Joel Jaeggli wrote:
>
> Brian Raaen wrote:
>> Russia (or the USSR at that time) used to use liquid graphite to cool
>> their nuclear reactors, even thought it was flammable of course
>> that was what they were using in Chernobyl.
>
> This has diverged far enough that it's now off the topic of
se water cooling to popularise
> it; if there were two water ports on all the pizzaboxes next to the RJ45s,
> and a standard set of flexible pipes, how many people would start using it?
> There's probably a medical, automotive or aerospace standard out there.
>
> On Tue, Mar 25, 20
$5
Adrian Chadd wrote:
This thread begs a question - how much do you think it'd be worth to do
things more efficiently?
Adrian
All you can say is...* **Caveat emptor.**
[EMAIL PROTECTED] wrote:
>> 2. What's the technical terminology for the request for AT&T
>> to simply start advertising our netblock called? I'm
>> wondering if they're not understanding our request.
>>
>
> You hit the nail on the head with that
Stasiniewicz, Adam wrote:
> In a previous job (circa mid 2004), I had attempted to get materials
removed from a DreamHost client (they where hosting it in violation of
my, at the time, employer's copyright). The DreamHost abuse process was
completely useless, and we ended up having to take direct
LOL.. Yeah, I am on call today - thankfully nothing happened. Anyway, I
hope you had a peaceful day!
--
Leigh
Crawford, Scott wrote:
Well, I guess he told you. :)
Merry Christmas
Scotte
-Original Message-
From: "Jeroen Massar" <[EMAIL PROTECTED]>
To: "
Wow, is this what you folks do at Christmas ?
--
Leigh
Joe Greco wrote:
Right... Let's look at this in detail:
/48 per customer == 65,536 customers at $2,250 == $0.03433/customer
/56 per customer == 16,777,216 customers at $2,250 == $0.00013/customer
So, total savings per customer is $0.03
Another nice feature would be cheap cheap optics with say 500M-1KM reach
for inter-floor connects.
--
Leigh
Robert E. Seastrom wrote:
A practical question here: does anyone know offhand if 4km reach is
adequate for interbuilding access (i.e., DC[124] to DC3) access at
Equinix Ashburn, incl
We have a load of test kit here running Windows, it frightens me as it
gets moved from lab to lab office to office and nobody runs anything on
it to keep in check.
It's a sad sad world when you need anti virus software on your lab test kit!
I mean really, how screwed up is it to run Windows on
Robert E. Seastrom wrote:
Barry Shein <[EMAIL PROTECTED]> writes:
P.S. It's an interesting thought. The only approach to a solution I
could imagine is that the whole address would have to be passed in the
MX query.
Once upon a time (1987) there was this experimental facility called M
If there was, I sure would not join it. It'd be full of "I cannot send
mail to your domain blah blah"
--
Leigh
Justin Scott wrote:
> Is there a mailing list similar to NANOG specifically for e-mail
> operations? I've seen some smaller lists around that deal with specific
> issues (spam, etc.)
Bill Nash wrote:
> On Fri, 9 Nov 2007, Jay R. Ashworth wrote:
>
>
>> On Fri, Nov 09, 2007 at 11:11:28AM -0500, Martin Hannigan wrote:
>>
>>> On Nov 9, 2007 11:00 AM, Bill Nash <[EMAIL PROTECTED]> wrote:
>>>
Given the serious impact this is having on operations, does this have a
Yeah.. I would nmap it, see whats there and check for web sites etc.
Also check revdns/fwddns for the address space and see if they match and
have microsoft registered domains.
--
Leigh
Church, Charles wrote:
> Looks fishy. Why would a company the size of Microsoft register a
> single /25?
A friend of mine who is a Jehova's Witness read something about the
Internet and the end of the world in Watchtower recently. Could it be
the same thing do you think?
Perhaps they got it right this time?
--
Leigh Porter
Andrew Odlyzko wrote:
> Isn't this same Dr. Larry Robert
And with working QoS and DSCP tagging flat rate works just fine.
Andrew Odlyzko wrote:
> Flat rate schemes have been spreading over the kicking and
> screaming bodies of telecom executives (bodies that are
> very much alive because of all the feasting on the profits
> produced by flat rates).
Rod Beck wrote:
>
> > The vast bulk of users have no idea how many bytes they
> > consume each month or the bytes generated by different
> > applications. The schemes being advocated in this discussion
> > require that the end users be Layer 3 engineers.
>
> "Actually, it sounds a lot like the Ele
Iljitsch van Beijnum wrote:
>
> On 24-okt-2007, at 16:44, Rod Beck wrote:
>
>> The vast bulk of users have no idea how many bytes they consume each
>> month or the bytes generated by different applications. The schemes
>> being advocated in this discussion require that the end users be
>> Layer 3
Hi All,
I am looking for hosting facilities for about 10-20 racks and Internet
transit with good local connectivity in Jordan, can anybody help?
Thanks,
Leigh Porter
UK Broaband/PCCW
You are more likely to get 5000 zonealarm emails
Justin M. Streiner wrote:
>
> On Fri, 12 Oct 2007, Chris Owen wrote:
>
>> You can't consider every wacko on the net when doing something like
>> this. Anyone who considers a ping an attack probably isn't worth
>> worrying about.
>
> I tend to
27MB? I duno, that's quite a lot.. I'll have to delete some mp3s first..
Duane Wessels wrote:
>
>
> ISI folks have been taking this census since at least mid 2003.
>
> We vizualized their data using our tool and then made a movie showing
> the changes from 2003 to late 2006. If you have 27 MB a
Yeah, try buying bandwidth in Australia! The have a lot more water to
cover ( and so potentially more cost and more profit to be made by
monopolies) than well connected areas such as the US.
Also there may be more tax costs, staff costs, equipment costs with
import duty etc which obviously means
Cabling Installatin & Maintenance Magazine
Sounds like a fascinating read ;-)
Frank Coluccio wrote:
> Article: Abandoned Cable Removal A Dogged Challenge For All
> Cabling Installatin & Maintenance Magazine
> By Patrick McLaughlin | July 2007 Issue
>
> http://preview.tinyurl.com/32cfak
> --
>
That is certainly very pretty cabling and most people usually start out
with things very pretty. What happens then is that things evolve, you
run out of space and have to put kit in other racks, run loads of
cabling there and then it gets moved again and then you add more cables
and then a fibre
mailto:[EMAIL PROTECTED] On Behalf Of
> Warren Kumari
> Sent: Monday, September 10, 2007 8:56 AM
> To: Leigh Porter
> Cc: Patrick Muldoon; Vinny Abello; nanog@merit.edu
> Subject: Re: shameful-cabling gallery of infamy - does anybody know
> where it went?
>
>
> One of the pla
We used to have a POP under somebodys stairs in Bristol in the UK and
another POP in the loft of a friend of one of the employees. They sold
their house and the POP stayed there and the new owners knew nothing
about it, imagine their surprise when a telco engineer turned up wanting
to fix a fibre
y on
list anyways...) with mine and am very unhappy that he is trying to
get me involved is his games. He should be unsubscribed from the list
as he has contributed absolutely nothing but garbage!
I disagree, he contributed comedy, which always helps when you're up at
midnight watching your GGSN die :)
--
Leigh Porter
UK Broadband
a customer
> retrieve the file from another customer on their network, then it is
> to go off net for the file.
>
> (LLU (where the ISP has installed their own equipment in the exchange)
> changes this dynamic obviously).
>
> S
Also bear in mind that many wireless systems have constrained uplink
capacity and anything P2P can quite happily kill a wireless network by
using up too much uplink resource.
--
Leigh Porter
LOL!
I guess if they are from different source addresses, varying UDP ports
etc and the total bandwidth in infeasible for a typical video stream..
Thankfully it sounds quite easy to build a filter for.
--
Leigh
Marshall Eubanks wrote:
Are you sure you don't have a customer watching stre
But why would they care where the nameserver is? Point 2 would seem to
be a little stupid a thing to assume. Also, what happens if, at that
moment, the ICMP packet is stuck in a queue for a few ms making the
shortest route longer.
--
Leigh
[EMAIL PROTECTED] wrote:
> On Mon, 06 Aug 2007 11:53:1
Petri Helenius wrote:
Could be, I heard that she was hosting the new Piratebay SupaNove service..
--
Leigh
> Leigh Porter wrote:
>>
>> Hey,
>>
>> BEcause you really need it ;-)
>>
>> 30 second input rate 77849000 bits/sec, 7236 packets/sec
>>
I hope they have good peering :)
Blake Pfankuch wrote:
I would be interested to see how a torrent reacts on a line like that :D
-Blake
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
Leigh Porter
Sent: Thursday, August 02, 2007 12:36 PM
To: Peter
We always used to put full customer details in RIPE for AS6765 and
AS5378. I never had any issues or queries from anybody, they were just
told that this is how it is done.
--
Leigh Porter
Steven Champeon wrote:
> on Wed, Aug 01, 2007 at 09:47:45AM -0400, Drew Weaver wrote:
>
>&
Hiya,
Plenty of boxes can do redirection in the middle such as Redback,
Ellacoya etc.
We redirect customers who are infected to a web page when the first
connect. Then every few hours they get re-directed again, just enough so
it's a bit annoying.
If they ignore this for a few weeks, they get re
I see a global demand for perhaps 5 CRS-1s ;-)
Brandon Butterworth wrote:
Wouldn't residential fiber be
expected to radiate out from neighborhood break-out boxes, or at the
longest from a central office in the middle of town, rather than having
some central point where enough individual stra
Come on folks, don't be afraid. We all know the beast is to blame for
this, just don't say the name three times...
Shub Internet
Philip Lavine wrote:
I just don't understand how if there is 1 segment that gets lost how this could
translate to such a catastrophic long period of slow-start.
I used to get about 60ms from router to router in TAT12/13 (I think)
from London Telehouse to NY Telehouse.
Security Admin (NetSec) wrote:
Sprint has probably the lowest latency in the industry; I use them for a Los
Angeles - London IPSec VPN. Typical latency is around 140-150 ms rt (70
david raistrick wrote:
>
> On Tue, 19 Jun 2007 [EMAIL PROTECTED] wrote:
>
>> information (i.e. source of all data). Canonical data is in
>> routing/forwarding tables on routers/switches. That's the operational
>> reality.
>>
>> The amount of data that you need to track IP allocations just doesn't
[EMAIL PROTECTED] wrote:
On Tue, 19 Jun 2007, William Allen Simpson wrote:
Drew Weaver wrote:
Does anyone have a recommendation of any software products
either commercial or freeware which will import the ip routing table
from one of my routers/switches and display it in a sor
Douglas Otis wrote:
On Jun 19, 2007, at 8:35 AM, Suresh Ramasubramanian wrote:
On 6/19/07, Leigh Porter <[EMAIL PROTECTED]> wrote:
Agreed, SMTP is not really a special vector, other than it's obvious
commercial spam use. So just block all the usual virus vector ports,
block 2
William Allen Simpson wrote:
Drew Weaver wrote:
Does anyone have a recommendation of any software products
either commercial or freeware which will import the ip routing table
from one of my routers/switches and display it in a sorted manner? We
just need an easier distributed method
Just out of interest, why are you looking at routing tables to find an
available subnet?
--
Leigh Porter
Scott Weeks wrote:
--- [EMAIL PROTECTED] wrote:
Does anyone have a recommendation of any software products either
commercial or freeware which will import the ip routing
Indeed and there is no need to fine them. Simply quarantine them in a
way that allows outbound WWW access and nothing else. Most customers
will not notice anyway. You could also occasionally re-direct them to a
forced-portal that tells them they are infected with something and
describing how to f
e periodic measurments of TCP throughput, UDP
throughput and packet loss was far more interesting.
--
Leigh Porter
Brandon Butterworth wrote:
I found it amusing the FBI saying "don't call us (either)."
Can't say I blame them, most reports from people who installed
a security device they know nothing about seem to CC the FBI
They must be bored tracking down why our web servers are
attacking people wit
Hiya all,
This is similar to some work being carried out by the WiMAX Forum at the
moment.
As for the forum, I'd be willing to provide anonymised output from our
Ellacoya boxes.
--
Leigh
Mark Allman wrote:
>
> Folks-
>
> This is a bit off-topic, but I wanted to make folks aware of it and no
Why did they even go for him in the fist place?
Has anybody heard of operation Ore in the UK? It looks like a bit of a
disaster, who would have thought that stolen credit Card details would
have been used to buy illegal porn?
--
Leigh
Alexander Harrowell wrote:
Well, it seems to be a stan
Iljitsch van Beijnum wrote:
On 8-jun-2007, at 12:01, <[EMAIL PROTECTED]>
<[EMAIL PROTECTED]> wrote:
In this case I would suggest that it is in ISPs best interests to get
involved with network content blocking, so that ISPs collectively become
deep experts on the subject. We are then in a po
ssshhh
David Freedman wrote:
Its too late, you've already admitted that the data exists and can be
captured.
This is always where it starts...
Dave.
Leigh Porter wrote:
Alexander Harrowell wrote:
On 6/7/07, Leigh Porter <[EMAIL PROTECTED]> wrote:
Since only port 8
Alexander Harrowell wrote:
On 6/7/07, Leigh Porter <[EMAIL PROTECTED]> wrote:
Since only port 80 is passed through the filter then of course there are
all manor of things you could do to circumvent the filter and this will
of course always be the case as people will use whatever they
of port 80 and
everybody's happy for a while.
Perhaps it'll even go away.
--
Leigh Porter
.html
Also the lists are actually updated fairly regularly.
--
Leigh Porter
ou want is to subscribe to a decent USENET service
and get it all from that.
For what it's worth though it works well for what it is and we certainly
get a few hits on it.
--
Leigh Porter
Alexander Harrowell wrote:
I strongly recommend you read Richard Clayton's paper on how (among
other things) one could hack the Cleanfeed system to *find* the really
bad stuff. He and his colleagues at the Cambridge Computer Lab also
have a fine blog - http://www.lightbluetouchpaper.org
I don
Which ones?
Brandon Butterworth wrote:
As to what CNN are doing with their DNS, I've no idea, but I don't think it
concerns Nanog
Other news sites are available
regards,
brandon
http://news.bbc.co.uk/
They can have remote desktop sessions to an Indian city somewhere and
employ a few thousand people to click the OK buttons ;-)
--
Leigh
Owen DeLong wrote:
Tongue in cheek:
Perhaps they upgraded to Vista on their servers and they are all
waiting
for someone to come around and answ
Simon Waters wrote:
On Thursday 26 April 2007 00:43, you wrote:
A chap I know (for some reason) set his source port
for queries to be port 53 and his DNS queries started to fail.
It was the default source port for DNS queries in some versions of BIND. And
may well still be (I don't d
Yeah they and a few others started doing this not too long ago (few months). I
thought perhaps something common got upgraded/patched but then I just thought
that it was a rather odd configuration change..
It certainly is new. A chap I know (for some reason) set his source port for
queries to b
what is it?
Jim Shankland
Also, it's a "modified" TCP not just tuned. I wonder how modified it is?
Will it talk to an un-modified TCP stack (whatever that really is) ?
--
Leigh Porter
Adrian Chadd wrote:
On Tue, Apr 24, 2007, [EMAIL PROTECTED] wrote:
The next day, the team used a modified version of TCP to achieve an even
greater record. Using the same 30,000 km path, the network was able to
achieve a throughput of 9.08 Gbps which is equal to 272,400 Tb-m/s for both
the
Don't forget to post to the list where you will do this so I can come
and watch ;-)
Marcus H. Sachs wrote:
Mr. Oquendo (I presume "Mr." but if it's "Ms." please accept my
apologies...), it appears that there is little common ground between you and
me. So, rather than stringing this out for
Dragos Ruiu wrote:
On Thursday 19 April 2007 18:25, Simon Lyall wrote:
If you are a random person who comes across a security hole in a website
or commercial product then the best thing to do is tell nobody, refrain
from any further investigation and if possible remove all evidence you
ever
any notice of being informed of it anyway,
because they were informed of it a number of times..
--
Leigh Porter
hard.
---rob
Leigh Porter <[EMAIL PROTECTED]> writes:
Somebody form a certain large network vendor actually blamed problems
with their kit on cosmic rays causing memory corruption...
--
Leigh Porter
Jay Hennigan wrote:
Andre Oppermann wrote:
Audie On
Somebody form a certain large network vendor actually blamed problems
with their kit on cosmic rays causing memory corruption...
--
Leigh Porter
Jay Hennigan wrote:
>
> Andre Oppermann wrote:
>>
>> Audie Onibala wrote:
>>> Yesterday on 04/16/07 between 3:0
This way it does not matter than some box somewhere does not support anything
greater than a 1500 byte MTU, anything with such a box in the path will simply
not support a jumbogram. How do you find out? Just send a jumbogram across the
path and see what happens.. ;-)
--
Leigh Porter
UK Broa
ce
people to use our mail servers that have sensible rate limiting etc.
People who use alternate SMTP servers can fill in a simple web form to
have them added to the exception list. We have about 50 on this list so far.
--
Leigh Porter
66 matches
Mail list logo