Quote:
Originally Posted by abookreader
sorry - I was repsonding to jbcohen who was discussing his friend's firewall on the homenetwork.
I've had the "log file" hack installed for awhile now but really no way of determining what it is doing or if it is working. For all I know Yifanlu has sent my Kindle log file to his computer and now he's tracking my reading habits and location. 
|
I'm way to busy to stalk random people on the internet, lol. I always include the source so people will know exactly what the script is doing, and I advice people to always read the source before installing a hack.
Also, I would need someone knowledgeable to log overnight. It's a pretty painful process (well not really), but I don't have the time right now (busy with some other stuff), so I haven't touched the kindle in a while. If anyone with linux knowledge read this, install my script and cross-compile (or find a copy of) tcpdump for ARM and run it (log size max please) overnight. Then connect to your computer, scp the .pcap file back and either analyze it yourself (I don't know what information will be logged) or send me a copy.