Re: 3rd party network monitoring

2008-03-05 Thread Michael Painter


- Original Message - 
From: "Darrell Hyde" 
Sent: Tuesday, March 04, 2008 7:02 AM

Subject: 3rd party network monitoring
[snip]


Can anybody recommend a vendor for this type of service? I suppose I
could always just get a bunch of VPS accounts here and there and run
smokeping, but I'd really like to avoid that.

- Darrell



Fwiw, http://www.dslreports.com/schedule has a 'Business' monitoring service 
(w/graphs) for a buck a week.

--Michael


Re: Sicily to Egypt undersea cable disruption

2008-02-01 Thread Michael Painter


RE: Sicily to Egypt undersea cable disruption
- Original Message - 
From: Rod Beck

Sent: Friday, February 01, 2008 12:42 PM
Subject: RE: Sicily to Egypt undersea cable disruption


Well, when you have all these cables running through narrow straits or converging to the same stretch of beach, it does 
not strike me as at all extraordinary.


An important factor is cooperation. Is there cooperation between the fiber optic guys and fishing associations to minimize 
hits?


I would wager there is close to zero.

~~
Here's at least one:

http://www.ofcc.com/procedures.htm



Re: FW: ISPs slowing P2P traffic...

2008-01-15 Thread Michael Painter


- Original Message - 
From: "Joe Greco" <[EMAIL PROTECTED]>


[snip]


As long as you fairly disclose to your end-users what limitations and
restrictions exist on your network, I don't see the problem.


You've set out a qualification that generally doesn't exist.  For example,
this discussion included someone from a WISP, Amplex, I believe, that
listed certain conditions of use on their web site, and yet it seems like
they're un{willing,able} (not assigning blame/fault/etc here) to deliver
that level of service, and using their inability as a way to justify
possibly rate shaping P2P traffic above and beyond what they indicate on
their own documents.

In some cases, we do have people burying T&C in lengthy T&C documents,
such as some of the 3G cellular providers who advertise "Unlimited
Internet(*)" data cards, but then have a slew of (*) items that are
restricted - but only if you dig into the fine print on Page 3 of the
T&C.  I'd much prefer that the advertising be honest and up front, and
that ISP's not be allowed to advertise "unlimited" service if they are
going to place limits, particularly significant limits, on the service.

... JG



Yep.

"In the US, Internet access is still generally sold as all-you-can-eat, with few restrictions on the types of services or 
applications that can be run across the network (except for wireless, of course), but things are different across the 
pond.  In the UK, ISP plus.net doesn't even offer "unlimited" packages, and they explain why on their web site.
'Most providers claiming to offer unlimited broadband will have a fair use policy to try and prevent people over-using 
their service," they write. "But if it's supposed to be unlimited, why should you use it fairly? The fair use policy stops 
you using your unlimited broadband in an unlimited fashion-so, by our reckoning, it's not unlimited. We don't believe in 
selling 'unlimited broadband' that's bound by a fair use policy. We'd rather be upfront with you and give you clear usage 
allowances, with FREE overnight usage.' "


The above (and there's much more) from:
http://arstechnica.com/articles/culture/Deep-packet-inspection-meets-net-neutrality.ars/

If I was a WISP, I'd be saving up for that DPI box.

--Michael








Another question on rfc1918

2007-11-23 Thread Michael Painter


The text below is from a 'security' list in reply to me questioning his statement, "Thus it is possible to route "private" 
address ranges."

I'd be interested in hearing comments from this group if it's on-topic.

Thanks,

--Michael


Michael,
Lets take an example:

Attacker --- ISP1---cloud---ISP2---Target.Router---Target.Host

If I can source route a packet to ISP2 this will forward the packet via
target.router to the target host. It does not matter that target.router
filters source route. Most ISP routers (and I have seen configs for over
1000 of them and only seen source route blocked on less then 10 of these!
[1]) do not filter source routing (ie no "no ip source-route" entry). As
a result, source routed packets float about the Internet.

Additionally, "most" ISPs do not have egress filters for private
addressing. They allow these packets as a source address on packets.

Many tools (even NC - Netcat) support a source route option. This allows
the attacker to select the path that is taken to the host and also the
return path. So setting the attack up the attacker will source route to
ISP2 which will be the last router outside the target's router. As this
is a default gateway for the target, all packets are sent from it to the
ISP unless egress filters are placed on Target.router.

Though the packets would normally "float" around the internet until
their TTL expires them, they have been source routed. As such, ISP2 will
have a "memory" of where to send them if it received the packet. Now
remember that all packets come out of target.router to ISP2. So all
packets make it to ISP2.

Due to source routing, packets sent to ISP2 follow the reverse of the
source route used to reach ISP2 and return to the attacker - even though
they are using a "non-routed" address.

Source route allows the packets to follow a set path. It does not
require the standard routing protocols and is thus dangerous. Source
routing is used in a number of multicast protocols (still) and many are
loath to disable it.

There are two primary types of source routing - Loose Source Routing and
Strict Source Routing. I would suggest a read of RFC 791. In strict
source routing, the sender specifies the exact route the packet must
take. Have a read of:
http://www.iss.net/security_center/advice/Underground/Hacking/Methods/Technical/Source_Routing/default.htm

Clear as mud?

Regards,

Quote:
"Source routing is an IP option which allows the originator of a packet
to specify what path that packet will take, and what path return packets
sent back to the originator will take. Source routing is useful when the
default route that a connection will take fails or is suboptimal for
some reason, or for network diagnostic purposes. For more information on
source routing, see RFC791."

[1] Disclaimer 1. I do not do much work with ISPs these days and they
may have cleaned up their act in the last 5 years - though I doubt it.



Re: History of the EPO (Emergency Power Off)

2007-07-25 Thread Michael Painter


From: "Sean Donelan" <[EMAIL PROTECTED]>
Subject: History of the EPO (Emergency Power Off)



The interesting thing about the EPO and data centers is it wasn't

orginally for life-safety, but came out of a recommendation by IBM
to the NFPA for property protection.<<

Fwiw, the EPO on  IBM's mainframes back in those days, had to be -pulled- and had a mechanical 'latch' that kept it from being 
pushed back in.  Took both hands to reset it.


--Michael



Re: San Francisco Power Outage

2007-07-25 Thread Michael Painter


From: "Justin M. Streiner" <[EMAIL PROTECTED]>
Sent: Tuesday, July 24, 2007 5:58 PM
Subject: Re: San Francisco Power Outage

Nothing quite like the sound of a whole machine 
room spinning down at the same time.  It gives you that lovely "oh shit" 
feeling in the pit of your stomach.<<


Yep.  
I plugged in my soldering iron and (coincidentally) the whole room at State of Calif., Franchise Tax, EPO'd.  
Everyone immediately started staring at me of course.


--Michael



Re: Network end users to pull down 2 gigabytes a day, continuously?

2007-01-12 Thread Michael Painter


- Original Message - 
From: Gian Constantine

Sent: Friday, January 12, 2007 5:24 AM
Subject: Re: Network end users to pull down 2 gigabytes a day, continuously?


Yes, the NCTC.
I have spoken with two of the vendors you mentioned. Neither have pass-through licensing rights. I still have to go directly to most 
of the content providers to get the proper licensing rights.
There are a few vendors out there who will help a company attain these rights, but the solution is not turnkey on licensing. To be 
clear, it is not turnkey for the major U.S. content providers.<<


Back in the 'day', these folks were great to work with, but I have no idea of how they 
would deal with "IPTV".
http://www.4com.com/Company-Profile.html

Btw, I thought VoD was one of the main drivers of IPTV, at the local level at 
least.

--Michael





Re: today's Wash Post Business section

2006-12-23 Thread Michael Painter


The first 
thing I do when I upgrade someone to IE7 is turn on the Menu Bar... and 
I've noticed that almost every other computer I've touched with IE7 has 
it turned back on...


Thomas


I stumbled on to the 'Alt' key toggling the Menu Bar (in case that helps).

--Michael


Re: BCP38 thread 93,871,738,435 (was Re: register.com down sev0?)

2006-10-26 Thread Michael Painter


- Original Message - 
From: "william(at)elan.net" <[EMAIL PROTECTED]>

To: "Don" <[EMAIL PROTECTED]>
Cc: 
Sent: Thursday, October 26, 2006 8:17 AM
Subject: Re: BCP38 thread 93,871,738,435 (was Re: register.com down sev0?)





On Thu, 26 Oct 2006, Don wrote:

Has anyone put together a centralized system where you can send in a list of 
attacking bots, let it automatically sort by allocation, and then let it 
notify the appropriate admin with a list of [potentially] compromised hosts?


mynetwatchman [1] comes to mind and so does dshield [2]

[1] http://www.mynetwatchman.com
[2] http://www.dshield.org

--
William Leibzon
Elan Networks
[EMAIL PROTECTED]



Anyone familiar with these folks?
http://www.simplicita.com/Simplicita_Research_Data_Partner_Program.html

--Michael


Re: [routing-wg]BGP Update Report

2006-09-09 Thread Michael Painter



From their webpage:

Service Advisory
On Aug. 17, 2006, the Boeing Company announced that a detailed business and market analysis of Connexion by Boeing is complete, and 
the company has decided to exit the high-speed broadband communications connectivity markets. Boeing will work with its customers to 
facilitate an orderly phase out of the Connexion by Boeing service. Passengers traveling on Internet-equipped flights will be able 
to use the service until it is phased out between now and the end of the year, depending on the airline.


- Original Message - 
From: "Joe Provo" <[EMAIL PROTECTED]>

To: "Hank Nussbacher" <[EMAIL PROTECTED]>
Cc: <[EMAIL PROTECTED]>; ; <[EMAIL PROTECTED]>
Sent: Friday, September 08, 2006 6:35 AM
Subject: Re: [routing-wg]BGP Update Report




On Fri, Sep 08, 2006 at 05:57:10PM +0300, Hank Nussbacher wrote:


On Fri, 8 Sep 2006, [EMAIL PROTECTED] wrote:

Strike me as curious, but this seems as if Connexion by Boeing is handing
off a /24 from ASN to ASN as a certain plane moves over certain geographic
areas.  Or is there some other explanation?


Detailed at nanog 31 (among other meetings):
http://www.nanog.org/mtg-0405/abarbanel.html

2005 detail from a blogger:
http://bayosphere.com/node/879

2006 detail from another blogger:
http://www.renesys.com/blog/2006/04/tracking_plane_flight_on_inter.shtml

--
RSUC / GweepNet / Spunk / FnB / Usenix / SAGE





Re: abuse.clue @ Sprint? (phish in barrel, pictures @ 11:00)

2006-04-03 Thread Michael Painter


- Original Message - 
From: "neal rauhauser" <[EMAIL PROTECTED]>

To: "NANGO" 
Sent: Monday, April 03, 2006 8:17 AM
Subject: abuse.clue @ Sprint? (phish in barrel, pictures @ 11:00)






  Got this forwarded to me by an associate - seems he tried the usual 
channels and is having no luck. I suppose there are professional 
phishermen out there but it sure would be nice to cut to the Chase on 
this one. Heh ... get it ... Chase?


http://castlecops.com/pirt



Re: Quarantine your infected users spreading malware

2006-02-21 Thread Michael Painter


- Original Message - 
From: <[EMAIL PROTECTED]>

Subject: Re: Quarantine your infected users spreading malware


Rather like a botnet except with the user's

consent and with a positive goal.<<

Isn't this pretty much like how they were compromised in the first place?  How do you differentiate this infection from the ones 
they've been preached to to avoid?


"Trust me...I won't come in your mouth."






Re: is this like a peering war somehow?

2006-01-20 Thread Michael Painter


From: "Doug Marschke" <[EMAIL PROTECTED]>
Subject: RE: is this like a peering war somehow?




If something like the slingbox catches on

www.slingmedia.com



From the sling community forum:


Hello before yall get to excited about verizon it looks like they are 
cancelling users who use too much bandwith.

" Unlimited NationalAccess/BroadbandAccess services cannot be used (1) for uploading, downloading or streaming of movies, music or 
games, (2) with server devices or with host computer applications, including, but not limited to, Web camera posts or broadcasts, 
automatic data feeds, Voice over IP (VoIP), automated machine-to-machine connections, or peer-to-peer (P2P) file sharing, or (3) as 
a substitute or backup for private lines or dedicated data connections. "





Re: Time for a real Internet highway (?)

2005-10-14 Thread Michael Painter


- Original Message - 
From: "Matt Ghali" <[EMAIL PROTECTED]>

To: "Michael Painter" <[EMAIL PROTECTED]>
Cc: "NANGO" 
Sent: Friday, October 14, 2005 1:29 PM
Subject: Re: Time for a real Internet highway (?)




On Fri, 14 Oct 2005, Michael Painter wrote:

 I'd be very interested in what folks here think of this:
 
http://news.com.com/Time+for+a+real+Internet+highway/2010-1028_3-5894664.html?tag=carsl

I think it's a news.com.com.com URL, and therefore most likely not
very worth opening, much less reading.

I'm very interested in why you didn't bother at least summarizing
the story as a general courtesy to folks here.

matto




Sorry...I didn't realize that was the protocol.


From the article:
"We already have our highway system and our electricity. Time has come for our broadband. It's a utility. We now need broadband to 
live, work, recreate and even make a profit. Whether in Palo Alto, Calif., or Cavalier, N.D., we need our broadband. Many local 
areas of America are attacking the need for broadband ubiquity, but perhaps it's time for a national program."


--Michael




Time for a real Internet highway (?)

2005-10-14 Thread Michael Painter


I'd be very interested in what folks here think of this:

http://news.com.com/Time+for+a+real+Internet+highway/2010-1028_3-5894664.html?tag=carsl

Thanks,

--Michael


Re: ISP's In Uproar Over Verizon-MCI Merger

2005-08-23 Thread Michael Painter



US is trailing other industrial countries in broadband penetration


I'm not sure that's the case, AFAIK the US holds its own.


Graph at the bottom of the article.

http://www.mbc-thebridge.com/viewbridge.cfm?instance_id=304




Re: KVM over IP suggestions?

2005-08-22 Thread Michael Painter


From: "Drew Weaver" <[EMAIL PROTECTED]>


Any suggestions would be helpful.<<


-Just- got this in an E-mail, fwiw.
http://www.nwc.com/showitem.jhtml?docid=1616f3





Re: fcc ruling on dsl providers' access to infrastructure

2005-08-08 Thread Michael Painter


From: "Joe McGuckin" <[EMAIL PROTECTED]>
Subject: Re: fcc ruling on dsl providers' access to infrastructure


On 8/7/05 7:20 PM, "Richard A Steenbergen" <[EMAIL PROTECTED]> wrote:


Maybe what we need is a certain class of
company who will be responsible for running and maintaining the public
data infrastructures. They could have lots of government regulations to
ensure that they are charging a "fair" price while still being guaranteed
a profit, and they could provide the last mile service for all those ISPs
out there who are the ones that can actually compete and innovate.



Yes, it's called structural separation.


Curious what others might think about this, assuming it's not snake-oil:

http://www.shorecliffcommunications.com/magazine/news.asp?news=4404

http://www.xgtechnology.com/plots.htm

Very low power and could be deployed right now in the unused adjacent-channel NTSC VHF spectrum.  VHF (and/or UHF) would seem to 
solve many of the problems with "wireless"


--Michael



Re: You're all over thinking this

2005-07-22 Thread Michael Painter


- Original Message - 
From: "Crist Clark" <[EMAIL PROTECTED]>

Subject: Re: You're all over thinking this




Sam Crooks wrote:

Didn't the US Navy buy Iridium?


Nope.

  http://www.iridium.com/corp/iri_corp-story.asp?storyid=2

 "In December 2000, a group of private investors led by Dan Colussy
  organized Iridium Satellite LLC which acquired the operating assets
  of the bankrupt Iridium LLC including the satellite constellation,
  the terrestrial network, Iridium real property and intellectual
  capital."


The scientists were all waiting to study the satellite constellation burning up on re-entry when it was picked up for less than a 
penny on the dollar and then were immediately awarded a multi-million contract from DoD.


http://www.heavens-above.com/iridiumdemise.asp

--Michael 



Re: DNS .US outage

2005-07-07 Thread Michael Painter


- Original Message - 
From: "Randy Bush" <[EMAIL PROTECTED]>

Sent: Wednesday, July 06, 2005 7:19 PM
Subject: RE: DNS .US outage



i believe even windoze has dig at the command line, though i don't
know in what directory it lies.

randy


In case other Win users aren't aware:

http://www.samspade.org/ssw/features.html

--Michael


Re: ATM

2005-06-30 Thread Michael Painter


- Original Message - 
From: "James Laszko" <[EMAIL PROTECTED]>

Sent: Wednesday, June 29, 2005 7:34 AM
Subject: RE: ATM




Most MPLS networks use a combination of point to point, frame and ATM
facilities as the infrastructure.  The phone companies use ATM just
about everywhere to deliver voice across their networks.  I don't see
ATM/FR equipment being EOL'd anytime in the near future.


http://www.networkworld.com/news/2005/062005-legacy-nets.html?rl&code=nlvpn2947


Re: ISP's Contact List

2005-06-13 Thread Michael Painter


http://www.geobytes.com/FAQ.htm#Technology
http://www.geobytes.com/FAQ.htm#DifferentFromWhoIs

- Original Message - 
From: "Sanfilippo, Ted" <[EMAIL PROTECTED]>

To: "Suresh Ramasubramanian" <[EMAIL PROTECTED]>
Cc: 
Sent: Monday, June 13, 2005 4:18 AM
Subject: RE: ISP's Contact List




Suresh,

Sorry I meant GEOBYTES --- http://www.geobytes.com/IpLocator.htm
When I enter my new /16 at this site it translates to Canada and it shouldn't. ARIN reports the address properly on the ARIN 
lookup. I have sent emails to the Geobytes website two weeks ago, they confirmed to me they have the email, but have done nothing 
to date to fix the problem. So my customers are getting a little upset because when they go to a website they are directed to the 
.ca portion.


Ted




Re: Looking for information about LD regulation

2005-05-27 Thread Michael Painter


You might want to try asking on the isp-clec list.

mailto:[EMAIL PROTECTED]

- Original Message - 
From: "Dan Lockwood" <[EMAIL PROTECTED]>

To: 
Sent: Friday, May 27, 2005 12:43 PM
Subject: Looking for information about LD regulation




Apologies if this is too off topic.  We (a group of state govt
organizations) are working together in a VoIP rollout.  Our plan is to
use our collective buying power to purchase long distance calls at
wholesales rates.  One organization in our group is going to be the lead
agency and charge back the other participants.There is concern as to
the legality of this venture.  Can anyone suggest some legal resources
where I might educate myself on the issue of "who can 'sell' long
distance"?  What are the rules that might apply in our situation?

Thanks
Dan



Re: "Bernie Ebbers Guilty"

2005-03-15 Thread Michael Painter

The Evening Bridge - March 15, 2005
TOP STORY: Today marked a big day in the government's moves to expel company 
executives who have allegedly conducted financial
fraud.
The first under the spotlight are former WorldCom CEO Bernard Ebbers and former 
Qwest CEO Joseph Nacchio, along with 10 other Qwest
executives.
Ebbers was found guilty in a federal court in New York on all counts for his 
role in WorldCom's demise. Meanwhile, the Securities
and Exchange Commission sued Nacchio and 10 other former executives, accusing 
them of perpetrating a massive financial fraud on
investors. The SEC also simultaneously settled with four of the former Qwest 
executives named in the lawsuits, which were filed in
Denver federal court.


- Original Message - 
From: "Paul Vixie" <[EMAIL PROTECTED]>
To: 
Sent: Tuesday, March 15, 2005 11:46 AM
Subject: "Bernie Ebbers Guilty"


>
> NEW YORK - Bernard Ebbers, the former chief executive of WorldCom and
> perhaps the most powerful American businessman ever to face a criminal
> trial, was found guilty today of securities fraud, conspiracy and filing
> false documents with regulators.
>
> ...
>
> http://www.forbes.com/home/management/2005/03/15/cx_da_0315ebbersguilty.html
>



Re: vonage routing issues

2005-03-04 Thread Michael Painter

- Original Message - 
From: "John Neiberger" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Cc: <[EMAIL PROTECTED]>
Sent: Friday, March 04, 2005 10:30 AM
Subject: Re: vonage routing issues


> 
> >>> Jon Lewis <[EMAIL PROTECTED]> 3/4/05 1:17:11 PM >>>
> >
> >Anyone else having reachability issues with Vonage?  The past two
> days,
> >about this time (~2pm), we've been unable to reach www.vonage.com and
> >customers with vonage phones have lost their service.
> >
> >My traces to them end with:
> >
> >13. 64.200.88.173  0%8832   31  
> 33 42
> >14. nycmny2wcx2-pos1-0-oc192.wcg.net   0%8837   37  
> 70176
> >15. ???
> 
> Interesting. I can't get to them, either. A trace from my site to
> theirs (via Sprint) ends here:
> 
> border23.ge2-0-bbnet1.nyc.pnap.net (209.191.128.92) [AS 10910] 
> 
> John

Fwiw, my trace ends at border23.ge2-0-bbnet1.nyc.pnap.net [209.191.128.92] as 
well, but I -can- browse to the site with IE.

--Michael


Re: Measure overall network availability

2005-01-07 Thread Michael Painter

- Original Message - 
From: "Joe Shen" <[EMAIL PROTECTED]>

> Hi,
> 
> is there any recommended method to measure overall
> network availability? 


For those who might want to use it for whatever...(buck a week):

http://www.dslreports.com/schedule




Fw: [pignet]

2004-12-02 Thread Michael Painter

- Original Message - 
From: <[EMAIL PROTECTED]>
To: "Pacific Internet Users Group Mailing List" <[EMAIL PROTECTED]>
Sent: Thursday, December 02, 2004 2:47 PM
Subject: [pignet] The Politics are starting


> I found this in the Washington Post - Interesting?
> By Shaun Waterman
> UNITED PRESS INTERNATIONAL
> Published December 2, 2004
>
> Former CIA Director George J. Tenet yesterday called for new security
> measures to guard against attacks on the United States that use the
> Internet, which he called "a potential Achilles' heel."
> "I know that these actions will be controversial in this age when we still
> think the Internet is a free and open society with no control or
> accountability," he told an information-technology security conference in
> Washington, "but ultimately the Wild West must give way to governance and
> control."
> The former CIA director said telecommunications -- and specifically the
> Internet -- are a back door through which terrorists and other enemies of
> the United States could attack the country, even though great strides have
> been made in securing the physical infrastructure.
> The Internet "represents a potential Achilles' heel for our financial
> stability and physical security if the networks we are creating are not
> protected," Mr. Tenet said.
> He said known adversaries, including "intelligence services, military
> organizations and non-state actors," are researching information attacks
> against the United States.
> Within the federal government, the Department of Homeland Security has the
> lead role in protecting the Internet from terrorism. But the department's
> head of cyber-security recently quit amid reports that he had clashed with
> his superiors.
> Mr. Tenet, who retired in July as director of the CIA after seven years,
> warned that al Qaeda remains a sophisticated group, even though its
> first-tier leadership largely has been destroyed.
> It is "undoubtedly mapping vulnerabilities and weaknesses in our
> telecommunications networks," he said.
> Mr. Tenet pointed out that the modernization of key industries in the
> United States is making them more vulnerable by connecting them with an
> Internet that is open to attack.
> The way the Internet was built might be part of the problem, he said. Its
> open architecture allows Web surfing, but that openness makes the system
> vulnerable, Mr. Tenet said.
> Access to networks like the World Wide Web might need to be limited to
> those who can show they take security seriously, he said.
> Mr. Tenet called for industry to lead the way by "establishing and
> enforcing" security standards. Products need to be delivered to government
> and private-sector customers "with a new level of security and risk
> management already built in."
> The national press, including United Press International (UPI), were
> excluded from yesterday's event, at Mr. Tenet's request, organizers said.
>
>
>
>
> Copyright © 2004 News World Communications, Inc. All rights reserved.
> Reagrds = Andrew
>
> *=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*
> To unsubscribe send a blank email to :
> [EMAIL PROTECTED]
> *=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*=*
> To be on this list you must be an ISOC member:
> Register at www.isoc.org it is free.
> Select the Pacific Islands Chapter.
>



Re: Campus size Wireless LAN

2004-07-21 Thread Michael Painter

- Original Message - 
From: "Eric Brown" >
Sent: Wednesday, July 21, 2004 8:01 AM
Subject: Campus size Wireless LAN


> Anyone have experience with Proxim's tsunami quickbridge for wireless
> connectivity between buildings at line of site distances under 1 mile?
> It's cheaper than Cisco and looks good on paper.  Looking for the good
> bad and ugly.  Thanks in advance!
> 
> -Eric 


You also might want to ask the folks on :

http://isp-lists.isp-planet.com/isp-wireless/

http://wisp-equipment.net

http://archives.part-15.org

http://www.wispa.org/

who seem to use every vendor known to man. 

--Michael



Re: Spyware becomes increasingly malicious

2004-07-11 Thread Michael Painter

- Original Message - 
From: "Michel Py" <[EMAIL PROTECTED]>
To: "Sean Donelan" <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>
Sent: Sunday, July 11, 2004 5:24 PM
Subject: RE: Spyware becomes increasingly malicious

> Indeed. Lately, I have not been able to clean a very annoying piece of
> crud named "CoolWebSearch". Spybot will not always detect and never
> remove; Ad-aware will likely detect but not remove either. None of the
> other crapware removers I have tried could clean the machine either.

You're right...it can be a sob to remove.  CWShredder has worked well for me.

http://www.spywareinfo.com/~merijn/cwschronicles.html

--Michael
 


Re: Attn MCI/UUNet - Massive abuse from your network

2004-06-25 Thread Michael Painter

- Original Message - 
From: "Dr. Jeffrey Race" <[EMAIL PROTECTED]>
To: "Smith, Donald" <[EMAIL PROTECTED]>
Cc: <[EMAIL PROTECTED]>
Sent: Thursday, June 24, 2004 6:22 PM
Subject: RE: Attn MCI/UUNet - Massive abuse from your network


>
> On Thu, 24 Jun 2004 21:39:26 -0600, Smith, Donald wrote:
>
> >I am not a lawyer. I am not aware of the law that requires uunet to
> >go to court to prevent spammers who are not their direct customers from using
> their network.
>
>
> Doctrine of attractive nuisance

When I worked for IBM back in the '60s, on many occasions during my 7 years there I 
heard
upper management say that they were proud to be with a company that tried to be a 
"Good Corporate Citizen ".
One branch manager had a cube on his desk which had printed on each side the(ir) 
manifesto of Corporate Social Responsibility.

>From the AOL theft article:
 "The revelations come as AOL and other Internet providers have ramped up their 
efforts to track down the purveyors of spam, which
has grown into a maddening scourge that costs consumers and businesses billions of 
dollars a year."

Perhaps those Corporate Citizens who can do something to ensure the viability of 
E-mail, should.

--Michael





Re: [Fwd: [IP] Feds: VoIP a potential haven for terrorists]

2004-06-19 Thread Michael Painter

- Original Message - 
From: "Scott Weeks" <[EMAIL PROTECTED]>
> Anyone know yet if they've they said who would have to pay for it, and
> what they specifically mean by "broadband Internet providers"?
> 
> scott
> 
> 

A coupla' years ago, the FCC defined "Broadband" as 200Kbps and above.

--Michael


Re: Points on your Internet driver's license (was RE: Even you can be hacked)

2004-06-12 Thread Michael Painter

- Original Message - 
From: "Randy Bush" <[EMAIL PROTECTED]>
To: "Jonathan Nichols" <[EMAIL PROTECTED]>
Cc: <[EMAIL PROTECTED]>
Sent: Friday, June 11, 2004 3:32 PM
Subject: Re: Points on your Internet driver's license (was RE: Even you can be hacked)


>
> > http://lawandhelp.com/q298-2.htm
>
> while i am no fan of macdonalds, and a good case is made for
> their negligence, perhaps you should follow the advice at the
> bottom of that web page
>
> The most important message this case has for you, the
> consumer, is to be aware of the potential danger posed
> by your early morning pick-me-up.
>
> randy
>

Yep...and after 65 years (assuming she started drinking coffee at 16), "reasonable 
expectation" of the temperature comes to mind.
I don't go to these kinds of places...has the temperature been climbing up in order to 
let you have a drinkable cup after (whatever
you do) an hour?

--Michael



Re: [Fwd: [IP] New flaw takes Wi-Fi off the air]

2004-05-14 Thread Michael Painter

- Original Message - 
From: "Bill Owens" <[EMAIL PROTECTED]>
> I can think of one application - the next time I'm presenting at a conference where 
> everyone has their heads buried in their
laptops, I know what I'll be running on my machine at the podium ;)
>
> Bill.


Wayback before laptops, an old hand at IBM stopped in the middle of his presentation 
and said, "If you guys get done listening
before I get done talking, please let me know so I can leave."

--Michael



Re: Microsoft XP SP2 (was Re: Lazy network operators - NOT)

2004-04-19 Thread Michael Painter

First time user of the "net" in '87 when CompuServe announced it to its denizens.
Thank [deity] for Micro$oft or we'd have to get a real job.


- Original Message - 
From: "Henry Yen" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Sunday, April 18, 2004 8:14 PM
Subject: Re: Microsoft XP SP2 (was Re: Lazy network operators - NOT)


>
> On Mon, Apr 19, 2004 at 08:50:34AM +0300, Petri Helenius wrote:
> > > Let's face it -- this shouldn't have to be the ISP's problem.
> > > Microsoft needs to quit rushing out new OS releases without properly
> > > straining them and stress testing to find as many holes as they can.
> > > They need to start cracking down on themselves and really start
> > > worrying about securing their OS and patching it as much as possible
> > > before throwing it to market.
> >
> > It´s very challenging to say that the world´s most profitable company
> > should do anything significantly different.
>
> s/most profitable company/convicted (and continuing) OS\&browser monopolist/
>
> Still feel the same?
>
> > Putting out releases and
> > letting marketing to address security concerns brings in billions. Not
> > putting out release will make less money.
>
> Forcing OEM pre-loads is where they get most of their money.  Maybe
> if they spent less on money-losing ventures like X-Box and WebTV,
> and maybe if they spent their R&D $Billions more wisely, and further
> if they spent less time and money knifing others' babies and put
> more genuine effort into it...
>
> > This is not that they would not be "trying their best". There is just a
> > very justifiable business decision between what we would like the best
> > to be and what it needs to be to keep their money machine running.
>
> Well, if they would just admit as such ("Keep the Money Machine Running!"),
> instead of offering endless platitudes and excuses (and FUD) and
> press releases about how much $money they are donating (yeah, right)
> to libraries and schools and ...
>
> -- 
> Henry Yen   Aegis Information Systems, Inc.
> Senior Systems Programmer   Hicksville, New York
>



Re: Warning - new trend of attempts to infect ISP users (possibly virus)

2004-03-03 Thread Michael Painter

If it ain't one thing, it's...

http://www.vnunet.com/News/1153081


Re: Lawsuit on ICANN (was: Re: A few words on VeriSign's sitefinder)

2004-02-27 Thread Michael Painter

http://techupdate.zdnet.com/special_report/Stratton_Sclavos.html


Re: Impending (mydoom) DOS attack

2004-01-31 Thread Michael Painter

- Original Message - 
From: <[EMAIL PROTECTED]>
Sent: Saturday, January 31, 2004 3:10 PM
Subject: Re: Impending (mydoom) DOS attack

>Anybody got recommendations on warm places that have good bandwidth to
>the beach? :)


http://pacific.bizjournals.com/pacific/stories/2002/05/27/daily35.html
It will mean instant high-speed Web access in rooms, poolside, or oceanside. "(We) 
will be able to offer laptop computers with
Internet access and virtual office guest rooms," Hyatt Regency Maui GM Barry Lewin 
said.

http://www.mauiembassy.com/amenities.html

http://www.mauiskyfiber.com/pricing.html





Re: Kinda' funny...

2004-01-30 Thread Michael Painter

- Original Message - 
From: "Aaron Thomas" <[EMAIL PROTECTED]>
To: "'Michael Painter'" <[EMAIL PROTECTED]>
Sent: Thursday, January 29, 2004 11:13 PM
Subject: RE: Kinda' funny...


> Sorry,
> 
> I don't see the funny in 1200 people losing their homes.
> 
> Is there something else to the story that I am missing?
> 
> Aaron
 

Your correct...poor choice for the Subject line and I apologize for that.  
I didn't mean it to refer to poor Niue at all, just the Register's take on the cc 
domains.  

--Michael





> 
> -Original Message-
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
> Michael Painter
> Sent: January 30, 2004 1:03 AM
> To: [EMAIL PROTECTED]
> Subject: Kinda' funny...
> 
> 
> http://www.theregister.co.uk/content/6/34919.html
> 
> 
> 


Kinda' funny...

2004-01-30 Thread Michael Painter

http://www.theregister.co.uk/content/6/34919.html


Re: cooling systems

2003-11-06 Thread Michael Painter

- Original Message - 
From: "Chris Lewis" <[EMAIL PROTECTED]>
Sent: Thursday, November 06, 2003 8:43 AM
Subject: Re: cooling systems


> Peter Galbavy wrote:
>
> > You "foreigners" are scary. As a UK resident, born in Oz many many years
> > ago, I consider -10C to be very very cold.
>
> You know it's cold when you have to deal with diesel fuel in chunk form
> by shovel.  (Well, actually, with a fork.  It solidifies into a rather
> waxy/oozy gunk.  In a previous life, I worked in a refinery lab, testing
> for fuel freezing points down to -100F/-80F amongst other fun things.).

A friend of mine was on a crew that was setting up a drilling rig in the mountains of 
Wyoming.  In an effort to get -any- kind of
heat, they opened the valve on the propane tank and it blubed a couple of times into a 
steel bucket.  They all stood around throwing
matches at it but it wouldn't lite.  They finally gave up and went back to the truck 
to get warm.  The whiskey which was on the
dashboard was frozen solid.



Re: Need FSO link in Santa Clara & Sunnyvale

2003-11-04 Thread Michael Painter

Brennan

I don't know anything about them, but these folks seem to be doing some interesting 
things:

http://www.loeacom.com/About/

http://www.infoworld.com/article/03/10/17/HNloea_1.html

--Michael


- Original Message - 
From: <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Monday, November 03, 2003 10:49 AM
Subject: OT: Need FSO link in Santa Clara & Sunnyvale


> 
> What are the top vendors these days for wireless FSO links?
> I need at least 100Mb link over a distance of about 1-2 miles.
> Seems like last time I looked at this though, the speeds
> were up to a Gig at pretty low cost. Any insights?
> 
> Would also accept emails from sales persons if they
> can briefly (1paragraph) summarize what they've got and
> at what price. I'll contact the top 3 or 5 offers directly. 
> 
> Thanks,
> BM
> 


Re: Is there anything that actually gets users to fix their computers?

2003-10-09 Thread Michael Painter

http://www.wired.com/news/digiwood/0,1412,60613,00.html

"When students first register on the network, they are required to read about 
peer-to-peer networks and certify that they will not
share copyright files. Icarus then scans their computer, detects any worms, viruses or 
programs that act as a server, such as Kazaa.
Students are then given instructions on how to disable offending programs."

Kinda' does some of what you want done? 


- Original Message - 
From: "Sean Donelan" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Thursday, October 02, 2003 10:12 PM
Subject: Is there anything that actually gets users to fix their computers?


>
> Short of turning off their network access, why won't users fix
> their computers when the computer is infected or needs a patch?
>
>
> The University of Massachusetts posted bulletins, sent an email to
> all incoming students, included an alert when they connected.
> Nevertheless, almost three months after Microsoft released the
> critical patch and almost two months after the first Blaster worm
> was released over 1,600 students failed to patched their computers.
>
> Eventually, the University started shutting off network access for the
> students and charging $3 for the CD with the patch and $25/hour for
> support to clean the student's computers.
>
> http://www.dailycollegian.com/vnews/display.v/ART/2003/10/03/3f7cfeb12c8c2
>   "Some students told the staff that they thought the University gave
>   their systems a virus. "By no means was this a UMass internet problem,"
>   said Fairey. "People were probably infected before they got to campus."
>   One student threatened to sue OIT, arguing that the offices did not
>   have the right to turn off her port. "We have policies that clearly
>   state our right to shut off systems," mentioned Fairey. "It's not
>   something that we want to do. It's a nightmare."
>



Re: East Coast outage?

2003-08-16 Thread Michael Painter

http://www.hydro.mb.ca/our_facilities/ts_nelson.shtml

- Original Message - 
From: "Chris Adams" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Friday, August 15, 2003 10:48 PM
Subject: Re: East Coast outage?


> 
> Once upon a time, Iljitsch van Beijnum <[EMAIL PROTECTED]> said:
> > Maybe a stupid question...
> > 
> > But what if the huge distribution systems used DC and the whole thing 
> > was only converted to AC close to the users in small installations? 
> > This would get rid of the frequency problems.
> 
> Basic physics.  To run DC at the power levels required, the "wire" would
> have to be over 100 feet in diameter IIRC.  Look up the Edison vs. Tesla
> power arguments for all kinds of information on AC vs. DC.
> 
> This is one of the problems that makes the room-temperature
> superconductor a "holy grail" research area.
> 
> -- 
> Chris Adams <[EMAIL PROTECTED]>
> Systems and Network Administrator - HiWAAY Internet Services
> I don't speak for anybody but myself - that's enough trouble.
> 


Re: RPC errors

2003-08-14 Thread Michael Painter

Forwarded from isp-tech:

Those of you having the issues of restarts, do the following:

Go to Control Panel, then Administrative Tools, then Services.  Under
Services find the Remote Procedure Call option, and right click then go to
Properties.
Under Properties, go to the Recovery Tab, and you'll see the "At first
failure..." "At Second Failure..." issue.  Change those to "Take No Action"
or "Restart The Service" instead of the the default "Reboot the Computer"
option, and you should be able to stay on for the patch.

--
Jon Catron
RNet Inc. - Technical Support
Systems Administrator
http://www.rnetinc.net/
(765) 342-3554
(888) 349-3080
--



Re: The impending DDoS storm

2003-08-14 Thread Michael Painter

http://www.dslreports.com/forum/remark,7652257~root=security,1~mode=flat;start=0

- Original Message - 
From: "Josh Fleishman" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Thursday, August 14, 2003 5:24 AM
Subject: RE: The impending DDoS storm


> 
> 
> 
> Has anyone determined a method for triggering the DOS attack manually?
> We've attempted this by changing an infected machine's clock, however it
> did not work on our test box.  If anyone has triggered the attack, do
> you have a copy of the sniffed data stream?  
> 
> It sounds like uRPF is going to be of very little benefit to blocking
> the attack if the spoofed addresses come from the infected host's
> subnet/parent subnet.
> 
> -Josh
> 
> -Original Message-
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
> Mark Vallar
> Sent: Wednesday, August 13, 2003 7:18 PM
> To: [EMAIL PROTECTED]
> Subject: Re: The impending DDoS storm
> 
> 
> 
> 
> Jack Bates Wrote:
> 
> > I have no affiliation with Microsoft, nor do I care about their
> > services or products. What I do care about is a worm that sends out 
> > packets uncontrolled. If there is the possibility that this "planned" 
> > DOS will cause issues with my topology, then I will do whatever it 
> > takes to stop it. The fact that user's can't reach windowsupdate.com 
> > is irrelevant.
> >
> 
> There will most likely be issues with a lot of networks.
> 
> I had a glimpse of what is to come on the 16th on Tuesday.  We have a
> firewall customer that had an infected machine behind the firewall and
> the RTC clock was set incorrectly to 8/16.  The firewall was *logging*
> ~50 attempts per second trying to connect on port 80 to
> windowsupdate.com. Since the worm was sending from a spoofed source
> address the firewall was denying the packets.  This customers network is
> a /24 out of traditional Class B space and I was seeing random source
> addresses from almost every IP out of the /16.
> 
> This is not a forensic analysis, just what I observed in the firewall
> logs.
> 
> Is it a coincidence that 8/16 is a SaturdayI think not.  A lot less
> personal on-site to deal with possible issues.
> 
> -Mark Vallar
> 
> 
> 
> 


Re: Cisco IOS Vulnerability

2003-07-17 Thread Michael Painter


Foundstone Security Briefings:
Cisco IPv4 Remote Denial of Service Vulnerability
Date: Today, Thursday, July 17, 2003
Time: 5:30 PM Eastern, 2:30 PM Pacific
Date: Tomorrow, Friday, July 18, 2003
Time: 11:00 AM Eastern, 8:00 AM Pacific
You're invited to a Special Web Seminar today covering this critical vulnerability. If 
you cannot attend today's briefing please see
instructions below to register for a follow up Web Seminar tomorrow.
Cisco today announced a serious vulnerability for all Cisco devices that implement and 
are configured to process Internet Protocol
version 4 (IPv4) packets. Foundstone Labs, first to respond to this serious risk, is 
offering this Security Briefing as part of a
coordinated effort designed to protect current customers and other organizations.
This vulnerability should be considered extremely critical due to the impact and 
ease-of-exploitation. Devices are vulnerable to a
Denial of Service (DoS) attack and although no known exploit has been yet identified, 
a complex purposely malicious sequence of IPv4
packets targeted to a vulnerable Cisco switch or router can cause the processing 
interface to stop processing traffic. This
vulnerability can be executed by remote unauthenticated users with mere knowledge of 
at least one interface IP address.
Web Seminar Outline
Introduction
Overview of Cisco IOS Issues
Analysis of the Cisco IOS Vulnerability
Understanding the Impact
Protection Mechanisms
Questions and Answers
Presenters
Matt Ploessel - Foundstone Labs
Tony Change - VP Engineering
Brian Kenyon - Director of Product Services
TO ATTEND TODAY'S WEB SEMINAR
1. Click the following Meeting URL or enter it in your browser:
http://www.placeware.com/cc/encounter/A?id=07172003&pw=798380
Or alternatively, use the following URL:
http://www.placeware.com/cc/encounter
2. On the "Enter Meeting" page that appears, supply this information if requested:
Your Name: (enter your name)
Meeting ID: 07172003
Meeting Key: 798380
Conference Center Name: encounter
and then click the ENTER button at the bottom of the page.
3. Access audio for the meeting based on the following:
If inside the US or Canada dial 1-800-223-9488
If outside the US or Canada dial 1-785-832-1508
Conference ID: Foundstone

TO REGISTER FOR TOMORROW'S WEB SEMINAR
Click the following URL or enter it in your browser:
http://www.globalknowledge.com/training/course.asp?pageid=10&courseid=8157&catid=248
++
Foundstone® Inc., experts in strategic security, offers a unique combination of 
software, services, and education to help
organizations continuously and measurably protect the most important assets from the 
most critical threats. Through a strategic
approach to security, Foundstone identifies and implements the right balance of 
technology, people, and process to manage digital
risk and leverage security investments more effectively.
++


If you wish to be excluded from future announcements, simply reply to this e-mail with 
the single word REMOVE in the SUBJECT LINE.
© 2003 Foundstone, Inc.



Re: internet.com

2003-04-01 Thread Michael Painter

From: "Rodney Joffe" <[EMAIL PROTECTED]>
 
> IMHO nothing touches lft (V 2.1 now out)
> http://www.mainnerve.com/lft/index.html
 
Thanks to everyone for the suggestions...I'll try them all.


Re: internet.com

2003-03-31 Thread Michael Painter

From: "E.B. Dreger" <[EMAIL PROTECTED]>
> Most day-to-day apps don't really care about ping.  Attempts to
> connect to 80/TCP are successful.  Ping and traceroute give me !X
> communication prohibited by filter.
>
> ICMP echo and response are NOT critical Internet traffic.  The
> inability to send/receive is NOT an inherent indicator of network
> health.
>
>
> Eddy

Ahh, thanks Eddy.
When the only tool you have is a hammer...

I haven't received anything from the isp-lists for a couple of days, and couldn't 
reach isp-planet.com's nameserver, so went looking
with what I had.

Time to get *nix loaded on this new laptop I suppose...what's your favorite traceroute 
prog.?

--Michael



Re: internet.com

2003-03-31 Thread Michael Painter

Tracing route to 63.236.73.147 over a maximum of 30 hops

  131 ms47 ms32 ms  adsl-linking.flex.com [10.20.124.1]
  232 ms31 ms47 ms  s5-9.hnllhi1-cr3.bbnplanet.net [4.25.157.41]
  378 ms94 ms78 ms  p3-0.lsanca2-cr3.bbnplanet.net [4.0.7.69]
  478 ms94 ms78 ms  p1-0.lsanca2-br1.bbnplanet.net [4.0.7.58]
  593 ms78 ms79 ms  p1-0.lsanca2-cr2.bbnplanet.net [4.25.112.1]
  694 ms78 ms94 ms  p0-0.lsanca2-br1.bbnplanet.net [4.25.112.2]
  778 ms79 ms93 ms  p1-0.lsanca2-cr2.bbnplanet.net [4.25.112.1]
  893 ms78 ms79 ms  p0-0.lsanca2-br1.bbnplanet.net [4.25.112.2]
  994 ms78 ms78 ms  p1-0.lsanca2-cr2.bbnplanet.net [4.25.112.1]
[snip]
  2878 ms93 ms94 ms  p0-0.lsanca2-br1.bbnplanet.net [4.25.112.2]
 2979 ms93 ms94 ms  p1-0.lsanca2-cr2.bbnplanet.net [4.25.112.1]
 3078 ms94 ms78 ms  p0-0.lsanca2-br1.bbnplanet.net [4.25.112.2]


- Original Message - 
From: "Joe" <[EMAIL PROTECTED]>
To: "Michael Painter" <[EMAIL PROTECTED]>
Sent: Monday, March 31, 2003 5:38 PM
Subject: Re: internet.com


> Don't know about Genuity, but from ATT no expires but an unusual response:
>  ping internet.com
> PING internet.com (63.236.73.147) from 192.168.1.2 : 56(84) bytes of data.
> >From 63.236.93.180 icmp_seq=1 Packet filtered
> 
> --- internet.com ping statistics ---
> 16 packets transmitted, 0 received, +1 errors, 100% loss, time 15005ms
> 
> Traceroute dies too:
> 6  tbr1-p013401.cb1ma.ip.att.net (12.122.11.193)  13.934 ms  14.451 ms
> 13.535
> ms
>  7  tbr2-p013701.n54ny.ip.att.net (12.122.10.22)  17.536 ms  18.327 ms
> 19.759 m
> s
>  8  gar4-p390.n54ny.ip.att.net (12.123.3.6)  22.599 ms  17.816 ms  18.772 ms
>  9  att-gw.ny.qwest.net (192.205.32.170)  18.239 ms  19.638 ms  18.117 ms
> 10  jfk-core-02.inet.qwest.net (205.171.230.22)  18.086 ms  18.516 ms
> 18.724 ms
> 11  ewr-core-01.inet.qwest.net (205.171.8.245)  17.110 ms  18.815 ms  22.078
> ms
> 12  ewr-cntr-01.inet.qwest.net (205.171.17.146)  21.773 ms  20.730 ms
> 17.912 ms
> 13  msfc-22.ewr.qwest.net (63.146.100.34)  19.377 ms  17.880 ms  20.138 ms
> 14  63.236.93.180 (63.236.93.180)  24.246 ms !X * *
> 15  *
> 
> Odd
> -Joe
> 
> - Original Message -
> From: "Michael Painter" <[EMAIL PROTECTED]>
> To: <[EMAIL PROTECTED]>
> Sent: Monday, March 31, 2003 10:21 PM
> Subject: internet.com
> 
> 
> >
> > Anyone else having trouble with reaching internet.com via genuity?
> >
> > Pinging 63.236.73.147 with 32 bytes of data:
> >
> > Reply from 4.25.112.2: TTL expired in transit.
> > Reply from 4.25.112.2: TTL expired in transit.
> > Reply from 4.25.112.2: TTL expired in transit.
> > Reply from 4.25.112.2: TTL expired in transit.
> >
> > Ping statistics for 63.236.73.147:
> > Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
> > Approximate round trip times in milli-seconds:
> > Minimum = 0ms, Maximum =  0ms, Average =  0ms
> >
> 


internet.com

2003-03-31 Thread Michael Painter

Anyone else having trouble with reaching internet.com via genuity?

Pinging 63.236.73.147 with 32 bytes of data:

Reply from 4.25.112.2: TTL expired in transit.
Reply from 4.25.112.2: TTL expired in transit.
Reply from 4.25.112.2: TTL expired in transit.
Reply from 4.25.112.2: TTL expired in transit.

Ping statistics for 63.236.73.147:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum =  0ms, Average =  0ms




Re: Syn Flood

2003-03-25 Thread Michael Painter

- Original Message -
From: "Christopher Bird" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Tuesday, March 25, 2003 5:55 PM
Subject: Syn Flood

> I have a problem on a home PC of all things. Every once in a while it
> bursts into life and syn floods an IP address on port 80. The IP
> addresses it chooses are random and varied. The network counters ratchet
> up alarmingly (as viewed in the connections window). I am running winXP
> Pro on this box.

You might want to let a prog. such as TCP View (free) run while you're idle.  Beats 
trying to get netstat to capture it, imo.

http://www.sysinternals.com/ntw2k/source/tcpview.shtml

Also, close everything you can and look at what Processes are running.  Some of these 
things are hard to spot...I was infected and
the offender was named "Iexplorer.exe", while the real IE is named IEXPLORE.exe and 
the real Explorer is named Explorer.exe.

Here's another free prog. which aids in tying a process to what's running it.

http://www.xmlsp.com/pview/prcview.htm

These "trojans" don't seem to be caught by some Anti-Virus programs...at least AVG 
didn't catch mine.  I ended up searching google
for Iexplorer.exe and found (5 pages deep a year ago) an obscure thread which had part 
of the solution for removal.  I then searched
the HD for any files created at the same time and found the rest of the (by then 
morphed) creature.

Good luck.

--Michael




> I have zone alarm, an SMC Barricade firewall, and Norton anti virus.
>
>
>
> I don't seem to be able to catch the computer at it, I just have the
> evidence after the event. I don't like the anti social behavior that
> this is exhibiting and am wondering if the collective wisdom of this
> group might have any ideas how to track the issue down.
>
>
>
> According to virus checkers, I am clean.
>
>
>
> Thanks in advance
>
>
>
> Chris Bird
>
>



Re: Homeland Security Alert System

2003-02-22 Thread Michael Painter

- Original Message -
From: "Sean Donelan" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Saturday, February 22, 2003 1:47 PM
Subject: Re: Homeland Security Alert System


>
> I'm certain the government folks working to protect us 24x7 are doing
> everything they can, but the fact of the matter is the public alert
> systems in the US suck.  Some just suck less.
>
> http://www.nj.com/news/gloucester/index.ssf?/base/news-0/104590500555170.xml
>
>"Butts said he often finds out about things like the change in the
>national threat level on CNN hours before the Communications Center
>receives a teletype about it."
>
> Butts is the Gloucester County Emergency Response Coordinator including
> the county 9-1-1 communications center.
>
>
> ISPs and other communication providers should be prepared to share
> information directly and quickly with each other.  If you wait to hear
> from government officials to decide what sanitized information to share,
> it will be hours later.  If ever.

Yesterday I was asked to install a DISH Network system for the Transportation
Security Administration so their folks at the Airport can get "the news".

--Michael



Re: DC power versus AC power

2002-12-29 Thread Michael Painter

- Original Message -
From: "Scott Granados" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>; "nanog list" <[EMAIL PROTECTED]>
Sent: Sunday, December 29, 2002 3:40 PM
Subject: Re: DC power versus AC power


>
> Is 48V DC at the amps present normallyin switch rooms etc enough to cause
> electricucian?  I have seen bad things with wrenches dropped across
> batteries even 12 volt car batteries although in this case it was a large
> battery bank in a submarine but I was curious about the 48V sources in
> switch rooms.

I've laid across the buss-bars before...definitely an uneasy feeling, but never
felt it unless I was sweaty. 
 Capability of thousands of Amps, but it's the old "power transfer"
deal...internal resistance of the source vs. internal resistance of the load (your
body).

--Michael

>
>
>
> - Original Message -
> From: "David Lesher" <[EMAIL PROTECTED]>
> To: "nanog list" <[EMAIL PROTECTED]>
> Sent: Sunday, December 29, 2002 4:43 PM
> Subject: Re: DC power versus AC power
>
>
> >
> > Unnamed Administration sources reported that Michael Painter said:
> > >
> > >
> > >
> > > > >But, as Stephen already eluded to... Compared with an AC plant
> design, to
> > > me, one of the biggest drawbacks of a DC plant is safety  (I have had to
> > > kick a fellow worker away from the rack before). <<
> > >
> > > What was the worker doing?  Is this 48 VDC?
> >
> > Bet so.
> >
> > And note, it's not just ISP's, of course. I heard that Sprint
> > PCS ha[s,d] a Dallas tech in critical condition and a dead switch
> > after a dropped wrench & resulting fire.
> >
> > In the words of Phil Esterhaus:
> >
> > Let's be careful out there
> >
> >
> >
> >
> >
> > --
> > A host is a host from coast to [EMAIL PROTECTED]
> > & no one will talk to a host that's close[v].(301) 56-LINUX
> > Unless the host (that isn't close).pob 1433
> > is busy, hung or dead20915-1433
> >
>




Re: DC power versus AC power

2002-12-29 Thread Michael Painter

- Original Message - 
From: "Kuhtz, Christian" <[EMAIL PROTECTED]>
To: "Wayne Bogan" <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>
Sent: Sunday, December 29, 2002 9:37 AM
Subject: RE: DC power versus AC power


> >But, as Stephen already eluded to... Compared with an AC plant design, to
me, one of the biggest drawbacks of a DC plant is safety  (I have had to
kick a fellow worker away from the rack before). <<

What was the worker doing?  Is this 48 VDC?

Thanks,

--Michael
 




Re: Guam - Typhoon 180 MPH winds

2002-12-09 Thread Michael Painter

- Original Message -
From: "Sean Donelan" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Sunday, December 08, 2002 11:40 PM
Subject: Guam - Typhoon 180 MPH winds


>
>
> Guam was struck by Typhoon Pongona with sustanted winds of 150 mph, and
> gusts of 184 mph.  Electricity is out on the entire island.  Most
> telephone service is down, although some calls have been received.  The
> University of Guam, the the ccTLD manager for .GU, is offline.  Backup
> name service for .GU is being provided by NS.RIPE.NET, although I haven't
> found working Internet service to the island.
>

Sounds nasty.
Around a dozen years ago, just after -another- Typhoon had gone through, someone
from the Guam Cable Co. had posted to rec.video.satellite.tvro that they needed a
new 12 ft. reflector and recommendations for securing it during a Typhoon.  I told
him that since 12 ft. reflectors were relatively inexpensive, just buy two and
bury the box with the second one.  After the next wipeout, dig up the box and put
up one that will last until the next time.  He never replied...

--Michael




Re: DirecPC Protocols

2002-11-14 Thread Michael Painter

Scott,

Just an f.y.i., Charlie Ergan (DishNetwork) said he couldn't see how the business
plan could succeed and pulled out of StarBand.  They are currently in Chap. 11.

http://65.186.192.177/liarband/ch11.html

--Michael

- Original Message -
From: "Scott Granados" <[EMAIL PROTECTED]>
To: "Crist J. Clark" <[EMAIL PROTECTED]>
Cc: <[EMAIL PROTECTED]>
Sent: Thursday, November 14, 2002 1:15 PM
Subject: Re: DirecPC Protocols


>
> Well there are some two way dish solutions for consumers now that don't
> need a dial-uplink.  I think dishnetwork has such a thing as does direct
> tv.  Doesn't help much but does help people in remote areas.
>




Re: DirecPC Protocols

2002-11-14 Thread Michael Painter

If you don't get an answer here, you might want to try the isp-satellites list.

http://isp-lists.isp-planet.com/isp-satellites/

Also, there are a -few- knowledgable folks on alt.satellite.direcpc.

Good luck...I'd be interested in hearing the description myself.

--Michael


- Original Message - 
From: "Crist J. Clark" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Thursday, November 14, 2002 12:53 PM
Subject: DirecPC Protocols


> 
> I've been looking for some technical descriptions on how DirecPC works
> from a TCP/IP point of view. Does anyone out there have some
> references? I have not been able to find anything too detailed, and
> from what I have been told, they are not too forthcoming when
> contacted directly.
> 
[s]



Re: Attacker Data / Wall of Shame

2002-11-05 Thread Michael Painter

- Original Message - 
From: "Daniel Senie" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Tuesday, November 05, 2002 1:51 PM
Subject: Attacker Data / Wall of Shame


> 
> We have had enough regular attacks on our web farm to put together tools 
> that catalogue the attacks, report them to a central database, and post 
> them to a website. The data is extracted hourly for the website to cut down 
> on server / database loading.
> 
> You can find our display of this data at:
> 
>http://www.shame.denialinfo.com/

These folks:

http://www.mynetwatchman.com/

have processed 669635 records in the last 24 hours.



Re: OT: If you thought Y2K was bad, wait until cyber-security hits

2002-07-22 Thread Michael Painter


I met del at a mini "Computer Expo" at Wailea, Maui in '96.  He was dealing Blackjack 
in his booth for prizes (I won an external
14.4 modem) and giving away "beta test" dialup accounts.  I thought that 'shaka.com' 
was cool, so after 6 months of free beta, I
signed up and have been with them since.

--Michael


- Original Message -
From: "Scott Weeks" <[EMAIL PROTECTED]>
To: "Scott Francis" <[EMAIL PROTECTED]>
Cc: "Rowland, Alan D" <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>
Sent: Monday, July 22, 2002 11:04 AM
Subject: Re: OT: If you thought Y2K was bad, wait until cyber-security hits


>
>
>
> On Mon, 22 Jul 2002, Scott Francis wrote:
>
> : On Mon, Jul 22, 2002 at 10:00:44AM -0700, [EMAIL PROTECTED] said:
> : >
> : > (shooting self in foot...)
> : >
> : > Just eliminate tech support and proprietary software! "A list of our
> : > settings is available at www.domain.com/settings. And don't call us with
> : > tech problems. We don't do tech support."
> : >
> : > I know of at least one ISP out there already doing this. Not that they're
> : > highly successful, but imagine not having to tell someone, "Yes, your
> : > username and password are case sensitive and must be spelled exactly as
> : > supplied. And it's .net, not .com" ever again.
> :
> : http://www.flex.com/
> :
> : Unfortunately, it looks like they took down the hate mail page, which was
> : hysterical. *sigh* They target clueful users only, and seem to be getting by
> : just fine. http://www.flex.com/adsl/ has a bit more of the "intelligent users
> : only" pitch.
>
>
>
> One of Hawaii's fun things...  ;-)
>
> http://www.flex.com/net_status/fan_con.html
>
> scott
>
>
>
>
>
> "sorry sir but i find AOL easy to use, i didnt know that since AOL is a
> helluva lot easier to use than freakin IE im considered computer
> illteritate, just quit bashing AOL, not all of us are sado-masochists."
>
>
>
> *heh* no need to comment, but it surely is begging for it... :-)
>




Re: Asian exchange points

2002-05-11 Thread Michael Painter


Richard,

If you don't have any luck elsewhere, a good source of info., especially for South 
Asia, could be:

Stuart Browne  <[EMAIL PROTECTED]>

He usually monitors the list  <[EMAIL PROTECTED]>

--Michael


- Original Message - 
From: "Richard A Steenbergen" <[EMAIL PROTECTED]>
To: "Dave Curado" <[EMAIL PROTECTED]>
Cc: <[EMAIL PROTECTED]>
Sent: Saturday, May 11, 2002 7:06 AM
Subject: Re: Asian exchange points


> 
> On Sat, May 11, 2002 at 12:59:12PM -0400, Dave Curado wrote:
> > Hi Richard,
> > 
> > http://www.ep.net/naps_ap.html
> 
> I was looking for more along the lines of opinions on which exchange 
> points are significant, without having to go through that entire list 
> looking for the english translations and trying to find traffic stats.
> 
> -- 
> Richard A Steenbergen <[EMAIL PROTECTED]>   http://www.e-gerbil.net/ras
> PGP Key ID: 0x138EA177  (67 29 D7 BC E8 18 3E DA  B2 46 B3 D8 14 36 FE B6)
> 



Re: ratios

2002-05-10 Thread Michael Painter


>>All of that changed when C&W depeered from PSI.  I lost a lot of money
due to Mr. Jansen's fascism.

Understand now?<<


I apologize in advance, I'm a total newbie...so what did you have to do?

--Michael


- Original Message - 
From: "Dean S Moran" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Thursday, May 09, 2002 12:42 PM
Subject: RE: ratios


> 
> 
> Stephen J. Wilcox wrote:
> >Your quality of life is affected by being turned down for peering how?
> 
> Who said I was turned down for peering?  When I buy a pipe from an internet
> provider, I buy it under the assumption that I'm going to be able to see
> the entire internet from it.  I know that probably any given moment, that
> some small part of the internet is going to be inaccesible due to outages
> or routing loops, but I do not expect to lose a path to another provider
> for days because my upstream decides to bully the competition.  I depended
> on, and had customers who depended on, being able to reach AS174, and for
> years this "just worked" so there was no need to multihome.  Short outages,
> or even overnight outages never hurt us, so single-homing was the way to
> go.  All of that changed when C&W depeered from PSI.  I lost a lot of money
> due to Mr. Jansen's fascism.
> 
> Understand now?
> 
> Dean 
> 
> 
> >Steve
> >
> >
> 
> _
> Free email with personality! Over 200 domains!
> http://www.MyOwnEmail.com
> 



Re: Large ISPs doing NAT?

2002-05-01 Thread Michael Painter


Roland, 

I have a static IP w/DirecPC and I haven't noticed any problems running ICS on Win2K.  
Have things changed?

--Michael


- Original Message - 
From: "Roland Dobbins" <[EMAIL PROTECTED]>
To: "Peter Bierman" <[EMAIL PROTECTED]>
Cc: <[EMAIL PROTECTED]>; "Beckmeyer" <[EMAIL PROTECTED]>
Sent: Wednesday, May 01, 2002 1:26 PM
Subject: Re: Large ISPs doing NAT?


> 
> I think a lot of the GRPS stuff is heading towards IPv6 w/IPv4
> gatewaying.
> 
> The NAT issue has certainly resulted in a quite a few disgruntled
> satellite customers (I'm thinking here primarily of direcpc.com) who're
> willing to put up with the large latencies, but get really irate when
> their apps won't work via NAT, or who want to run RFC1918 space for a
> LAN at home, then find out that lots of stuff can't stand being NATted
> twice.
> 
> -- 
> 
> Roland Dobbins <[EMAIL PROTECTED]> // 650.776.1024 voice
> 
> "Central databases already exist. Privacy is already gone." 
> 
>  -- Larry Ellison, CEO of Oracle Corporation
> 
> On Wed, 2002-05-01 at 16:07, Peter Bierman wrote:
> > 
> > At 3:03 PM -0700 5/1/02, Scott Francis wrote:
> > >On Wed, May 01, 2002 at 02:55:02PM -0700, [EMAIL PROTECTED] said:
> > >>
> > >> I don't know if this is an annual argument yet, but the frog is in the
> > >> pot, and the flame is on.  Guess who's playing the part of the frog?
> > >> Answer: ISPs who do this sort of thing.  Value added security is a nice
> > >> thing.  Crippling Internet connections will turn the Internet into the
> > >> phone company, where only the ISP gets to say what services are good and
> > >> which ones are bad.  While an ISP might view it appealing to be a baby
> > >> bell, remember from whence we all come: the notion that the middle should
> > >> not inhibit the endpoints from doing what they want.  You find this to be
> > >> a support headache?  Offer a deal on Norton Internet Security or some
> > >> such.  Offer to do rules merges.  Even offer a provisioning interface to
> > >> some access-lists.  Just make sure that when that next really fun game is
> > >> delivered on a play station that speaka de IP your customers can play it,
> > >> and that you haven't built a business model around them not being able to
> > >> play it.
> > >
> > >As long as it is _clear_ from the get-go that customers behind NAT are
> > >getting that service, and not publicly-routable IP space, I don't see the
> > >problem. If they don't like it, they don't have to sign up to begin with - as
> > >long as there is no doubt as to what kind of service they're getting, there
> > >shouldn't be a problem (legally, at any rate).
> > 
> > 
> > You've got to be kidding. Do you think it's clear to the average consumer
> > buying a GPRS phone what NAT is, and why they might or might not want it?
> > Do you think the use of NAT will be explained to these customers? Or
> > clearly stated in 5pt text on page 17 of the service agreement?
> > 
> > IMHO, as one of the people who will likely be using Cingular's GPRS network
> > with a Danger HipTop, I _strongly_ hope they choose to use routable address
> > space instead of NAT. I would hate for NAT to be an impediment to some cool
> > new app no one has thought of yet because these gizmos aren't in widespread
> > use yet.
> > 
> > >This is not to say that if, as Eliot posits, the next Big Thing on the market
> > >requires public IPs that your customer base won't all jump ship. That's a
> > >risk that providers will have to weigh against the benefits of NAT.
> > 
> > I'm more concerned that if the major metropolitan markets deploying GPRS
> > all use NAT, then the Next Big Thing won't ever happen on GPRS devices.
> > Customers won't jump ship if they have no where to jump to. That might
> > sound attractive to the bean counters, but think of the customers you might
> > never get in the first place. Also, I don't see how deploying NAT could be
> > a cost savings over requesting real IP space.
> > 
> > -pmb
> > 
> > --
> > Ring around the Internet, | Peter Bierman <[EMAIL PROTECTED]>
> > Packet with a bit not set | http://www.sfgoth.com/pmb/
> > SYN ACK SYN ACK,  |"Nobody realizes that some people expend
> > We all go down. -A. Stern | tremendous energy merely to be normal."-Al Camus
> > 
> 
>