PDA

View Full Version : how to join in BOINC?



tor-admin
06-13-2008, 04:06 AM
Hi I'm noob, rookie question, probably too easy to figure out & I'm having a homer moment ... CP.net says joining AMD Users in boinc is as easy as 'To join a team, visit its team page and click Join this team.' (http://tinyurl.com/4yudy3)

yeah, right, everything should be so easy, yes?

oh wait, everything usually _is_ this easy lol, never mind :icon_redface:

anyway, I'm using IE6 & Firefox 2, been running boinc & climateprediction.net for years now, never joined a team, got lots of credits, now want to join AMD Users in boinc ... so, how do I get boinc to make the change that I've now joined AMD Users? anyone know?

tia

btw, this is tor https://www.torproject.org/ runs great on AMD64 chips :)

sentient_life
06-13-2008, 04:53 AM
Through that page just type 'amd users' in the 'Key words' box. Hit 'search'. 'AMD Users' should be the first choice to select. The following page should have 'Join this team'. Hopefully, that will get you up and going. Good luck, and welcome to the team!

tor-admin
06-14-2008, 12:44 AM
Through that page just type 'amd users' in the 'Key words' box. Hit 'search'. 'AMD Users' should be the first choice to select. The following page should have 'Join this team'. Hopefully, that will get you up and going. Good luck, and welcome to the team!

That's wild. It's gotta be privoxy through tor here, somehow disallowing the 'Join this team' link: http://tinyurl.com/5yh4g9 maybe the link is java & prone to leak IP addresses, hmm. This same thing (lack of the 'Join this team' option on that page) comes up in IE6 or FF2, it don't matter which, through privoxy & tor here :icon_confused:

Gonna have to try this later on a machine with a direct connect to the net. All my network here is behind tor/privoxy/squid, no direct access out to the net.

Oh well, hopefully it works later.

Thanks for the help & happy to be aboard the green team :)

AMDave
06-14-2008, 07:56 AM
I agree.
You will have better luck without your Tor cloak.
Communicating with trusted sites without Tor is much easier because they in-turn will then also trust the individual.
If you have any problems on a real connection, let us know.

tor-admin
06-14-2008, 05:29 PM
I agree.
You will have better luck without your Tor cloak.
Communicating with trusted sites without Tor is much easier because they in-turn will then also trust the individual.
If you have any problems on a real connection, let us know.

It's not the sites that I don't trust, it's who is sniffing the traffic in between me & the site that gives me pause.

I find eavesdroppers to be a particular bother as usually nothing good comes of their nosiness.

Witness the Bush administration & their warrantless wiretapping in the U.S. during the last 8 years.

Nuff said I would imagine, eh?

I'll try it unstealthed later, hopefully will be able to add my credits

go green team! :)
l8r

NeoGen
06-15-2008, 01:06 AM
I for one don't care much about packet sniffers anymore. I find it much worse to have a cellphone. You are aware that your cellphone gives out your near exact geographical position at any moment if on, right? :icon_rolleyes:

AMDave
06-15-2008, 02:57 AM
... You are aware that your cellphone gives out your near exact geographical position at any moment if on, right? :icon_rolleyes:...as well as when it is off.
The cell providers can turn some of them on and interrogate the memory remotely.
You'd actually need to remove the battery to prevent all that.

http://amdusers.com/forum/newreply.php?do=newreply&p=59516

Security-conscious corporate executives routinely remove the batteries from their cell phones, he added. It's old news, but something that many people are not aware of.

In short, if you are not doing anything wrong then you have nothing to hide. However, there are some non-law-enforcement types who might take advantage of these capabilities and use them against the unsuspecting public. We have to trust the cell companies and the law enforcers that they have some way of preventing that, otherwise it might be used against them also.

The same goes for the proxies. I am aware that the law enforces both use them and monitor them and those that use them.
That's not new either. I think it's not really possible to conceal everything and it can take more effort and cause more hassle than makes it worthwhile.

I don't wear an aluminium hat. It's too hot in summer :biggrin:

Bender10
06-15-2008, 01:09 PM
You don't wear protection in the summer!! Too warm!!

OMG Man!

I have the perfect solution for the 'Paranoid anti-mind wave' individuals in your area (I'm a chapter rep in our local Fiefdom...).

The unique design allows good air flow, yet still blocks those 'pesky' Mind Rays...

It's stylish, and yet functional. Lightweight and durable (an aluminum model is avaiable for use in the summer). And if worn properly, you cannot be singled out of the crowd for hiding your thoughts from the King (and burned at the stake)....

102

tor-admin
07-23-2008, 01:46 AM
Ok, I was (finally) able to join AMD Users team :) http://tinyurl.com/5kymga

This glitch looks to be related to the DNS cache poisoning ('DNS hijacking'? hmm) that's been happening for, oh, how long now? Years maybe? :icon_wink:

Looks like there were some unpatched DNS servers over in the U.K. that were preventing the climateprediction.net site (in the U.K. of course) from making the full user profile page display correctly to overseas users (imagine that, with clunky or cache poisoned DNS servers, shoddy web service to overseas users results! imagine! :icon_wink:)

btw if you don't know about the ongoing DNS flaw-patching mess: http://www.doxpara.com/

Today there was a bit more detail came out about the flaw: http://tinyurl.com/67jyjm

Turns out after the vulnerable DNS server(s?) in the U.K. was patched today (I'm assuming climateprediction.net site in the U.K. was using this for DNS service), voila! Suddenly my full user profile web page on climateprediction.net came up for me, & I was able to successfully transfer over my account to Team AMD Users :)

I've been running tor for years now... I've seen things you people wouldn't believe. Attack ships on fire off the shoulder of Orion. I watched C-beams glitter in the dark near the Tannhauser gate. All those moments will be lost in time... oh wait, that was Blade Runner. Sorry, my bad :icon_wink:

No, really, I have seen some attacks, hijacks, redirects, spoofs, hack attempts, phishing... just, you name it, if it can be done on the web, it happens even more often in the security of The Onion Router then it does on the 'open' WWW

I've had to do & learn major security precautions & techniques to deal with the craziness of some of the attacks that go on daily inside the safety of the 'stinky router' lol

It's made me a better admin overall, but from what I have witnessed & dealt with & learned to fix & program & 'work around' in these years of hosting tor, I would advise that tor is 'not for the faint hearted' (nor for the technology challenged either)

But I have seen a *huge* amount of DNS related spoofing & hijacking in these years of running tor, way too much nasty stuff that I was beginning to wonder if it would ever be fixed.

Just in this last month since Kaminsky, et al have released their DNS patch to the world have some of the shenanigans finally disappeared & the world within tor has finally started to resemble the WWW @ large :)

Yay, its been far too long coming, much as something else I can think of that has gone on for _way_ too long now is just a few months away from finally coming to an end :)

Anyway, makes me think that maybe mankind will figure a way out of another mess he's created for himself: http://tinyurl.com/59h9yy

ok folks, as the piggy in the cartoon used to say 'that's all!'

l8r (oh yeah, & happy to _finally_ be aboard Team AMD Users! :) )