Re: 3rd party network monitoring
- Original Message - From: "Darrell Hyde" Sent: Tuesday, March 04, 2008 7:02 AM Subject: 3rd party network monitoring [snip] Can anybody recommend a vendor for this type of service? I suppose I could always just get a bunch of VPS accounts here and there and run smokeping, but I'd really like to avoid that. - Darrell Fwiw, http://www.dslreports.com/schedule has a 'Business' monitoring service (w/graphs) for a buck a week. --Michael
Re: Sicily to Egypt undersea cable disruption
RE: Sicily to Egypt undersea cable disruption - Original Message - From: Rod Beck Sent: Friday, February 01, 2008 12:42 PM Subject: RE: Sicily to Egypt undersea cable disruption Well, when you have all these cables running through narrow straits or converging to the same stretch of beach, it does not strike me as at all extraordinary. An important factor is cooperation. Is there cooperation between the fiber optic guys and fishing associations to minimize hits? I would wager there is close to zero. ~~ Here's at least one: http://www.ofcc.com/procedures.htm
Re: FW: ISPs slowing P2P traffic...
- Original Message - From: "Joe Greco" <[EMAIL PROTECTED]> [snip] As long as you fairly disclose to your end-users what limitations and restrictions exist on your network, I don't see the problem. You've set out a qualification that generally doesn't exist. For example, this discussion included someone from a WISP, Amplex, I believe, that listed certain conditions of use on their web site, and yet it seems like they're un{willing,able} (not assigning blame/fault/etc here) to deliver that level of service, and using their inability as a way to justify possibly rate shaping P2P traffic above and beyond what they indicate on their own documents. In some cases, we do have people burying T&C in lengthy T&C documents, such as some of the 3G cellular providers who advertise "Unlimited Internet(*)" data cards, but then have a slew of (*) items that are restricted - but only if you dig into the fine print on Page 3 of the T&C. I'd much prefer that the advertising be honest and up front, and that ISP's not be allowed to advertise "unlimited" service if they are going to place limits, particularly significant limits, on the service. ... JG Yep. "In the US, Internet access is still generally sold as all-you-can-eat, with few restrictions on the types of services or applications that can be run across the network (except for wireless, of course), but things are different across the pond. In the UK, ISP plus.net doesn't even offer "unlimited" packages, and they explain why on their web site. 'Most providers claiming to offer unlimited broadband will have a fair use policy to try and prevent people over-using their service," they write. "But if it's supposed to be unlimited, why should you use it fairly? The fair use policy stops you using your unlimited broadband in an unlimited fashion-so, by our reckoning, it's not unlimited. We don't believe in selling 'unlimited broadband' that's bound by a fair use policy. We'd rather be upfront with you and give you clear usage allowances, with FREE overnight usage.' " The above (and there's much more) from: http://arstechnica.com/articles/culture/Deep-packet-inspection-meets-net-neutrality.ars/ If I was a WISP, I'd be saving up for that DPI box. --Michael
Another question on rfc1918
The text below is from a 'security' list in reply to me questioning his statement, "Thus it is possible to route "private" address ranges." I'd be interested in hearing comments from this group if it's on-topic. Thanks, --Michael Michael, Lets take an example: Attacker --- ISP1---cloud---ISP2---Target.Router---Target.Host If I can source route a packet to ISP2 this will forward the packet via target.router to the target host. It does not matter that target.router filters source route. Most ISP routers (and I have seen configs for over 1000 of them and only seen source route blocked on less then 10 of these! [1]) do not filter source routing (ie no "no ip source-route" entry). As a result, source routed packets float about the Internet. Additionally, "most" ISPs do not have egress filters for private addressing. They allow these packets as a source address on packets. Many tools (even NC - Netcat) support a source route option. This allows the attacker to select the path that is taken to the host and also the return path. So setting the attack up the attacker will source route to ISP2 which will be the last router outside the target's router. As this is a default gateway for the target, all packets are sent from it to the ISP unless egress filters are placed on Target.router. Though the packets would normally "float" around the internet until their TTL expires them, they have been source routed. As such, ISP2 will have a "memory" of where to send them if it received the packet. Now remember that all packets come out of target.router to ISP2. So all packets make it to ISP2. Due to source routing, packets sent to ISP2 follow the reverse of the source route used to reach ISP2 and return to the attacker - even though they are using a "non-routed" address. Source route allows the packets to follow a set path. It does not require the standard routing protocols and is thus dangerous. Source routing is used in a number of multicast protocols (still) and many are loath to disable it. There are two primary types of source routing - Loose Source Routing and Strict Source Routing. I would suggest a read of RFC 791. In strict source routing, the sender specifies the exact route the packet must take. Have a read of: http://www.iss.net/security_center/advice/Underground/Hacking/Methods/Technical/Source_Routing/default.htm Clear as mud? Regards, Quote: "Source routing is an IP option which allows the originator of a packet to specify what path that packet will take, and what path return packets sent back to the originator will take. Source routing is useful when the default route that a connection will take fails or is suboptimal for some reason, or for network diagnostic purposes. For more information on source routing, see RFC791." [1] Disclaimer 1. I do not do much work with ISPs these days and they may have cleaned up their act in the last 5 years - though I doubt it.
Re: History of the EPO (Emergency Power Off)
From: "Sean Donelan" <[EMAIL PROTECTED]> Subject: History of the EPO (Emergency Power Off) The interesting thing about the EPO and data centers is it wasn't orginally for life-safety, but came out of a recommendation by IBM to the NFPA for property protection.<< Fwiw, the EPO on IBM's mainframes back in those days, had to be -pulled- and had a mechanical 'latch' that kept it from being pushed back in. Took both hands to reset it. --Michael
Re: San Francisco Power Outage
From: "Justin M. Streiner" <[EMAIL PROTECTED]> Sent: Tuesday, July 24, 2007 5:58 PM Subject: Re: San Francisco Power Outage Nothing quite like the sound of a whole machine room spinning down at the same time. It gives you that lovely "oh shit" feeling in the pit of your stomach.<< Yep. I plugged in my soldering iron and (coincidentally) the whole room at State of Calif., Franchise Tax, EPO'd. Everyone immediately started staring at me of course. --Michael
Re: Network end users to pull down 2 gigabytes a day, continuously?
- Original Message - From: Gian Constantine Sent: Friday, January 12, 2007 5:24 AM Subject: Re: Network end users to pull down 2 gigabytes a day, continuously? Yes, the NCTC. I have spoken with two of the vendors you mentioned. Neither have pass-through licensing rights. I still have to go directly to most of the content providers to get the proper licensing rights. There are a few vendors out there who will help a company attain these rights, but the solution is not turnkey on licensing. To be clear, it is not turnkey for the major U.S. content providers.<< Back in the 'day', these folks were great to work with, but I have no idea of how they would deal with "IPTV". http://www.4com.com/Company-Profile.html Btw, I thought VoD was one of the main drivers of IPTV, at the local level at least. --Michael
Re: today's Wash Post Business section
The first thing I do when I upgrade someone to IE7 is turn on the Menu Bar... and I've noticed that almost every other computer I've touched with IE7 has it turned back on... Thomas I stumbled on to the 'Alt' key toggling the Menu Bar (in case that helps). --Michael
Re: BCP38 thread 93,871,738,435 (was Re: register.com down sev0?)
- Original Message - From: "william(at)elan.net" <[EMAIL PROTECTED]> To: "Don" <[EMAIL PROTECTED]> Cc: Sent: Thursday, October 26, 2006 8:17 AM Subject: Re: BCP38 thread 93,871,738,435 (was Re: register.com down sev0?) On Thu, 26 Oct 2006, Don wrote: Has anyone put together a centralized system where you can send in a list of attacking bots, let it automatically sort by allocation, and then let it notify the appropriate admin with a list of [potentially] compromised hosts? mynetwatchman [1] comes to mind and so does dshield [2] [1] http://www.mynetwatchman.com [2] http://www.dshield.org -- William Leibzon Elan Networks [EMAIL PROTECTED] Anyone familiar with these folks? http://www.simplicita.com/Simplicita_Research_Data_Partner_Program.html --Michael
Re: [routing-wg]BGP Update Report
From their webpage: Service Advisory On Aug. 17, 2006, the Boeing Company announced that a detailed business and market analysis of Connexion by Boeing is complete, and the company has decided to exit the high-speed broadband communications connectivity markets. Boeing will work with its customers to facilitate an orderly phase out of the Connexion by Boeing service. Passengers traveling on Internet-equipped flights will be able to use the service until it is phased out between now and the end of the year, depending on the airline. - Original Message - From: "Joe Provo" <[EMAIL PROTECTED]> To: "Hank Nussbacher" <[EMAIL PROTECTED]> Cc: <[EMAIL PROTECTED]>; ; <[EMAIL PROTECTED]> Sent: Friday, September 08, 2006 6:35 AM Subject: Re: [routing-wg]BGP Update Report On Fri, Sep 08, 2006 at 05:57:10PM +0300, Hank Nussbacher wrote: On Fri, 8 Sep 2006, [EMAIL PROTECTED] wrote: Strike me as curious, but this seems as if Connexion by Boeing is handing off a /24 from ASN to ASN as a certain plane moves over certain geographic areas. Or is there some other explanation? Detailed at nanog 31 (among other meetings): http://www.nanog.org/mtg-0405/abarbanel.html 2005 detail from a blogger: http://bayosphere.com/node/879 2006 detail from another blogger: http://www.renesys.com/blog/2006/04/tracking_plane_flight_on_inter.shtml -- RSUC / GweepNet / Spunk / FnB / Usenix / SAGE
Re: abuse.clue @ Sprint? (phish in barrel, pictures @ 11:00)
- Original Message - From: "neal rauhauser" <[EMAIL PROTECTED]> To: "NANGO" Sent: Monday, April 03, 2006 8:17 AM Subject: abuse.clue @ Sprint? (phish in barrel, pictures @ 11:00) Got this forwarded to me by an associate - seems he tried the usual channels and is having no luck. I suppose there are professional phishermen out there but it sure would be nice to cut to the Chase on this one. Heh ... get it ... Chase? http://castlecops.com/pirt
Re: Quarantine your infected users spreading malware
- Original Message - From: <[EMAIL PROTECTED]> Subject: Re: Quarantine your infected users spreading malware Rather like a botnet except with the user's consent and with a positive goal.<< Isn't this pretty much like how they were compromised in the first place? How do you differentiate this infection from the ones they've been preached to to avoid? "Trust me...I won't come in your mouth."
Re: is this like a peering war somehow?
From: "Doug Marschke" <[EMAIL PROTECTED]> Subject: RE: is this like a peering war somehow? If something like the slingbox catches on www.slingmedia.com From the sling community forum: Hello before yall get to excited about verizon it looks like they are cancelling users who use too much bandwith. " Unlimited NationalAccess/BroadbandAccess services cannot be used (1) for uploading, downloading or streaming of movies, music or games, (2) with server devices or with host computer applications, including, but not limited to, Web camera posts or broadcasts, automatic data feeds, Voice over IP (VoIP), automated machine-to-machine connections, or peer-to-peer (P2P) file sharing, or (3) as a substitute or backup for private lines or dedicated data connections. "
Re: Time for a real Internet highway (?)
- Original Message - From: "Matt Ghali" <[EMAIL PROTECTED]> To: "Michael Painter" <[EMAIL PROTECTED]> Cc: "NANGO" Sent: Friday, October 14, 2005 1:29 PM Subject: Re: Time for a real Internet highway (?) On Fri, 14 Oct 2005, Michael Painter wrote: I'd be very interested in what folks here think of this: http://news.com.com/Time+for+a+real+Internet+highway/2010-1028_3-5894664.html?tag=carsl I think it's a news.com.com.com URL, and therefore most likely not very worth opening, much less reading. I'm very interested in why you didn't bother at least summarizing the story as a general courtesy to folks here. matto Sorry...I didn't realize that was the protocol. From the article: "We already have our highway system and our electricity. Time has come for our broadband. It's a utility. We now need broadband to live, work, recreate and even make a profit. Whether in Palo Alto, Calif., or Cavalier, N.D., we need our broadband. Many local areas of America are attacking the need for broadband ubiquity, but perhaps it's time for a national program." --Michael
Time for a real Internet highway (?)
I'd be very interested in what folks here think of this: http://news.com.com/Time+for+a+real+Internet+highway/2010-1028_3-5894664.html?tag=carsl Thanks, --Michael
Re: ISP's In Uproar Over Verizon-MCI Merger
US is trailing other industrial countries in broadband penetration I'm not sure that's the case, AFAIK the US holds its own. Graph at the bottom of the article. http://www.mbc-thebridge.com/viewbridge.cfm?instance_id=304
Re: KVM over IP suggestions?
From: "Drew Weaver" <[EMAIL PROTECTED]> Any suggestions would be helpful.<< -Just- got this in an E-mail, fwiw. http://www.nwc.com/showitem.jhtml?docid=1616f3
Re: fcc ruling on dsl providers' access to infrastructure
From: "Joe McGuckin" <[EMAIL PROTECTED]> Subject: Re: fcc ruling on dsl providers' access to infrastructure On 8/7/05 7:20 PM, "Richard A Steenbergen" <[EMAIL PROTECTED]> wrote: Maybe what we need is a certain class of company who will be responsible for running and maintaining the public data infrastructures. They could have lots of government regulations to ensure that they are charging a "fair" price while still being guaranteed a profit, and they could provide the last mile service for all those ISPs out there who are the ones that can actually compete and innovate. Yes, it's called structural separation. Curious what others might think about this, assuming it's not snake-oil: http://www.shorecliffcommunications.com/magazine/news.asp?news=4404 http://www.xgtechnology.com/plots.htm Very low power and could be deployed right now in the unused adjacent-channel NTSC VHF spectrum. VHF (and/or UHF) would seem to solve many of the problems with "wireless" --Michael
Re: You're all over thinking this
- Original Message - From: "Crist Clark" <[EMAIL PROTECTED]> Subject: Re: You're all over thinking this Sam Crooks wrote: Didn't the US Navy buy Iridium? Nope. http://www.iridium.com/corp/iri_corp-story.asp?storyid=2 "In December 2000, a group of private investors led by Dan Colussy organized Iridium Satellite LLC which acquired the operating assets of the bankrupt Iridium LLC including the satellite constellation, the terrestrial network, Iridium real property and intellectual capital." The scientists were all waiting to study the satellite constellation burning up on re-entry when it was picked up for less than a penny on the dollar and then were immediately awarded a multi-million contract from DoD. http://www.heavens-above.com/iridiumdemise.asp --Michael
Re: DNS .US outage
- Original Message - From: "Randy Bush" <[EMAIL PROTECTED]> Sent: Wednesday, July 06, 2005 7:19 PM Subject: RE: DNS .US outage i believe even windoze has dig at the command line, though i don't know in what directory it lies. randy In case other Win users aren't aware: http://www.samspade.org/ssw/features.html --Michael
Re: ATM
- Original Message - From: "James Laszko" <[EMAIL PROTECTED]> Sent: Wednesday, June 29, 2005 7:34 AM Subject: RE: ATM Most MPLS networks use a combination of point to point, frame and ATM facilities as the infrastructure. The phone companies use ATM just about everywhere to deliver voice across their networks. I don't see ATM/FR equipment being EOL'd anytime in the near future. http://www.networkworld.com/news/2005/062005-legacy-nets.html?rl&code=nlvpn2947
Re: ISP's Contact List
http://www.geobytes.com/FAQ.htm#Technology http://www.geobytes.com/FAQ.htm#DifferentFromWhoIs - Original Message - From: "Sanfilippo, Ted" <[EMAIL PROTECTED]> To: "Suresh Ramasubramanian" <[EMAIL PROTECTED]> Cc: Sent: Monday, June 13, 2005 4:18 AM Subject: RE: ISP's Contact List Suresh, Sorry I meant GEOBYTES --- http://www.geobytes.com/IpLocator.htm When I enter my new /16 at this site it translates to Canada and it shouldn't. ARIN reports the address properly on the ARIN lookup. I have sent emails to the Geobytes website two weeks ago, they confirmed to me they have the email, but have done nothing to date to fix the problem. So my customers are getting a little upset because when they go to a website they are directed to the .ca portion. Ted
Re: Looking for information about LD regulation
You might want to try asking on the isp-clec list. mailto:[EMAIL PROTECTED] - Original Message - From: "Dan Lockwood" <[EMAIL PROTECTED]> To: Sent: Friday, May 27, 2005 12:43 PM Subject: Looking for information about LD regulation Apologies if this is too off topic. We (a group of state govt organizations) are working together in a VoIP rollout. Our plan is to use our collective buying power to purchase long distance calls at wholesales rates. One organization in our group is going to be the lead agency and charge back the other participants.There is concern as to the legality of this venture. Can anyone suggest some legal resources where I might educate myself on the issue of "who can 'sell' long distance"? What are the rules that might apply in our situation? Thanks Dan
Re: "Bernie Ebbers Guilty"
The Evening Bridge - March 15, 2005 TOP STORY: Today marked a big day in the government's moves to expel company executives who have allegedly conducted financial fraud. The first under the spotlight are former WorldCom CEO Bernard Ebbers and former Qwest CEO Joseph Nacchio, along with 10 other Qwest executives. Ebbers was found guilty in a federal court in New York on all counts for his role in WorldCom's demise. Meanwhile, the Securities and Exchange Commission sued Nacchio and 10 other former executives, accusing them of perpetrating a massive financial fraud on investors. The SEC also simultaneously settled with four of the former Qwest executives named in the lawsuits, which were filed in Denver federal court. - Original Message - From: "Paul Vixie" <[EMAIL PROTECTED]> To: Sent: Tuesday, March 15, 2005 11:46 AM Subject: "Bernie Ebbers Guilty" > > NEW YORK - Bernard Ebbers, the former chief executive of WorldCom and > perhaps the most powerful American businessman ever to face a criminal > trial, was found guilty today of securities fraud, conspiracy and filing > false documents with regulators. > > ... > > http://www.forbes.com/home/management/2005/03/15/cx_da_0315ebbersguilty.html >
Re: vonage routing issues
- Original Message - From: "John Neiberger" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Cc: <[EMAIL PROTECTED]> Sent: Friday, March 04, 2005 10:30 AM Subject: Re: vonage routing issues > > >>> Jon Lewis <[EMAIL PROTECTED]> 3/4/05 1:17:11 PM >>> > > > >Anyone else having reachability issues with Vonage? The past two > days, > >about this time (~2pm), we've been unable to reach www.vonage.com and > >customers with vonage phones have lost their service. > > > >My traces to them end with: > > > >13. 64.200.88.173 0%8832 31 > 33 42 > >14. nycmny2wcx2-pos1-0-oc192.wcg.net 0%8837 37 > 70176 > >15. ??? > > Interesting. I can't get to them, either. A trace from my site to > theirs (via Sprint) ends here: > > border23.ge2-0-bbnet1.nyc.pnap.net (209.191.128.92) [AS 10910] > > John Fwiw, my trace ends at border23.ge2-0-bbnet1.nyc.pnap.net [209.191.128.92] as well, but I -can- browse to the site with IE. --Michael
Re: Measure overall network availability
- Original Message - From: "Joe Shen" <[EMAIL PROTECTED]> > Hi, > > is there any recommended method to measure overall > network availability? For those who might want to use it for whatever...(buck a week): http://www.dslreports.com/schedule
Fw: [pignet]
- Original Message - From: <[EMAIL PROTECTED]> To: "Pacific Internet Users Group Mailing List" <[EMAIL PROTECTED]> Sent: Thursday, December 02, 2004 2:47 PM Subject: [pignet] The Politics are starting > I found this in the Washington Post - Interesting? > By Shaun Waterman > UNITED PRESS INTERNATIONAL > Published December 2, 2004 > > Former CIA Director George J. Tenet yesterday called for new security > measures to guard against attacks on the United States that use the > Internet, which he called "a potential Achilles' heel." > "I know that these actions will be controversial in this age when we still > think the Internet is a free and open society with no control or > accountability," he told an information-technology security conference in > Washington, "but ultimately the Wild West must give way to governance and > control." > The former CIA director said telecommunications -- and specifically the > Internet -- are a back door through which terrorists and other enemies of > the United States could attack the country, even though great strides have > been made in securing the physical infrastructure. > The Internet "represents a potential Achilles' heel for our financial > stability and physical security if the networks we are creating are not > protected," Mr. Tenet said. > He said known adversaries, including "intelligence services, military > organizations and non-state actors," are researching information attacks > against the United States. > Within the federal government, the Department of Homeland Security has the > lead role in protecting the Internet from terrorism. But the department's > head of cyber-security recently quit amid reports that he had clashed with > his superiors. > Mr. Tenet, who retired in July as director of the CIA after seven years, > warned that al Qaeda remains a sophisticated group, even though its > first-tier leadership largely has been destroyed. > It is "undoubtedly mapping vulnerabilities and weaknesses in our > telecommunications networks," he said. > Mr. Tenet pointed out that the modernization of key industries in the > United States is making them more vulnerable by connecting them with an > Internet that is open to attack. > The way the Internet was built might be part of the problem, he said. Its > open architecture allows Web surfing, but that openness makes the system > vulnerable, Mr. Tenet said. > Access to networks like the World Wide Web might need to be limited to > those who can show they take security seriously, he said. > Mr. Tenet called for industry to lead the way by "establishing and > enforcing" security standards. Products need to be delivered to government > and private-sector customers "with a new level of security and risk > management already built in." > The national press, including United Press International (UPI), were > excluded from yesterday's event, at Mr. Tenet's request, organizers said. > > > > > Copyright © 2004 News World Communications, Inc. All rights reserved. > Reagrds = Andrew > > *=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=* > To unsubscribe send a blank email to : > [EMAIL PROTECTED] > *=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=* > To be on this list you must be an ISOC member: > Register at www.isoc.org it is free. > Select the Pacific Islands Chapter. >
Re: Campus size Wireless LAN
- Original Message - From: "Eric Brown" > Sent: Wednesday, July 21, 2004 8:01 AM Subject: Campus size Wireless LAN > Anyone have experience with Proxim's tsunami quickbridge for wireless > connectivity between buildings at line of site distances under 1 mile? > It's cheaper than Cisco and looks good on paper. Looking for the good > bad and ugly. Thanks in advance! > > -Eric You also might want to ask the folks on : http://isp-lists.isp-planet.com/isp-wireless/ http://wisp-equipment.net http://archives.part-15.org http://www.wispa.org/ who seem to use every vendor known to man. --Michael
Re: Spyware becomes increasingly malicious
- Original Message - From: "Michel Py" <[EMAIL PROTECTED]> To: "Sean Donelan" <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]> Sent: Sunday, July 11, 2004 5:24 PM Subject: RE: Spyware becomes increasingly malicious > Indeed. Lately, I have not been able to clean a very annoying piece of > crud named "CoolWebSearch". Spybot will not always detect and never > remove; Ad-aware will likely detect but not remove either. None of the > other crapware removers I have tried could clean the machine either. You're right...it can be a sob to remove. CWShredder has worked well for me. http://www.spywareinfo.com/~merijn/cwschronicles.html --Michael
Re: Attn MCI/UUNet - Massive abuse from your network
- Original Message - From: "Dr. Jeffrey Race" <[EMAIL PROTECTED]> To: "Smith, Donald" <[EMAIL PROTECTED]> Cc: <[EMAIL PROTECTED]> Sent: Thursday, June 24, 2004 6:22 PM Subject: RE: Attn MCI/UUNet - Massive abuse from your network > > On Thu, 24 Jun 2004 21:39:26 -0600, Smith, Donald wrote: > > >I am not a lawyer. I am not aware of the law that requires uunet to > >go to court to prevent spammers who are not their direct customers from using > their network. > > > Doctrine of attractive nuisance When I worked for IBM back in the '60s, on many occasions during my 7 years there I heard upper management say that they were proud to be with a company that tried to be a "Good Corporate Citizen ". One branch manager had a cube on his desk which had printed on each side the(ir) manifesto of Corporate Social Responsibility. >From the AOL theft article: "The revelations come as AOL and other Internet providers have ramped up their efforts to track down the purveyors of spam, which has grown into a maddening scourge that costs consumers and businesses billions of dollars a year." Perhaps those Corporate Citizens who can do something to ensure the viability of E-mail, should. --Michael
Re: [Fwd: [IP] Feds: VoIP a potential haven for terrorists]
- Original Message - From: "Scott Weeks" <[EMAIL PROTECTED]> > Anyone know yet if they've they said who would have to pay for it, and > what they specifically mean by "broadband Internet providers"? > > scott > > A coupla' years ago, the FCC defined "Broadband" as 200Kbps and above. --Michael
Re: Points on your Internet driver's license (was RE: Even you can be hacked)
- Original Message - From: "Randy Bush" <[EMAIL PROTECTED]> To: "Jonathan Nichols" <[EMAIL PROTECTED]> Cc: <[EMAIL PROTECTED]> Sent: Friday, June 11, 2004 3:32 PM Subject: Re: Points on your Internet driver's license (was RE: Even you can be hacked) > > > http://lawandhelp.com/q298-2.htm > > while i am no fan of macdonalds, and a good case is made for > their negligence, perhaps you should follow the advice at the > bottom of that web page > > The most important message this case has for you, the > consumer, is to be aware of the potential danger posed > by your early morning pick-me-up. > > randy > Yep...and after 65 years (assuming she started drinking coffee at 16), "reasonable expectation" of the temperature comes to mind. I don't go to these kinds of places...has the temperature been climbing up in order to let you have a drinkable cup after (whatever you do) an hour? --Michael
Re: [Fwd: [IP] New flaw takes Wi-Fi off the air]
- Original Message - From: "Bill Owens" <[EMAIL PROTECTED]> > I can think of one application - the next time I'm presenting at a conference where > everyone has their heads buried in their laptops, I know what I'll be running on my machine at the podium ;) > > Bill. Wayback before laptops, an old hand at IBM stopped in the middle of his presentation and said, "If you guys get done listening before I get done talking, please let me know so I can leave." --Michael
Re: Microsoft XP SP2 (was Re: Lazy network operators - NOT)
First time user of the "net" in '87 when CompuServe announced it to its denizens. Thank [deity] for Micro$oft or we'd have to get a real job. - Original Message - From: "Henry Yen" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Sunday, April 18, 2004 8:14 PM Subject: Re: Microsoft XP SP2 (was Re: Lazy network operators - NOT) > > On Mon, Apr 19, 2004 at 08:50:34AM +0300, Petri Helenius wrote: > > > Let's face it -- this shouldn't have to be the ISP's problem. > > > Microsoft needs to quit rushing out new OS releases without properly > > > straining them and stress testing to find as many holes as they can. > > > They need to start cracking down on themselves and really start > > > worrying about securing their OS and patching it as much as possible > > > before throwing it to market. > > > > It´s very challenging to say that the world´s most profitable company > > should do anything significantly different. > > s/most profitable company/convicted (and continuing) OS\&browser monopolist/ > > Still feel the same? > > > Putting out releases and > > letting marketing to address security concerns brings in billions. Not > > putting out release will make less money. > > Forcing OEM pre-loads is where they get most of their money. Maybe > if they spent less on money-losing ventures like X-Box and WebTV, > and maybe if they spent their R&D $Billions more wisely, and further > if they spent less time and money knifing others' babies and put > more genuine effort into it... > > > This is not that they would not be "trying their best". There is just a > > very justifiable business decision between what we would like the best > > to be and what it needs to be to keep their money machine running. > > Well, if they would just admit as such ("Keep the Money Machine Running!"), > instead of offering endless platitudes and excuses (and FUD) and > press releases about how much $money they are donating (yeah, right) > to libraries and schools and ... > > -- > Henry Yen Aegis Information Systems, Inc. > Senior Systems Programmer Hicksville, New York >
Re: Warning - new trend of attempts to infect ISP users (possibly virus)
If it ain't one thing, it's... http://www.vnunet.com/News/1153081
Re: Lawsuit on ICANN (was: Re: A few words on VeriSign's sitefinder)
http://techupdate.zdnet.com/special_report/Stratton_Sclavos.html
Re: Impending (mydoom) DOS attack
- Original Message - From: <[EMAIL PROTECTED]> Sent: Saturday, January 31, 2004 3:10 PM Subject: Re: Impending (mydoom) DOS attack >Anybody got recommendations on warm places that have good bandwidth to >the beach? :) http://pacific.bizjournals.com/pacific/stories/2002/05/27/daily35.html It will mean instant high-speed Web access in rooms, poolside, or oceanside. "(We) will be able to offer laptop computers with Internet access and virtual office guest rooms," Hyatt Regency Maui GM Barry Lewin said. http://www.mauiembassy.com/amenities.html http://www.mauiskyfiber.com/pricing.html
Re: Kinda' funny...
- Original Message - From: "Aaron Thomas" <[EMAIL PROTECTED]> To: "'Michael Painter'" <[EMAIL PROTECTED]> Sent: Thursday, January 29, 2004 11:13 PM Subject: RE: Kinda' funny... > Sorry, > > I don't see the funny in 1200 people losing their homes. > > Is there something else to the story that I am missing? > > Aaron Your correct...poor choice for the Subject line and I apologize for that. I didn't mean it to refer to poor Niue at all, just the Register's take on the cc domains. --Michael > > -Original Message- > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of > Michael Painter > Sent: January 30, 2004 1:03 AM > To: [EMAIL PROTECTED] > Subject: Kinda' funny... > > > http://www.theregister.co.uk/content/6/34919.html > > >
Kinda' funny...
http://www.theregister.co.uk/content/6/34919.html
Re: cooling systems
- Original Message - From: "Chris Lewis" <[EMAIL PROTECTED]> Sent: Thursday, November 06, 2003 8:43 AM Subject: Re: cooling systems > Peter Galbavy wrote: > > > You "foreigners" are scary. As a UK resident, born in Oz many many years > > ago, I consider -10C to be very very cold. > > You know it's cold when you have to deal with diesel fuel in chunk form > by shovel. (Well, actually, with a fork. It solidifies into a rather > waxy/oozy gunk. In a previous life, I worked in a refinery lab, testing > for fuel freezing points down to -100F/-80F amongst other fun things.). A friend of mine was on a crew that was setting up a drilling rig in the mountains of Wyoming. In an effort to get -any- kind of heat, they opened the valve on the propane tank and it blubed a couple of times into a steel bucket. They all stood around throwing matches at it but it wouldn't lite. They finally gave up and went back to the truck to get warm. The whiskey which was on the dashboard was frozen solid.
Re: Need FSO link in Santa Clara & Sunnyvale
Brennan I don't know anything about them, but these folks seem to be doing some interesting things: http://www.loeacom.com/About/ http://www.infoworld.com/article/03/10/17/HNloea_1.html --Michael - Original Message - From: <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Monday, November 03, 2003 10:49 AM Subject: OT: Need FSO link in Santa Clara & Sunnyvale > > What are the top vendors these days for wireless FSO links? > I need at least 100Mb link over a distance of about 1-2 miles. > Seems like last time I looked at this though, the speeds > were up to a Gig at pretty low cost. Any insights? > > Would also accept emails from sales persons if they > can briefly (1paragraph) summarize what they've got and > at what price. I'll contact the top 3 or 5 offers directly. > > Thanks, > BM >
Re: Is there anything that actually gets users to fix their computers?
http://www.wired.com/news/digiwood/0,1412,60613,00.html "When students first register on the network, they are required to read about peer-to-peer networks and certify that they will not share copyright files. Icarus then scans their computer, detects any worms, viruses or programs that act as a server, such as Kazaa. Students are then given instructions on how to disable offending programs." Kinda' does some of what you want done? - Original Message - From: "Sean Donelan" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Thursday, October 02, 2003 10:12 PM Subject: Is there anything that actually gets users to fix their computers? > > Short of turning off their network access, why won't users fix > their computers when the computer is infected or needs a patch? > > > The University of Massachusetts posted bulletins, sent an email to > all incoming students, included an alert when they connected. > Nevertheless, almost three months after Microsoft released the > critical patch and almost two months after the first Blaster worm > was released over 1,600 students failed to patched their computers. > > Eventually, the University started shutting off network access for the > students and charging $3 for the CD with the patch and $25/hour for > support to clean the student's computers. > > http://www.dailycollegian.com/vnews/display.v/ART/2003/10/03/3f7cfeb12c8c2 > "Some students told the staff that they thought the University gave > their systems a virus. "By no means was this a UMass internet problem," > said Fairey. "People were probably infected before they got to campus." > One student threatened to sue OIT, arguing that the offices did not > have the right to turn off her port. "We have policies that clearly > state our right to shut off systems," mentioned Fairey. "It's not > something that we want to do. It's a nightmare." >
Re: East Coast outage?
http://www.hydro.mb.ca/our_facilities/ts_nelson.shtml - Original Message - From: "Chris Adams" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Friday, August 15, 2003 10:48 PM Subject: Re: East Coast outage? > > Once upon a time, Iljitsch van Beijnum <[EMAIL PROTECTED]> said: > > Maybe a stupid question... > > > > But what if the huge distribution systems used DC and the whole thing > > was only converted to AC close to the users in small installations? > > This would get rid of the frequency problems. > > Basic physics. To run DC at the power levels required, the "wire" would > have to be over 100 feet in diameter IIRC. Look up the Edison vs. Tesla > power arguments for all kinds of information on AC vs. DC. > > This is one of the problems that makes the room-temperature > superconductor a "holy grail" research area. > > -- > Chris Adams <[EMAIL PROTECTED]> > Systems and Network Administrator - HiWAAY Internet Services > I don't speak for anybody but myself - that's enough trouble. >
Re: RPC errors
Forwarded from isp-tech: Those of you having the issues of restarts, do the following: Go to Control Panel, then Administrative Tools, then Services. Under Services find the Remote Procedure Call option, and right click then go to Properties. Under Properties, go to the Recovery Tab, and you'll see the "At first failure..." "At Second Failure..." issue. Change those to "Take No Action" or "Restart The Service" instead of the the default "Reboot the Computer" option, and you should be able to stay on for the patch. -- Jon Catron RNet Inc. - Technical Support Systems Administrator http://www.rnetinc.net/ (765) 342-3554 (888) 349-3080 --
Re: The impending DDoS storm
http://www.dslreports.com/forum/remark,7652257~root=security,1~mode=flat;start=0 - Original Message - From: "Josh Fleishman" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Thursday, August 14, 2003 5:24 AM Subject: RE: The impending DDoS storm > > > > Has anyone determined a method for triggering the DOS attack manually? > We've attempted this by changing an infected machine's clock, however it > did not work on our test box. If anyone has triggered the attack, do > you have a copy of the sniffed data stream? > > It sounds like uRPF is going to be of very little benefit to blocking > the attack if the spoofed addresses come from the infected host's > subnet/parent subnet. > > -Josh > > -Original Message- > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of > Mark Vallar > Sent: Wednesday, August 13, 2003 7:18 PM > To: [EMAIL PROTECTED] > Subject: Re: The impending DDoS storm > > > > > Jack Bates Wrote: > > > I have no affiliation with Microsoft, nor do I care about their > > services or products. What I do care about is a worm that sends out > > packets uncontrolled. If there is the possibility that this "planned" > > DOS will cause issues with my topology, then I will do whatever it > > takes to stop it. The fact that user's can't reach windowsupdate.com > > is irrelevant. > > > > There will most likely be issues with a lot of networks. > > I had a glimpse of what is to come on the 16th on Tuesday. We have a > firewall customer that had an infected machine behind the firewall and > the RTC clock was set incorrectly to 8/16. The firewall was *logging* > ~50 attempts per second trying to connect on port 80 to > windowsupdate.com. Since the worm was sending from a spoofed source > address the firewall was denying the packets. This customers network is > a /24 out of traditional Class B space and I was seeing random source > addresses from almost every IP out of the /16. > > This is not a forensic analysis, just what I observed in the firewall > logs. > > Is it a coincidence that 8/16 is a SaturdayI think not. A lot less > personal on-site to deal with possible issues. > > -Mark Vallar > > > >
Re: Cisco IOS Vulnerability
Foundstone Security Briefings: Cisco IPv4 Remote Denial of Service Vulnerability Date: Today, Thursday, July 17, 2003 Time: 5:30 PM Eastern, 2:30 PM Pacific Date: Tomorrow, Friday, July 18, 2003 Time: 11:00 AM Eastern, 8:00 AM Pacific You're invited to a Special Web Seminar today covering this critical vulnerability. If you cannot attend today's briefing please see instructions below to register for a follow up Web Seminar tomorrow. Cisco today announced a serious vulnerability for all Cisco devices that implement and are configured to process Internet Protocol version 4 (IPv4) packets. Foundstone Labs, first to respond to this serious risk, is offering this Security Briefing as part of a coordinated effort designed to protect current customers and other organizations. This vulnerability should be considered extremely critical due to the impact and ease-of-exploitation. Devices are vulnerable to a Denial of Service (DoS) attack and although no known exploit has been yet identified, a complex purposely malicious sequence of IPv4 packets targeted to a vulnerable Cisco switch or router can cause the processing interface to stop processing traffic. This vulnerability can be executed by remote unauthenticated users with mere knowledge of at least one interface IP address. Web Seminar Outline Introduction Overview of Cisco IOS Issues Analysis of the Cisco IOS Vulnerability Understanding the Impact Protection Mechanisms Questions and Answers Presenters Matt Ploessel - Foundstone Labs Tony Change - VP Engineering Brian Kenyon - Director of Product Services TO ATTEND TODAY'S WEB SEMINAR 1. Click the following Meeting URL or enter it in your browser: http://www.placeware.com/cc/encounter/A?id=07172003&pw=798380 Or alternatively, use the following URL: http://www.placeware.com/cc/encounter 2. On the "Enter Meeting" page that appears, supply this information if requested: Your Name: (enter your name) Meeting ID: 07172003 Meeting Key: 798380 Conference Center Name: encounter and then click the ENTER button at the bottom of the page. 3. Access audio for the meeting based on the following: If inside the US or Canada dial 1-800-223-9488 If outside the US or Canada dial 1-785-832-1508 Conference ID: Foundstone TO REGISTER FOR TOMORROW'S WEB SEMINAR Click the following URL or enter it in your browser: http://www.globalknowledge.com/training/course.asp?pageid=10&courseid=8157&catid=248 ++ Foundstone® Inc., experts in strategic security, offers a unique combination of software, services, and education to help organizations continuously and measurably protect the most important assets from the most critical threats. Through a strategic approach to security, Foundstone identifies and implements the right balance of technology, people, and process to manage digital risk and leverage security investments more effectively. ++ If you wish to be excluded from future announcements, simply reply to this e-mail with the single word REMOVE in the SUBJECT LINE. © 2003 Foundstone, Inc.
Re: internet.com
From: "Rodney Joffe" <[EMAIL PROTECTED]> > IMHO nothing touches lft (V 2.1 now out) > http://www.mainnerve.com/lft/index.html Thanks to everyone for the suggestions...I'll try them all.
Re: internet.com
From: "E.B. Dreger" <[EMAIL PROTECTED]> > Most day-to-day apps don't really care about ping. Attempts to > connect to 80/TCP are successful. Ping and traceroute give me !X > communication prohibited by filter. > > ICMP echo and response are NOT critical Internet traffic. The > inability to send/receive is NOT an inherent indicator of network > health. > > > Eddy Ahh, thanks Eddy. When the only tool you have is a hammer... I haven't received anything from the isp-lists for a couple of days, and couldn't reach isp-planet.com's nameserver, so went looking with what I had. Time to get *nix loaded on this new laptop I suppose...what's your favorite traceroute prog.? --Michael
Re: internet.com
Tracing route to 63.236.73.147 over a maximum of 30 hops 131 ms47 ms32 ms adsl-linking.flex.com [10.20.124.1] 232 ms31 ms47 ms s5-9.hnllhi1-cr3.bbnplanet.net [4.25.157.41] 378 ms94 ms78 ms p3-0.lsanca2-cr3.bbnplanet.net [4.0.7.69] 478 ms94 ms78 ms p1-0.lsanca2-br1.bbnplanet.net [4.0.7.58] 593 ms78 ms79 ms p1-0.lsanca2-cr2.bbnplanet.net [4.25.112.1] 694 ms78 ms94 ms p0-0.lsanca2-br1.bbnplanet.net [4.25.112.2] 778 ms79 ms93 ms p1-0.lsanca2-cr2.bbnplanet.net [4.25.112.1] 893 ms78 ms79 ms p0-0.lsanca2-br1.bbnplanet.net [4.25.112.2] 994 ms78 ms78 ms p1-0.lsanca2-cr2.bbnplanet.net [4.25.112.1] [snip] 2878 ms93 ms94 ms p0-0.lsanca2-br1.bbnplanet.net [4.25.112.2] 2979 ms93 ms94 ms p1-0.lsanca2-cr2.bbnplanet.net [4.25.112.1] 3078 ms94 ms78 ms p0-0.lsanca2-br1.bbnplanet.net [4.25.112.2] - Original Message - From: "Joe" <[EMAIL PROTECTED]> To: "Michael Painter" <[EMAIL PROTECTED]> Sent: Monday, March 31, 2003 5:38 PM Subject: Re: internet.com > Don't know about Genuity, but from ATT no expires but an unusual response: > ping internet.com > PING internet.com (63.236.73.147) from 192.168.1.2 : 56(84) bytes of data. > >From 63.236.93.180 icmp_seq=1 Packet filtered > > --- internet.com ping statistics --- > 16 packets transmitted, 0 received, +1 errors, 100% loss, time 15005ms > > Traceroute dies too: > 6 tbr1-p013401.cb1ma.ip.att.net (12.122.11.193) 13.934 ms 14.451 ms > 13.535 > ms > 7 tbr2-p013701.n54ny.ip.att.net (12.122.10.22) 17.536 ms 18.327 ms > 19.759 m > s > 8 gar4-p390.n54ny.ip.att.net (12.123.3.6) 22.599 ms 17.816 ms 18.772 ms > 9 att-gw.ny.qwest.net (192.205.32.170) 18.239 ms 19.638 ms 18.117 ms > 10 jfk-core-02.inet.qwest.net (205.171.230.22) 18.086 ms 18.516 ms > 18.724 ms > 11 ewr-core-01.inet.qwest.net (205.171.8.245) 17.110 ms 18.815 ms 22.078 > ms > 12 ewr-cntr-01.inet.qwest.net (205.171.17.146) 21.773 ms 20.730 ms > 17.912 ms > 13 msfc-22.ewr.qwest.net (63.146.100.34) 19.377 ms 17.880 ms 20.138 ms > 14 63.236.93.180 (63.236.93.180) 24.246 ms !X * * > 15 * > > Odd > -Joe > > - Original Message - > From: "Michael Painter" <[EMAIL PROTECTED]> > To: <[EMAIL PROTECTED]> > Sent: Monday, March 31, 2003 10:21 PM > Subject: internet.com > > > > > > Anyone else having trouble with reaching internet.com via genuity? > > > > Pinging 63.236.73.147 with 32 bytes of data: > > > > Reply from 4.25.112.2: TTL expired in transit. > > Reply from 4.25.112.2: TTL expired in transit. > > Reply from 4.25.112.2: TTL expired in transit. > > Reply from 4.25.112.2: TTL expired in transit. > > > > Ping statistics for 63.236.73.147: > > Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), > > Approximate round trip times in milli-seconds: > > Minimum = 0ms, Maximum = 0ms, Average = 0ms > > >
internet.com
Anyone else having trouble with reaching internet.com via genuity? Pinging 63.236.73.147 with 32 bytes of data: Reply from 4.25.112.2: TTL expired in transit. Reply from 4.25.112.2: TTL expired in transit. Reply from 4.25.112.2: TTL expired in transit. Reply from 4.25.112.2: TTL expired in transit. Ping statistics for 63.236.73.147: Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 0ms, Maximum = 0ms, Average = 0ms
Re: Syn Flood
- Original Message - From: "Christopher Bird" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Tuesday, March 25, 2003 5:55 PM Subject: Syn Flood > I have a problem on a home PC of all things. Every once in a while it > bursts into life and syn floods an IP address on port 80. The IP > addresses it chooses are random and varied. The network counters ratchet > up alarmingly (as viewed in the connections window). I am running winXP > Pro on this box. You might want to let a prog. such as TCP View (free) run while you're idle. Beats trying to get netstat to capture it, imo. http://www.sysinternals.com/ntw2k/source/tcpview.shtml Also, close everything you can and look at what Processes are running. Some of these things are hard to spot...I was infected and the offender was named "Iexplorer.exe", while the real IE is named IEXPLORE.exe and the real Explorer is named Explorer.exe. Here's another free prog. which aids in tying a process to what's running it. http://www.xmlsp.com/pview/prcview.htm These "trojans" don't seem to be caught by some Anti-Virus programs...at least AVG didn't catch mine. I ended up searching google for Iexplorer.exe and found (5 pages deep a year ago) an obscure thread which had part of the solution for removal. I then searched the HD for any files created at the same time and found the rest of the (by then morphed) creature. Good luck. --Michael > I have zone alarm, an SMC Barricade firewall, and Norton anti virus. > > > > I don't seem to be able to catch the computer at it, I just have the > evidence after the event. I don't like the anti social behavior that > this is exhibiting and am wondering if the collective wisdom of this > group might have any ideas how to track the issue down. > > > > According to virus checkers, I am clean. > > > > Thanks in advance > > > > Chris Bird > >
Re: Homeland Security Alert System
- Original Message - From: "Sean Donelan" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Saturday, February 22, 2003 1:47 PM Subject: Re: Homeland Security Alert System > > I'm certain the government folks working to protect us 24x7 are doing > everything they can, but the fact of the matter is the public alert > systems in the US suck. Some just suck less. > > http://www.nj.com/news/gloucester/index.ssf?/base/news-0/104590500555170.xml > >"Butts said he often finds out about things like the change in the >national threat level on CNN hours before the Communications Center >receives a teletype about it." > > Butts is the Gloucester County Emergency Response Coordinator including > the county 9-1-1 communications center. > > > ISPs and other communication providers should be prepared to share > information directly and quickly with each other. If you wait to hear > from government officials to decide what sanitized information to share, > it will be hours later. If ever. Yesterday I was asked to install a DISH Network system for the Transportation Security Administration so their folks at the Airport can get "the news". --Michael
Re: DC power versus AC power
- Original Message - From: "Scott Granados" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]>; "nanog list" <[EMAIL PROTECTED]> Sent: Sunday, December 29, 2002 3:40 PM Subject: Re: DC power versus AC power > > Is 48V DC at the amps present normallyin switch rooms etc enough to cause > electricucian? I have seen bad things with wrenches dropped across > batteries even 12 volt car batteries although in this case it was a large > battery bank in a submarine but I was curious about the 48V sources in > switch rooms. I've laid across the buss-bars before...definitely an uneasy feeling, but never felt it unless I was sweaty. Capability of thousands of Amps, but it's the old "power transfer" deal...internal resistance of the source vs. internal resistance of the load (your body). --Michael > > > > - Original Message - > From: "David Lesher" <[EMAIL PROTECTED]> > To: "nanog list" <[EMAIL PROTECTED]> > Sent: Sunday, December 29, 2002 4:43 PM > Subject: Re: DC power versus AC power > > > > > > Unnamed Administration sources reported that Michael Painter said: > > > > > > > > > > > > > >But, as Stephen already eluded to... Compared with an AC plant > design, to > > > me, one of the biggest drawbacks of a DC plant is safety (I have had to > > > kick a fellow worker away from the rack before). << > > > > > > What was the worker doing? Is this 48 VDC? > > > > Bet so. > > > > And note, it's not just ISP's, of course. I heard that Sprint > > PCS ha[s,d] a Dallas tech in critical condition and a dead switch > > after a dropped wrench & resulting fire. > > > > In the words of Phil Esterhaus: > > > > Let's be careful out there > > > > > > > > > > > > -- > > A host is a host from coast to [EMAIL PROTECTED] > > & no one will talk to a host that's close[v].(301) 56-LINUX > > Unless the host (that isn't close).pob 1433 > > is busy, hung or dead20915-1433 > > >
Re: DC power versus AC power
- Original Message - From: "Kuhtz, Christian" <[EMAIL PROTECTED]> To: "Wayne Bogan" <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]> Sent: Sunday, December 29, 2002 9:37 AM Subject: RE: DC power versus AC power > >But, as Stephen already eluded to... Compared with an AC plant design, to me, one of the biggest drawbacks of a DC plant is safety (I have had to kick a fellow worker away from the rack before). << What was the worker doing? Is this 48 VDC? Thanks, --Michael
Re: Guam - Typhoon 180 MPH winds
- Original Message - From: "Sean Donelan" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Sunday, December 08, 2002 11:40 PM Subject: Guam - Typhoon 180 MPH winds > > > Guam was struck by Typhoon Pongona with sustanted winds of 150 mph, and > gusts of 184 mph. Electricity is out on the entire island. Most > telephone service is down, although some calls have been received. The > University of Guam, the the ccTLD manager for .GU, is offline. Backup > name service for .GU is being provided by NS.RIPE.NET, although I haven't > found working Internet service to the island. > Sounds nasty. Around a dozen years ago, just after -another- Typhoon had gone through, someone from the Guam Cable Co. had posted to rec.video.satellite.tvro that they needed a new 12 ft. reflector and recommendations for securing it during a Typhoon. I told him that since 12 ft. reflectors were relatively inexpensive, just buy two and bury the box with the second one. After the next wipeout, dig up the box and put up one that will last until the next time. He never replied... --Michael
Re: DirecPC Protocols
Scott, Just an f.y.i., Charlie Ergan (DishNetwork) said he couldn't see how the business plan could succeed and pulled out of StarBand. They are currently in Chap. 11. http://65.186.192.177/liarband/ch11.html --Michael - Original Message - From: "Scott Granados" <[EMAIL PROTECTED]> To: "Crist J. Clark" <[EMAIL PROTECTED]> Cc: <[EMAIL PROTECTED]> Sent: Thursday, November 14, 2002 1:15 PM Subject: Re: DirecPC Protocols > > Well there are some two way dish solutions for consumers now that don't > need a dial-uplink. I think dishnetwork has such a thing as does direct > tv. Doesn't help much but does help people in remote areas. >
Re: DirecPC Protocols
If you don't get an answer here, you might want to try the isp-satellites list. http://isp-lists.isp-planet.com/isp-satellites/ Also, there are a -few- knowledgable folks on alt.satellite.direcpc. Good luck...I'd be interested in hearing the description myself. --Michael - Original Message - From: "Crist J. Clark" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Thursday, November 14, 2002 12:53 PM Subject: DirecPC Protocols > > I've been looking for some technical descriptions on how DirecPC works > from a TCP/IP point of view. Does anyone out there have some > references? I have not been able to find anything too detailed, and > from what I have been told, they are not too forthcoming when > contacted directly. > [s]
Re: Attacker Data / Wall of Shame
- Original Message - From: "Daniel Senie" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Tuesday, November 05, 2002 1:51 PM Subject: Attacker Data / Wall of Shame > > We have had enough regular attacks on our web farm to put together tools > that catalogue the attacks, report them to a central database, and post > them to a website. The data is extracted hourly for the website to cut down > on server / database loading. > > You can find our display of this data at: > >http://www.shame.denialinfo.com/ These folks: http://www.mynetwatchman.com/ have processed 669635 records in the last 24 hours.
Re: OT: If you thought Y2K was bad, wait until cyber-security hits
I met del at a mini "Computer Expo" at Wailea, Maui in '96. He was dealing Blackjack in his booth for prizes (I won an external 14.4 modem) and giving away "beta test" dialup accounts. I thought that 'shaka.com' was cool, so after 6 months of free beta, I signed up and have been with them since. --Michael - Original Message - From: "Scott Weeks" <[EMAIL PROTECTED]> To: "Scott Francis" <[EMAIL PROTECTED]> Cc: "Rowland, Alan D" <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]> Sent: Monday, July 22, 2002 11:04 AM Subject: Re: OT: If you thought Y2K was bad, wait until cyber-security hits > > > > On Mon, 22 Jul 2002, Scott Francis wrote: > > : On Mon, Jul 22, 2002 at 10:00:44AM -0700, [EMAIL PROTECTED] said: > : > > : > (shooting self in foot...) > : > > : > Just eliminate tech support and proprietary software! "A list of our > : > settings is available at www.domain.com/settings. And don't call us with > : > tech problems. We don't do tech support." > : > > : > I know of at least one ISP out there already doing this. Not that they're > : > highly successful, but imagine not having to tell someone, "Yes, your > : > username and password are case sensitive and must be spelled exactly as > : > supplied. And it's .net, not .com" ever again. > : > : http://www.flex.com/ > : > : Unfortunately, it looks like they took down the hate mail page, which was > : hysterical. *sigh* They target clueful users only, and seem to be getting by > : just fine. http://www.flex.com/adsl/ has a bit more of the "intelligent users > : only" pitch. > > > > One of Hawaii's fun things... ;-) > > http://www.flex.com/net_status/fan_con.html > > scott > > > > > > "sorry sir but i find AOL easy to use, i didnt know that since AOL is a > helluva lot easier to use than freakin IE im considered computer > illteritate, just quit bashing AOL, not all of us are sado-masochists." > > > > *heh* no need to comment, but it surely is begging for it... :-) >
Re: Asian exchange points
Richard, If you don't have any luck elsewhere, a good source of info., especially for South Asia, could be: Stuart Browne <[EMAIL PROTECTED]> He usually monitors the list <[EMAIL PROTECTED]> --Michael - Original Message - From: "Richard A Steenbergen" <[EMAIL PROTECTED]> To: "Dave Curado" <[EMAIL PROTECTED]> Cc: <[EMAIL PROTECTED]> Sent: Saturday, May 11, 2002 7:06 AM Subject: Re: Asian exchange points > > On Sat, May 11, 2002 at 12:59:12PM -0400, Dave Curado wrote: > > Hi Richard, > > > > http://www.ep.net/naps_ap.html > > I was looking for more along the lines of opinions on which exchange > points are significant, without having to go through that entire list > looking for the english translations and trying to find traffic stats. > > -- > Richard A Steenbergen <[EMAIL PROTECTED]> http://www.e-gerbil.net/ras > PGP Key ID: 0x138EA177 (67 29 D7 BC E8 18 3E DA B2 46 B3 D8 14 36 FE B6) >
Re: ratios
>>All of that changed when C&W depeered from PSI. I lost a lot of money due to Mr. Jansen's fascism. Understand now?<< I apologize in advance, I'm a total newbie...so what did you have to do? --Michael - Original Message - From: "Dean S Moran" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Thursday, May 09, 2002 12:42 PM Subject: RE: ratios > > > Stephen J. Wilcox wrote: > >Your quality of life is affected by being turned down for peering how? > > Who said I was turned down for peering? When I buy a pipe from an internet > provider, I buy it under the assumption that I'm going to be able to see > the entire internet from it. I know that probably any given moment, that > some small part of the internet is going to be inaccesible due to outages > or routing loops, but I do not expect to lose a path to another provider > for days because my upstream decides to bully the competition. I depended > on, and had customers who depended on, being able to reach AS174, and for > years this "just worked" so there was no need to multihome. Short outages, > or even overnight outages never hurt us, so single-homing was the way to > go. All of that changed when C&W depeered from PSI. I lost a lot of money > due to Mr. Jansen's fascism. > > Understand now? > > Dean > > > >Steve > > > > > > _ > Free email with personality! Over 200 domains! > http://www.MyOwnEmail.com >
Re: Large ISPs doing NAT?
Roland, I have a static IP w/DirecPC and I haven't noticed any problems running ICS on Win2K. Have things changed? --Michael - Original Message - From: "Roland Dobbins" <[EMAIL PROTECTED]> To: "Peter Bierman" <[EMAIL PROTECTED]> Cc: <[EMAIL PROTECTED]>; "Beckmeyer" <[EMAIL PROTECTED]> Sent: Wednesday, May 01, 2002 1:26 PM Subject: Re: Large ISPs doing NAT? > > I think a lot of the GRPS stuff is heading towards IPv6 w/IPv4 > gatewaying. > > The NAT issue has certainly resulted in a quite a few disgruntled > satellite customers (I'm thinking here primarily of direcpc.com) who're > willing to put up with the large latencies, but get really irate when > their apps won't work via NAT, or who want to run RFC1918 space for a > LAN at home, then find out that lots of stuff can't stand being NATted > twice. > > -- > > Roland Dobbins <[EMAIL PROTECTED]> // 650.776.1024 voice > > "Central databases already exist. Privacy is already gone." > > -- Larry Ellison, CEO of Oracle Corporation > > On Wed, 2002-05-01 at 16:07, Peter Bierman wrote: > > > > At 3:03 PM -0700 5/1/02, Scott Francis wrote: > > >On Wed, May 01, 2002 at 02:55:02PM -0700, [EMAIL PROTECTED] said: > > >> > > >> I don't know if this is an annual argument yet, but the frog is in the > > >> pot, and the flame is on. Guess who's playing the part of the frog? > > >> Answer: ISPs who do this sort of thing. Value added security is a nice > > >> thing. Crippling Internet connections will turn the Internet into the > > >> phone company, where only the ISP gets to say what services are good and > > >> which ones are bad. While an ISP might view it appealing to be a baby > > >> bell, remember from whence we all come: the notion that the middle should > > >> not inhibit the endpoints from doing what they want. You find this to be > > >> a support headache? Offer a deal on Norton Internet Security or some > > >> such. Offer to do rules merges. Even offer a provisioning interface to > > >> some access-lists. Just make sure that when that next really fun game is > > >> delivered on a play station that speaka de IP your customers can play it, > > >> and that you haven't built a business model around them not being able to > > >> play it. > > > > > >As long as it is _clear_ from the get-go that customers behind NAT are > > >getting that service, and not publicly-routable IP space, I don't see the > > >problem. If they don't like it, they don't have to sign up to begin with - as > > >long as there is no doubt as to what kind of service they're getting, there > > >shouldn't be a problem (legally, at any rate). > > > > > > You've got to be kidding. Do you think it's clear to the average consumer > > buying a GPRS phone what NAT is, and why they might or might not want it? > > Do you think the use of NAT will be explained to these customers? Or > > clearly stated in 5pt text on page 17 of the service agreement? > > > > IMHO, as one of the people who will likely be using Cingular's GPRS network > > with a Danger HipTop, I _strongly_ hope they choose to use routable address > > space instead of NAT. I would hate for NAT to be an impediment to some cool > > new app no one has thought of yet because these gizmos aren't in widespread > > use yet. > > > > >This is not to say that if, as Eliot posits, the next Big Thing on the market > > >requires public IPs that your customer base won't all jump ship. That's a > > >risk that providers will have to weigh against the benefits of NAT. > > > > I'm more concerned that if the major metropolitan markets deploying GPRS > > all use NAT, then the Next Big Thing won't ever happen on GPRS devices. > > Customers won't jump ship if they have no where to jump to. That might > > sound attractive to the bean counters, but think of the customers you might > > never get in the first place. Also, I don't see how deploying NAT could be > > a cost savings over requesting real IP space. > > > > -pmb > > > > -- > > Ring around the Internet, | Peter Bierman <[EMAIL PROTECTED]> > > Packet with a bit not set | http://www.sfgoth.com/pmb/ > > SYN ACK SYN ACK, |"Nobody realizes that some people expend > > We all go down. -A. Stern | tremendous energy merely to be normal."-Al Camus > > > >