Quote Originally Posted by User137 View Post
And like i said, if you fake your IP you can't hack, only DoS.
This is an interesting point. Actually, I think you can if you use a combination of IP spoofing and sniffing so that you have continuous communication with the server, which believes you are somebody else. This may not be as easy as it sounds, but it is certainly a possibility.

In either case, both issues are related as you are trying to protect against hacking by making the server vulnerable to DOS attacks.

Quote Originally Posted by User137 View Post
Subnetting is about communicating with computers in same network group. You cannot form a network group with a computer out in the Internet, especially if he is using a fake IP.
Actually you can by using NAT and ports translated to local addresses, this is how actually subnetting works. In addition, you can always resort to using proxies, including those running as trojans on random user's machines.

Quote Originally Posted by User137 View Post
I can prove the subnetting restriction with example: From your home computer, it is not possible to directly connect to local universitys internal network even if you fake your own IP network mask same. That is why schools have SSH or VPN login systems.
Again, please be careful with red herring. SSH, VPN, Subnetting and IP spoofing are four different independent topics not directly related to each other.

Quote Originally Posted by User137 View Post
About easy passwords people make, ok, could be that large amount of people try to make them as easy as possible for them. However this topic was about hackers trying to guess them. I have been trying to make it clear that most systems will not let them try it many times in a row.
Good, now let's take the premise to which you have agreed, that many people use simple passwords instead of strong ones. Now take another premise that Stream accounts were hacked. Therefore, even if data was encrypted, it is easier to crack these passwords than the best-case scenario as these passwords are prone to guessing and once the hackers have this data, their guessing potential is unrestricted by delays, processing power and so on. Therefore, there is a high chance that they actually acquire user's private information. This was my original point.

Quote Originally Posted by SilverWarior View Post
Fake IP? What are you talking about?
IP spoofing is a technique of modifying IP packet header to change the source address to fool the server into thinking that the packet was sent by somebody else. This is sometimes accompanied by a sniffer, which can also intercept the packets to interpret their contents.

Btw, is it just me or there have been no discussions on PGD other than this one lately? We urgently need more controversial topics!