On Tue, 9 Aug 2005, David Lesher wrote:
> If you can live w/o true watts, I'd bet someone has a Hall effect
> sensor package that could tell you just amps. Such would be
> non-contact and would thus skirt the US issue, I'd bet.
I'd love to hear about an actual purchaseable lower cost per circuit
Speaking on Deep Background, the Press Secretary whispered:
>
> > http://www.baytech.net/
>
> I had moderate success with this suggestion. Their technical support said
> the only product they had that does this is the 4 outlet RPC5 or RPC6
> (ethernet version vs serial version). Unfortunately,
PAY YOUR BILLS PAY YOUR BILLS PAY YOUR BILLS PAY YOUR
BILLS PAY YOUR BILLS PAY YOUR BILLS PAY YOUR BILLS PAY
YOUR BILLS PAY YOUR BILLS PAY YOUR BILLS PAY YOUR
BILLS PAY YOUR BILLS PAY YOUR BILLS PAY YOUR BILLS PAY
YOUR BILLS PAY YOUR BILLS PAY YOUR BILLS PAY YOUR
BILLS PAY YOUR BILLS PAY YOUR BILL
on this side of the puddles, i think most folk use /126s for p2p links.
this has been endlessly and loudly debated, but it still seems extremely
strange to use 18,446,744,073,709,551,616 addresses for a p2p link.
randy
hi
this is a very interesting topic
>On 9-aug-2005, at 19:24, Cody Lerum wrote:
>
>> Here is our current plan, but we are looking for suggestions from
>> people
>> who have been down this road before. The plan is to break out a /48
>> for
>> our organization. Then break out the first /64 for
We were using RPC14s and the RPC22s. Both worked well. The RPC14s were
a bit odd to setup though. For me, It would make a bit more sense to
use the RPC14s and connect them up to the serial access server (DS
series modules) and then do snmp connections to the serial connections
to the power
On Tue, Aug 09, 2005 at 04:37:04AM -0700, Mike Leber wrote:
> On Sun, 7 Aug 2005, Justin Kreger wrote:
> > At the now defunct redundant.com we used baytech strips with the ds-3
> > (not the circuit) modules to snmp enable the strips. We were able to
> > control each port, and monitor load on ea
On Sun, 7 Aug 2005, Justin Kreger wrote:
> At the now defunct redundant.com we used baytech strips with the ds-3
> (not the circuit) modules to snmp enable the strips. We were able to
> control each port, and monitor load on each port.
>
> http://www.baytech.net/
I had moderate success with
I talked to them yesterday and their technical support said they didn't, I
just called them again to confirm and rephrased the question a few other
ways and they still say they don't.
Perhaps it's something they have that they don't call a power strip, what
part number is what you had in mind?
At 11:49 AM -0700 8/9/05, Dan Hollis wrote:
Someone made a video of cisco hard at work fixing router security holes:
http://www.makezine.com/blog/archive/2005/08/video_of_ciscoi.html
Cisco is also fixing web security holes:
http://www.dslreports.com/shownews/66078
With all this and the FBI inv
On 9-aug-2005, at 19:24, Cody Lerum wrote:
Here is our current plan, but we are looking for suggestions from
people
who have been down this road before. The plan is to break out a /48
for
our organization. Then break out the first /64 for loopbacks, and the
next /64 for point-to-point conne
On Aug 9, 2005, at 3:20 PM, [EMAIL PROTECTED] wrote:
On Tue, 09 Aug 2005 14:31:08 EDT, James Baldwin said:
What techniques are you referencing? The technique Lynn demonstrated
has not been seen anywhere in the wild, as far as I know. He, nor
ISS, ever made the source code available to anyone
On Tue, 09 Aug 2005 14:31:08 EDT, James Baldwin said:
> What techniques are you referencing? The technique Lynn demonstrated
> has not been seen anywhere in the wild, as far as I know. He, nor
> ISS, ever made the source code available to anyone outside of Cisco,
> or ISS. What publication a
Makes sense. However the PTP addresses need to be internally visible
from an NMS perspective in our network.
-C
-Original Message-
From: James [mailto:[EMAIL PROTECTED]
Sent: Tuesday, August 09, 2005 12:13 PM
To: Cody Lerum
Cc: nanog@merit.edu
Subject: Re: IPv6 Address Planning
On Tue,
The latest is in the warehouse this september. Thanks for the interest.
best,
sean
- Original Message -
From: Sam Crooks <[EMAIL PROTECTED]>
Date: Tuesday, August 9, 2005 10:06 am
Subject: RE: Of Fiber Cuts and RBOC Mega-mergers
> When is that book of yours coming out?
>
> -Orig
On Tue, 9 Aug 2005, J. Oquendo wrote:
> Anyhow, sorry for the rants... The article is pseudo-worth the read
> if you can filter out marketing and crapaganda.
Someone made a video of cisco hard at work fixing router security holes:
http://www.makezine.com/blog/archive/2005/08/video_of_ciscoi.html
On Aug 9, 2005, at 11:11 AM, [EMAIL PROTECTED] wrote:
They are not "Lynn's exploit techniques". The techniques were
published by someone else in considerable more detail than
Lynn along with source code.
What techniques are you referencing? The technique Lynn demonstrated
has not been seen
Currently we are in the process of planning our IPv6 addressing schema
for our network. We are a service provider with around 20 core routers,
and several hundred enterprise customers. These customers currently
connect back to our core via a separate VLANs or channelized
DS1/DS3/OC-X type interfac
> /* ARTICLE
> Experts and users say the hole in IOS appears not to be an immediate
> concern based on what is public knowledge at the moment, since patches
> are available. But what concerns some is that Lynn's exploit
> techniques take router hacking to a new level, which eventually could
> have
On Aug 9, 2005, at 9:57 AM, J. Oquendo wrote:
Ironic the marketing and disinformation coming out of Cisco Systems
in relation to not disclosing what really occurred and labeling the
vulnerability as "IPv6 based but" after they initially stated
it as "IPv6 only!"
Its a half truth. The vuln
When is that book of yours coming out?
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
[EMAIL PROTECTED]
Sent: Monday, August 08, 2005 1:34 PM
To: Gordon Cook
Cc: nanog@merit.edu
Subject: Re: Of Fiber Cuts and RBOC Mega-mergers
The unfortunate part of
http://www.networkworld.com/news/2005/080805-cisco-routers.html
/* ARTICLE
Among the developments last week: Cisco continually revised its
security bulletin, adding details as to how versions of unpatched IOS
software could be undermined by a "specifically crafted IPv6 packet."
Sources at Cisco
> The unfortunate part of all this is there is a demand for diversity,
> especially from the financial and government sectors. One of the
> big problems is that clients seldom know which providers or
> combinaiton of providers give them the most diversity. There are
> some intersting ways to
23 matches
Mail list logo