I think if program design criterion would change, to coding secure applications then
the problem would be reduced dramatically
-HenryPetri Helenius [EMAIL PROTECTED] wrote:
Matthew Kaufman wrote:End-to-end requires that people writing the software at the end learn aboutbuffer overruns (and other
A bunch of optical ethernet guys make everything one would need from the enterprise to the metro area, GigE to dwdm to sonet/sdh http://www.luminous.com/
-HRLDeepak Jain [EMAIL PROTECTED] wrote:
A bunch of guys make these in very simple configurations.MRV:
-BEGIN PGP SIGNED MESSAGE-Hash: SHA1
Oh boy, well first and foremost the root servers and database areowned by the public because they were paid for from the TAX-BASE.
Second and foremost the technology to redirect web pages and ips isnot new or innovative, kiddies used to do it on
That is a positive note, hopefully the new group will give us a public statement
of its intentions.
-HenryMark Vallar [EMAIL PROTECTED] wrote:
Just got this email from Network Solutions...Hm--mvalFrom: Network Solutions, Inc.[mailto:[EMAIL PROTECTED]Sent: Thursday, October 16, 2003 10:31
Innovation and the Internet
http://news.com.com/2010-1071-5086769.html
is about 12 hours old on google news
-HenryBrian Bruns [EMAIL PROTECTED] wrote:
Well, I donno about anyone else, but I absolutely suck on the PR end ofthings.Now, I *am* good at writing documentation for end users (I used to
That is so not very funny, andafterthis latest move on verisigns part, Iwouldn't trust online voting forthe next 1000 years..and you can "quote" me on that...
-Henry
Eric Germann [EMAIL PROTECTED] wrote:
Hope they don't just wildcard the virtual hanging chads...They could start with a vote
are there any better tools that will accmoplish the same thing for win2k/xp users
-HenryPetri Helenius [EMAIL PROTECTED] wrote:
William Caban wrote:Are NANOG meetings webcasted? More specifically, Is NANOG29 going to bewebcasted/multicasted/netcasted? NANOG meetings have typically very narrowband
http://www.luminous.com has ip telephony solutios that are secure
read under products and request your own information
-HenryChristopher Bird [EMAIL PROTECTED] wrote:
There has been much buzz of late about using IP telephony solutions inplace of the more common analog based solutions.Traditional
I used to help design these products and I veified them
http://www.luminous.com/
-HenryAndy Walden [EMAIL PROTECTED] wrote:
On Tue, 9 Sep 2003, Gil Levi wrote: Can anyone help me convert a 100MB Ethernet interface to an OC-3 POS interface in a small cheap box ?Depends on what you mean by cheap?
Microsoft has a task scheduler that people should learn to use to remind
them to check update to make sure their patches are current, it is
located in the control panel and labled Scheduled Tasks and has an
Add Scheduled Tasks icon to add update, FYI
-HenryJack Bates [EMAIL PROTECTED] wrote:
Now having personally experienced the worm myself.
This is how it went, there was no known way to remove the worm with
any current software for the variety that I had, it was mutagenic, recognized
AVP, and other forms of disinfectors and went nuts propagating itself to the
point the only
It comes standard with a firewall built in, which is not user friendly and you
have to still purchase a firewall that allows user access to control what
gets blocked and what does not, most intelligent people turn it off.
-HenryEdward Lewis [EMAIL PROTECTED] wrote:
[Veering further
This should help some for people who are worried
http://securityresponse.symantec.com/avcenter/FixBlast.exe
-Henry"Steven M. Bellovin" [EMAIL PROTECTED] wrote:
In message <[EMAIL PROTECTED]>, "Dominic J. Eidson" writes:On Mon, 11 Aug 2003, Jack Bates wrote: Sean Donelan wrote:
This is almost comical when I read this, when I sit out here and see people
getting whacked at 3Gb/s and from an estimated 2.3 million drones,
sitting on various proxies and hacked .edu accounts.
Where are the pages that have solutions for such intense attacks
and if you don't want to say
When looking at IRC and chat networks in general you have to look at them
from the internet since the attacks are launched from the internet outside
of any irc. The originators of the attacks use irc as a front to distract the
investigators effort to find their real points of origin.
In the past
Here is a company who thinks they have a solution for spam
http://www.nwtechusa.com/ironmail-zd-srit-enterprise-security.html
-Henry[EMAIL PROTECTED] wrote:
I would have though people would have learned by now that there is no technical solution to spam. You can go ahead with all these
I agree with Pauls' position on anti-spoofing, without that, you are fighting A
losing battle.
Henry R LinnewehPaul Vixie [EMAIL PROTECTED] wrote:
Filtering the bogons does help, and everyone should perform anti-spoofing in the appropriate places. It isn't, however, a silver bullet.it's
We have attempted in the past tried to deal with Arin on this issue
and they as usual deny anything that could potentially be useful,
in thwarting these attacks.
There have been some people with good idea's, however when you
have a 1 gig bi-directional pipe and you have 2Gb/s incoming these
July 17, 2003DoS Flaw in Cisco Router, Switches By Ryan Naraine
http://www.atnewyork.com/news/article.php/2236591
I simply would like to borrow this /24 if you are not going to use in the near and distantfuture or ever for that matter.
It can not be attached to any subdomain and or any or part of any routing table,
this would most helpful in the development of methods to prevent ddos and dos.
Thank you very
101 - 120 of 120 matches
Mail list logo