Wolfram
Hazard to Others
Posts: 133
Registered: 13-10-2003
Member Is Offline
Mood: No Mood
|
|
Where can I find a corrupt webhosting service?
Where can I find a reliable but corrupt webhosting service for my homepage, that will not give a shit about copyright issues or indecency of the
content?
Thank you for any help.
[Edited on by Wolfram]
|
|
JohnWW
International Hazard
Posts: 2849
Registered: 27-7-2004
Location: New Zealand
Member Is Offline
Mood: No Mood
|
|
Look in countries like these: Ukraine, Russia, Armenia, Georgia, Azerbaijan, Belarus, Vietnam, Iran/Syria/Libya (except for indecency), Nauru, Cuba,
Sri Lanka, Venezuela.
|
|
BromicAcid
International Hazard
Posts: 3247
Registered: 13-7-2003
Location: Wisconsin
Member Is Offline
Mood: Rock n' Roll
|
|
Note that even webservice providers in the US don't care about what you host for the most part until someone takes the time to complain to them and
point out that you are hosting something that you shouldn't be.
|
|
franklyn
International Hazard
Posts: 3026
Registered: 30-5-2006
Location: Da Big Apple
Member Is Offline
Mood: No Mood
|
|
It really doesn't matter if you use redirects through proxy's
Unless you anticipate having monthly bandwidth demand in the terrabyte range ,
it will be cheaper to host on your own server through a Telco or cable subsciption.
.
|
|
not_important
International Hazard
Posts: 3873
Registered: 21-7-2006
Member Is Offline
Mood: No Mood
|
|
Redirects don't help because someone accessing the content is going to know the final target unless you've configured the proxy to serve as an
alternative address and hand that out in place of the actual server IP. But a LEA can go to the proxy host, discover that they are not storing those
JACS centerfolds you've put up on your web pages, and compel the proxy host to reveal the actual IP and then go to that host to both remove your
chemical porn and find out who you are.
Restricting access to sections of the site to users that you've flipped an access bit on reduces the chances of automated searches finding stuff to
take down. Encrypting the files with a reasonably strong passphrase can also help, but pass phrases have a tendency to become public knowledge
(witness the reference section).
|
|