What if the spotted stations couldn't handle the pileups efficiently, and their rate actually DECREASED after each spot (yes, that's right. cluster spots = more LIDS). Then.....(as Shaggy and Scooby
Then there's KAOS (KG5U's Access of Service attack): I, in my contest QRPness, come on a big pileup. hmmm...can't break it...I log on to the local cluster with a bogus call, spot a much rarer statio
it...I station, another and in If you have time to do this to work one multiplier you aren't making very efficient use of your station anyway.... or you are just a DXer in disguise. David Robbins K1
<snip> to happened I have always wondered why the PacketCluster software isn't changed to require a callsign and password to connect. This password would have to bet set up in advance with the node o
to I Sending passwords on rf is rather worthless as anyone with a tnc can monitor them. To do it securely would require a one-time use password that changes for each login, like the secure crypto ke
Using a challenge/response exchange you can verify a password without sending it over the link. (Server encrypts a random number with what it thinks is the user's password. Sends same random number
Hi Gary! My thought on this is that it would stop a lot of people from having the freedom to check into many different telnet packetcluster systems. On our local systems which are also on telnet, K9C