zest
New Member
Posts: 2
|
Post by zest on Jul 6, 2005 10:18:48 GMT -5
Right basic atm i am running a mir 1.9 server on my pc i have a hub connect with another pc on it it wont let me share the connection but i can share files and acess the server from this pc but now this means i have no net is it possible 2 host the server from the offline hubbed pc thru the hub and out of the online pc ?? i think this could be done some how not sure thi if u can help please post bak /Thanks in advance
|
|
zest
New Member
Posts: 2
|
Post by zest on Jul 6, 2005 10:48:44 GMT -5
come on peeps lol pls
|
|
|
Post by Crystal on Aug 12, 2005 14:35:35 GMT -5
You would have to set up your online pc as a router or gateway with routing software such as Zebra ( www.zebra.org), a full-featured open source routing software, or if you just need the basics and are not that saavy, set up routing in windows. Information for setting up routing in windows can be found here www.windowsnetworking.com/articles_tutorials/routeset.html and here www.windowsnetworking.com/articles_tutorials/w2kprout.html . You would then have to configure the other computer with a private IP and set the online computer as the gateway. Then forward incoming connections from ports 7000, 7100 and 7200 to the other computer. That is the only method I know that will work in your situation. The alternative would be to buy an external router and set it up that way. Hopefully this helps.
|
|
|
Post by Ardbeg on Sept 11, 2005 15:50:59 GMT -5
I managed to run a 1.4 server on my PC1 that connects to the net and a 2nd PC "PC2" connects to it via a crossover cable. PC2 sees the net and also my server. This uses no router or hub but ICS and TCP/IP.
|
|
|
Post by Ardbeg on Sept 11, 2005 15:53:58 GMT -5
Just out of interest, where did you source the 1.9 server files ? Please do a check on the mir.exe client and the M2Server.exe as I'm sure there's some sort of Trojan or simple info gathering been added. I found an IP address in there somewhere that pointed to some Chinese university ! I don't believe its a true 1.9 either but a reworked 1.4.
|
|
|
Post by Crystal on Nov 19, 2005 17:59:45 GMT -5
There is an IP address buried in any of the m2server.exe files that I have seen, as well as most of the mir.exe files. I am not sure what it is for, but it has never caused me any problems. You might try changing it to something like 127.0.0.1 or 0.0.0.0. If you are worried about it, that should effectively disable it. You can also try running a packet sniffer and monitor that IP address to see if the exe connects to it during execution. However, someone who is smart enough to write a trojan is probably smart enough to not put the readable IP in the file. It is easy to convert an IP to, say, a winsock network address (127.0.0.1 would be 16777343). This would not alert anyone that was scanning through the file. So, the fact that the actual IP address is in the file most likely means it is not intended for a malicious purpose. Less likely, someone actually embedded a trojan with a plainly visible IP address in it.
If anyone is concerned about an IP address being in their exe, the best thing I could tell you is to run a packet sniffer set up to monitor that specific IP and see what, if anything, is being sent to that address. The other option would be to use a hex editor and simply change the IP to something like 0.0.0.0 that it would be unable to connect to.
|
|
|
Post by Ardbeg on Nov 24, 2005 20:48:25 GMT -5
There is an IP address buried in any of the m2server.exe files that I have seen, as well as most of the mir.exe files. I am not sure what it is for, but it has never caused me any problems. You might try changing it to something like 127.0.0.1 or 0.0.0.0. If you are worried about it, that should effectively disable it. You can also try running a packet sniffer and monitor that IP address to see if the exe connects to it during execution. However, someone who is smart enough to write a trojan is probably smart enough to not put the readable IP in the file. It is easy to convert an IP to, say, a winsock network address (127.0.0.1 would be 16777343). This would not alert anyone that was scanning through the file. So, the fact that the actual IP address is in the file most likely means it is not intended for a malicious purpose. Less likely, someone actually embedded a trojan with a plainly visible IP address in it. If anyone is concerned about an IP address being in their exe, the best thing I could tell you is to run a packet sniffer set up to monitor that specific IP and see what, if anything, is being sent to that address. The other option would be to use a hex editor and simply change the IP to something like 0.0.0.0 that it would be unable to connect to. Just seen this reply. Good point. Disregard a PM I just sent to you concerning 1.9 and said IP address
|
|