logic to time out, forcing it to write a bunch of padding, stop,
reposition, get a running start, write a bunch of preamble junk,
write one more minimum size block, underrun, write more padding,
reposition, etc...
I appreciate that, but I want to explore the threshold so I can
be
I've seen some people mentioning a desire to talk about Asterisk. Well,
for you who want to talk, now's your chance! Please contact me if you're
willing to get up in front of the fun folks at MarthaLU..., errr,
MerriLUG, and chat about your favorite VoIP applicaton. For that matter,
now that
An attempt to exploit a cgi-email script at http://www.tedroche.com/
contact.html was made from a computer located at 213.112.195.100
according to the logs:
213.112.195.100 - - [31/Aug/2005:17:05:29 -0400] POST /cgi-bin/
gypsymail.py/traacontact.txt/traaemail.txt HTTP/1.1 200 674 http://
Years ago, I bought an HP OfficeJet d145 and network interface, but
we use it very little. because of that, the ink cartridges and print
heads often have dried out, and I need to run a half-dozen attempts
at cleaning print heads and realigning to get the highest quality
output. The printer
Ted Roche wrote:
but I don't have any direct experience with refilling. Has anyone
done this? Recommended vendors pro or con? Words of wisdom? One
friend on another board suggested trying this outside on a day with
little wind and clothes you don't mind staining for the first couple
of
The funny thing, to me, is that I see stuff like this in my mail logs
all the time, both at my day job and at home:
2005-08-30 00:20:36 SMTP protocol violation: synchronization error
(input sent without waiting for greeting): rejected connection from
H=[81.12.246.11] input=POST /
On Aug 31, 2005, at 21:54, Ted Roche wrote:
My question: how likely is it that the IP address in my Apache logs is
correct? I'd like to report the abuse to the ISP, but there is no
point if it is spoofed.
TCP is hard to spoof because you have to complete the 3-way handshake
so the victim