At a University I "consult" for, this is a common problem, their 34.5kv
lines, which incidentally travel the same hole as their fiber optics, blow
open about once a month, due to failing old power lines.
Get used to it, and make money off of it, is all I can say
At 20:59 2/21/03 -0500, yo
I'll bite..
- Original Message -
From: "William Allen Simpson" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Friday, February 21, 2003 2:25 PM
Subject: Re: M$SQL cleanup incentives
[snip]
> I'm of the technical opinion that everyone will need to filter outgoing
> 1434 udp forever.
[
I can imagine there is some reason why this was originally reserved thats
probably not valid any more..
However seems like a lot of effort to change documents and policies for a single
/24 !
Steve
On Thu, 20 Feb 2003 [EMAIL PROTECTED] wrote:
>
> 223.255.255.0/24 has historically been desig
Doug Clements wrote:
> Which is it? Where do you draw the line between something that's big enough
> to block forever and something that's not worth tracking down?
Where it causes a network meltdown. The objective reality is pretty
clear to some (many? most?) of us.
> You lambast
> him for a
> BB> DNS clients will eventually timeout and fall back to another
> BB> server, so any problems would be transient, but the packets
> BB> were legit, right?
>
> Stateful packet filters are nice. Properly written, they protect
> both inbound and outbound traffic and need to track very little
> s
Our link to FastNet (formerly Netaxs) went down a while ago, and their
phone lines are all busy. I can get to fast.net's website, but none of
the netaxs servers, including NewsRead.com.
They are at a somewhat low elevation, so I'm wondering if they're dealing
with a flooding situation. Our cir
On Sat, Feb 22, 2003 at 09:25:24AM -0500, William Allen Simpson wrote:
> Doug Clements wrote:
> > Which is it? Where do you draw the line between something that's big
enough
> > to block forever and something that's not worth tracking down?
>
> Where it causes a network meltdown. The objective re
The associated press is reporting that parts of Tyson's Corner is
experiencing flooding, and officials are restricting access.
As some folks are aware the Tyson's Corner area is/was a very
dense colocation and peering center for the Internet.
Unnamed Administration sources reported that Sean Donelan said:
>
>
> The associated press is reporting that parts of Tyson's Corner is
> experiencing flooding, and officials are restricting access.
>
> As some folks are aware the Tyson's Corner area is/was a very
> dense colocation and peering
http://www.cnn.com/2003/TECH/internet/02/21/email.encryption.reut/index.html
Very little real information...
Mark Radabaugh
Amplex
(419) 720-3635
more here:
http://lasecwww.epfl.ch/memo_ssl.shtml
Lucy E. Lynch Academic User Services
Computing CenterUniversity of Oregon
[EMAIL PROTECTED] (541) 346-1774/Cell: 912-7998
On Sat, 22 Feb 2003, Mark Radabaugh wrote:
>
> http://www.
On Sat, 22 Feb 2003, Doug Clements wrote:
> The issue I had with your argument is "forever". You should realize as well
> as anyone that the course of software development and implementation will
> mitigate the threats of the slammer worm until it's nothing more than a bad
> memory.
Unlikely in
Thus spake <[EMAIL PROTECTED]>
> If your network is able to contain slammer infected boxes without
> melting down, who cares if you have a few infected customers? You
> don't need to filter, and they'll all be encouraged to fix their systems
> sooner.
As one hoster put it to me, DoS and worm tra
On Sat, Feb 22, 2003 at 03:55:14PM -0500, Mark Radabaugh wrote:
> http://www.cnn.com/2003/TECH/internet/02/21/email.encryption.reut/index.html
>
> Very little real information...
Sounds like a CNN-digested version of CAN-2003-0078, which is a (relatively
minor) bug in OpenSSL which allows for a
Doug Clements wrote:
> I see. So you're still filtering port 25 from the Morris sendmail worm.
>
Funny thing, I was a researcher visiting at Cornell, and had just left
in the car for the 9.5 hour drive home when it struck. I've often
wished I'd stuck around for a few more hours for the exciteme
Yeah, CNN screwed up the story more than they releaed anything..
Jim
-Original Message-
From: Matt Zimmerman
To: [EMAIL PROTECTED]
Sent: 2/22/03 5:13 PM
Subject: Re: SSL crack in the news
On Sat, Feb 22, 2003 at 03:55:14PM -0500, Mark Radabaugh wrote:
>
http://www.cnn.com/2003/TECH/i
In a message written on Sat, Feb 22, 2003 at 03:41:19PM -0500, Sean Donelan wrote:
> The associated press is reporting that parts of Tyson's Corner is
> experiencing flooding, and officials are restricting access.
>
> As some folks are aware the Tyson's Corner area is/was a very
> dense colocation
Including our basement; we live a few miles from Tyson's. --Steve
At 3:52 PM -0500 2/22/03, David Lesher wrote:
You can expect
flooding in the usual places in the next day or so.
"Mark Radabaugh" <[EMAIL PROTECTED]> writes:
> http://www.cnn.com/2003/TECH/internet/02/21/email.encryption.reut/index.html
>
> Very little real information...
Here's the writeup I sent to the cryptography mailing list.
--
Here's a fairly
On Sat, 22 Feb 2003, Stephen Sprunk wrote:
> As one hoster put it to me, DoS and worm traffic is billable so it's not in
> the hoster's interests to protect customers -- quite the opposite in fact.
Whether or not the traffic is billable is irrelevant if your network is
effectively down. One in
On Sat, Feb 22, 2003 at 05:33:20PM -0500, Leo Bicknell wrote:
> In a message written on Sat, Feb 22, 2003 at 03:41:19PM -0500, Sean Donelan wrote:
> > The associated press is reporting that parts of Tyson's Corner is
> > experiencing flooding, and officials are restricting access.
> >
> > As some
I'm certain the government folks working to protect us 24x7 are doing
everything they can, but the fact of the matter is the public alert
systems in the US suck. Some just suck less.
http://www.nj.com/news/gloucester/index.ssf?/base/news-0/104590500555170.xml
"Butts said he often finds out a
> ISPs and other communication providers should be prepared to share
> information directly and quickly with each other. If you wait to hear
> from government officials to decide what sanitized information to share,
> it will be hours later. If ever.
If anybody is interested here, I did put to
On Sat, 22 Feb 2003, Richard A Steenbergen wrote:
> Looks like 30 stores on the upper level were flooded (probably too strong
> a word, "slightly moistened" would seem more appropriate) due to a roof
> leak, and the mall was closed.
>
> Hardly a danger to the internet, unless there are more people
>
> On Sat, 22 Feb 2003, Richard A Steenbergen wrote:
>> Looks like 30 stores on the upper level were flooded (probably too
>> strong a word, "slightly moistened" would seem more appropriate) due
>> to a roof leak, and the mall was closed.
>>
>> Hardly a danger to the internet, unless there are mo
Hello,
I'm trying to track down a sample operating agreement, specifically when
one network operator offers to manage another's telecommunications
assets, in exchange for an IRU. Something close to this would be
wonderful. Google lists many network operating agreements for power
interconnection
On Sat, Feb 22, 2003 at 10:32:11PM -0500, Jason Lewis wrote:
> AHHH!!! But they DO! Who is in the old Hechinger building a stones throw
> from Tyson's II?
Until just a couple of weeks ago it was an MFN data center.
Unfortunately, it was one of the sites we elected to close down
as part of the
Anyone have recommendations on good books (or similar
resources) on ENUM/E.164 for education, planning, design,
implementation and/or operation?
Pete.
- Original Message -
From: "Sean Donelan" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Saturday, February 22, 2003 1:47 PM
Subject: Re: Homeland Security Alert System
>
> I'm certain the government folks working to protect us 24x7 are doing
> everything they can, but the fact of the
29 matches
Mail list logo