Bad request' to any method call aimed at such sites. Using the correct logical name for the target will, however, produce a correct response from Nd. AUTHORS
Yuuichi Teranishi (teranisi@gohome.org). SEE ALSO
libxml(4). February 25, 2002 ND(1)
All times are GMT -4. The time now is 12:04 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy