Jump to content

Featured Replies

thats what u get for being commie.

 

 

Are you sure that you know the difference between north and south?

thats what u get for being commie.

 

North Korea is communist, America stopped South Korea from becoming communist by investing in it's companies.

Well, it's Korea, what can you expect? Fuck that..
This is a mild case of a growing phenomenon Koreans call cyber violence.

 

ROFL. There is an easy solution:

 

TURN IT OFF

 

Funny/sad to see that helplessness and "victimization" isn't just an American thing.

South Korea needs proxys.

AATools and a list of proxys.

 

Maybe even a nice .php script that parses all 20 pages of proxys and puts it into a convenient .txt file to be loaded into AATools:

<?PHP

$aStrPrefix = 'http://www.samair.ru/proxy/';
$aStrFile = 'proxy-';
$aStrPostfix = '.htm';

header('Content-Type: text/plain');
header('Content-Disposition: attachment; filename="proxy.txt"');

for($i = 1; $i <= 20; $i++)
{
   if($i == 1)
       $filestring = $aStrPrefix . 'index' . $aStrPostfix;
   else
   {
       $num = sprintf("%02d", $i);
       $filestring = $aStrPrefix . $aStrFile . $num . $aStrPostfix;
   }
   
   @ $fp = fopen($filestring, 'r');
   if(!fp)
   {
       echo "Cannot open $filestring\n";
       exit;
   }

   // initalize $inner to FALSE, used to handle all text within <pre> tag
   $inner = FALSE;
       
   // extract all text between <pre> and </pre>
   while(!feof($fp))
   {
       
       $string = fgets($fp);
       if(!$inner)
       {
           $pos = stripos($string, "<pre>");
           if($pos !== FALSE)
           {
               $inner = TRUE;
               $string = substr($string, $pos + 5);
           }
       }
       
       if($inner)
       {
           $pos = stripos($string, "</pre>");
           if($pos !== FALSE)
           {
               $inner = FALSE;
               $string = substr($string, 0, $pos - 7);
           }
           echo $string;
       }
   }            
}
?>

BTW: The South Koreans shouldn't use the planetlab proxys because they log.

All accesses via CoDeeN are logged, mostly to aid in identifying abuse and other forms of damage control. We sometimes monitor these logs, report abuse, and release entries to aid in investigations. In case of suspicious traffic, we may access URLs from the logs to determine what kind of content is passing through our network. We are also using these logs in our own research, so they may be examined as needed for non-abuse reasons. For normal users, we do not expect that we will intentionally release any personally-identifying information. To prevent abuse, some sites have requested we pass along the client IP addresses, and these are included with every request forwarded to those sites.
Guest
This topic is now closed to further replies.