@e.mccormick I learned something the other its a http proxy that can change you ip address......
A proxy is one way to do that. It has other purposes too.
I don't remember which one I used but there's a list of proxy's, I used one to create another account yesterday, and as you know I am IP banned. This is a serious problem for people that have been banned from OS. They can make as many accounts as they want. Have you guys ever looked into this? http://free-proxy-list.net/web-proxy.html
I have brought up proxy blocking to them. I have also suggested they use some of the RBLs. They are computationally cheap and cache easily.
Rbl?? Is that router checking? If it is it would make more sense. Idk how this hasn't happened yet. @Preetha You and the dev team need to look into his. And can you delete this question so no one can find it. I don't want other users to find out about the ip trick. It could cause something really bad.
Realtime Blackhole List. Lots of people know about IP bypassing.
http://efnetrbl.org/ http://en.wikipedia.org/wiki/Comparison_of_DNS_blacklists Things like those. I am just not sure how well the site proxy server can implement one. See, that is why they stopped generic proxy blocking. They needed to load distribute the site to a cluster and they had to use a proxy to do so. That means all blocks need to happen at the proxy. I read some of the documentation on the one they are using and it has some filter capabilities, but I don't know the software that well.
http://prntscr.com/5e51mz That looks interesting. Haven't you guys even attempted this yet? It couldn't hurt to try one of the codes, I mean what harm would it do?
invaluement DNSBL Looks good as well.
Many of those are not useful because they aim at email stuff. But there are a few that could help. The issue is populating the precompiled database with the proper format fo the proxy they are using to allow the cluster to work. It is not a simple plugin.
Welp, I am gonna get some sleep....
Performing a manual DNSBL lookup 1.Take an IP address, for instance the test address 127.0.0.2, and reverse its octets, yielding 2.0.0.127. 2.Append the DNSBL's domain name, resulting in: 2.0.0.127.dnsbl.proxybl.org. 3.Look up this name in the DNS as a domain name ("A" record). This will return either an address, indicating that the IP is listed; or a NXDOMAIN ("No such domain") code, indicating that it is not. 4.If the IP is listed there will be a "TXT" record for the same name with more information about the listing. Looking up an address in a DNSBL is thus similar to looking it up in reverse-DNS. The differences are that a DNSBL lookup uses the "A" and "TXT" record types rather than a "PTR" record type, and uses a forward domain (such as dnsbl.proxybl.org above) rather than the special reverse domain in-addr.arpa. That's from the last link I put up.
Yes, I know how they work. I am a system admin that has used them on a server. Hehe. However, they require the software to be able to do such a lookup. On mail servers, like postix and sendmail, they build that in. On the particular proxy they use for this web site, they do not.
I see... Let me look for something else that might work...
Yo would have to know the software. I already looked into it before. It was not very friendly to it.
Personally, I think they should run the signup page without the proxy. Then they could just block those for new signups. That would require the signup page to not be a popup thing, but I see that as a non-issue.
Openstudy.com isn't the issue its http://openstudy.com/signup http://2anonymousproxy.com/index.php Type the sign up link into there and see what happens.
See, if they used the dns to do that as http://signup.openstudy.com then they could host it without their internal proxy system. Then it would be easier to block all proxies.
Oooh...
Yah. Kill abusive signups and you really cut down the problem.
Join our real-time social learning platform and learn together with your friends!