At 11:04 PM 5/2/2004, Sean Donelan wrote:
The antivirus vendors are bemoaning the fact the Sasser worm has been
slow to spread. On the other hand, most of the vulnerable computers
seem to have already been taken over by one or more Bots days or weeks
before the worms arrived.
Other than the
I miss this essential toolset now that I do not have
it
-Henry
On Mon, 3 May 2004, Henry Linneweh wrote:
I miss this essential toolset now that I do not have it
Try RIPE NCC's RIS project: www.ripe.net/ris, same data, similar tools.
Henk
--
Henk Uijterwaal
On Sun, May 02, 2004 at 02:06:09AM +0200, Anand Buddhdev wrote:
Hi,
I'm having trouble sending packets to AOL from the network
217.21.144.0/20. I've tried to contact AOL at the address
[EMAIL
Hi Everyone,
We have a website up for our infrastructure mapping project here at George Mason that
might be of interest to some of the folks on the list:
http://policy.gmu.edu/imp/
Also I though we would add our little take from the thread a while back that asked if
our maps showed the 2003
On Mon, 3 May 2004 [EMAIL PROTECTED] wrote:
If the work looks helpful to
anyone or if you have an feedback please pass it along.
But what everyone wants to know: Did the school finally decide to award
you a degree for your work?
Yup - on April 20th I passed my defense and I'll be walking May 15th. The committee
agreed the dissertation was worth while, that is just four people, but I ain't
complaining.
Now Supposedly Dr. Gorman
- Original Message -
From: Sean Donelan [EMAIL PROTECTED]
Date: Monday, May 3,
Sean Donelan wrote:
Other than the obvious, don't let a bot on get on your computer in
the first place, are there any opinions about the best anti-bot tools
for naive computer users? The major virus vendors seem to be having
a bit of trouble dealing with bots, frequently recommending manual
Hi, NANOGers.
] Just because a machine has a bot/worm/virus that didn't come with a
] rootkit, doesn't mean that someone else hasn't had their way with it.
Agreed.
A growing trend in the 0wnage category is the installation of
multiple bots on a single host. This isn't intentional, but a
I see times more typically in the 5 - 10 second range to infection. As
a test, I unprotected a machine this morning on a single T1 to get a
sample. 8 seconds. If you can get in 20 minutes of downloads you're
luckier than most.
Eric
-Original Message-
From: [EMAIL PROTECTED]
On Mon, 3 May 2004, Rob Thomas wrote:
] Just because a machine has a bot/worm/virus that didn't come with a
] rootkit, doesn't mean that someone else hasn't had their way with it.
Agreed.
Won't help. What's the first thing people do after re-installing
the operating system (still have all
On Mon, 3 May 2004, Sean Donelan wrote:
On Mon, 3 May 2004, Rob Thomas wrote:
] Just because a machine has a bot/worm/virus that didn't come with a
] rootkit, doesn't mean that someone else hasn't had their way with it.
Agreed.
Won't help. What's the first thing people do after
On May 3, 2004, at 6:26 PM, [EMAIL PROTECTED] wrote:
Now that the firestorm over implementing Md5 has quieted down a bit, is
anybody aware of whether the exploit has been used?
Feel free to reply off list.
I would also be interested in what %-age of peers are MD5-ized? And if
anyone has had any
Now that the firestorm over implementing Md5 has quieted down a bit, is
anybody aware of whether the exploit has been used?
Feel free to reply off list.
Thanks,
Keith Wallace
Director, Telecommunications
PC Connection Services
Network Card Theft Causes Internet Outage
May 3, 2004
By Sean Gallagher
A handful of corporate customers were left without e-mail and Internet
access Monday after the theft of networking equipment from a New York City
office late Sunday.
Law enforcement officials said four DS-3 cards were
Microsoft has said Windows XP SP2 will have the firewall
turned on by default, and that they have considered
reissuing the installation CD's such that a new installation
will have the firewall enabled to deal with just this
problem. I do not know the current state of the
consideration, but to
William wrote:
but in our ISP office I setup new win2000 servers and first
thing I do is download all the patches. I've yet to see the
server get infected in the 20-30 minutes it takes to finish it
It can happen in 5 or 10 minutes (I've seen it) but only if all of the
following conditions
Just in case any of you don't read slashdot:
http://www.eweek.com/article2/0,1759,1583347,00.asp
Law enforcement officials said four DS-3 cards were reported missing from
a Manhattan co-location facility owned by Verizon Communications Inc. The
theft at 240 E. 38th St. occurred just after
On Tue, 4 May 2004, Andy Dills wrote:
Just in case any of you don't read slashdot:
http://www.eweek.com/article2/0,1759,1583347,00.asp
Law enforcement officials said four DS-3 cards were reported missing from
a Manhattan co-location facility owned by Verizon Communications Inc. The
theft
19 matches
Mail list logo