Hello,
If anyone on the list works for or has a reliable contact at CP Internet (Duluth,
MN)then please contact me off-list ASAP. I have tried the NOC and ABUSE to no avail.
Thanks.
Scott Vachon
CNS-Salem Network Group
Paymentech L.P.
Learn more about Paymentech's payment processing serv
> all
> those who approve
> of the wildcards would put their token-of-choice in another pile.
>
Might I suggest the "joker" out of a deck of playing cards ? ; )
Learn more about Paymentech's payment processing services at www.paymentech.com
THIS MESSAGE IS CONFIDENTIAL. This e-mail message
> [EMAIL PROTECTED] wrote:
> > Beware the single point of failure. If all your clocks
> come from GPS, then
> > GPS is the SPOF.
>
> Can you describe what would be involved to cause this sort of single
> point of failure to fail?
>
> Eliot
>
just me wrote:
> - Antenna failure
> -
>Did this thing
>expire (in which case, roughly 10% of all infected machines have
>misconfigured clocks, assuming the exp date was in UDT), or did something
>else happen? Just curious...
According to sarc.com:
The worm de-activates on September 10, 2003. The last day on which the worm will
sp
>OK... Maybe I'm smoking crack here, but, if they have the list of 20
>machines,wouldn't it make more sense to replace them with honey-pots that download
>code to remove SOBIG instead of just disabling them?
Only if we make assumptions that what they state is 100% fact and the whole truth of
th
> Bryan Heitman wrote:
>
>> Several networks I have talked to are reporting they can't get to
>> www.microsoft.com
>>
>> Has the virus began? anyone?
>
>
> Yep, remember it's already August 16th in some parts of the world.
> Unable to get to www.microsoft.com at 0958 EDT.
>
Northeastern US. No
>Has anyone seen/heard of this virus propagating through email in any way?
>We appear to have been infected on a network that is very heavily
>firewalled from the outside, and are trying to track down possibly entry
>methods the worm might have had...
I know of a few associates who have been infe
> while i think many of us will welcome this, i am skeptical of what
> the firewall will be 'enabled' to block, and how easy it will be
> for the user to set-up rules (and hopefully there will be a sanity
> check included so that 'permit in any' is not a valid option, but
> then 'permit out any' s
addendum: These are broadband cable users. All PCs.
-Original Message-
Sent: Tuesday, August 12, 2003 1:57 PM
To: NANOG
Subject: RE: RPC errors
>Has anyone seen/heard of this virus propagating through email in any way?
>We appear to have been infected on a network that is very heavily
>