

(Note: You will see somehow increased overhead).
#Peerguardian downloades free#
#Peerguardian downloades download#

Fixed potential exploit due to memory corruption in webserver.Fixed multi threading problem with a completing file which was concurrently uploaded.fixed some not updated labels when changing language.fixed some statistics, like count of banned sources, A4AF-sources.Fixed bug with eD2K link control in search window which did not accept more than 3 or 4 links.Fixed crash bug in host name resolution.Fixed bug in client UDP socket which did not handled the blocking state correctly.Server UDP socket handles blocking socket state which could happen for larger UDP packets.Fixed bug with invalid client objects in upload list after a file was unshared/reshared.
#Peerguardian downloades update#
Information: A new version is available - an update is recommendedĭownload Version v0.51c (Community Release)Ĭhangelog v0.30a to v0.51c (Community Release) Security warning: Your version has known security bugs, please update! I havent tried the way i mentioned above so i cant tell if its any good from experience but it looks like it would do the - Official eMule Homepage. It would be great if someone makes a package with autoupdate functionality and stuff like that.

I think the iptables way is better because some sites are loading the ads from IP-adresses + iptables should be faster. Iptables -A OUTPUT -o eth0 -d 4.65.105.109 -j REJECTiptables -t filter -I INPUT 1 -s 12.3.249.0/24 -j MLDONKEY_LOGDROP Iptables -A OUTPUT -o eth0 -d 4.38.98.140 -j REJECTiptables -t filter -I INPUT 1 -s 4.65.105.109 -j MLDONKEY_LOGDROP Iptables -A OUTPUT -o eth0 -d 4.36.44.3 -j REJECTiptables -t filter -I INPUT 1 -s 4.38.98.140 -j MLDONKEY_LOGDROP Iptables -A OUTPUT -o eth0 -d 4.18.162.102 -j REJECTiptables -t filter -I INPUT 1 -s 4.36.44.3 -j MLDONKEY_LOGDROP Iptables -t filter -I INPUT 1 -s 4.18.162.102 -j MLDONKEY_LOGDROP # Jump to the special MLD chain at the end of the INPUT chain (commented out) Iptables -t filter -A MLDONKEY_LOGDROP -j DROP Iptables -t filter -A MLDONKEY_LOGDROP -j LOG -log-prefix "MLDONKEY" # Create the logdrop chain to log & drop a packet With this you can create a script with the desired adresses(adware,spyware, antip2p.).
