Besides, have you ever tried updating an XP system at 56k? It could
literally take days.
Yes, days if you have never updated the system at all or if you count
minutes as days.
And if you just bought a new system, it should have the big update
(SP2) installed on the machine already, unless
On Wed, Sep 03, 2003 at 10:55:47AM -0400, [EMAIL PROTECTED] wrote:
On Wed, 3 Sep 2003, at 10:41am, [EMAIL PROTECTED] wrote:
And if you just bought a new system, it should have the big update (SP2)
installed on the machine already ...
Service Pack 2 for Windows XP has not been released
Oops, didn't fully understand the post before I hit reply.
Ignore that little rant.
On Sun, Aug 31, 2003 at 03:44:00PM -0700, David Schwartz wrote:
If you don't want to, don't accept that traffic. It's just like a store
stocking Christmas toys. If they don't sell, you're stuck with them. A
customer will only pay for what he wants, not what you think he should want.
My
On Fri, Aug 29, 2003 at 02:15:49PM -0400, Matthew Crocker wrote:
SMTP_AUTH authenticated users to a mail server. What I'm talking
Postfix will let you do SMTP authentication from one mail server
to another, and to address the person who said a school was brute-
forced, this is from server to
On Fri, Aug 29, 2003 at 04:08:52PM -0400, Vivien M. wrote:
If this solution had been implemented 5 years ago instead of the no third
party relays system now in place, I wouldn't be opposed to it... But the
issue is that the use the local SMTP server to send model is the main one
deployed in
On Fri, Aug 29, 2003 at 09:44:11PM -0400, Sean Donelan wrote:
How many ISPs disconnect infected computers from the network? Do you
leave them connected because they are paying customers, and how else
could they download the patch from microsoft?
Let's see...
* I don't know how many, at
On Sat, Aug 30, 2003 at 12:21:02PM +0100, Stephen J. Wilcox wrote:
It really doesnt make any difference, if you change the rules by implementing
auth etc the spammers will just adopt and it follows that the more thorough you
are in the anti-spam measures, the more drastic the spammers will
On Thu, Aug 28, 2003 at 10:06:10AM -0400, Roland Perry wrote:
Here's another tale of undeliverable email. It seems that [at least] one
of those organisations you mention assigns IP addresses for its ADSL
customers from the same blocks as dial-up. Which means that
organisations using MAPS-DUL
trusted-mx.crocker.com uses DNSRTTL (Real Time Trust List) to only
accept connections from IPs it trusts.
Hate to break up your envisionary experiences and insight into
reinventing the wheel, but what happened to consideration of
SMTP authentication?
On Mon, Aug 25, 2003 at 06:03:15PM -0500, Andy Walden wrote:
I don't trust Microsoft to get the patch right, not arbitrarily delete my
data, or change my machine in some unexpected fashion that I will not
approve of. Granted, I, nor are most people on this list, the average Joe
PC user, but I
On Mon, Aug 25, 2003 at 11:50:10AM -0400, Roland Perry wrote:
In article [EMAIL PROTECTED], Paul A.
Bradford [EMAIL PROTECTED] writes
Hmm,
and how would you protect the remote controlled MS firewall software
from:
1. Vulnerabilities itself since MS is building it?
2. the remote
On Mon, Aug 25, 2003 at 03:15:06PM -0400, Robbie Foust wrote:
Also, perhaps Microsoft put that
high per-call rate into play to SLOW DOWN the amount of calls they
were getting, not because Bill Gates is greedy.
This was a theory, not an interpretation.
Microsoft isn't charging for support
If you're responsible for any of the IPs on the list, better
permanently remove them from your DHCP pools, IP assignments,
dial-up pools, or anything else that assigns IP addresses,
because these will be filtered and forgotten for the next
200 years.
For our Postfix viewers out there...
header_checks:
/^X-MailScanner: Found to be clean$/REJECT You're infected, but you probably won't
see this message anyway.
body_checks:
/X-MailScanner: Found to be clean/ REJECT Please, stop sending me
bounces/infection notices for spoofed virus
On Sun, Aug 17, 2003 at 08:28:44PM -0400, Sean Donelan wrote:
So, the US Government wants to classify Sean Gorman's student project.
The question is did Mr. Gorman's maps divulge the vulnerability in the
East Coast power grid that resulted in the blackouts this week?
Would it be better to
And here we all go again, talking about something we have no clue
about. In case you have forgotten, I would like to remind you all
of certain things (in no particular order).
You ARE NOT:
a) electric utilities
b) independent system operators
c) utility workers who actually climb poles
d)
On Thu, Aug 14, 2003 at 05:37:44PM +0100, Richard Cox wrote:
What I do like in the latest release of Zone Alarm Pro is that it will
stop ANY program from connecting outbound on Port 25 unless that program
has been specifically authorised to send mail. It was quite informative
to see which
How about quoting the excerpt in question than telling me to pick up
a book that I would lose interest in after the first ten pages?
I?ll start looking for this to happen when Microsoft manages to release
an OS version which does not contain remote exploitable flaw before
the boxes hit the store self.
If FreeBSD, OpenBSD, NetBSD, RedHat, Debian, SuSE were packaged and
and sold in stores, how would this be any different? Oh
So by telling people to shut up you expect to make the world more secure? Right :)
No, but merely talking about the how much the vendor sucks doesn't
make them suck any less nor the users suck any more.
But in the telco world, how often do you have people's home phones
trojanned and directed to 'DoS' another company? To pull that off
with great magnitude, you need a whole lot of coordinated access
to the physical plant, which is either impossible or extremely
noticeable. But in a scenario like
can't explain it to them, then you should step back and look at who you
really have for customers. Enough said.
--
Omachonu Ogali
Information Wave Technologies
[EMAIL PROTECTED]
http://www.informationwave.net
Who cares? It's not like one of you got ripped off by 419. Load up
SpamAssassin and forget about it. Kinda sad how a thread that
started about finding networkers in Africa turns into derogatory
remarks about countries you have no clue about.
Shut up and move along.
--
Omachonu Ogali
Information
24 matches
Mail list logo