Activity Stream
227,828 MEMBERS
15726 ONLINE
greengrassforums On YouTube Subscribe to our Newsletter greengrassforums On Twitter greengrassforums On Facebook greengrassforums On Google+
banner1

View Poll Results: Ready to harvest after ~10 weeks flowering? - PUBLIC

Voters
22. You may not vote on this poll
  • READY!

    6 27.27%
  • Be patient, young paduwan.

    16 72.73%
Page 3 of 3 FirstFirst 123
Results 21 to 25 of 25
  1.     
    #21
    Senior Member

    Someone's first grow

    Thanks Delta9. I think I might get a static IP address so I can easily set up an exit node. Until then I guess I will turn it off. I'm curious though, does the operator of an exit node know the IP address that the packets come from? I always thought the point was more to keep your ip address anonymous more so than encrypting the content. Maybe I have missed the point though. caspr: if you cut the main stem, two new stems will grow out from where the leaves are attached. If you bend the stem down so the tip of the stem is at the soil level then several of the leaves will have stems growing up at the base of the leaves. It helps you get more yield in a low-light situation, because you can have all of those different flowering points very close to your lights.

  2.     
    #22
    Senior Member

    Someone's first grow

    It seems to me that your buds are trying their best to be tight, but have a problem with low lighting. Do you think you could increase the intensity of your lights? It could be too late for these lovely ladies, but wonâ??t hurt in the future. Take my advice with a grain of salt though; Iâ??m still learning the green arts myself.

  3.   Advertisements

  4.     
    #23
    Senior Member

    Someone's first grow

    looks like it's got a lot more filling in to do...a pocket microscope is the only way you'll be able to judge it correctly..very inexpensive..

  5.     
    #24
    Senior Member

    Someone's first grow

    Nice plant, I like your LSTing

  6.     
    #25
    Senior Member

    Someone's first grow

    Quote Originally Posted by JD1stTimer
    Thanks Delta9. I think I might get a static IP address so I can easily set up an exit node. Until then I guess I will turn it off. I'm curious though, does the operator of an exit node know the IP address that the packets come from? I always thought the point was more to keep your ip address anonymous more so than encrypting the content. Maybe I have missed the point though.
    Not necessarily (regarding tor operators knowing the address packets are coming from). However, you do have to log in and out of the boards, and other data is transmitted which may be sensitive, which *can* be traced back to wherever your destination is (destination = website or terminal server - ie this website). Your IP is masked from the website or destination server, yes, however the tor exit hub (admin) DOES know your IP. So if they think you look like a tasty target, they can trace your IP to whatever you were accessing (if they put the work into it - which isn't hard for someone good - depending on how many levels of security you use). It takes a bit of work to get enough info out of tor to ident someone, and most people don't have anyone looking for them with enough passion to go to the trouble. The thing about tor is that a LOT of people sniff tor exit hubs just because they can (thats what hackers do, after all), and instead of the joys of horticulture, or some other pleasantry, they spend their day trying to trace the routes of packets sent across the interweb, and many of them target tor especially because they know tor is used by people who don't want to be found.

    To answer your question without going on and on - you are correct, in that the primary utility of tor is to prevent your IP being associated with someone else's IP (such as a website's IP). However, inside the tor architecture, there are several security and encryption algorithms built in as well to enhance privacy (theoretically). This allows not only your IP to be masked, but also the contents of the packets being sent back and forth. The encryption is why only the exit hubs are vulnerable. Since all the intermediate tor nodes are sending your data (and IP) encrypted, their security is FAR harder to bypass than an exit hub. Once your packets reach an exit hub though, if done correctly, the packets can be read (since they are no longer encrypted) and a trace back to whatever you were looking at or talking to is much easier.

    Sorry for the long narative, I know its a *growing board* :jointsmile:

    BTW- those are some very nice LST pics!

Page 3 of 3 FirstFirst 123

Similar Threads

  1. Replies: 31
    Last Post: 07-08-2013, 11:00 AM
  2. Replies: 5
    Last Post: 08-17-2012, 07:41 PM
  3. Replies: 6
    Last Post: 03-05-2010, 08:15 PM
  4. 1 metre square grow room - scrog grow - advice needed
    By doubledutch in forum Growroom Setup
    Replies: 15
    Last Post: 10-10-2008, 09:41 PM
  5. Replies: 10
    Last Post: 07-22-2008, 01:44 PM
Amount:

Enter a message for the receiver:
BE SOCIAL
GreenGrassForums On Facebook