The question is stated as delivery of a "S-300 or S-400 missile system." A "system" requires all the major operational components to be delivered (search radar, targeting radar, missile launcher, command post, etc.). Regarding hiding the system, while I agree that generally you don't want to give away the exact location of your military assets, it is important to credibly signal your enemies if you expect to deter them. Most of the Iranian comments to this point are probably inward directed, to create a sense of strength in the aftermath of the nuclear deal with the West. Outward directed statements (to Israel) will come when the system is actually functioning.
They were the first of their kind. Lots of things block the original ones, but I've experienced some odd behavior of certain company websites that indicate that the lessons were learned.
@jeremylichtman Given that swarms of script kiddies read my harmless hacking tutorials, there are probably lots of telnet browsing incidents all over the place. In addition, how would one tie a telnet jokester to my staid old Chrome browser? Note that each of my browsers, even when run from the same operating system on the same Linux box, gives a different signature. Now if I were to run my plethora of browsers on various boxen through Tor, how would the admins of any web server know they all came from the same mostly harmless hacker? (P.S. I don't trust Tor. Toooo convenient... but then maybe I'm paranoid.)
This actually is a serious problem that needs a solution for future IARPA/DARPA crowdsource experiments.
I've got the old ASCII only lynx on a bunch of old servers in my basement. Can't recall how I installed it on them. Probably something silly like "sudo apt-get install lynx". I occasionally use it in command-line mode for similar purposes as wget, or to trigger remote scripts, or just for accessibility testing.
I don't think the Tor folks are deliberately malevolent, but it is known to "leak", and I worry about folks in certain countries who think it makes them safe.
When I was working on the original GJP scraper in September or October, I ran into a similar issue. I don't remember exactly what the problem was but For some reason TLS version comes to mind. I ended up switching to a different tool to get around it.
@jeremylichtman@000 But wget can download pages. Then sort through the directory where they are stored with find . -name '*' -print | xargs grep
Crude alternative to scraping.
Yup, more than one way to scrape a website, Lars. But as Heffalump points out, I won't because I'm too proud, having kindly asked permission to nmap and scrape and was denied so I'll just wait for stuff to automagically arrive in my inboxen. No SQL injections, either. Not even insertions of jokes into syslog or wherever they store that stuff.
Reaffirming my forecast.
The question is stated as delivery of a "S-300 or S-400 missile system." A "system" requires all the major operational components to be delivered (search radar, targeting radar, missile launcher, command post, etc.). Regarding hiding the system, while I agree that generally you don't want to give away the exact location of your military assets, it is important to credibly signal your enemies if you expect to deter them. Most of the Iranian comments to this point are probably inward directed, to create a sense of strength in the aftermath of the nuclear deal with the West. Outward directed statements (to Israel) will come when the system is actually functioning.
They were the first of their kind. Lots of things block the original ones, but I've experienced some odd behavior of certain company websites that indicate that the lessons were learned.
@jeremylichtman Given that swarms of script kiddies read my harmless hacking tutorials, there are probably lots of telnet browsing incidents all over the place. In addition, how would one tie a telnet jokester to my staid old Chrome browser? Note that each of my browsers, even when run from the same operating system on the same Linux box, gives a different signature. Now if I were to run my plethora of browsers on various boxen through Tor, how would the admins of any web server know they all came from the same mostly harmless hacker? (P.S. I don't trust Tor. Toooo convenient... but then maybe I'm paranoid.)
This actually is a serious problem that needs a solution for future IARPA/DARPA crowdsource experiments.
@jeremylichtman Where did you get your Lynx? Is it the old ASCII only version?
I've got the old ASCII only lynx on a bunch of old servers in my basement. Can't recall how I installed it on them. Probably something silly like "sudo apt-get install lynx". I occasionally use it in command-line mode for similar purposes as wget, or to trigger remote scripts, or just for accessibility testing.
I don't think the Tor folks are deliberately malevolent, but it is known to "leak", and I worry about folks in certain countries who think it makes them safe.
@jeremylichtman could you please see what happens when your lynx tries to connect to GJopen.com? Mine gets instantly aborted. http://us.archive.ubuntu.com/ubuntu/ wily/main lynx all 2.8.9dev6-3 [3,728 B]
Same problem. It looks like the SSL setup here isn't compatible with lynx.
When I was working on the original GJP scraper in September or October, I ran into a similar issue. I don't remember exactly what the problem was but For some reason TLS version comes to mind. I ended up switching to a different tool to get around it.
I won't publicly admit to knowing anything about TLS, SSL or anything related.
In my experience, that always leads to being asked to babysit servers.
@jeremylichtman @000 But wget can download pages. Then sort through the directory where they are stored with find . -name '*' -print | xargs grep
Crude alternative to scraping.
Yup, more than one way to scrape a website, Lars. But as Heffalump points out, I won't because I'm too proud, having kindly asked permission to nmap and scrape and was denied so I'll just wait for stuff to automagically arrive in my inboxen. No SQL injections, either. Not even insertions of jokes into syslog or wherever they store that stuff.
Do I win the kiddie haxor bragfest yet?
I google'd "lynx tls support". Looks like it has issues with some types of TLS.
This site's cert is using TLS 1.2 (current). I think lynx isn't up to date with handling for that yet.