Why should ISPs still pay to support subscriber e-mail either inhouse
or outsourced, any more than paying to support USENET, Chat, FTP/HTTP
Hosting, etc? Let subscribers choose whichever "free" or "fee-based"
supplier, and wash your hands of both the support issues and the legal
compliance
The discussion started out regarding an IP-over-cable ISP. Please
point me at places where there is significant *real* competition (i.e.
addresses that have more than one copper cable-TV line running into the
consumer residence).
There are a number of cable overbuilders out there. Knology,
Anyway, does anyone have a suggestion for determine our next
best transit? Essentially, I am looking for techniques of:
1. Gathering our current traffic patterns and subtotalling
source/destination IP by ASN.
Flowscan will do this. Origin and path.
2. Gathering our BGP views into a useful
Should your company be preparing to operate v6 services
at all? Popular opinion is that when the automobile was
invented, all buggy manufacturers shut down. This is
not true. http://www.liveryone.net/
A buggy company founded in 1972?
What kind of comparison are you trying to make? Wait 75 ye
Not that it matters, but Hamas is the government of parts of Palestine,
no matter how much heartburn this gives some people, and the Elashis
are diaspora Palestinians.
And they did violate US laws in the US.
Ah well, maybe they will get deported when they get released from prison,
just lik
Christopher L. Morrow wrote:
I'm confused by the reasoning behind this public-root (alternate root)
problem... It seems to me (minus crazy-pills of course) that there is no
way for it to work, ever. So why keep trying to push it and break other
things along the way?
No wonder that some peopl
What security risk does TFTP pose that isn't also shared by
HTTP?
Not security of the protocol necessarily, but you will find that TFTP is
filtered by a number of cable modem providers on the CPE side of the cable
modem.
Not arguing if filtering/not filtering it is better, just thats one
I'm wondering what is the best way to detect people doing these things
on my end. I realize there are methods to protect myself from people
attacking from the outside but I'm not real sure how to pinpoint who is
really being loud on the inside.
One of the best things we did was setup a snor
I, personally, was told, during a job interview in the San Jose area,
for a position as a Forth programmer, that the desired outcome of the
project was for the cable company to derive access information and
purchasing information from the streams of electrons coursing through
their cable medium.
M
The fact is, DSL is a competitive market, Cable is not, competitive
markets keep customers happy, monopolies anger people.
How are they different?
With DSL, you are usually using the ILECs copper to provide service and
paying them.
With cable, there are some places that offer a choice in provid
And Big Pond is my hero. :-)
http://www.zdnet.com.au/news/communications/0,261791,39188135,00.htm
I'm not sure I'd break my arm trying to pat them on the back yet. They
have a ways to go in SMTP filtering their users so that when they are
infected with trojans, they aren't abused to send spa
Unblocking on customer request is an expensive operation, for both the
ISP and the customer.
And they frequently assume that network operations changes are
free---Comcast reported that it would cost $58 million to implement port
25 blocking and notify customers, just for Comcast.
Anyone can co
When I reported this the bug/feature was changed but I noticed a while
back (late 8.x maybe 9.0) that it is back. So if the purp can get you to
the wrong server only once it may be possible to keep you there.
It was actually fixed in 9.2.3rc1.
1429. [bug] Prevent the cache getting lock
http://www.cnn.com/2005/TECH/internet/03/23/internet.phones.911.ap/index.html
On Thu, 3 Feb 2005, Michael Loftis wrote:
--On Thursday, February 03, 2005 11:42 + [EMAIL PROTECTED]
wrote:
Do you let your customers send an unlimited number of
emails per day? Per hour? Per minute? If so, then why?
Because there are *NO* packages available that offer limiting. Free or
co
> I thought I saw some 'MUST' statements in an RFC
[*] From RFC 1912, section 2.1.
http://www.faqs.org/rfcs/rfc1912.html
"Every Internet-reachable host should have a name. The consequences of
this are becoming more and more obvious. Many services available on the
Internet will not talk to you if
On Wed, 23 Jun 2004, Brett wrote:
> At least they now realize they are one of the worst and are finally
> becoming proactive:
>
> http://zdnet.com.com/2100-1104-5230615.html
>
> They are also starting to block port 25.
That is still reactive (first the abuse has to occur, then you try and
filter
On Thu, 25 Mar 2004, Adi Linden wrote:
> Does anyone have any resources on building a mail relay that would limit
> the amount of email a single user or ip address can relay over a given
> time period?
http://monkey.org/~jose/software/vthrottle/
It allows you to say you will only take 1 email f
On Wed, 17 Sep 2003, David Schwartz wrote:
> Microsoft, for example, specifically designed IE to behave in a
> particular way when an unregistered domain was entered. Verisigns
> wildcard record is explicitly intended to break this detection.
Has Microsoft responded to this yet? Seems li
19 matches
Mail list logo