Greg Whynott writes:
i found it funny how M$ started giving away virus/security software
for its OS. it can't fix the leaky roof, so it includes a roof patch
kit. (and puts about 10 companies out of business at the same time)
I actually like the new arrangement better, where Microsoft
George Bonser gbon...@seven.com writes:
-Original Message-
From: Bret Clark
Sent: Friday, December 10, 2010 7:08 AM
To: nanog@nanog.org
Subject: Re: BGP multihoming question.
On 12/10/2010 10:01 AM, Dylan Ebner wrote:
3. You cannot trust the second isp to advertise the SWIP
Interesting analysis of the 3 LOIC tool variants used in the Anonymous
Operation Payback attacks on Mastercard, Paypal, etc.
http://www.simpleweb.org/reports/loic-report.pdf
LOIC makes no attempt to hide the IP addresses of the attackers, making it easy
to trace them if they are using their
Interesting..
there's an ED about LOIC
http://encyclopediadramatica.com/LOIC
it even gives a instruction on how to deny the use of the tool: (funny)
What if I get caught and Vd?
You probably won't. It's recommended that attack with over 9000 other
anons while attacking alone pretty much means
-Original Message-
From: Marshall Eubanks [mailto:t...@multicasttech.com]
Sent: Saturday, December 11, 2010 10:20 AM
To: North American Network Operators Group
Subject: LOIC tool used in the Anonymous attacks
Interesting analysis of the 3 LOIC tool variants used in the
Anonymous
I was reading about this- yeah really anonymous.
http://praetorianprefect.com/archives/2010/12/anonymous-releases-very-unanonymous-press-release/
Also:
http://www.boingboing.net/2010/12/11/anonymous-isnt-loic.html
Andrew
From: Stefan Fouant sfou...@shortestpathfirst.net
To: 'Marshall
check the agreed maintenance windows as defined in the (SLA)section Maintenance
Plans - etc
- Original Message
From: Joel Jaeggli joe...@bogus.com
To: valdis.kletni...@vt.edu
Cc: nanog@nanog.org
Sent: Fri, December 10, 2010 6:48:41 PM
Subject: Re: [Operational] Internet Police
location?
- Original Message
From: Matt Disuko gourmetci...@hotmail.com
To: NANOG nanog@nanog.org
Sent: Thu, December 9, 2010 3:02:59 PM
Subject: Global Crossing/GBLX tech needed - AS3549
Can a Global Crossing IP engineer please contact me off-list?
Thanks,
Matt
It's hard to believe that it took eight people to run wireshark and
write this simplistic paper about LOIC. The analysis is weak at best
(it seems they only had a few days to study the problem), and never
analyzes the source code which has been widely available at
In a message written on Sat, Dec 11, 2010 at 10:19:32AM -0500, Marshall Eubanks
wrote:
LOIC makes no attempt to hide the IP addresses of the attackers, making it
easy to trace them if they are using their own computers.
Perhaps the authors of the tool would rather keep the finite law
On Fri, 10 Dec 2010 15:32:10 -0500
Drew Weaver drew.wea...@thenap.com wrote:
I should've qualified my question by saying What valid application
which traverses the Internet and could be seen at the edge of a
network actually uses UDP 80?
I'll grant that my response was a bit pedantic: there
On Dec 11, 2010, at 4:21 PM, Leo Bicknell wrote:
In a message written on Sat, Dec 11, 2010 at 10:19:32AM -0500, Marshall
Eubanks wrote:
LOIC makes no attempt to hide the IP addresses of the attackers, making it
easy to trace them if they are using their own computers.
Perhaps the
Like I said the other day on Cnet comments section, December 10, 2010 3:31 PM
PST.
It is extremely easy to find out who everyone is, because the
anonymous is decentralised and easy to infiltrate and manipulate.
Andrew
From: Leo Bicknell bickn...@ufp.org
To: North American Network Operators
The USSS has jurisdiction over all DDoS (threats to critical infrastructure).
Jeff
On Wed, Dec 8, 2010 at 3:30 PM, andrew.wallace
andrew.wall...@rocketmail.com wrote:
I would say the attack falls under the jurisdiction of the US secret service
since this is an attack on the financial system.
So then why is there a cyber command and a cyber group part of homeland
security charged with protection of critical infrastructure if critical
infrastructure is the responsibility of USSS? Looks like we have too many
keystone cops (the AF advertises an operational Cyber Command with nothing
http://www.secretservice.gov/ectf_newyork.shtml
Each field office has their own page.
Jeff
On Sat, Dec 11, 2010 at 8:42 PM, TR Shaw ts...@oitc.com wrote:
So then why is there a cyber command and a cyber group part of homeland
security charged with protection of critical infrastructure if
On Fri, Dec 10, 2010 at 5:51 PM, Joel Jaeggli joe...@bogus.com wrote:
On 12/10/10 12:33 PM, Drew Weaver wrote:
Nobody has really driven the point home that yes you can purchase a
system from Arbor, RioRey, make your own mitigation system; what-have
you, but you still have to pay for the
I'm certain there are thresholds to that. Carrier grade mitigation
solutions will start low and ramp up to 5, 6, 7, etc. figures
depending on the attack and amount of bandwidth to be filtered among
other variables.
Jeff
On Sun, Dec 12, 2010 at 12:05 AM, Christopher Morrow
On Sun, Dec 12, 2010 at 12:20 AM, Jeffrey Lyon
jeffrey.l...@blacklotus.net wrote:
I'm certain there are thresholds to that. Carrier grade mitigation
solutions will start low and ramp up to 5, 6, 7, etc. figures
depending on the attack and amount of bandwidth to be filtered among
other
On Sun, Dec 12, 2010 at 12:05 AM, Christopher Morrow
morrowc.li...@gmail.com wrote:
verizon's ddos service was/is 3250/month flat... not extra if there
was some sort of incident, and completely self-service for the
customer(s). Is 3250/month a reasonable insurance against loss?
(40k/yr or
On Sun, Dec 12, 2010 at 12:42 AM, Aaron Glenn aaron.gl...@gmail.com wrote:
On Sun, Dec 12, 2010 at 12:05 AM, Christopher Morrow
morrowc.li...@gmail.com wrote:
verizon's ddos service was/is 3250/month flat... not extra if there
was some sort of incident, and completely self-service for the
21 matches
Mail list logo