1. use an octal buffer tri-state device like the Texas Instruments 54AC541Excuse me, but how such IC has any chance to help you with your goal?
A $20 5-port unmanaged Gig-Ethernet switch plugged into a separate switchable power outlet might be a cleaner solution. Run your connection through that, and then cut power when you want to disconnect. It won't offer the same debugging opportunities, though. ;D
A $20 5-port unmanaged Gig-Ethernet switch plugged into a separate switchable power outlet might be a cleaner solution. Run your connection through that, and then cut power when you want to disconnect. It won't offer the same debugging opportunities, though. ;DNah, not a good solution to me: I've already organized the stuff in a way that there's not a good way without re-arranging everything else, unless, there's a tiny 2 way switch, but I would probably need another plug on the wall...
A $20 5-port unmanaged Gig-Ethernet switch plugged into a separate switchable power outlet might be a cleaner solution. Run your connection through that, and then cut power when you want to disconnect. It won't offer the same debugging opportunities, though. ;DNah, not a good solution to me: I've already organized the stuff in a way that there's not a good way without re-arranging everything else, unless, there's a tiny 2 way switch, but I would probably need another plug on the wall...
That is more than $20, if you count that I have to buy the switch and adding antoher plug. That's why I want it plug and play.
Also, considered that I have pretty much anything other than the chip, that would be the cost of the chip only...
1. use an octal buffer tri-state device like the Texas Instruments 54AC541Excuse me, but how such IC has any chance to help you with your goal?
Do you really need to unplug Ethernet at all?
http://stackoverflow.com/questions/19021466/disabling-ethernet-connection-with-command-line (http://stackoverflow.com/questions/19021466/disabling-ethernet-connection-with-command-line)
Why?A $20 5-port unmanaged Gig-Ethernet switch plugged into a separate switchable power outlet might be a cleaner solution. Run your connection through that, and then cut power when you want to disconnect. It won't offer the same debugging opportunities, though. ;DNah, not a good solution to me: I've already organized the stuff in a way that there's not a good way without re-arranging everything else, unless, there's a tiny 2 way switch, but I would probably need another plug on the wall...
That is more than $20, if you count that I have to buy the switch and adding antoher plug. That's why I want it plug and play.
Also, considered that I have pretty much anything other than the chip, that would be the cost of the chip only...
Hi
The problem with the chip is that it is not going to work for what you want to do.
Bob
1. use an octal buffer tri-state device like the Texas Instruments 54AC541Excuse me, but how such IC has any chance to help you with your goal?
Do you really need to unplug Ethernet at all?
http://stackoverflow.com/questions/19021466/disabling-ethernet-connection-with-command-line (http://stackoverflow.com/questions/19021466/disabling-ethernet-connection-with-command-line)
This chip here has this design here:
(http://circuits.datasheetdir.com/102/54AC541-pinout.jpg)
So, From I0 to I7 goes the ethernet in, to O 0-07 goes the output line. pin 1 and pin 19 are the control signals that open and closes the tri-states. What is really interesting about this IC is that actually all the eight tri-states are interconnected, as a result with a single toggle you can command all of them at once.
So, From I0 to I7 goes the ethernet in, to O 0-07 goes the output line. pin 1 and pin 19 are the control signals that open and closes the tri-states. What is really interesting about this IC is that actually all the eight tri-states are interconnected, as a result with a single toggle you can command all of them at once.But why do you think cmos logic IC will work with ethernet signals :palm:?
Why?
Why?A $20 5-port unmanaged Gig-Ethernet switch plugged into a separate switchable power outlet might be a cleaner solution. Run your connection through that, and then cut power when you want to disconnect. It won't offer the same debugging opportunities, though. ;DNah, not a good solution to me: I've already organized the stuff in a way that there's not a good way without re-arranging everything else, unless, there's a tiny 2 way switch, but I would probably need another plug on the wall...
That is more than $20, if you count that I have to buy the switch and adding antoher plug. That's why I want it plug and play.
Also, considered that I have pretty much anything other than the chip, that would be the cost of the chip only...
Hi
The problem with the chip is that it is not going to work for what you want to do.
Bob
What are you trying to achieve?
Why are you plugging and unplugging your ethernetplug so many times?
If you find switching one wire insufficient then you could just use a switch with more poles to switch whatever wire you wish.
Or use a suitable relay if you want to do it remotely.
http://www.dx.com/p/mini-2-port-rj45-manual-network-switch-white-58286 (http://www.dx.com/p/mini-2-port-rj45-manual-network-switch-white-58286)
Ok guys.... Sorry I'm just a beginner in electronics, I was assuming by given that Ethernet signaling was the classical digital 1/0 V system, I've hadn't any idea that there were 5 different voltages... Now, the chart above, explains a lot of things, that I didn't knew.
That said, the best solution is:http://www.dx.com/p/mini-2-port-rj45-manual-network-switch-white-58286 (http://www.dx.com/p/mini-2-port-rj45-manual-network-switch-white-58286)
Don't cost that much and so I don't have to mess up with Ethernet signaling and all that stuff...
Ok guys.... Sorry I'm just a beginner in electronics, I was assuming by given that Ethernet signaling was the classical digital 1/0 V system, I've hadn't any idea that there were 5 different voltages... Now, the chart above, explains a lot of things, that I didn't knew.
That said, the best solution is:http://www.dx.com/p/mini-2-port-rj45-manual-network-switch-white-58286 (http://www.dx.com/p/mini-2-port-rj45-manual-network-switch-white-58286)
Don't cost that much and so I don't have to mess up with Ethernet signaling and all that stuff...
As to why to use one to physically isolate the network? Well, if you frequently need to air-gap the PC, (e.g. when changing Antivirus or security programs) and both the back of the PC and the RJ45 wall socket are awkward to get at, or if the O.P. has a disability that makes unplugging/replugging a cable difficult, it makes sense to me.
Ok guys.... Sorry I'm just a beginner in electronics, I was assuming by given that Ethernet signaling was the classical digital 1/0 V system, I've hadn't any idea that there were 5 different voltages... Now, the chart above, explains a lot of things, that I didn't knew.
That said, the best solution is:http://www.dx.com/p/mini-2-port-rj45-manual-network-switch-white-58286 (http://www.dx.com/p/mini-2-port-rj45-manual-network-switch-white-58286)
Don't cost that much and so I don't have to mess up with Ethernet signaling and all that stuff...
Hi
Since we still don't have the slightest idea what you actually are trying to do ... there still may be a lot of important gaps that are not being addressed.
One possible gap:
Are you running 10 megabit ethernet (as in 1970's speeds) or something much faster? (as in your computer is < 20 years old).
Any time you mess with the wires in a ethernet cable, you create an impedance bump. That mismatch will degrade the signal to noise on the line and possibly introduce cross talk between the pairs. Put more simply - it adds a lot of noise. The switch you show may be fine for 10 megabit. It may be a disaster in some modern setups.
Bob
netsh interface set interface name="Local Area Connection" admin=enable
netsh interface set interface name="Local Area Connection" admin=disable
ifconfig eth0 up
ifconfig eth0 down
These should persist on reboot. Not recommended for servers. Classic XY-problem (http://xyproblem.info/), or is there something special in why you want to "unplug"?
Are you writing device drivers? Or maybe an ethernet device?
I'd guess not, you'd have known ethernet used differential signalling with transformers.
Disabling the network adapter on any modern operating system works like this:Code: (Windows) [Select]netsh interface set interface name="Local Area Connection" admin=enable
netsh interface set interface name="Local Area Connection" admin=disableCode: (Linux) [Select]These should persist on reboot. Not recommended for servers.ifconfig eth0 up
ifconfig eth0 down
You'd need to be root to do this, obviously.
And just to chime in and ask the same question you've ignored numerous times now: Why do you need to keep disconnecting it?It's a secret the OP wants to take to his grave.
And just to chime in and ask the same question you've ignored numerous times now: Why do you need to keep disconnecting it?It's a secret the OP wants to take to his grave.
And just to chime in and ask the same question you've ignored numerous times now: Why do you need to keep disconnecting it?It's a secret the OP wants to take to his grave.
If I take the liberty of explaining WHY, despite me NOT being the OP.
Disclaimer: Since I'm NOT the OP, I could be completely WRONG.
I think he is worried about some of the rumored, backdoor(s) that are implemented in (some) Intel cpus. He is especially concerned that they may be activated at some point, and cause issues. Hence by keeping the PC air-gaped/isolated, most of the time, he believes it will protect him. There is also concerns about keyloggers and things.
On pain of death, I will NOT ever reveal my source here (which was looking at his past posts, about his concerns about these issues).
There is also the other kind of ethernet killer. This one isn't mine, but I did wire up one of these at one point. It turned up recently.
Never had the guts to try it out...
There is also the other kind of ethernet killer. This one isn't mine, but I did wire up one of these at one point. It turned up recently.
Never had the guts to try it out...
Actually This device you have does not do any damage: Pc boards are optically insulated between parts
as a result it will only fry the controller if you are lucky.
Actually This device you have does not do any damage: Pc boards are optically insulated between parts, as a result it will only fry the controller if you are lucky. You have a better result with some coke poured on a pc board: after the thing dries it screw up everything because it conducts electricity.
Actually This device you have does not do any damage: Pc boards are optically insulated between parts, as a result it will only fry the controller if you are lucky. You have a better result with some coke poured on a pc board: after the thing dries it screw up everything because it conducts electricity.
I can't speak for all ethernet adapters across all time, but I have seen the results of a lightening strike that traveled via LAN wiring to destroy not only network adapters but also attached motherboards.
Lightning's a little more of an extreme. Okay, it's just a few million volts difference, but still.
And just to chime in and ask the same question you've ignored numerous times now: Why do you need to keep disconnecting it?It's a secret the OP wants to take to his grave.
If I take the liberty of explaining WHY, despite me NOT being the OP.
Disclaimer: Since I'm NOT the OP, I could be completely WRONG.
I think he is worried about some of the rumored, backdoor(s) that are implemented in (some) Intel cpus. He is especially concerned that they may be activated at some point, and cause issues. Hence by keeping the PC air-gaped/isolated, most of the time, he believes it will protect him. There is also concerns about keyloggers and things.
On pain of death, I will NOT ever reveal my source here (which was looking at his past posts, about his concerns about these issues).
And, you are actually wrong. That's not why I keep disconnecting the eth plug: this regards only a special pc I have... I'm a bit keen on saying why, because it's not really seen well by the majority of people I know, and some other may actually misunderstand, so, it may be better not to say anything about it...
...this regards only a special pc I have... I'm a bit keen on saying why, because it's not really seen well by the majority of people I know, and some other may actually misunderstand, so, it may be better not to say anything about it...
Pr0n confirmed!
That was my initial thought also, but I bit my tongue and didn't post. Sorry R005T3r, but secrets generate rumors......this regards only a special pc I have... I'm a bit keen on saying why, because it's not really seen well by the majority of people I know, and some other may actually misunderstand, so, it may be better not to say anything about it...
Pr0n confirmed!
Porn really should be kept on a shared drive
Bonus points: you don't need to waste disk space in backups, you'll find others glad to do it for you.Porn really should be kept on a shared driveIt's colloquially known as "the internet".
Regarding the 2-port network clunky-switch: any chance that it can cause damages to the connected devices (e.g. shorting wires while switching ports) ?Probably not - it would take a special level of incompetence to design one using make-before-break switches - and twisted pair Ethernet interfaces are fairly robust, typically tolerating shorts to other Ethernet signals without damage. I wouldn't want to use it with POE though!
That was my initial thought also, but I bit my tongue and didn't post. Sorry R005T3r, but secrets generate rumors......this regards only a special pc I have... I'm a bit keen on saying why, because it's not really seen well by the majority of people I know, and some other may actually misunderstand, so, it may be better not to say anything about it...
Pr0n confirmed!
Since you're using VMs you could assign a VLAN to each virtual NIC instead of bridging it to the physical NIC of your host PC. Then setup your router/firefall for VLANs and isolate the netwoks, allow the VMs just to access the internet. That way cou could also view the complete network traffic and/or log it (pcap) for analyzing it later on. Monitoring the network traffic gives you hints about how the malware communicates to control servers or tries to find other victims. Or you could place a victim VM into the same VLAN and watch what happens.
My concern would then be for things like WiFi and Bluetooth that are a bit less easy to shut off.If your "safe" machines are vulnerable to a compromised wireless device you own, they're also vulnerable to a "compromised" wireless device you do not own - i.e. one owned by an attacker.
A-ha! So you are distributing your ransomware via porn sites eh? Very clever! That's why all 7 of my dedicated porn machines are all running Linux and behind a firewall.
Everyone's got to make a living, good luck to you, I say!
HiNo the machine have no wifi, not any bluetooth... it's only a cpu + old hard drive + motherboard, 4Gb ram and a dvd drive...
Ok, I'd call that a legit reason to go for some sort of separation. My concern would then be for things like WiFi and Bluetooth that are a bit less easy to shut off. I have enough confidence in a managed switch (properly set up and used) that I would go that route rather than a physical switch. The whole VM thing has a few issues as well ...
Bob
OP, thanks for clearing that up. I could see why you would not want to post that sort of info but it does make more sense now.Exactly, that's what I'm talking about. This is a really really dangerous rumor, because if your employer know this, you are the first to be blamed if something happens to them. Also, when the voices spreads, you are probably not able to get a work on an office again.
I worked with a guy who collected code like this. One day I heard he had told someone that if something were to happen he would infect the companies LAN. Gone, right then and there. :-DD I didn't say he was all that bright.
My router allows VLANs.Since you're using VMs you could assign a VLAN to each virtual NIC instead of bridging it to the physical NIC of your host PC. Then setup your router/firefall for VLANs and isolate the netwoks, allow the VMs just to access the internet. That way cou could also view the complete network traffic and/or log it (pcap) for analyzing it later on. Monitoring the network traffic gives you hints about how the malware communicates to control servers or tries to find other victims. Or you could place a victim VM into the same VLAN and watch what happens.
Ding ding ding! We have a winner! This is the way to do it. What I would do is pickup a cheap 5-port managed or semi-managed (aka "smart") switch, which, in addition to allowing you setup VLANs would also allow you to implement port mirroring. That allows you to use a WireShark on a second machine to inspect the traffic on a much lower level. You can grab a 5-port semi-managed GigE switch on Amazon for ~$30 that do exactly that. (Assuming your existing router doesn't allow VLANs and mirroring.)