Fortunately, our founding fathers also gave us not only the right, but the
duty and the tools to take the treasonous out and dispose of them when they
became a threat to the republic. That time is once again here.
At 21:53 9/10/02 -0400, you wrote:
Ya know Vadim, with all due respect, some
blitz wrote:
And you think the terresterial sources are hard to shut down
Drive-by spam hits wireless LANs
By Graeme Wearden
Special to CNET News.com
September 6, 2002, 10:14 AM PT
http://news.com.com/2100-1033-956911.html
LONDON--The proliferation of insecure
Neil J. McRae wrote:
I must be honest, I havn't heard of any reports here in Sweden (or
anywhere else) that this is a real problem, are there any true incidents
that this has happend?
Yes. If you sit with your laptop in the park across from our office
you can see 3 unprotected wireless
Just cause there are unprotected WLANs dosn't imply that spammers use
them (perhaps its to hard for the spammers ;)).
Corporations should protect ther WLANs but saying that spamming is a
great threat is to overdo it.
I agree, but people said that the spammers wouldn't be able to
deal with
Neil J. McRae wrote:
Just cause there are unprotected WLANs dosn't imply that spammers use
them (perhaps its to hard for the spammers ;)).
Corporations should protect ther WLANs but saying that spamming is a
great threat is to overdo it.
I agree, but people said that the spammers wouldn't
On Wed, Sep 11, 2002 at 12:45:23PM +0200, John Angelmo wrote:
Just cause there are unprotected WLANs dosn't imply that spammers use
them (perhaps its to hard for the spammers ;)).
Corporations should protect ther WLANs but saying that spamming is a
great threat is to overdo it.
To
I agree, but people said that the spammers wouldn't be able to
deal with BGP route advertisement but there was cases of spammers
injecting routes sending out spam then removing those routes. Wlan is
easy.
Spammers come from every walk of life including the various technical
professions.
Title: Message
Everyone,
I have a customer
that is multihomed, to a public ISP and to another large network that uses
10.0.0.0 address space. The private address space also has services
available via public address space and consequently is running a split DNS
service, public and private.
At 10:16 AM -0700 2002/09/10, Dave Crocker wrote:
Laptop mobile users cannot use their home SMTP server.
Depends on the configuration of the SMTP server and the mail
server client running on the laptop. With SMTPAUTH and/or TLSSMTP,
and using a different (unfiltered)
At 2:37 PM -0400 2002/09/10, Barry Shein wrote:
A) Make a clear policy as part of the terms conditions, including a
significant clean-up fee + direct charges (e.g., if they ask you or
prompt a legal question they can pay the legal fee for you to get it
answered.)
That's nice
Brad Knowles wrote:
B) KNOW WHO THE HELL YOU'RE GIVING ACCOUNTS TO so that (A) works. Get
a credit card or verify the phone number and other info (e.g., call
them back, insist on calling them back.)
Do you know how many credit cards are out there? Do you know how
many of them are
I believe the question was use of the access to spam, not just that the
majority of users leave their equipment (all, not just the wireless
part) in the original, out-of-the-box configuration. Remember those
comments on the flahsing 12:00 on most VCRs?
BTW, everyone out there with a random
Jared Mauch wrote:
Imagine a few of the following scenarios:
1) You wok for an ISP and have access through them. One large
enough that they apply their AUP to their own people. You have ISDN/DSL
or some other connection w/ reverse-dns for your personal domain home.
Someone
The cost of enabling/labeling may be only a 'few cents more' but the
cost of support when Joe Sixpack forgets his key/loses the label is
another story altoghether. There's a reason most equipment, not just
wireless, is deliverd in 'chimp simple' configuration...
Best regards,
On Wed, Sep 11, 2002 at 07:08:53PM +0200, John Angelmo wrote:
Jared Mauch wrote:
In some way you are right, but still I think it's even worse to use WEP
cause then the admins might think it's safe, it takes about 15 minutes
to crack a wepkey, so instead of drive-by spamming you could call
This is what console ports / direct cable connects to a mgmt
port (usb or whatnot) are useful for. As well as an overall 'clear config'
button on the unit.
Now if someone can help me figure out the unlock code
for the microwave in the house i bought so i can stop
unplugging
In some way you are right, but still I think it's even worse to use WEP
cause then the admins might think it's safe, it takes about 15 minutes
to crack a wepkey, so instead of drive-by spamming you could call it
drive-by, have a bagle, start spamming.
WEP != security, true.
The most
hi,
Does anybody know of the existence of a public looking glass or traceroute
server for Cogent Communications? I used to have my hands on a Netrail
(AS4006) looking glass, but this seems to be gone now.
thanks, regards,
Vincent Rais
peering coordinator
Versatel Telecom Europe B.V.
m.(+34)
Wanna bet if Joe Sixpack bothers to re-enable anything he doesn't have
to after his first use of the clear config button/power cycle? This also
breaks physical security. Find the power panel on the house (accessible
by fire code) cycle the power, hack into the now open system... Hey,
that's just
* [EMAIL PROTECTED] (Al Rowland) [Wed 11 Sep 2002, 19:13 CEST]:
The cost of enabling/labeling may be only a 'few cents more' but the
cost of support when Joe Sixpack forgets his key/loses the label is
another story altoghether. There's a reason most equipment, not just
wireless, is deliverd
On Wed, 11 Sep 2002, Vincent Rais wrote:
hi,
Does anybody know of the existence of a public looking glass or traceroute
server for Cogent Communications? I used to have my hands on a Netrail
(AS4006) looking glass, but this seems to be gone now.
Try www.traceroute.org
On Wed, 11 Sep 2002, Jared Mauch wrote:
There are a lot of things one can do:
1) enable wep
2) rotate wep keys
3) authenticate by mac-address
4) restrict dhcp to known mac-addresses
5) force utilization of vpn/ipsec client
Suddenly laying down UTP
On Wed, 11 Sep 2002, Brad Knowles wrote:
B) KNOW WHO THE HELL YOU'RE GIVING ACCOUNTS TO so that (A) works. Get
a credit card or verify the phone number and other info (e.g., call
them back, insist on calling them back.)
C) Use (B) to enforce (A).
Doesn't work. See above.
{WEP != encryption... thread}
As it happens, I'm looking at a consumer 802.11 product that will
have real encryption.
It should be released Real Soon Now I'll be happy to say more
when that happens..
--
A host is a host from coast to [EMAIL PROTECTED]
no one will talk to a host that's
Dan Lockwood wrote:
Everyone,
I have a customer that is multihomed, to a public ISP and to another large network
that uses 10.0.0.0 address space. The private address space also has services
available via public address space and consequently is running a split DNS service,
public and
* [EMAIL PROTECTED] (David Lesher) [Wed 11 Sep 2002, 20:38 CEST]:
As it happens, I'm looking at a consumer 802.11 product that will
have real encryption.
It should be released Real Soon Now I'll be happy to say more
when that happens..
No Wires Needed is among the companies working on
Doug,
The only drop in 'traffic' I've ever noticed was in my former life in
the military. Retreat policy on base was that traffic pulled to the side
of the road and the driver got out, faced the music and rendered the
appropriate salute through the end of the anthem. Since this occurred at
a
On fredag, sep 6, 2002, at 21:57 Europe/Stockholm, Tim Thorne wrote:
OK, what if 60 Hudson, 25 Broadway, LinX and AmsIX were all put out of
commission?
To some extent - nothing for the above...if design right. The major
networks should have designed their networks to route around this. If
And locking your car, taking the keys, setting the alarm or whatever
doesn't guarantee someone won't load it into a soundproof truck.
BUT IT HELPS!
And having run an ISP for 13 years now I'm here to tell you what I say
HELPS. I'm not just making this stuff up, I'm telling you what I know
from
Getting your entire corporate LAN dumped into the RBL mess could be
devastating, how much productivity lost? How much time wasted getting OFF
the RBL? How many contacts missed, correspondences missed?
You could be getting into a very rough ride for some days to some weeks, as
the block
On Wed, 11 Sep 2002, David Charlap wrote:
Brad Knowles wrote:
B) KNOW WHO THE HELL YOU'RE GIVING ACCOUNTS TO so that (A) works. Get
a credit card or verify the phone number and other info (e.g., call
them back, insist on calling them back.)
Do you know how many credit
ehm... maybe asking the wrong question then: If traceroute.org (the first
place you look, right?) doesn't have a public looking glass for Cogent
Communications, perhaps someone knows where I may find one?
thanks again,
Vince
-Oorspronkelijk bericht-
Van: Patrick [mailto:[EMAIL
Hello...
Dan Lockwood wrote:
Everyone,
I have a customer that is multihomed, to a public ISP and to another
large network that uses 10.0.0.0 address space. The private address
The other large network is, IMHO, broken for doing this. The address
space is no longer 'private'.
On Wed, 11 Sep 2002, Dan Lockwood wrote:
Everyone,
I have a customer that is multihomed, to a public ISP and to another
large network that uses 10.0.0.0 address space. The private address
space also has services available via public address space and
consequently is running a split
Hi
Try looking at this company's line of products:
http://www.itouchcom.com/
they used to be Xyplex.
Arie
On Tue, 10 Sep 2002, Charles Sprickman wrote:
Hello all,
Here's what I've found out. It's a mix. If any one solution looks to
be the winner it's the roll-your-own solution.
At 1:51 PM -0700 2002/09/10, Eliot Lear wrote:
A proposed activity for Portland? Network engineer assisted homocide?
Seriously, how about a spam lottery? With payouts that only
occur on the death of a known spammer? Of course, you'd have to
ensure that the death was accidental,
At 12:48 PM -0400 2002/09/11, David Charlap wrote:
When you are given the card number and info, you contact the bank and
put a hold on the account for the expecte amount of the bill. When
the bill actually comes due, you put the charge through. You know
that the charge will succeed
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
Hi
Try looking at this company's line of products:
http://www.itouchcom.com/
they used to be Xyplex.
We've had pretty good luck with these...
Like other embedded systems, they are a good fit for those
On Wed, Sep 11, 2002 at 11:56:32PM +0200, Brad Knowles wrote:
There are also cards which don't properly authorize immediately,
but the other way -- they are valid, the person presenting it really
is the legal owner, there is plenty of available credit, but when you
try to place a
39 matches
Mail list logo