At 08:53 PM 11/2/2003, you wrote:
I'm fairly certain that the telco huts or CO's have to accomodate multiple
groups having access, so I'd bet that a padlock probably is a tough sell
There are special latches that accommodate multiple padlocks, where
unlocking any one padlock opens the latch. They
On Sun, 2 Nov 2003, John Brown (CV) wrote:
>
> lets not even begin to talk about American Towers Inc cell
> tower and relay facilities :) :(
>
> same combo on about 60 towers I know of
>
just like padlocks at Fairfax County Public Schools... all are key #1345
(or where when I went through tha
lets not even begin to talk about American Towers Inc cell
tower and relay facilities :) :(
same combo on about 60 towers I know of
security comes down to the "human condition"
its a bitch to remember all those combo's, keep them
updated, or install wiggle wire card readers, bad readers
lost ca
[EMAIL PROTECTED] (Andrew D Kirch) writes:
> There are however legitimate reasons for a portscan, responding to
> incoming abuse and attack being one of them, automatically searching for
> openrealys used to send you spam is another. Curtailing scanning
> shouldn't be a priority here, nailing pa
On Sun, 2 Nov 2003, Sean Donelan wrote:
>
> On Sun, 2 Nov 2003 [EMAIL PROTECTED] wrote:
> >
> > Either the KIRO guys are lying through their teeth, or somebody dropped the ball
> > BIG time. The bio of the guy who wrote it is here;
>
>
> I wonder has he ever tried walking into the transmission
Telstra reported on the problems viruses caused its network to a Senate
panel in Australia.
http://www.theage.com.au/articles/2003/11/03/1067708121544.html
Telstra took 10 days to understand virus, Senate panel told
Canberra
November 3, 2003
Telstra spent 10 days trying to understand the Swen v
On Sun, 2 Nov 2003 [EMAIL PROTECTED] wrote:
> "While the FBI scrambles to find a suspect, KIRO Team 7 Investigators went to
> check out security measures at the Qwest routing station.
> We walked straight through an unlocked gate, a wide-open door, and then mapped
> the interior of the building wi
On Sun, 02 Nov 2003 19:38:09 PST, Gregory Hicks said:
> You mean that these places aren't even locked? Who has (had) the key?
The article says:
"While the FBI scrambles to find a suspect, KIRO Team 7 Investigators went to
check out security measures at the Qwest routing station.
We walked straig
Andrew D Kirch wrote:
There are however legitimate reasons for a portscan, responding to incoming abuse and attack being one of them, automatically searching for openrealys used to send you spam is another.
And on that note I would like to inform all, the new SORBS scanning
process is running, t
> From: [EMAIL PROTECTED]
> Date: Sun, 02 Nov 2003 22:12:20 -0500
>
> On Sun, 02 Nov 2003 21:37:30 EST, "Robert M. Enger"
<[EMAIL PROTECTED]> said:
>
> > You'd think after three previous disruptions, that Qwest would
> > have enabled some form of redundancy.
>
> Redundancy hell. How about a
Today, the California Highway Patrol arrested a Spokane, Washington man
in connection with the sabotage of 10 west coast electric grid towers.
http://bend.com/news/ar_view%5E3Far_id%5E3D12260.htm
Tower saboteur: I was only pointing out flaws
By Barney Lerten
Bend.com
[...]
Crews last Thursday h
On Sun, 02 Nov 2003 21:37:30 EST, "Robert M. Enger" <[EMAIL PROTECTED]> said:
> You'd think after three previous disruptions, that Qwest would
> have enabled some form of redundancy.
Redundancy hell. How about a *PADLOCK*?
pgp0.pgp
Description: PGP signature
On Sun, Nov 02, 2003 at 09:37:30PM -0500, Robert M. Enger wrote:
> You'd think after three previous disruptions, that Qwest would
> have enabled some form of redundancy.
>
> The Washington State PUC doesn't appear to be providing
> very good oversight.
Farmington, NM doesn't have any redundancy
There are however legitimate reasons for a portscan, responding to incoming abuse and
attack being one of them, automatically searching for openrealys used to send you spam
is another. Curtailing scanning shouldn't be a priority here, nailing packet kids,
spammers etc should be. Sadly both of
The article says there were three disruptions prior
to this most recent event. It goes on to say:
Early in the morning of Sept. 3, some criminal strolled into a
Qwest Telecommunications server station with tools in hand
and carefully sliced one strand of wire.
For the nex
KIRO TV has a report concerning the fiber cuts targeting a particular
fiber route in the Northwest US. It has been been disrupted four times
in the last two years, not by backhoes, but by someone entering a
fiber hut.
North Sound 911 Service Repeatedly Targeted
by Chris Halsne KIRO 7 Eyewitnes
I should know better than to stick my foot into things, but the IP in
question (69.60.142.242) is registered with the .US registrar as
ns2.nanog.us, and is the secondary name server for nanog.us
The ethics and/or legality of registering nanog.us notwithstanding, I
don't understand this particula
>I have a question. I need for a project a small router than can do 2xFE
> @wire speed, IOS IP feature set, and it will do BGP with a small subset of
> the global routing table (~1000 networks).
>
>Price is a big issue, but so is stability and reliability of the
> platform.
Cisco Catalys
Hi guys/gals,
I have a question. I need for a project a small router than can do 2xFE
@wire speed, IOS IP feature set, and it will do BGP with a small subset of
the global routing table (~1000 networks).
Price is a big issue, but so is stability and reliability of the
platform.
> Richard Cox wrote:
> The only relevance of those postings to this group can be
> found by observing exactly how the MX (69.60.142.242) for
> his email address ([EMAIL PROTECTED]) answers on
> Port 25. Most interesting!
Indeed. Would be worth taking action with nic.us.
Michel.
There has been more operational and useful discussion on #nanog
today than on NANOG-L. Something is wrong with this picture.
Eddy
--
Brotsman & Dreger, Inc. - EverQuick Internet Division
Bandwidth, consulting, e-commerce, hosting, and network building
Phone: +1 785 865 5885 Lawrence and [inter]
On Sun, 02 Nov 2003 15:32:57 -0500
William Allen Simpson <[EMAIL PROTECTED]> wrote:
| I've reviewed all the postings from this Michael (ENG) Booth,
| and found none that add to the knowledge of this group.
The only relevance of those postings to this group can be found by
observing exactly how t
> OK, enough is enough. We've all had a spammer or spam site sign up,
> and we've all (presumably) kicked them off. Why are you referencing
> data from some spam posting over 4 years old?
Because, as I showed you, Elan is still hosting their domains.
If William would take some action and cle
Adding to the indictment, the postings are listed as circa 9 am EST,
but didn't show up until 3 pm EST, and are coming from a machine that
claims to be NANOG.us (with missing inverses). Not a good sign:
Received: from ns2.nanog.us (unknown [69.60.142.242])
by segue.merit.edu (Postfix
OK, enough is enough. We've all had a spammer or spam site sign up,
and we've all (presumably) kicked them off. Why are you referencing
data from some spam posting over 4 years old?
"Booth, Michael (ENG)" wrote:
>
> Sorry guys, I left this one out:
>
> http://groups.google.com/groups?q=bizn
Has anyone been experiencing connectivity issues with Wiltel over the
last 12 hours?
-brian
And how about this one William?
http://216.239.39.104/search?q=cache:Q7SpB-SrrT8J:www.collectibles-auctions-online.com/download_game_warez.html+%22216.151.192.0%22&hl=en&ie=UTF-8
Google cache doesn't lie.
Sorry guys, I left this one out:
http://groups.google.com/groups?q=biznet+spam&hl=en&lr=&ie=UTF-8&oe=UTF-8&safe=off&selm=0.d4e3f0c6.2573f599%40aol.com&rnum=9
And any idea why you're hosting all of these William?
123-EASY-DIET NS DNS1.ELAN.NET.
123-EASY-HOME-MORTGAGE NS DNS1.ELAN.NET.
123-EASY-L
I am looking for real world feedback on the effectiveness of DDoS detection
and mitigation devices from Riverhead, Top Layer, ISS (Proventia), Melior,
etc. Some of them make pretty impressive claims of performance, too good to
be true?
This would be used in conjunction with other techniques as p
> That post was rejected because of the words "porn site". This was quite
> clear from the type of filtering message. I'm sure this post will generate
> exactly the same reply back to me...
I'm not sure about that. I spoke with several large ISP abuse desks that
have you blackholed, for wastin
30 matches
Mail list logo