Re: whois microsoft.com

2001-01-25 Thread Mason Eike


  Microsoft wasn't believed to be hacked but instead the reasons for
the limited access were due to a misconfiguration of their DNS servers
or router that serves the traffic for said DNS servers.  See the
article below

http://news.cnet.com/news/0-1003-200-4583218.html?tag=unkn


On 24 Jan 2001 20:33:49 -0500, [EMAIL PROTECTED] ("Greg Smythe")
wrote:

>No it hasn't. It's always been like that, it's a problem with the way whois
>works. Do a whois on aol.com...
>
>Check out:
>www.securiteam.com/securitynews/Spoofing_whois_information__Was__Is_Microsof
>t_com_safe_.html
>
>for more info.
>
>Greg
>- Original Message -
>From: "Allen May" <[EMAIL PROTECTED]>
>To: <[EMAIL PROTECTED]>
>Sent: Wednesday, January 24, 2001 12:43 PM
>Subject: whois microsoft.com
>
>
>Quick!  do a whois no microsoft.com.  It's been hacked ;)
>
>
>_
>FAQ, list archives, and subscription info:
>http://www.groupstudy.com/list/cisco.html
>Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
>
>_
>FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
>Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



Re: Secondary vrs sub interfaces

2001-01-25 Thread Mason Eike


I think you may be referring to secondary networks for an Interface
and then Sub-interfaces.

Secondary refers to secondary network or IP for an interface.  Say you
want to assign more than (1) IP or block of IP's to an interface what
already has an IP address/block assigned.. say.:
 
 interface Ethernet 0
 ip address 10.0.0.1 255.255.255.0
 
 To add another IP or block to the interface you would do the
following:

 ip adress {network} {netmask} secondary

 making..

 interface Ethernet 0
 ip address 10.0.0.1 255.255.255.0 
 ip address 192.168.0.1 255.255.255.0 secondary

 Now you'll have 2 networks directly connected to Ethernet0 in your
route table.

 Sub-Interfaces -

 I've only used sub-interfaces in a frame-relay scenario.  Say you
have multiple branch offices which are all connected via Frame Relay.
In order to communicate with them you need FR PVC's mapped to all of
them throughout the frame cloud, not necessarily full mesh.. :).  Each
PVC will have a separate DLCI pair describing essentially
entrance/exit points in the network.  You will need to build
frame-relay subinterfaces with a dlci to distinquish each branch
office connection for the other.

Say.

 interface Serial0.1 is used to connect to BranchA
 interface Serial0.2 is used to connect to BranchB
 interface Serial0.3 is used to connect to BranchC

In turn.. BranchA will need an sub interface with DLCI configured to
speak with Branch B and so on..

Hope that make sense.. If not I'm sure someone on here can straighten
me and you out..

 Cheers.
 Mas


On 25 Jan 2001 15:11:40 -0500, [EMAIL PROTECTED] (Charles Nunie) wrote:

>Hi everyone,
>
>What's the difference between secondary and sub interfaces and when and where
>are they applied.
>
>Dzilo
>
>
>Get free email and a permanent address at http://www.netaddress.com/?N=1
>
>_
>FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
>Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



Re: question on route map + access list on same interface

2001-01-26 Thread Mason Eike


 Route-maps are typically used to filter ROUTING PROTOCOL
advertisements either inbound or outboud.  An ACL applied to an
interface specifically instead of a routing protocl process using the
"ip access-group" command with filter the interface traffic.   

  For instance (and clarity):

  You can have an ACL assigned to an interface that permits packets
transmitted from the source  10.0.0.0 network ONLY.  Any packet coming
into the interface(ip ACL is applied IN) that has a SA within that
specific network will be permitted, all others dropped..  Now let's
say you have a BGP session with a router at the other end that has an
ip of 10.0.0.2.  You are 10.0.0.1.  If you have a route-map applied to
the interface that is to match the BGP advertisements to an ACL for
permission and that ACL is filtering for 10.0.0.0/8, 192.168.0.0/16,
etc,  the router WILL ACCEPT the 192.168.0.0 advertisement for two
reasons:

  1.  Because you are neighboring with a 10.0.0.0 address that is
permitted on the interface ACL
  2.  Because 192.168.0.0 is permitted in the BGP route-map ACL.

 Interface ACL checked first.
 Routing protocol ACL's checked second, third. etc..

 Please let me know if you have any questions.
 Mas


  

On 26 Jan 2001 13:31:21 -0500, [EMAIL PROTECTED] ("Bill O'Brien")
wrote:

>George,
>
>Why would you put both on an interface.  If your using
>a route map you have to call the access-lists you
>need. 
>
>Bill
>--- george <[EMAIL PROTECTED]> wrote:
>> Theory question:
>> If a route-map and an input acess list are on the
>> same interface what is the
>> order of processing?
>> 1. Do packets go through the access list first then
>> proccessed by route map?
>> 2. Does the route-map go first and if so, do the
>> packets then go to the
>> access list for processing or are they just sent out
>> the next interface
>> bypassing the access list?
>> 
>> 
>> 
>> 
>> _
>> FAQ, list archives, and subscription info:
>> http://www.groupstudy.com/list/cisco.html
>> Report misconduct and Nondisclosure violations to
>[EMAIL PROTECTED]
>
>
>__
>Do You Yahoo!?
>Yahoo! Auctions - Buy the things you want at great prices. 
>http://auctions.yahoo.com/
>
>_
>FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
>Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



Re: CLARIFICATION on question on route map + access list on same interface,

2001-01-30 Thread Mason Eike


##  The packet will never make it to the route map comparison. ##
  If a packet comes from a source that is blocked inbound on your  
  ethernet port by an ACL, the packet will get dropped right there
regardless of what a route-map says..

 ACL's and route-maps don't work in the way I believe you are
questioning.  You would need the router to look at the ACL and if
there was a match, also look in the route-map, and if there was a
match there for the denied source network go ahead and let it in if
the route map has work for it to do, otherwise drop it. 
That would open up mucho holes..



On 26 Jan 2001 19:16:21 -0500, [EMAIL PROTECTED]
("george") wrote:

>For sake of argument lets say there is a router that has three interfaces.
>e0 to the internal network and two serial routes out to the internet. The
>policy is all www traffic will go through S2 and all other traffic will go
>through S1.  There is an IP policy route (route map) on e0 to accomplish
>this.  There is also an input ACL blocking some ip's from entering this
>router.
>
>Now if a www packet comes from an ip that happens to be blocked by the ACL
>will it be routed by the policy route to s2, bypassing the access list and
>allowing this address to get out that was supposed to be blocked or will it
>have to go through the access list thereby never making it to the route map.
>
>This is a purley hypothetical situation to help with the understanding of
>how these interact with each other. Please don't respond with any why in the
>world would you want to do this answers. Although I do feel it is relevent
>to several situations.
>
>
>
>
>_
>FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
>Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



Re: Catalyst error message

2001-01-30 Thread Mason Eike


 According to Cisco's site:

   Was this switch actively switching traffic at the time you reset
the switch?

http://www.cisco.com/univercd/cc/td/doc/product/lan/cat5000/c5krn/sw_rns/78_3829.htm#xtocid2465133


On 30 Jan 2001 15:50:05 -0500, [EMAIL PROTECTED] ("Mask Of
Zorro") wrote:

>What does the following error message mean:
>
>BOOTROM Version 2.1, Dated Jun 4 1996 12:02:33
>BOOT date: 12/01/00
>BOOT time: 21:38:29
>SIMM RAM address test
>SIMM Ram r/w 55aa
>SIMM Ram r/w aa55
>Uncompressing image. This will take a minute...
>Module 1 failure due to CBL0, CBL1, or CBL2 Error
>
>I was contemplating buying this sup engine until I saw the following startup 
>error.
>
>Z
>
>
>_
>Get your FREE download of MSN Explorer at http://explorer.msn.com
>
>_
>FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
>Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



Re: cd burner

2001-01-31 Thread Mason Eike


Below is a link to the CDR section on CNET.com.  They have reviews and
Top 5 devices etc etc.  Useful info.

http://cnet.search.com/search?timeout=3&tag=ex.cn.1.srch.cnet&q=CDR


On 30 Jan 2001 19:41:11 -0500, [EMAIL PROTECTED] ("hao vu") wrote:

>TDK and Plextor burners have good review.
>HTH
>
>HV
>
>-Original Message-
>From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of
>Ray Smith
>Sent: Tuesday, January 30, 2001 2:36 PM
>To: [EMAIL PROTECTED]
>Subject: Help
>
>
>Guys,
>I am trying get a CD burner, but am not very familiar with which ones
>are good and which ones gives a lot of problems.  Could someone make their
>personal recommendations as to which one might be a good one to get right.
>If not could you direct me to a website that will give me some valuable
>comparisons and reviews.  Thanks
>
>
>Ray
>_
>Get your FREE download of MSN Explorer at http://explorer.msn.com
>
>_
>FAQ, list archives, and subscription info:
>http://www.groupstudy.com/list/cisco.html
>Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
>
>_
>FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
>Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



Re: Telco guru question

2001-02-02 Thread Mason Eike


 Only thing that comes to mind for me is Bit Interleaved Parity..
 For error monitoring on a signal...


  On 2 Feb 2001 11:27:40 -0500, [EMAIL PROTECTED] (Dan West) wrote:

>Hi All,
>
>Any telco guys know what a "BIPP" (BIP)? refers to?
>One of our guys here says it's a circuit "out to the
>Internet". Better phrased, is BIPP something physical?
>circuit? card/slot? etc...I was thinking maybe it was
>where two LECS hand-off on a high cap customer
>circuit.
>
>OR Is it something like a demarq point? Thanks and
>have a great weekend!
>
>=
>Don't forget to cross your digits...
>Dan West -- CCNA, CCNP (in progress)
>
>__
>Get personalized email addresses from Yahoo! Mail - only $35 
>a year!  http://personal.mail.yahoo.com/
>
>_
>FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
>Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



Re: DMZ

2001-02-02 Thread Mason Eike


DMZ stands for Demilitarized Zone and is also called a Permiter
network.  A DMZ adds another layer of security between an external and
internal network.  The purpose of the DMZ is that if someone is able
to break into your network like the WAN router or other device they
won't be able to see the traffic passed between hosts on your Internal
network, because the intruded upon device is on an external network on
a completely different segment than your LAN traffic.  Some companies
place their mail servers and webservers on a separate segment from
their Internal LAN.  If the web, mail, or DNS server is compromised,
your Internal LAN traffic is still protected from the intruder since
the hosts/devices in the DMZ aren't seeing indirect LAN traffic
because of the internal router.

Sample diagram:

{   Internet}
   |
   |
 ( + ) External router 
   |__ 
   |__|  |  Server on DMZ segment
|   
|
  ( + ) Internal router
|
 --
   |  |
 [  ]   [  ]
| __|  Host A|__]   Host B



On 2 Feb 2001 12:32:36 -0500, [EMAIL PROTECTED] ("Snyder, LeRoy F")
wrote:

>Could anyone explian the DMZ process in a little
>more detial? 
>
>-Original Message-
>From: John Chang [mailto:[EMAIL PROTECTED]]
>Sent: Sunday, January 28, 2001 4:25 PM
>To: [EMAIL PROTECTED]
>Subject: DMZ
>
>
>Does anyone know a good book or article on the web that explains DMZ in 
>great detail?  Thank you.
>
>_
>FAQ, list archives, and subscription info:
>http://www.groupstudy.com/list/cisco.html
>Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
>
>_
>FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
>Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



Re: Which BCMSN Cisco book?

2001-02-06 Thread Mason Eike


I found the Cisco Press book to be most useful filling in the gaps and
will suit anyone well that doesn't know a thing about switching and
just beginning.  The book has excellent case studies and questions
although they are not asked in the same manner as they are in the
test.
 
 Plus.  When I took the exam they didn't even go over 3 or 4 important
 topics of switching technologies.. I was surprised but anywho..

Good luck to ya..


On 5 Feb 2001 08:31:10 -0500, [EMAIL PROTECTED] (Rajeev Soni) wrote:

>If you just want to pass the exam then take CISCO CCNP Switching Exam
>Certification Guide. It goes through point by point through the course. If you
>are the one to know hows and whys then take both since they refer back and
>forth. Both of them are good to have and study from. This is my point of view.
>
>Rajeev Soni
>
>Reply Separator
>Subject:Which BCMSN Cisco book?
>Author: "Terry" <[EMAIL PROTECTED]>
>Date:   2/2/2001 9:50 PM
>
>Trying to decide which book to get for the switching test.  Anyone out there
>compared them both?
>
>Building Cisco Multilayer Switched Networks
>
>Hardcover - 500 pages 1st edition (May 15, 2000)
>Cisco Pr; ISBN: 1578700930 ; Dimensions (in inches): 1.40 x 9.47 x 7.70
>
>- or -
>
>Cisco Ccnp Switching Exam Certification Guide
>Hardcover - 576 pages Bk&Cd-Rom edition (December 20, 2000)
>Cisco Systems; ISBN: 158727 ; Dimensions (in inches): 1.50 x 9.43 x 7.71
>
>Thanks
>
>Terry
>
>
>
>_
>FAQ, list archives, and subscription info:
>http://www.groupstudy.com/list/cisco.html
>Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
>Received: from groupstudy.com ([63.104.50.75]) by ccmail.itd.nps.gov with SMTP
>  (IMA Internet Exchange 3.13) id 00857FCD; Fri, 2 Feb 2001 23:17:03 -0500
>Received: from localhost (mail@localhost)
>by groupstudy.com (8.9.3/8.9.3) with SMTP id AAA21354;
>Sat, 3 Feb 2001 00:27:10 -0500
>Received: by groupstudy.com (bulk_mailer v1.12); Fri, 2 Feb 2001 23:58:52 -0500
>Received: (from listserver@localhost)
>by groupstudy.com (8.9.3/8.9.3) id XAA18581
>GroupStudy Mailer; Fri, 2 Feb 2001 23:58:51 -0500
>Received: (from news@localhost)
>by groupstudy.com (8.9.3/8.9.3) id XAA18557
>GroupStudy Mailer; Fri, 2 Feb 2001 23:58:51 -0500
>To: [EMAIL PROTECTED]
>Path: not-for-mail
>From: "Terry" <[EMAIL PROTECTED]>
>Newsgroups: groupstudy.cisco
>Subject: Which BCMSN Cisco book?
>Date: Fri, 2 Feb 2001 21:50:54 -0600
>Organization: GroupStudy.com Discussion Groups  
>Lines: 20
>Message-ID: <95g36a$i3n$[EMAIL PROTECTED]>
>NNTP-Posting-Host: 1cust92.tnt7.gulfport.ms.da.uu.net
>NNTP-Posting-Date: 3 Feb 2001 04:58:50 GMT
>X-Priority: 3
>X-MSMail-Priority: Normal
>X-Newsreader: Microsoft Outlook Express 5.50.4133.2400
>X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4133.2400
>Sender: [EMAIL PROTECTED]
>Reply-To: "Terry" <[EMAIL PROTECTED]>
>Precedence: bulk
>
>_
>FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
>Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



Re: Simple question

2001-01-02 Thread Mason Eike


 Those are symbols for use with Regular expressions.

  ^ = Matches the beginning of the input string
  $ = Matches the end of the input string

 What your example is doing is permitting advertisement(s) for any BGP
learned networks whose path either begins or ends with 100. In other words,
accept advertisements that were originated from AS 100.

Mas


mak <[EMAIL PROTECTED]> wrote in message
[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
> Hi,
>
> For example, ip as-path access-list 20 permit ^100$
>
> What is the ^$ stands for?
>
> Thanks
>
> mak
>
>
>
> _
> FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html
> Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
>


_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



Re: about connect the ISP

2001-01-02 Thread Mason Eike


  The address space you were assigned from the Mother ISP is more than
likely going to be out of a larger block the Mother ISP was assigned from
ARIN.  Say your /24 prefix (Class C) is part of a /16 (Class B) that they
own..  They only announce the /16 to their peers unless a specific situation
arises where they'd need to send the /24.  All of the Major ISP's and org's
follow this procedure and that's why we don't have 9,000,000 routes in our
routing tables.. :)..  Route aggregation is the term..
  So to answer your question.. :)..

 Mother ISP assigns /24 to you statically.  Then they redistribute that
throughout their Autonomous Systems using a Dynamic routing protocol so all
of the internal routers know the path to the router you're connect to, and
then only announce the /16 to their peers.   Everyone knows how to get to
everyone else..

Hope that answers your question.
Mas


"Tony van Ree" <[EMAIL PROTECTED]> wrote in message
[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
> Hi,
>
> We provide a service to thousands of clients with anything from full class
"B" to 4 addresses out of a class "C".  In a nutshell you place a default
static back to the supplier.  The supplier has a static pointing your class
"C" down your link.
>
> In a number of places this is managed by auto type processes for example
going into a customer area and adding the routes you own to your service.
The process then updates the router from the supplier to you.
>
> Teunis
> Hobart, Tasmania
> Australia
>
>
> On Saturday, December 30, 2000 at 07:49:57 AM, gary gary wrote:
>
> > Hi guys:
> > We are a small ISP, just using static routing connect
> > the mother ISP, the mother ISP assign a class C
> > address to us, I want to know how the mother ISP
> > locate the Class c networking , just using static
> > routing? Need they redistribute the static to their
> > dynamic routing (for example OSPF) in order to the
> > internet router know the class c network,?
> > Did the mother ISP create the stub area, then assign
> > the lots of ip address to stub area ,if so  how to
> > create the stub area by static routing? Anyone can
> > give me some configuration,
> >
> >
> > Thanks in advice
> >
> >
> >
> > gary
> >
> >
> >
> >
> > __
> > Do You Yahoo!?
> > Yahoo! Photos - Share your holiday photos online!
> > http://photos.yahoo.com/
> >
> > _
> > FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html
> > Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
> >
> >
>
>
> --
> www.tasmail.com
>
>
> _
> FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html
> Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
>


_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



Re: Passive-interface in OSPF

2001-01-11 Thread Mason Eike

 Unless specifically stated in the debug output that these are OSPF
neighbor hello's then the hello's you are seeing sent are not to verify the
neighbor still exists, rather the link/interface.

To test you can specify a longer hello-interval for OSPF, and then debug.
If you set the OSPF neighbor hello-interval to say 15 secs and leave the
interface default to say 8/10 secs, and if you debug and see the hello
packet sent at 8/10 secs you'll know it's the link hello.. If you see the
hello sent at 15 secs you'll know its the OSPF hello..

Can't explain why the other side debug doesn't show receipt... unless debug
doesn't pickup receipt of interface hellos, but the routing protocol
instead.

enough contemplation.. :)

"Jaeheon Yoo" <[EMAIL PROTECTED]> wrote in message
[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
> Hi,
>
> in p.463 of Building Scalable Cisco Networks
> ---
> During testing with debug commands, it was found that OSPF does send
> Hello and DBD packets on passive interfaces, but does not send LSUs.
> EIGRP does not send anything on passive interfaces.
> -
>
> I tested it by myself, Yes, it is true when you believe what the
> debugger says, "debug ip packet" reports it's  sending hellos on a
> passive interface, But on the other end, the same "debug ip packet"
> says no hellos from the passive interface are received.
>
> So what's going on here? I still firmly believe no hellos are sent on
> a passive interface. Then is it a BUG in IOS?
>
> Thanks in advance.
>
> Jaeheon
>
> _
> FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html
> Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
>


_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



Re: How to configure 2 ip address block on a router ?

2001-01-11 Thread Mason Eike

Check out:
http://www.cisco.com/univercd/cc/td/doc/product/software/ios11/cbook/cip.htm

should you want further reference.

""Tony van Ree"" <[EMAIL PROTECTED]> wrote in message
[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
> Hi,
>
> Use a secondary address.
>
> Example
>
> router#conf t
> router#(config)int e 0
> router#(config-if)ip address 216.x.x.x 255.255.255.240 secondary
> router#(config-if)
>
> Check it with a show int then confirm with show arp.
>
> Teunis
> Hobart, Tasmania
> Australia
>
>
>
> On Wednesday, January 10, 2001 at 08:47:12 AM, [EMAIL PROTECTED] wrote:
>
> > I request additional ip address block from my ISP. I
> > have 2 ip address blcok: 209.x.x.x /29 and
> > 216.x.x.x/28.
> >
> > How do I configure on my Csico 2524 to use those ip
> > address block ? IS it possible.
> >
> > Thanks.
> >
> > __
> > Do You Yahoo!?
> > Yahoo! Photos - Share your holiday photos online!
> > http://photos.yahoo.com/
> >
> > _
> > FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html
> > Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
> >
> >
>
>
> --
> www.tasmail.com
>
>
> _
> FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html
> Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
>


_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]