Re: [AFMUG] Computer History Museum

2018-08-14 Thread chuck
Will add that to the list when I get some spare time again (2022, perhaps, 
maybe 2023)...

From: David Coudron 
Sent: Tuesday, August 14, 2018 5:59 PM
To: AnimalFarm Microwave Users Group 
Subject: Re: [AFMUG] Computer History Museum

We had an opportunity to visit the Intel Museum/showroom in Santa Clara, CA a 
few years back.  It brought back lots of memories.   Also worth the time if you 
get a chance.   

 

Regards,

 

David Coudron

From: AF  On Behalf Of Cameron Crum
Sent: Tuesday, August 14, 2018 10:43 AM
To: AnimalFarm Microwave Users Group 
Subject: [AFMUG] Computer History Museum

 

I just thought I'd share a little bit about the tour of the Computer History 
Museum. Chuck had a emergency come up and couldn't make it, but here are some 
photos. They have some great exhibits both on the hardware and software side. 
It is headquartered in the old SGI headquarters and is straddled on either side 
by the Google campus. If anyone's ever out there and wants to get a tour, let 
me know and I'll send you contact information for my buddy who's a director 
there. The first one is an actual working IBM 4601. It takes up a really big 
size room and they actually have ex IBM Engineers from the 50s that come in and 
turn it on a few times a week and actually run Punch Cards through it to do 
things. They even have a punch card maker and you can write your own code on a 
punch card and keep it as a souvenir. The next one is and original Cray Super 
Computer. There were many more really cool exhibits. Someone could totally geek 
out there for a whole day or more. We were there for 3 hours and basically just 
walked by everything, pausing just to listen to my friend tell us what the 
displays were. But you could easily spend a few days there reading about 
everything and really taking it all in.

 

 




-- 
AF mailing list
AF@af.afmug.com
http://af.afmug.com/mailman/listinfo/af_af.afmug.com
-- 
AF mailing list
AF@af.afmug.com
http://af.afmug.com/mailman/listinfo/af_af.afmug.com


Re: [AFMUG] Computer History Museum

2018-08-14 Thread David Coudron
We had an opportunity to visit the Intel Museum/showroom in Santa Clara, CA a 
few years back.  It brought back lots of memories.   Also worth the time if you 
get a chance.

Regards,

David Coudron
From: AF  On Behalf Of Cameron Crum
Sent: Tuesday, August 14, 2018 10:43 AM
To: AnimalFarm Microwave Users Group 
Subject: [AFMUG] Computer History Museum

I just thought I'd share a little bit about the tour of the Computer History 
Museum. Chuck had a emergency come up and couldn't make it, but here are some 
photos. They have some great exhibits both on the hardware and software side. 
It is headquartered in the old SGI headquarters and is straddled on either side 
by the Google campus. If anyone's ever out there and wants to get a tour, let 
me know and I'll send you contact information for my buddy who's a director 
there. The first one is an actual working IBM 4601. It takes up a really big 
size room and they actually have ex IBM Engineers from the 50s that come in and 
turn it on a few times a week and actually run Punch Cards through it to do 
things. They even have a punch card maker and you can write your own code on a 
punch card and keep it as a souvenir. The next one is and original Cray Super 
Computer. There were many more really cool exhibits. Someone could totally geek 
out there for a whole day or more. We were there for 3 hours and basically just 
walked by everything, pausing just to listen to my friend tell us what the 
displays were. But you could easily spend a few days there reading about 
everything and really taking it all in.


-- 
AF mailing list
AF@af.afmug.com
http://af.afmug.com/mailman/listinfo/af_af.afmug.com


Re: [AFMUG] Wind Farm Experiences

2018-08-14 Thread Brian Webster
If you have any licensed PTP links they need to protect your pathways by not 
placing any turbines and blade swing radius in a way to block it. I have worked 
on some of these in the past and mapped licensed links as rectangles based on 
the two points and widest part of the Fresnel zone. Would be a good idea for 
you to do that and provide it to the developer. You could also provide your 
unlicensed PTP links but I don’t think you can get any protection for them.

 

Thank You,

Brian Webster

 

From: AF [mailto:af-boun...@af.afmug.com] On Behalf Of Adam Moffett
Sent: Tuesday, August 14, 2018 6:17 PM
To: af@af.afmug.com
Subject: Re: [AFMUG] Wind Farm Experiences

 





We've been on a wind tower for a few years. We're 20' below the tip of the 
blades.just for the climber's sanity.  You can imagine how unnerving it 
must be to get close to that blade. 

I'm not aware of any particular problems with being there.

I don't know how the turbine would affect ptp.  I think ken Hohoff said you 
could hear a warble in the audible alignment of FSK Canopy, but it didn't seem 
to impair service.  That's obviously a different beast from anything we're 
using today.

-Adam





On 8/14/2018 5:38 PM, Bill Prince wrote:

Ken Hohoff was the guy with all the wind farm experience. Haven't seen or heard 
from him in a while...

 

bp

 

On 8/14/2018 2:08 PM, Matt Corcoran wrote:

A township within our wireless coverage area is in the public 
hearing/permitting/approval stage for the construction of a new large windfarm.

 

What are your experiences providing service in the vicinity of Wind farms?
Source of Problems?  Opportunity? I am currently checking to see if it will 
interfere with any of our ptp links.   I’m unsure if reflections off these big 
monopoles will cause any problems.   Naturally, tall hills are an asset to the 
wind farms and Wisps alike.   Has anyone ever used a wind turbine monopole as a 
transmit location?.

 

 

Matt Corcoran

Network Engineer

Stratos Networks

 










 

 

-- 
AF mailing list
AF@af.afmug.com
http://af.afmug.com/mailman/listinfo/af_af.afmug.com


Re: [AFMUG] Wind Farm Experiences

2018-08-14 Thread Lewis Bergman
We had, and still have a number of links in and through wind farms. It
never really caused us huge issues but we had a lot of fade margin. I think
the best bet is identify with them early and they will work with you on
placement to try and avoid direct path problems. They won't let you
anywhere near their turbines if they aren't using the equipment and their
fiber is also off limits. We have put in a number of PTP links to use for
radio systems we put in for the windfarms and they won't even use them for
stuff they own that isn't directly related to generating power.

The planning starts early so I would suggest getting after it now. If you
can give them a KMZ someone with the wind farm already has one or will when
they place them. I would provide them with a KMZ of your paths to start and
offer any help required to keep things clean.

On Tue, Aug 14, 2018 at 4:47 PM Sean Heskett  wrote:

> he's over on the WISPA members list.
>
> he left AF when agent-orange got elected.  reason we now observe LENT year
> round on the list...the rest of us were tired of the noise too tho.
>
> -sean
>
>
> On Tue, Aug 14, 2018 at 3:38 PM, Bill Prince  wrote:
>
>> Ken Hohoff was the guy with all the wind farm experience. Haven't seen or
>> heard from him in a while...
>>
>>
>> bp
>> 
>>
>>
>> On 8/14/2018 2:08 PM, Matt Corcoran wrote:
>>
>> A township within our wireless coverage area is in the public
>> hearing/permitting/approval stage for the construction of a new large
>> windfarm.
>>
>>
>>
>> What are your experiences providing service in the vicinity of Wind
>> farms?Source of Problems?  Opportunity? I am currently checking to see
>> if it will interfere with any of our ptp links.   I’m unsure if reflections
>> off these big monopoles will cause any problems.   Naturally, tall hills
>> are an asset to the wind farms and Wisps alike.   Has anyone ever used a
>> wind turbine monopole as a transmit location?.
>>
>>
>>
>>
>>
>> Matt Corcoran
>>
>> Network Engineer
>>
>> Stratos Networks
>>
>>
>>
>>
>>
>>
>> --
>> AF mailing list
>> AF@af.afmug.com
>> http://af.afmug.com/mailman/listinfo/af_af.afmug.com
>>
>>
> --
> AF mailing list
> AF@af.afmug.com
> http://af.afmug.com/mailman/listinfo/af_af.afmug.com
>
-- 
AF mailing list
AF@af.afmug.com
http://af.afmug.com/mailman/listinfo/af_af.afmug.com


Re: [AFMUG] Wind Farm Experiences

2018-08-14 Thread Chuck McCown
He got pissed during the election.  I have personally invited him to come back 
but no reply.  

From: Bill Prince 
Sent: Tuesday, August 14, 2018 3:38 PM
To: af@af.afmug.com 
Subject: Re: [AFMUG] Wind Farm Experiences

Ken Hohoff was the guy with all the wind farm experience. Haven't seen or heard 
from him in a while...



bp


On 8/14/2018 2:08 PM, Matt Corcoran wrote:

  A township within our wireless coverage area is in the public 
hearing/permitting/approval stage for the construction of a new large windfarm.

   

  What are your experiences providing service in the vicinity of Wind farms?
Source of Problems?  Opportunity? I am currently checking to see if it will 
interfere with any of our ptp links.   I’m unsure if reflections off these big 
monopoles will cause any problems.   Naturally, tall hills are an asset to the 
wind farms and Wisps alike.   Has anyone ever used a wind turbine monopole as a 
transmit location?.

   

   

  Matt Corcoran

  Network Engineer

  Stratos Networks

   


   






-- 
AF mailing list
AF@af.afmug.com
http://af.afmug.com/mailman/listinfo/af_af.afmug.com
-- 
AF mailing list
AF@af.afmug.com
http://af.afmug.com/mailman/listinfo/af_af.afmug.com


Re: [AFMUG] Fwd: Your server 162.222.29.1 has been registered as an attack source

2018-08-14 Thread Rob Genovesi
Create a firewall rule in the outbound and forward tables to log and/or
block outgoing connections to tcp port 8080.  This can help you identify
where the traffic is coming from.

-Rob


On Tue, Aug 14, 2018 at 2:18 PM, TJ Trout  wrote:

> No socks enabled, no addl user accounts, config looks good (nothing new).
> Strange.
>
> Possibly a few behind nat, that could be it but I'm getting notifications
> on multiple mikrotiks...
>
> TJ
>
> On Tue, Aug 14, 2018 at 8:02 AM, Colin Stanners 
> wrote:
>
>> Could it be a device being NATed behind the MT that is a source? Are they
>> doing any port-forwarding?
>>
>> On Tue, Aug 14, 2018 at 2:03 AM, TJ Trout  wrote:
>>
>>> I have the tiks on the latest current with everything locked down and
>>> the forward chain has all commonly abused services filtered as well. Can
>>> someone give me an idea what I need to do here?
>>>
>>> On Tue, Aug 14, 2018, 12:57 PM Mike Hammett  wrote:
>>>
 Unimus should tell you what's changed in the router's config.



 -
 Mike Hammett
 Intelligent Computing Solutions 
 
 
 
 
 Midwest Internet Exchange 
 
 
 
 The Brothers WISP 
 


 
 --
 *From: *"TJ Trout" 
 *To: *af@af.afmug.com
 *Sent: *Monday, August 13, 2018 6:00:21 PM
 *Subject: *[AFMUG] Fwd: Your server 162.222.29.1 has been registered
 as an attack source

 Anyone know of a mikrotik exploit or what this traffic capture might
 mean?

 I have my router locked down and all common abuse ports/services
 filtered in both router and pass thru to customers

 -- Forwarded message -
 From: BitNinja 
 Date: Tue, Aug 14, 2018, 10:58 AM
 Subject: Your server 162.222.29.1 has been registered as an attack
 source
 To: 





 Dear Provider,


 I’m George Egri, the Co-Founder and CEO of BitNinja Server Security.
 I’m writing to inform you that we have detected malicious requests from the
 IP 162.222.29.1 directed at our clients’ servers.


 As a result of these attacks, we have added your IP to our greylist to
 prevent it from attacking our clients’ servers.


 Servers are increasingly exposed as the targets of botnet attacks and
 you might not be aware that your server is being used as a “bot” to send
 malicious attacks over the Internet.


 I've collected the 3 earliest logs below, and you can find the freshest
 100, that may help you disinfect your server, under the link. The timezone
 is UTC +2:00.
 http://bitninja.io/incidentReport.php?details=7281f016fb83701789
 
 

 {
 "PORT HIT": "162.222.29.1:32862->94.46.59.143:8080",
 "MESSAGES": "Array
(
[11:34:08] => GET / HTTP/1.1
Host: 94.46.59.143:8080
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) 
 AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.103 Safari/537.36
Content-Length: 0


)
"
 }

 {
 "PORT HIT": "162.222.29.1:57131->37.187.190.61:8080",
 "MESSAGES": "Array
(
[19:06:48] => GET / HTTP/1.1
Host: 37.187.190.61:8080
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) 
 AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2743.116 Safari/537.36
Content-Length: 0


)
"
 }

 {
 "PORT HIT": "162.222.29.1:56717->104.128.74.105:8080",
 "MESSAGES": "Array
(
[16:26:25] => GET / HTTP/1.1
Host: 104.128.74.105:8080
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) 
 AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2743.116 Safari/537.36
Content-Length: 0


)
"
 }



 Please keep in mind that after the first intrusion we log all traffic
 between your server and the BitNinja-protected servers until the IP is
 removed from the 

Re: [AFMUG] Wind Farm Experiences

2018-08-14 Thread Sean Heskett
he's over on the WISPA members list.

he left AF when agent-orange got elected.  reason we now observe LENT year
round on the list...the rest of us were tired of the noise too tho.

-sean


On Tue, Aug 14, 2018 at 3:38 PM, Bill Prince  wrote:

> Ken Hohoff was the guy with all the wind farm experience. Haven't seen or
> heard from him in a while...
>
>
> bp
> 
>
>
> On 8/14/2018 2:08 PM, Matt Corcoran wrote:
>
> A township within our wireless coverage area is in the public
> hearing/permitting/approval stage for the construction of a new large
> windfarm.
>
>
>
> What are your experiences providing service in the vicinity of Wind
> farms?Source of Problems?  Opportunity? I am currently checking to see
> if it will interfere with any of our ptp links.   I’m unsure if reflections
> off these big monopoles will cause any problems.   Naturally, tall hills
> are an asset to the wind farms and Wisps alike.   Has anyone ever used a
> wind turbine monopole as a transmit location?.
>
>
>
>
>
> Matt Corcoran
>
> Network Engineer
>
> Stratos Networks
>
>
>
>
>
>
> --
> AF mailing list
> AF@af.afmug.com
> http://af.afmug.com/mailman/listinfo/af_af.afmug.com
>
>
-- 
AF mailing list
AF@af.afmug.com
http://af.afmug.com/mailman/listinfo/af_af.afmug.com


Re: [AFMUG] Wind Farm Experiences

2018-08-14 Thread Bill Prince

  
  
Ken Hohoff was the guy with all the wind farm experience. Haven't
  seen or heard from him in a while...


bp



On 8/14/2018 2:08 PM, Matt Corcoran
  wrote:


  
  
  
  
  
  
A township
within our wireless coverage area is in the public
hearing/permitting/approval stage for the construction of a
new large windfarm.
 
What are
your experiences providing service in the vicinity of Wind
farms?    Source of Problems?  Opportunity? I am currently
checking to see if it will interfere with any of our ptp
links.   I’m unsure if reflections off these big monopoles
will cause any problems.   Naturally, tall hills are an
asset to the wind farms and Wisps alike.   Has anyone ever
used a wind turbine monopole as a transmit location?.
 
 
Matt
Corcoran
Network
Engineer
Stratos
Networks
 
  
  
  
  


  


-- 
AF mailing list
AF@af.afmug.com
http://af.afmug.com/mailman/listinfo/af_af.afmug.com


Re: [AFMUG] Fwd: Your server 162.222.29.1 has been registered as an attack source

2018-08-14 Thread TJ Trout
No socks enabled, no addl user accounts, config looks good (nothing new).
Strange.

Possibly a few behind nat, that could be it but I'm getting notifications
on multiple mikrotiks...

TJ

On Tue, Aug 14, 2018 at 8:02 AM, Colin Stanners  wrote:

> Could it be a device being NATed behind the MT that is a source? Are they
> doing any port-forwarding?
>
> On Tue, Aug 14, 2018 at 2:03 AM, TJ Trout  wrote:
>
>> I have the tiks on the latest current with everything locked down and the
>> forward chain has all commonly abused services filtered as well. Can
>> someone give me an idea what I need to do here?
>>
>> On Tue, Aug 14, 2018, 12:57 PM Mike Hammett  wrote:
>>
>>> Unimus should tell you what's changed in the router's config.
>>>
>>>
>>>
>>> -
>>> Mike Hammett
>>> Intelligent Computing Solutions 
>>> 
>>> 
>>> 
>>> 
>>> Midwest Internet Exchange 
>>> 
>>> 
>>> 
>>> The Brothers WISP 
>>> 
>>>
>>>
>>> 
>>> --
>>> *From: *"TJ Trout" 
>>> *To: *af@af.afmug.com
>>> *Sent: *Monday, August 13, 2018 6:00:21 PM
>>> *Subject: *[AFMUG] Fwd: Your server 162.222.29.1 has been registered as
>>> an attack source
>>>
>>> Anyone know of a mikrotik exploit or what this traffic capture might
>>> mean?
>>>
>>> I have my router locked down and all common abuse ports/services
>>> filtered in both router and pass thru to customers
>>>
>>> -- Forwarded message -
>>> From: BitNinja 
>>> Date: Tue, Aug 14, 2018, 10:58 AM
>>> Subject: Your server 162.222.29.1 has been registered as an attack source
>>> To: 
>>>
>>>
>>>
>>>
>>>
>>> Dear Provider,
>>>
>>>
>>> I’m George Egri, the Co-Founder and CEO of BitNinja Server Security. I’m
>>> writing to inform you that we have detected malicious requests from the IP
>>> 162.222.29.1 directed at our clients’ servers.
>>>
>>>
>>> As a result of these attacks, we have added your IP to our greylist to
>>> prevent it from attacking our clients’ servers.
>>>
>>>
>>> Servers are increasingly exposed as the targets of botnet attacks and
>>> you might not be aware that your server is being used as a “bot” to send
>>> malicious attacks over the Internet.
>>>
>>>
>>> I've collected the 3 earliest logs below, and you can find the freshest
>>> 100, that may help you disinfect your server, under the link. The timezone
>>> is UTC +2:00.
>>> http://bitninja.io/incidentReport.php?details=7281f016fb83701789
>>> 
>>> 
>>>
>>> {
>>> "PORT HIT": "162.222.29.1:32862->94.46.59.143:8080",
>>> "MESSAGES": "Array
>>> (
>>> [11:34:08] => GET / HTTP/1.1
>>> Host: 94.46.59.143:8080
>>> User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) 
>>> AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.103 Safari/537.36
>>> Content-Length: 0
>>> 
>>> 
>>> )
>>> "
>>> }
>>>
>>> {
>>> "PORT HIT": "162.222.29.1:57131->37.187.190.61:8080",
>>> "MESSAGES": "Array
>>> (
>>> [19:06:48] => GET / HTTP/1.1
>>> Host: 37.187.190.61:8080
>>> User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) 
>>> AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2743.116 Safari/537.36
>>> Content-Length: 0
>>> 
>>> 
>>> )
>>> "
>>> }
>>>
>>> {
>>> "PORT HIT": "162.222.29.1:56717->104.128.74.105:8080",
>>> "MESSAGES": "Array
>>> (
>>> [16:26:25] => GET / HTTP/1.1
>>> Host: 104.128.74.105:8080
>>> User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) 
>>> AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2743.116 Safari/537.36
>>> Content-Length: 0
>>> 
>>> 
>>> )
>>> "
>>> }
>>>
>>>
>>>
>>> Please keep in mind that after the first intrusion we log all traffic
>>> between your server and the BitNinja-protected servers until the IP is
>>> removed from the greylist. This means you may see valid logs beside the
>>> malicious actions in the link above. If you need help finding the malicious
>>> logs, please don’t hesitate to contact our incident experts by replying to
>>> this e-mail.
>>>
>>> For more information on analyzing and understanding outbound traffic,
>>> check out this:
>>> 

Re: [AFMUG] Wind Farm Experiences

2018-08-14 Thread Sean Heskett
from what i've heard as the blades move in front of your PMP or PTP paths
they will drop...which causes errors...which causes re-transmits...which
makes the network run like crap.



On Tue, Aug 14, 2018 at 3:08 PM, Matt Corcoran  wrote:

> A township within our wireless coverage area is in the public
> hearing/permitting/approval stage for the construction of a new large
> windfarm.
>
>
>
> What are your experiences providing service in the vicinity of Wind
> farms?Source of Problems?  Opportunity? I am currently checking to see
> if it will interfere with any of our ptp links.   I’m unsure if reflections
> off these big monopoles will cause any problems.   Naturally, tall hills
> are an asset to the wind farms and Wisps alike.   Has anyone ever used a
> wind turbine monopole as a transmit location?.
>
>
>
>
>
> Matt Corcoran
>
> Network Engineer
>
> Stratos Networks
>
>
>
> --
> AF mailing list
> AF@af.afmug.com
> http://af.afmug.com/mailman/listinfo/af_af.afmug.com
>
>
-- 
AF mailing list
AF@af.afmug.com
http://af.afmug.com/mailman/listinfo/af_af.afmug.com


Re: [AFMUG] Dear WISPA...

2018-08-14 Thread Steve Jones
is somebody pickin a fight with wispa? im in


On Tue, Aug 14, 2018 at 2:23 PM Lewis Bergman 
wrote:

> It appears that I was the canary in the WISP coal mine all those years
> ago. I thought Ubiquiti was a WISPA member as well. I mean, I used very
> little of their gear compared to Cambium but still. If they are both
> members why is Sean asking to take sides? I get the suing WISPA memer is
> bad thing, but the rest of it would seem to be an internal issue.
>
> On Tue, Aug 14, 2018 at 2:12 PM Chuck McCown  wrote:
>
>> Make sure to put Cambium right next to UBNT in the exhibit hall.
>>
>> Which one of them is the fascist and which is antifa?
>>
>> *From:* Jay Weekley
>> *Sent:* Tuesday, August 14, 2018 12:59 PM
>> *To:* AnimalFarm Microwave Users Group ; Members ; tcof...@wispa.org ; 
>> Arielle
>> Coffey ; Will Peterson ; ghelm...@wispa.org ; bo...@wispa.org ; Trina
>> Coffey ; Alan Belvo
>> *Subject:* Re: [AFMUG] Dear WISPA...
>>
>> Will make for an interesting conference in October.
>>
>> Sean Heskett wrote:
>>
>> An Open Letter to WISPA, the Board of Directors and all WISPA members.
>>
>> Our industry and indeed WISPA itself if founded on the bedrock of helping
>> one another to further our industry and our businesses.  This group is a
>> dedicated, committed group of IT cowboys that try their hardest to get
>> things done and move forward.  When one of our members suffers or has
>> difficulty, we are all there to stand with them and provide whatever help
>> necessary.  When disaster strikes we jump in and help as in the case of
>> several hurricanes and bad storms over the years.  We also actively strive
>> to help each other solve difficult problems whether it be configuring a
>> server, securing financing, finding the best hardware solution to solve a
>> problem or any other myriad of issues our businesses face the members of
>> WISPA are there to help!  I joined WISPA because I felt it was a great
>> thing for me and my business and I want to support WISPA anyway I can,
>> however our membership is being attacked from within and I call on the
>> board to take corrective action immediately and forcefully!
>>
>> Ubiquiti Networks has recently sued Cambium as well as Blip Networks (a
>> fellow WISP), Winncom Technologies (a WISPA vendor), Sakid Ahmed (Cambium
>> VP of engineering) and Dmitry Moiseev (project engineer at Cambium) over
>> Cambiums “Elevate technology”.  I’ve attached the legal complaint so you
>> can read all the details yourself.  Basically the group is accused of
>> “hacking” ubiquiti equipment by loading a different operating system and
>> user interface on Ubiquiti subscriber radios so that they interoperate with
>> Cambium ePMP access points.  This is no different than someone loading
>> windows on a Mac, or vise versa someone building a Hackintosh out of PC
>> parts and loading MacOS on it.  Or more to the point someone loading
>> DD-WART on a linksys WiFi router.  However, regardless of the merits of the
>> complaint, what Ubiquiti is doing is a clear violation of everything that
>> WISPA stands for!
>>
>> I’ve also attached the WISPA mission statement, Goals, Code of ethics,
>> and Article 8 of the By Laws.  Ubiquiti is in clear violation of all these
>> sections and *I hear by call on the board to terminate Ubiquiti’s
>> membership in WISPA.  A HOUSE DIVIDED CANNOT STAND!*  We must get rid of
>> any bad actors amongst us so that we can continue to accomplish everything
>> WISPA stands for.
>>
>> *IT IS EXTREMELY UNNERVING TO SEE UBIQUITI SUE ONE OF OUR FELLOW WISPS.*
>> What kind of business actively sues it's own customers?  Who will be next?
>> Our businesses are too small to be forced to defend ourselves from this bad
>> actor in our organization.  I fear that any one of us could be next on the
>> chopping block and i’ve invested way too much time, energy, sweat blood and
>> tears to see my business or a fellow WISP attached by a wall street company
>> with deep pockets that can sue us out of existence.
>>
>> I hope the rest of the membership will join in signing this letter and
>> that the board will remove Ubiquiti from our organization and send a
>> message that we will not put up with this kind of business ethics.  If the
>> board is unwilling to remove Ubiquiti then I will be forced to remove
>> myself and my company from WISPA because this is not what we stand for.
>>
>>
>> VERY DISGUSTED,
>>
>> Sean Heskett
>>
>> ZIRKEL Wireless
>> High-Speed Internet for NW Colorado
>> 970-871-8500 x100 <(970)%20871-8500> - Office
>> 970-846-8065 <(970)%20846-8065> - mobile
>>
>>
>>
>> ***
>>
>> MISSION AND GOALS
>> http://www.wispa.org/About-Us/Mission-and-Goals
>>
>> MISSION STATEMENT:
>>
>> WISPA works to promote the development, advancement and unification of
>> the wireless Internet service provider industry.
>>
>> WISPA GOALS:
>>
>> • Encourage Congress and the FCC to write laws 

Re: [AFMUG] Epmp puck disable

2018-08-14 Thread Steve Jones
my bones are getting old and my fear of heights is getting worse, so
climbing up to disconnect them all would hurt my emotion, but it looks like
it is what it is.
the few test sites we have up now with no pucks are working great
i want the GPS as a secondary to Packetflux. I have a couple sites that the
packetflux sync just doesnt work

On Tue, Aug 14, 2018 at 11:17 AM Chuck McCown  wrote:

> Why not just disconnect it?
>
> *From:* Josh Luthman
> *Sent:* Tuesday, August 14, 2018 10:09 AM
> *To:* AnimalFarm Microwave Users Group
> *Subject:* Re: [AFMUG] Epmp puck disable
>
> I was told I couldn't do this at one site where I would like to do this.
> This was only a few weeks ago.
>
>
> Josh Luthman
> Office: 937-552-2340
> Direct: 937-552-2343
> 1100 Wayne St
> Suite 1337
> Troy, OH 45373
>
> On Fri, Aug 10, 2018 at 12:13 PM, Steve Jones 
> wrote:
>
>> We have been deploying new sites without the pucks so it uses the
>> internal gps and still has front back sync. Has the software come along yet
>> to disable the puck on the sites where it's already installed?
>>
>> --
>> AF mailing list
>> AF@af.afmug.com
>> http://af.afmug.com/mailman/listinfo/af_af.afmug.com
>>
>>
>
> --
> --
> AF mailing list
> AF@af.afmug.com
> http://af.afmug.com/mailman/listinfo/af_af.afmug.com
> --
> AF mailing list
> AF@af.afmug.com
> http://af.afmug.com/mailman/listinfo/af_af.afmug.com
>
-- 
AF mailing list
AF@af.afmug.com
http://af.afmug.com/mailman/listinfo/af_af.afmug.com


Re: [AFMUG] Dear WISPA...

2018-08-14 Thread Lewis Bergman
It appears that I was the canary in the WISP coal mine all those years ago.
I thought Ubiquiti was a WISPA member as well. I mean, I used very little
of their gear compared to Cambium but still. If they are both members why
is Sean asking to take sides? I get the suing WISPA memer is bad thing, but
the rest of it would seem to be an internal issue.

On Tue, Aug 14, 2018 at 2:12 PM Chuck McCown  wrote:

> Make sure to put Cambium right next to UBNT in the exhibit hall.
>
> Which one of them is the fascist and which is antifa?
>
> *From:* Jay Weekley
> *Sent:* Tuesday, August 14, 2018 12:59 PM
> *To:* AnimalFarm Microwave Users Group ; Members ; tcof...@wispa.org ; Arielle
> Coffey ; Will Peterson ; ghelm...@wispa.org ; bo...@wispa.org ; Trina
> Coffey ; Alan Belvo
> *Subject:* Re: [AFMUG] Dear WISPA...
>
> Will make for an interesting conference in October.
>
> Sean Heskett wrote:
>
> An Open Letter to WISPA, the Board of Directors and all WISPA members.
>
> Our industry and indeed WISPA itself if founded on the bedrock of helping
> one another to further our industry and our businesses.  This group is a
> dedicated, committed group of IT cowboys that try their hardest to get
> things done and move forward.  When one of our members suffers or has
> difficulty, we are all there to stand with them and provide whatever help
> necessary.  When disaster strikes we jump in and help as in the case of
> several hurricanes and bad storms over the years.  We also actively strive
> to help each other solve difficult problems whether it be configuring a
> server, securing financing, finding the best hardware solution to solve a
> problem or any other myriad of issues our businesses face the members of
> WISPA are there to help!  I joined WISPA because I felt it was a great
> thing for me and my business and I want to support WISPA anyway I can,
> however our membership is being attacked from within and I call on the
> board to take corrective action immediately and forcefully!
>
> Ubiquiti Networks has recently sued Cambium as well as Blip Networks (a
> fellow WISP), Winncom Technologies (a WISPA vendor), Sakid Ahmed (Cambium
> VP of engineering) and Dmitry Moiseev (project engineer at Cambium) over
> Cambiums “Elevate technology”.  I’ve attached the legal complaint so you
> can read all the details yourself.  Basically the group is accused of
> “hacking” ubiquiti equipment by loading a different operating system and
> user interface on Ubiquiti subscriber radios so that they interoperate with
> Cambium ePMP access points.  This is no different than someone loading
> windows on a Mac, or vise versa someone building a Hackintosh out of PC
> parts and loading MacOS on it.  Or more to the point someone loading
> DD-WART on a linksys WiFi router.  However, regardless of the merits of the
> complaint, what Ubiquiti is doing is a clear violation of everything that
> WISPA stands for!
>
> I’ve also attached the WISPA mission statement, Goals, Code of ethics, and
> Article 8 of the By Laws.  Ubiquiti is in clear violation of all these
> sections and *I hear by call on the board to terminate Ubiquiti’s
> membership in WISPA.  A HOUSE DIVIDED CANNOT STAND!*  We must get rid of
> any bad actors amongst us so that we can continue to accomplish everything
> WISPA stands for.
>
> *IT IS EXTREMELY UNNERVING TO SEE UBIQUITI SUE ONE OF OUR FELLOW WISPS.*
> What kind of business actively sues it's own customers?  Who will be next?
> Our businesses are too small to be forced to defend ourselves from this bad
> actor in our organization.  I fear that any one of us could be next on the
> chopping block and i’ve invested way too much time, energy, sweat blood and
> tears to see my business or a fellow WISP attached by a wall street company
> with deep pockets that can sue us out of existence.
>
> I hope the rest of the membership will join in signing this letter and
> that the board will remove Ubiquiti from our organization and send a
> message that we will not put up with this kind of business ethics.  If the
> board is unwilling to remove Ubiquiti then I will be forced to remove
> myself and my company from WISPA because this is not what we stand for.
>
>
> VERY DISGUSTED,
>
> Sean Heskett
>
> ZIRKEL Wireless
> High-Speed Internet for NW Colorado
> 970-871-8500 x100 <(970)%20871-8500> - Office
> 970-846-8065 <(970)%20846-8065> - mobile
>
>
>
> ***
>
> MISSION AND GOALS
> http://www.wispa.org/About-Us/Mission-and-Goals
>
> MISSION STATEMENT:
>
> WISPA works to promote the development, advancement and unification of the
> wireless Internet service provider industry.
>
> WISPA GOALS:
>
> • Encourage Congress and the FCC to write laws that support the survival
> and success of community-based wireless Internet service providers (WISPs).
> • Provide online technical forums that enable and encourage the sharing
> and exchange of information 

Re: [AFMUG] Epmp puck disable

2018-08-14 Thread Christopher Gray
I thought the puck was just the antenna, and disconnecting the puck is just
running the GPS without an antenna.

Is that incorrect?


--


On Tue, Aug 14, 2018 at 12:15 PM Chuck McCown  wrote:

> Why not just disconnect it?
>
> *From:* Josh Luthman
> *Sent:* Tuesday, August 14, 2018 10:09 AM
> *To:* AnimalFarm Microwave Users Group
> *Subject:* Re: [AFMUG] Epmp puck disable
>
> I was told I couldn't do this at one site where I would like to do this.
> This was only a few weeks ago.
>
>
> Josh Luthman
> Office: 937-552-2340
> Direct: 937-552-2343
> 1100 Wayne St
> Suite 1337
> Troy, OH 45373
>
> On Fri, Aug 10, 2018 at 12:13 PM, Steve Jones 
> wrote:
>
>> We have been deploying new sites without the pucks so it uses the
>> internal gps and still has front back sync. Has the software come along yet
>> to disable the puck on the sites where it's already installed?
>>
>> --
>> AF mailing list
>> AF@af.afmug.com
>> http://af.afmug.com/mailman/listinfo/af_af.afmug.com
>>
>>
>
> --
> --
> AF mailing list
> AF@af.afmug.com
> http://af.afmug.com/mailman/listinfo/af_af.afmug.com
> --
> AF mailing list
> AF@af.afmug.com
> http://af.afmug.com/mailman/listinfo/af_af.afmug.com
>
-- 
AF mailing list
AF@af.afmug.com
http://af.afmug.com/mailman/listinfo/af_af.afmug.com


Re: [AFMUG] Dear WISPA...

2018-08-14 Thread Chuck McCown
Make sure to put Cambium right next to UBNT in the exhibit hall.  

Which one of them is the fascist and which is antifa?

From: Jay Weekley 
Sent: Tuesday, August 14, 2018 12:59 PM
To: AnimalFarm Microwave Users Group ; Members ; tcof...@wispa.org ; Arielle 
Coffey ; Will Peterson ; ghelm...@wispa.org ; bo...@wispa.org ; Trina Coffey ; 
Alan Belvo 
Subject: Re: [AFMUG] Dear WISPA...

Will make for an interesting conference in October.


Sean Heskett wrote:

  An Open Letter to WISPA, the Board of Directors and all WISPA members. 

  Our industry and indeed WISPA itself if founded on the bedrock of helping one 
another to further our industry and our businesses.  This group is a dedicated, 
committed group of IT cowboys that try their hardest to get things done and 
move forward.  When one of our members suffers or has difficulty, we are all 
there to stand with them and provide whatever help necessary.  When disaster 
strikes we jump in and help as in the case of several hurricanes and bad storms 
over the years.  We also actively strive to help each other solve difficult 
problems whether it be configuring a server, securing financing, finding the 
best hardware solution to solve a problem or any other myriad of issues our 
businesses face the members of WISPA are there to help!  I joined WISPA because 
I felt it was a great thing for me and my business and I want to support WISPA 
anyway I can, however our membership is being attacked from within and I call 
on the board to take corrective action immediately and forcefully!  

  Ubiquiti Networks has recently sued Cambium as well as Blip Networks (a 
fellow WISP), Winncom Technologies (a WISPA vendor), Sakid Ahmed (Cambium VP of 
engineering) and Dmitry Moiseev (project engineer at Cambium) over Cambiums 
“Elevate technology”.  I’ve attached the legal complaint so you can read all 
the details yourself.  Basically the group is accused of “hacking” ubiquiti 
equipment by loading a different operating system and user interface on 
Ubiquiti subscriber radios so that they interoperate with Cambium ePMP access 
points.  This is no different than someone loading windows on a Mac, or vise 
versa someone building a Hackintosh out of PC parts and loading MacOS on it.  
Or more to the point someone loading DD-WART on a linksys WiFi router.  
However, regardless of the merits of the complaint, what Ubiquiti is doing is a 
clear violation of everything that WISPA stands for!  

  I’ve also attached the WISPA mission statement, Goals, Code of ethics, and 
Article 8 of the By Laws.  Ubiquiti is in clear violation of all these sections 
and I hear by call on the board to terminate Ubiquiti’s membership in WISPA.  A 
HOUSE DIVIDED CANNOT STAND!  We must get rid of any bad actors amongst us so 
that we can continue to accomplish everything WISPA stands for.

  IT IS EXTREMELY UNNERVING TO SEE UBIQUITI SUE ONE OF OUR FELLOW WISPS.  What 
kind of business actively sues it's own customers?  Who will be next?  Our 
businesses are too small to be forced to defend ourselves from this bad actor 
in our organization.  I fear that any one of us could be next on the chopping 
block and i’ve invested way too much time, energy, sweat blood and tears to see 
my business or a fellow WISP attached by a wall street company with deep 
pockets that can sue us out of existence.  

  I hope the rest of the membership will join in signing this letter and that 
the board will remove Ubiquiti from our organization and send a message that we 
will not put up with this kind of business ethics.  If the board is unwilling 
to remove Ubiquiti then I will be forced to remove myself and my company from 
WISPA because this is not what we stand for.


  VERY DISGUSTED,

  Sean Heskett

  ZIRKEL Wireless 
  High-Speed Internet for NW Colorado
  970-871-8500 x100 - Office
  970-846-8065 - mobile


  
***

  MISSION AND GOALS
  http://www.wispa.org/About-Us/Mission-and-Goals

  MISSION STATEMENT:

  WISPA works to promote the development, advancement and unification of the 
wireless Internet service provider industry.

  WISPA GOALS:


  • Encourage Congress and the FCC to write laws that support the survival and 
success of community-based wireless Internet service providers (WISPs).

  • Provide online technical forums that enable and encourage the sharing and 
exchange of information between all the members of the WISP community.

  • Demystify government rules and regulations.

  • Publicize, promote, demonstrate and maintain a Code of Ethical Business 
Practices.

  • Promote and support industry-wide communication, coordination and 
cooperation between local WISP organizations, national WISP organizations, 
community wireless organizations and wireless industry vendors.


  
***


  CODE OF ETHICS
  

Re: [AFMUG] Dear WISPA...

2018-08-14 Thread Jay Weekley

  
  
Will make for an interesting conference in October.

Sean Heskett wrote:


  An
  Open Letter to WISPA, the Board of Directors and all WISPA
  members.


Our
  industry and indeed WISPA itself if founded on the bedrock of
  helping one another to further our industry and our
  businesses.  This group is a dedicated, committed group of IT
  cowboys that try their hardest to get things done and move
  forward.  When one of our members suffers or has difficulty,
  we are all there to stand with them and provide whatever help
  necessary.  When disaster strikes we jump in and help as in
  the case of several hurricanes and bad storms over the years. 
  We also actively strive to help each other solve difficult
  problems whether it be configuring a server, securing
  financing, finding the best hardware solution to solve a
  problem or any other myriad of issues our businesses face the
  members of WISPA are there to help!  I joined WISPA because I
  felt it was a great thing for me and my business and I want to
  support WISPA anyway I can, however our membership is being
  attacked from within and I call on the board to take
  corrective action immediately and forcefully!  


Ubiquiti
  Networks has recently sued Cambium as well as Blip Networks (a
  fellow WISP), Winncom Technologies (a WISPA vendor), Sakid
  Ahmed (Cambium VP of engineering) and Dmitry Moiseev (project
  engineer at Cambium) over Cambiums “Elevate technology”.  I’ve
  attached the legal complaint so you can read all the details
  yourself.  Basically the group is accused of “hacking”
  ubiquiti equipment by loading a different operating system and
  user interface on Ubiquiti subscriber radios so that they
  interoperate with Cambium ePMP access points.  This is no
  different than someone loading windows on a Mac, or vise versa
  someone building a Hackintosh out of PC parts and loading
  MacOS on it.  Or more to the point someone loading DD-WART on
  a linksys WiFi router.  However, regardless of the merits of
  the complaint, what Ubiquiti is doing is a clear violation of
  everything that WISPA stands for!  


I’ve
  also attached the WISPA mission statement, Goals, Code of
  ethics, and Article 8 of the By Laws.  Ubiquiti is in clear
  violation of all these sections and I hear by call on the
board to terminate Ubiquiti’s membership in WISPA.  A HOUSE
DIVIDED CANNOT STAND!  We must get rid of any bad actors
  amongst us so that we can continue to accomplish everything
  WISPA stands for.


IT
IS EXTREMELY UNNERVING TO SEE UBIQUITI SUE ONE OF OUR FELLOW
WISPS.  What kind of business actively sues it's own
  customers?  Who will be next?  Our businesses are too small to
  be forced to defend ourselves from this bad actor in our
  organization.  I fear that any one of us could be next on the
  chopping block and i’ve invested way too much time, energy,
  sweat blood and tears to see my business or a fellow WISP
  attached by a wall street company with deep pockets that can
  sue us out of existence.  


I
  hope the rest of the membership will join in signing this
  letter and that the board will remove Ubiquiti from our
  organization and send a message that we will not put up with
  this kind of business ethics.  If the board is unwilling to
  remove Ubiquiti then I will be forced to remove myself and my
  company from WISPA because this is not what we stand for.




VERY
  DISGUSTED,


Sean
  Heskett
  
  ZIRKEL Wireless 
  High-Speed Internet for NW Colorado
  970-871-8500 x100 - Office
  970-846-8065 - mobile




***

  MISSION AND GOALS
  http://www.wispa.org/About-Us/Mission-and-Goals
  
  MISSION STATEMENT:
  
  WISPA works to promote the development, advancement and
  unification of the wireless Internet service
  provider industry.
  
  WISPA GOALS:
  
  	• Encourage
Congress and the FCC to write laws that support the survival
and success of community-based wireless Internet service
providers (WISPs).
  
  	• 

Re: [AFMUG] test

2018-08-14 Thread Sean Heskett
thanks!

On Tue, Aug 14, 2018 at 12:26 PM, Seth Mattinen  wrote:

> On 8/14/18 11:12 AM, Sean Heskett wrote:
>
>> testing 123
>>
>>
>
> Works.
>
> --
> AF mailing list
> AF@af.afmug.com
> http://af.afmug.com/mailman/listinfo/af_af.afmug.com
>
-- 
AF mailing list
AF@af.afmug.com
http://af.afmug.com/mailman/listinfo/af_af.afmug.com


Re: [AFMUG] NOC Full Rack pricing

2018-08-14 Thread Mark Radabaugh
Biggest cost driver is electricity.  20A/240 is ~3500kW/mo.  At $0.15/kwh 
that’s $525 in power alone.   Add another 50% for cooling and it’s approaching 
$800/mo in energy cost alone.

Mark

> On Aug 14, 2018, at 11:49 AM, Chuck McCown  wrote:
> 
> Last quote I remember was $450 in Salt Lake City.  I think in the Cogent data 
> center. 
>  
> From: Eric Kuhnke <>
> Sent: Monday, August 13, 2018 7:34 PM
> To: AnimalFarm Microwave Users Group <>
> Subject: Re: [AFMUG] NOC Full Rack pricing
>  
> Since power was not specified he's looking at anywhere from $500/mo for one 
> cabinet up to $4000/mo.  Entirely dependent on where, power, connectivity. 
> Also know your cross connect NRCs and MRCs and contract terms before getting 
> into a colo.
>  
>  
>  
> On Mon, Aug 13, 2018 at 6:31 PM Mike Hammett > wrote:
>> We'd probably let a full rack with 20 amp A + B in Chicago go for 
>> $2,500/month. I assume almost everywhere (outside of HFT-targeted stuff) 
>> would be less.
>> 
>> 
>> 
>> -
>> Mike Hammett
>> Intelligent Computing Solutions 
>>   
>>  
>>  
>> 
>> Midwest Internet Exchange 
>>   
>>  
>> 
>> The Brothers WISP 
>>  
>> 
>> 
>>  
>> From: "Sterling Jacobson" >
>> To: "AnimalFarm Microwave Users Group" >
>> Sent: Monday, August 13, 2018 8:26:20 PM
>> Subject: [AFMUG] NOC Full Rack pricing
>> 
>> What’s a ‘normal’ or ‘average’ monthly rate now days for a full rack in a 
>> datacenter?
>>  
>> I’m pricing upgrading my half rack to a full rack, but it’s a ‘ghetto’ NOC 
>> with questionable cooling and ‘maybe’ the generator will kick on after a 
>> minute type of situation.
>>  
>>  
>> 
>> -- 
>> AF mailing list
>> AF@af.afmug.com <>
>> http://af.afmug.com/mailman/listinfo/af_af.afmug.com 
>> 
>>  
>> -- 
>> AF mailing list
>> AF@af.afmug.com <>
>> http://af.afmug.com/mailman/listinfo/af_af.afmug.com 
>> 
> 
> 
> -- 
> AF mailing list
> AF@af.afmug.com
> http://af.afmug.com/mailman/listinfo/af_af.afmug.com
> -- 
> AF mailing list
> AF@af.afmug.com
> http://af.afmug.com/mailman/listinfo/af_af.afmug.com

-- 
AF mailing list
AF@af.afmug.com
http://af.afmug.com/mailman/listinfo/af_af.afmug.com


Re: [AFMUG] How to point domain via dns

2018-08-14 Thread Josh Luthman
To clarify you're supposed to use MX to point to a CNAME (mail.domain.com)
which then leads to an A (1.2.3.4)


Josh Luthman
Office: 937-552-2340
Direct: 937-552-2343
1100 Wayne St
Suite 1337
Troy, OH 45373

On Mon, Aug 13, 2018 at 7:36 PM, Timothy Alexander  wrote:

> Hi,
>
> We’ve found the dns by default points the mx to the @ record (master a
> record.)
>
> I’d suggest changing mail.domain.com to point to an a record (probably a
> cname or domain.com by default) to your cPanel server IP then point the
> mx to mail.domain.com.
>
> (replace domain.com with whatever your domain is)
>
> You can then edit the master @ a record and point it to your new server.
>
> At this point mx should point to mail.domain.com and mail.domain.com
> should be an a record to your cPanel server.
>
> cPanel dns isn’t setup by default to have your site hosted on a different
> server then your mail since it usually references domain.com for mail/mx.
>
> Tim
>
> Sent from my iPhone
>
> On Aug 13, 2018, at 7:00 PM, TJ Trout  wrote:
>
> Cpanel
>
> On Tue, Aug 14, 2018, 11:00 AM TJ Trout  wrote:
>
>> Cpanel
>>
>> On Tue, Aug 14, 2018, 10:36 AM Steve Jones 
>> wrote:
>>
>>> What dns platform
>>>
>>> On Mon, Aug 13, 2018, 4:58 PM CBB - Jay Fuller <
>>> par...@cyberbroadband.net> wrote:
>>>

 to me, it does look like the a record.
 not sure why the a record would be screwing with the mx (email) record


 - Original Message -
 *From:* TJ Trout 
 *To:* af@af.afmug.com
 *Sent:* Monday, August 13, 2018 4:37 PM
 *Subject:* [AFMUG] How to point domain via dns

 So I am trying to point a domains web traffic at a different server by
 modifying the DNS records, I thought the A record was the trick but the A
 record seems to over ride the MX record even though the MX record is set
 correctly, as soon as I change the a record back to my server the MX record
 follows even though it never changes in my DNS settings. (dns server not
 registrar)

 How can I keep everything pointed at my server except the web traffic?
 Looking for which DNS zone that might be?

 --

 --
 AF mailing list
 AF@af.afmug.com
 http://af.afmug.com/mailman/listinfo/af_af.afmug.com

 --
 AF mailing list
 AF@af.afmug.com
 http://af.afmug.com/mailman/listinfo/af_af.afmug.com

>>> --
>>> AF mailing list
>>> AF@af.afmug.com
>>> http://af.afmug.com/mailman/listinfo/af_af.afmug.com
>>>
>> --
> AF mailing list
> AF@af.afmug.com
> http://af.afmug.com/mailman/listinfo/af_af.afmug.com
>
>
> --
> AF mailing list
> AF@af.afmug.com
> http://af.afmug.com/mailman/listinfo/af_af.afmug.com
>
>
-- 
AF mailing list
AF@af.afmug.com
http://af.afmug.com/mailman/listinfo/af_af.afmug.com


Re: [AFMUG] Computer History Museum

2018-08-14 Thread Josh Luthman
Man I wish I worked at Ubnt so I could visit museums :)  That looks like a
ton of fun!


Josh Luthman
Office: 937-552-2340
Direct: 937-552-2343
1100 Wayne St
Suite 1337
Troy, OH 45373

On Tue, Aug 14, 2018 at 12:03 PM, Cameron Crum  wrote:

> That was a 1401 not 4601. I mixed my room number with the computer
> model...doh!
>
> On Tue, Aug 14, 2018 at 10:42 AM, Cameron Crum 
> wrote:
>
>> I just thought I'd share a little bit about the tour of the Computer
>> History Museum. Chuck had a emergency come up and couldn't make it, but
>> here are some photos. They have some great exhibits both on the hardware
>> and software side. It is headquartered in the old SGI headquarters and is
>> straddled on either side by the Google campus. If anyone's ever out there
>> and wants to get a tour, let me know and I'll send you contact information
>> for my buddy who's a director there. The first one is an actual working IBM
>> 4601. It takes up a really big size room and they actually have ex IBM
>> Engineers from the 50s that come in and turn it on a few times a week and
>> actually run Punch Cards through it to do things. They even have a punch
>> card maker and you can write your own code on a punch card and keep it as a
>> souvenir. The next one is and original Cray Super Computer. There were many
>> more really cool exhibits. Someone could totally geek out there for a whole
>> day or more. We were there for 3 hours and basically just walked by
>> everything, pausing just to listen to my friend tell us what the displays
>> were. But you could easily spend a few days there reading about everything
>> and really taking it all in.
>>
>>
>>
>> --
>> AF mailing list
>> AF@af.afmug.com
>> http://af.afmug.com/mailman/listinfo/af_af.afmug.com
>>
>>
>
> --
> AF mailing list
> AF@af.afmug.com
> http://af.afmug.com/mailman/listinfo/af_af.afmug.com
>
>
-- 
AF mailing list
AF@af.afmug.com
http://af.afmug.com/mailman/listinfo/af_af.afmug.com


Re: [AFMUG] Fwd: Your server 162.222.29.1 has been registered as an attack source

2018-08-14 Thread Colin Stanners
Could it be a device being NATed behind the MT that is a source? Are they
doing any port-forwarding?

On Tue, Aug 14, 2018 at 2:03 AM, TJ Trout  wrote:

> I have the tiks on the latest current with everything locked down and the
> forward chain has all commonly abused services filtered as well. Can
> someone give me an idea what I need to do here?
>
> On Tue, Aug 14, 2018, 12:57 PM Mike Hammett  wrote:
>
>> Unimus should tell you what's changed in the router's config.
>>
>>
>>
>> -
>> Mike Hammett
>> Intelligent Computing Solutions 
>> 
>> 
>> 
>> 
>> Midwest Internet Exchange 
>> 
>> 
>> 
>> The Brothers WISP 
>> 
>>
>>
>> 
>> --
>> *From: *"TJ Trout" 
>> *To: *af@af.afmug.com
>> *Sent: *Monday, August 13, 2018 6:00:21 PM
>> *Subject: *[AFMUG] Fwd: Your server 162.222.29.1 has been registered as
>> an attack source
>>
>> Anyone know of a mikrotik exploit or what this traffic capture might mean?
>>
>> I have my router locked down and all common abuse ports/services filtered
>> in both router and pass thru to customers
>>
>> -- Forwarded message -
>> From: BitNinja 
>> Date: Tue, Aug 14, 2018, 10:58 AM
>> Subject: Your server 162.222.29.1 has been registered as an attack source
>> To: 
>>
>>
>>
>>
>>
>> Dear Provider,
>>
>>
>> I’m George Egri, the Co-Founder and CEO of BitNinja Server Security. I’m
>> writing to inform you that we have detected malicious requests from the IP
>> 162.222.29.1 directed at our clients’ servers.
>>
>>
>> As a result of these attacks, we have added your IP to our greylist to
>> prevent it from attacking our clients’ servers.
>>
>>
>> Servers are increasingly exposed as the targets of botnet attacks and you
>> might not be aware that your server is being used as a “bot” to send
>> malicious attacks over the Internet.
>>
>>
>> I've collected the 3 earliest logs below, and you can find the freshest
>> 100, that may help you disinfect your server, under the link. The timezone
>> is UTC +2:00.
>> http://bitninja.io/incidentReport.php?details=7281f016fb83701789
>> 
>> 
>>
>> {
>> "PORT HIT": "162.222.29.1:32862->94.46.59.143:8080",
>> "MESSAGES": "Array
>>  (
>>  [11:34:08] => GET / HTTP/1.1
>>  Host: 94.46.59.143:8080
>>  User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) 
>> AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.103 Safari/537.36
>>  Content-Length: 0
>>  
>>  
>>  )
>>  "
>> }
>>
>> {
>> "PORT HIT": "162.222.29.1:57131->37.187.190.61:8080",
>> "MESSAGES": "Array
>>  (
>>  [19:06:48] => GET / HTTP/1.1
>>  Host: 37.187.190.61:8080
>>  User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) 
>> AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2743.116 Safari/537.36
>>  Content-Length: 0
>>  
>>  
>>  )
>>  "
>> }
>>
>> {
>> "PORT HIT": "162.222.29.1:56717->104.128.74.105:8080",
>> "MESSAGES": "Array
>>  (
>>  [16:26:25] => GET / HTTP/1.1
>>  Host: 104.128.74.105:8080
>>  User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) 
>> AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2743.116 Safari/537.36
>>  Content-Length: 0
>>  
>>  
>>  )
>>  "
>> }
>>
>>
>>
>> Please keep in mind that after the first intrusion we log all traffic
>> between your server and the BitNinja-protected servers until the IP is
>> removed from the greylist. This means you may see valid logs beside the
>> malicious actions in the link above. If you need help finding the malicious
>> logs, please don’t hesitate to contact our incident experts by replying to
>> this e-mail.
>>
>> For more information on analyzing and understanding outbound traffic,
>> check out this:
>> https://doc.bitninja.io/_images/bitninja-incident-report-1.jpg?
>> 
>>
>>
>> We’ve
>> also dedicated an entire site help people prevent their server from sending
>> malicious attacks:
>> 

Re: [AFMUG] Fwd: Your server 162.222.29.1 has been registered as an attack source

2018-08-14 Thread Faisal Imtiaz
See if some proxy services are turned on (socks ? ) 
Try Torch to see if you can see the traffic in your router .. 
See if there are any user accounts created which should not be there. 

Regards. 

Faisal Imtiaz 
Snappy Internet & Telecom 
http://www.snappytelecom.net 

Tel: 305 663 5518 x 232 

Help-desk: (305)663-5518 Option 2 or Email: supp...@snappytelecom.net 

> From: "TJ Trout" 
> To: "AnimalFarm Microwave Users Group" 
> Sent: Tuesday, August 14, 2018 3:03:34 AM
> Subject: Re: [AFMUG] Fwd: Your server 162.222.29.1 has been registered as an
> attack source

> I have the tiks on the latest current with everything locked down and the
> forward chain has all commonly abused services filtered as well. Can someone
> give me an idea what I need to do here?

> On Tue, Aug 14, 2018, 12:57 PM Mike Hammett < af...@ics-il.net > wrote:

>> Unimus should tell you what's changed in the router's config.

>> -
>> Mike Hammett
>> Intelligent Computing Solutions

>> Midwest Internet Exchange

>> The Brothers WISP

>> From: "TJ Trout" < t...@voltbb.com >
>> To: af@af.afmug.com
>> Sent: Monday, August 13, 2018 6:00:21 PM
>> Subject: [AFMUG] Fwd: Your server 162.222.29.1 has been registered as an 
>> attack
>> source

>> Anyone know of a mikrotik exploit or what this traffic capture might mean?

>> I have my router locked down and all common abuse ports/services filtered in
>> both router and pass thru to customers

>> -- Forwarded message -
>> From: BitNinja < incident-rep...@bitninja.io >
>> Date: Tue, Aug 14, 2018, 10:58 AM
>> Subject: Your server 162.222.29.1 has been registered as an attack source
>> To: < exp...@gmail.com >



>> Dear Provider,

>> I’m George Egri, the Co-Founder and CEO of BitNinja Server Security. I’m 
>> writing
>> to inform you that we have detected malicious requests from the IP 
>> 162.222.29.1
>> directed at our clients’ servers.

>> As a result of these attacks, we have added your IP to our greylist to 
>> prevent
>> it from attacking our clients’ servers.

>> Servers are increasingly exposed as the targets of botnet attacks and you 
>> might
>> not be aware that your server is being used as a “bot” to send malicious
>> attacks over the Internet.

>> I've collected the 3 earliest logs below, and you can find the freshest 100,
>> that may help you disinfect your server, under the link. The timezone is UTC
>> +2:00.
>> http://bitninja.io/incidentReport.php?details=7281f016fb83701789

>> {
>> "PORT HIT": "162.222.29.1:32862-> 94.46.59.143:8080 ",
>> "MESSAGES": "Array
>>  (
>>  [11:34:08] => GET / HTTP/1.1
>>  Host: 94.46.59.143:8080 User-Agent: Mozilla/5.0 (Windows NT 
>> 6.1; WOW64)
>>  AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.103 
>> Safari/537.36
>>  Content-Length: 0


>>  )
>>  "
>> }
>> {
>> "PORT HIT": "162.222.29.1:57131-> 37.187.190.61:8080 ",
>> "MESSAGES": "Array
>>  (
>>  [19:06:48] => GET / HTTP/1.1
>>  Host: 37.187.190.61:8080 User-Agent: Mozilla/5.0 (Windows NT 
>> 6.1; WOW64)
>>  AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2743.116 
>> Safari/537.36
>>  Content-Length: 0


>>  )
>>  "
>> }
>> {
>> "PORT HIT": "162.222.29.1:56717-> 104.128.74.105:8080 ",
>> "MESSAGES": "Array
>>  (
>>  [16:26:25] => GET / HTTP/1.1
>>  Host: 104.128.74.105:8080 User-Agent: Mozilla/5.0 (Windows NT 
>> 6.1; WOW64)
>>  AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2743.116 
>> Safari/537.36
>>  Content-Length: 0


>>  )
>>  "
>> }

>> Please keep in mind that after the first intrusion we log all traffic between
>> your server and the BitNinja-protected servers until the IP is removed from 
>> the
>> greylist. This means you may see valid logs beside the malicious actions in 
>> the
>> link above. If you need help finding the malicious logs, please don’t 
>> hesitate
>> to contact our incident experts by replying to this e-mail.

>> For more information on analyzing and understanding outbound traffic, check 
>> out
>> this:
>> https://doc.bitninja.io/_images/bitninja-incident-report-1.jpg?

>> We’ve also dedicated an entire site help people prevent their server from
>> sending malicious attacks:
>> https://doc.bitninja.io/investigations.html

>> Our incident experts are also happy to help you and can provide detailed 
>> logs if
>> needed. Please, feel free to connect me with the administrator or technical
>> team responsible for managing your server.

>> Thank you for helping us make the Internet a safer place!

>> Regards,

>> George Egri
>> CEO at BitNinja.io

>> BitNinja.io @ BusinessInsider UK

>> BitNinja.io hits the WHIR.com
>> BitNinja @ CodeMash conference



>> Partnered by:

>> --
>> AF mailing list
>> AF@af.afmug.com
>> 

Re: [AFMUG] OT Moviepass

2018-08-14 Thread Bill Prince

  
  
And be careful if/when you try to cancel your subscription:

  https://www.vox.com/culture/2018/8/14/17687732/moviepass-cant-cancel-opt-in-email-app
  

bp



On 7/31/2018 8:42 AM, Chuck McCown
  wrote:


  
  

  Now trading at 59.4 cents per share
   
  Equivalent of .237 cents per share pre split.  
   
  I wonder how long the exchange will allow it to continue
to trade.  

  
  
  
  


  


-- 
AF mailing list
AF@af.afmug.com
http://af.afmug.com/mailman/listinfo/af_af.afmug.com


Re: [AFMUG] Nothing better

2018-08-14 Thread Lewis Bergman
Good info. I would kind of expect some pics but i know you aren't jaime.

On Mon, Aug 13, 2018 at 9:56 PM Chuck McCown  wrote:

>
> Than laying on the floor rassling with grandkids.
> Sent from my iPhone
>
> --
> AF mailing list
> AF@af.afmug.com
> http://af.afmug.com/mailman/listinfo/af_af.afmug.com
>
-- 
AF mailing list
AF@af.afmug.com
http://af.afmug.com/mailman/listinfo/af_af.afmug.com


Re: [AFMUG] Fwd: Your server 162.222.29.1 has been registered as an attack source

2018-08-14 Thread TJ Trout
I have the tiks on the latest current with everything locked down and the
forward chain has all commonly abused services filtered as well. Can
someone give me an idea what I need to do here?

On Tue, Aug 14, 2018, 12:57 PM Mike Hammett  wrote:

> Unimus should tell you what's changed in the router's config.
>
>
>
> -
> Mike Hammett
> Intelligent Computing Solutions 
> 
> 
> 
> 
> Midwest Internet Exchange 
> 
> 
> 
> The Brothers WISP 
> 
>
>
> 
> --
> *From: *"TJ Trout" 
> *To: *af@af.afmug.com
> *Sent: *Monday, August 13, 2018 6:00:21 PM
> *Subject: *[AFMUG] Fwd: Your server 162.222.29.1 has been registered as
> an attack source
>
> Anyone know of a mikrotik exploit or what this traffic capture might mean?
>
> I have my router locked down and all common abuse ports/services filtered
> in both router and pass thru to customers
>
> -- Forwarded message -
> From: BitNinja 
> Date: Tue, Aug 14, 2018, 10:58 AM
> Subject: Your server 162.222.29.1 has been registered as an attack source
> To: 
>
>
>
>
>
> Dear Provider,
>
>
> I’m George Egri, the Co-Founder and CEO of BitNinja Server Security. I’m
> writing to inform you that we have detected malicious requests from the IP
> 162.222.29.1 directed at our clients’ servers.
>
>
> As a result of these attacks, we have added your IP to our greylist to
> prevent it from attacking our clients’ servers.
>
>
> Servers are increasingly exposed as the targets of botnet attacks and you
> might not be aware that your server is being used as a “bot” to send
> malicious attacks over the Internet.
>
>
> I've collected the 3 earliest logs below, and you can find the freshest
> 100, that may help you disinfect your server, under the link. The timezone
> is UTC +2:00.
> http://bitninja.io/incidentReport.php?details=7281f016fb83701789
> 
> 
>
> {
> "PORT HIT": "162.222.29.1:32862->94.46.59.143:8080",
> "MESSAGES": "Array
>   (
>   [11:34:08] => GET / HTTP/1.1
>   Host: 94.46.59.143:8080
>   User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) 
> AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.103 Safari/537.36
>   Content-Length: 0
>   
>   
>   )
>   "
> }
>
> {
> "PORT HIT": "162.222.29.1:57131->37.187.190.61:8080",
> "MESSAGES": "Array
>   (
>   [19:06:48] => GET / HTTP/1.1
>   Host: 37.187.190.61:8080
>   User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) 
> AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2743.116 Safari/537.36
>   Content-Length: 0
>   
>   
>   )
>   "
> }
>
> {
> "PORT HIT": "162.222.29.1:56717->104.128.74.105:8080",
> "MESSAGES": "Array
>   (
>   [16:26:25] => GET / HTTP/1.1
>   Host: 104.128.74.105:8080
>   User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) 
> AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2743.116 Safari/537.36
>   Content-Length: 0
>   
>   
>   )
>   "
> }
>
>
>
> Please keep in mind that after the first intrusion we log all traffic
> between your server and the BitNinja-protected servers until the IP is
> removed from the greylist. This means you may see valid logs beside the
> malicious actions in the link above. If you need help finding the malicious
> logs, please don’t hesitate to contact our incident experts by replying to
> this e-mail.
>
> For more information on analyzing and understanding outbound traffic,
> check out this:
> https://doc.bitninja.io/_images/bitninja-incident-report-1.jpg?
> 
>
>
> We’ve
> also dedicated an entire site help people prevent their server from sending
> malicious attacks:
> https://doc.bitninja.io/investigations.html
> 
>
>
> Our incident experts are also happy to help you and can provide detailed
> logs if needed. Please, feel