RE: in case nobody else noticed it, there was a mail worm released today

2004-01-26 Thread Wojtek Zlobicki
The worm is being talked about on news.com and all the major virus vendors already have advisories on their websites. The worm in my case masqueraded as a Mailer Daemon bounce. Source email address appeared to be valid and matching a domain of a website I visited recently (but have not for a long

RE: sniffer/promisc detector

2004-01-16 Thread Wojtek Zlobicki
Since all sniffers I know of are passive devices, there really shouldn't be a way to track one down. From a Cisco standpoint, if I were mirroring a port, and had a sniffer mirroring the sniffer port, I would see traffic of a unicast nature with multiple unicast MAC destinations destined at a swith

RE: GSR, 7600, Juniper M?, oh my!

2004-01-08 Thread Wojtek Zlobicki
Ejay, Those would be Intel NICs. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Ejay Hire Sent: Thursday, January 08, 2004 10:17 AM To: 'Alexei Roudnev'; [EMAIL PROTECTED]; 'Jeff Kell' Cc: [EMAIL PROTECTED] Subject: RE: GSR, 7600, Juniper M?, oh my! "

RE: Anit-Virus help for all of us??????

2003-11-25 Thread Wojtek Zlobicki
I would hate to blame the users here. In most organizations it is the role of the IT Dept to manage the workstations and not end users. Severely restricting users privileges is often a good thing, at least from the perspective of being able to control what gets installed on the machines in questi

RE: Worst design decisions?

2003-09-20 Thread Wojtek Zlobicki
Its even funnier what happens when a customer confuses a Netopia console connector with that of the power connector from the next revision :) -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of [EMAIL PROTECTED] Sent: Thursday, September 18, 2003 10:57 AM To

RE: uunet

2003-01-19 Thread Wojtek Zlobicki
This type of situation has been extensively discussed and debated here. If you are not UUNet's direct customer (or many other providers for that manner), they likely cannot and will not open a ticket. If MFN is your upstream, open up a ticket with them. -Original Message- From: [EMAIL PRO

Re: Effective ways to deal with DDoS attacks?

2002-05-01 Thread Wojtek Zlobicki
> Then you are pushing out /32's and peers would need to accept them. Then > someone will want to blackhole /30's, /29's, etc. Route bloat. Yum! I am in no way proposing discounting current filtering rules. There are alway two different intersts one must consider, one that of the customer an

Re: Effective ways to deal with DDoS attacks?

2002-05-01 Thread Wojtek Zlobicki
> > What processes and/or tools are large networks using to > > identify and limit the impact of DDoS attacks? > > A great deal of thought is being expended on this question, I am certain, > however, how many of these thought campaings have born significant fruit yet, > I do not know. How about