Install psybnc with ssl




















Also shows if they're connected, what server they're connected to, and what their IP is. I recommend you secure your bnc even more by restricting what IPs can connect to it:. IPs can be definite, ie. If you did not, then you can do all your dcc stuff as you normally would in your irc client, but remember that your real IP will be revealed by doing this. First, let's go over the basic DCC commands:. Not sure what your user is? You must then type this to accept the request. Use this after you get a file from another user and then want to get it from your shell.

This is the only way people without shell access can get their files. Now for the cool stuff my favorite feature of psy is its ability to stay permanently connected to a bot through a DCC, and to ask this bot for ops.

With psy, however, the askop request can be done two ways: through the partyline when a DCC is initiated, or through a msg that first checks the mask of the person being sent the request. Sweet, eh? So, the commands to do it:. The host is the host of the bot. It can be either the alpha-form, or the actual IP address. And finally, the port is the port that the bot listens on for user connections.

Now, for the askops part: This part assumes you added in a DCC to the bot as shown above. If you don't have partyline access, you can still add an askop, but I'll get to that later.

Now, if you don't have partyline access, you can add the askop in this way:. A hostmask, for the uninformed, is formed like this: username! Multiple Networks One of my other favorite things about psyBNC Do you have a bunch of channels you hang in on efnet, but also one or two channels on dalnet that you like to go to?

If you're like me, you do Fret no more! By the time you read this, it is possible that the latest version has been updated. You may want to use. To ensure a positive. The default port for psybnc is , for security you must change it to whatever you like using only ports If that line isn't there; type or paste it in.

Linux lowercase and uppercase are not the same. Example: a is not the same as A. Close Privacy Overview This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website.

We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience. Necessary Necessary. Necessary cookies are absolutely essential for the website to function properly.

Same vice versa, the text you send to him will be translated to his native language and also shown to you how it was translated. Example: Hello i am happy to meet you would have a nice chance to get translated. Yo Ey eye em h4pee tew m33t yaw wont have any chance. How does it work? Well, simple. And then processes the result. Edit the config. If you want to delete compiled objects and the compiled binary, do make clean.

Also you should add the name of psyBNC, if you plan to link it to other bouncers. Also autoop was added in psyBNC2. Be sure to use this function with care, because spoofing is still possible on most of the ircnetworks. That way is recommended. Some notes about Traffic-Logging: - be sure to set filters. Be sure to erase your Trafficlog as often as possible. Be sure to check the usage if you are going to log any event. And buy a new hd, if you only got mbyte :.

Before using this feature, read the following restrictions, which result from the usage of this feature: - You will always see yourself having the nick of the main network, even, if psyBNC needed to change your nick on the secondary network.

Check, which nick your client is using on the other network. Maybe your nick was used, so psyBNC had to change it.

You got the clue? If you want to administrate the network specifics, you will have to use the commands already described above including the network token. It wont connect until you did.

You need to establish own dcc connections for every network if you want to use this feature. Thats logical, bots cant be on multiple networks :. The multinetworking can make problems in rejoining and resolving channel names.

This is done asynchron, and its possible the client gets NAMES of both network for two different channels at the same time. This is recommended. Querying to other eggdrops is insecure because of possible spoofed clients who got op by takeover. You need to set a password for a channel or person you are querying with.

If you adress a channel, every person on the channel has to have the key. Also normal irc clients can request an encrypted connection. Clients for this purpose are ready on www. Specifications can be requested from me mail to psychoid lam3rz. Bouncer- and Userconnectionencryption from Version 2. You should run stunnel on your home Machine to connect to psyBNC, if you want to encrypt Listeners as well. It's set enabled in standard, so just remove it from config. In return, everything you would type in english to bayern, would be posted in german to the channel.

This has to be done before Compilation. Not both at the same time. Or you dont want a translation module, so just disable it.

When your host offers devices which use the IPv6 Protocoll as well, you can use this hosts by setting them as vhosts, and by listening on them if you also connect from outside to this host via IPv6. Also dccchat and dccfiles is being supported with IPv6 experimental , but it is not sure, if the DCC protocol will be realised for IPv6 the way it was done in psybnc.



0コメント

  • 1000 / 1000