German Shepherd Dogs are wonderful intrusion detection devices. In a lot of
cases they also server as excellent intrusion prevention devices as well.
(Must be Friday night)
:-)
---
Theory is when you know everything but nothing works. Practice is when
everything works but no one knows why.
On Fri, Feb 13, 2015 at 11:40 AM, Andy Ringsmuth wrote:
> NANOG'ers,
> I've been tasked by our company president to learn about, investigate and
> recommend an intrusion detection system for our company.
An important thing to realize is that an Intrusion Detection System is
not a "product" you c
William,
I beg to differ though this is getting slightly off topic.
Art = something different, unexpected, not quite in your ordinary
experience yet related to your ordinary experience.
Art is connected to what we experience every day but it represents some
kind of transformation of the ever
Ammar,
Feel free to contact me off-list, and I'd be happy to take a look into this
issue for you. Thanks!
On 2/13/2015 8:10 PM, Ammar Zuberi wrote:
Hi all,
Does anyone know of a direct phone number for someone with somewhat authority
at GTT? Our prefix has been hijacked by a customer of the
Hi Ammar,
Sorry to hear this has happened. I do not have any contact info, but have you
tried announcing more specific prefixes to override the hijacker?
Jason
On Feb 13, 2015, at 20:10, Ammar Zuberi wrote:
> Hi all,
>
> Does anyone know of a direct phone number for someone with somewhat
Of course it is. You say that like faith is a bad thing.
The illogic of claiming to have no faith in anything is this: it's impractical
to assume the role of quality assurance for everything in your life.
The question is your faith reasonable. Ever use an elevator? Faith. Drive a
car? Faith.
Hi all,
Does anyone know of a direct phone number for someone with somewhat authority
at GTT? Our prefix has been hijacked by a customer of theirs and we haven’t
received any kind of response to our email and the guys on the phone seem to
not speak very good English.
Any ideas?
Ammar.
tl;dr
dc
-mel
> On Feb 13, 2015, at 1:13 PM, "J. Oquendo" wrote:
>
>> On Fri, 13 Feb 2015, Mel Beckman wrote:
>>
>> JO,
>>
>> IDS to meet PCI or HIPAA requirements is "regulatory grade". It meets
>> specific notification and logging requirements. SNORT-based systems fall
>> into this categ
Hello Andy,
I believe you are very good set up the way you are in technology. I see you are
surrounded by BSD systems everywhere, on servers, mobile and desktop. And I
suggest you keep running FreeBSD for this new security requirement you have.
We run FreeBSD as IDS/IPS system on several sites, a
Could anyone from Verizon webmail service contact me regarding access issues?
Thanks in advance.
--
Eduardo Schoedler
On Fri, 13 Feb 2015, Rafael Possamai wrote:
> What is the alternative then... Does he have the time to become a BSD guru
> and master ipfw and pf? Probably not feasible with all other job duties,
> unless he locks himself in his mom's basement for the next 5 years.
>
The alternative is to unders
On Fri, 13 Feb 2015 15:45:30 -0600, Rafael Possamai said:
> What is the alternative then... Does he have the time to become a BSD guru
> and master ipfw and pf? Probably not feasible with all other job duties,
> unless he locks himself in his mom's basement for the next 5 years.
By the time you le
NANOG
Request for a Google / Youtube network eng. to contact me off list to
help troubleshooting.
Thanks,
---
Cory Haessler | CNI | Network Operations Center Manager | 888-618-4638
www.cniteam.com; www.ifnetwork.biz
13888 County
BGP Update Report
Interval: 05-Feb-15 -to- 12-Feb-15 (7 days)
Observation Point: BGP Peering with AS131072
TOP 20 Unstable Origin AS
Rank ASNUpds % Upds/PfxAS-Name
1 - AS23752 260831 4.7%1890.1 -- NPTELECOM-NP-AS Nepal
Telecommunications Corporation, Intern
This report has been generated at Fri Feb 13 21:14:25 2015 AEST.
The report analyses the BGP Routing Table of AS2.0 router
and generates a report on aggregation potential within the table.
Check http://www.cidr-report.org/2.0 for a current version of this report.
Recent Table History
Date
What is the alternative then... Does he have the time to become a BSD guru
and master ipfw and pf? Probably not feasible with all other job duties,
unless he locks himself in his mom's basement for the next 5 years.
On Fri, Feb 13, 2015 at 3:27 PM, Rich Kulawiec wrote:
> On Fri, Feb 13, 2015 at
> Date: Fri, 13 Feb 2015 11:45:06 -0430
> From: alejandroacostaal...@gmail.com
> To: nanog@nanog.org
> Subject: Re: Dark Fiber in Latin America
>
> Hi Beavis,
> Just in case, there is a Lacnog mailing list.., the URL:
> https://mail.lacnic.net/mailman/listinfo/lacnog
> In case you don't get
> From: aa...@heyaaron.com
> Date: Thu, 12 Feb 2015 14:13:56 -0800
> Subject: Vancouver WA Comcast Outage?
> To: nanog@nanog.org
>
> We just lost a handful of customers in Vancouver WA on Comcast.
> Voice and data are out.
>
> Initial reports are saying a transformer blew down town.
Service st
A good tool to test all that is mxtoolbox.com. They have black list checks and
SMTP tests that will check your PTR records and other things. They also provide
free weekly blacklist checks for one domain.
DJ Anderson
Sent from my iPhone
> On Feb 12, 2015, at 10:53 AM, Scott Helms wrote:
>
>
Hi Mike,
You should try CYAN inc and the Z series. (US based) Very solid platform and
very strong warranty.
David Boisseleau
-Original Message-
From: NANOG [mailto:nanog-bounces+dboisseleau=fonex@nanog.org] On Behalf Of
Colin Johnston
Sent: February-07-15 6:29 PM
To: Tim Durack
C
If it's email you are sending from your domain that's getting marked as
spam make sure that you have a reverse DNS setup, an SPF record, and DKIM
signing helps too.
Alex
On Feb 12, 2015 8:42 AM, "Mike Hammett" wrote:
> Don't use GMail for things you care about?
>
>
>
>
> -
> Mike Hammett
> I
Hi all!
We wrote up TIPS memo "an easy way to build a server cluster
without top of rack switches" concept.
This model have a reduce switches and cables costs and high network
durability
by lightweight and simple configuration.
if you interest in, please try to do yourself this concept ;-)
An
Apologies if this comes through twice, it's been waiting for moderation for
30 hours or so.
I am researching a project that would involve running fiber to several
thousand kiosks in a dense metro area. My $dayjob owns very dense metro
fiber footpring in the metro in question, but splicing costs a
I am researching a project that would involve running fiber to several
thousand kiosks in a dense metro area. My $dayjob owns very dense metro
fiber footpring in the metro in question, but splicing costs are high, and
I prefer not to strand a lot of backbone fibers if at all possible.
The customer
On Fri, Feb 13, 2015 at 02:45:46PM -0600, Rafael Possamai wrote:
> I am a huge fan of FreeBSD, but for a medium/large business I'd definitely
> use a fairly well tested security appliance like Cisco's ASA.
Closed-source software is faith-based security.
---rsk
On Fri, 13 Feb 2015, Mel Beckman wrote:
> JO,
>
> IDS to meet PCI or HIPAA requirements is "regulatory grade". It meets
> specific notification and logging requirements. SNORT-based systems fall into
> this category.
>
tl;dr (even I don't read what I write)
You failed to see the snark in "m
On 12 Feb 2015, at 3:12, Skeeve Stevens wrote:
Hi all,
I have two perspectives I am trying to address with regard to network
design and intellectual property.
1) The business who does the design - what are their rights?
2) The customer who asked for the rights from a consultant
My personal t
I am a huge fan of FreeBSD, but for a medium/large business I'd definitely
use a fairly well tested security appliance like Cisco's ASA. Depending on
the traffic you have on your fiber uplink, you can get a redundant pair of
ASAs running for less than $2,000 in the US. I just find it less stressful
Thank you for looking up facts, laws, etc... The rest is merely opinion,
and wouldn't necessarily help someone trying to protect their network
designs.
On Fri, Feb 13, 2015 at 11:25 AM, wrote:
> On Fri, 13 Feb 2015 10:28:25 -0500, William Herrin said:
>
> > I have to disagree with you there. Thi
JO,
IDS to meet PCI or HIPAA requirements is "regulatory grade". It meets specific
notification and logging requirements. SNORT-based systems fall into this
category.
-mel beckman
> On Feb 13, 2015, at 10:00 AM, "J. Oquendo" wrote:
>
>> On Fri, 13 Feb 2015, Mel Beckman wrote:
>>
>> Unless
On Fri, 13 Feb 2015 13:36:43 -0500, William Herrin said:
> On Fri, Feb 13, 2015 at 12:25 PM, wrote:
> > If catalogs and directories are covered, config files are... :)
>
> Smells like a Friday challenge for who can produce the most "artistic"
> yet functionally correct Cisco configuration.
All t
On Fri, Feb 13, 2015 at 12:25 PM, wrote:
> The issue with software wasn't if it was "art", but if it was a literary work
> (they struggled for a while with the concept of machine-readable versus human
> readable).
>
> If catalogs and directories are covered, config files are... :)
Smells like a
This is an automated weekly mailing describing the state of the Internet
Routing Table as seen from APNIC's router in Japan.
The posting is sent to APOPS, NANOG, AfNOG, AusNOG, SANOG, PacNOG,
CaribNOG and the RIPE Routing Working Group.
Daily listings are sent to bgp-st...@lists.apnic.net
For hi
On 13/02/15 17:45 +, Mel Beckman wrote:
Unless you need regulatory-grade IDS, your best bet is a Unified Threat
Management (UTM) appliance, essentially any modern enterprise grade firewall
such as a Cisco ASA, Fortigate, SonicWall, etc. These all have built-in IDS/IPS
options for a fee.
-
On Fri, 13 Feb 2015, Mel Beckman wrote:
> Unless you need regulatory-grade IDS, your best bet is a Unified Threat
> Management (UTM) appliance, essentially any modern enterprise grade firewall
> such as a Cisco ASA, Fortigate, SonicWall, etc. These all have built-in
> IDS/IPS options for a fee.
On Fri, 13 Feb 2015, Andy Ringsmuth wrote:
> NANOG'ers,
>
> I've been tasked by our company president to learn about, investigate and
> recommend an intrusion detection system for our company.
>
> We're a smaller outfit, less than 100 employees, entirely Apple-based. Macs,
> iPhones, some Mac
Unless you need regulatory-grade IDS, your best bet is a Unified Threat
Management (UTM) appliance, essentially any modern enterprise grade firewall
such as a Cisco ASA, Fortigate, SonicWall, etc. These all have built-in IDS/IPS
options for a fee.
-mel
On Feb 13, 2015, at 9:40 AM, Andy Ringsm
NANOG'ers,
I've been tasked by our company president to learn about, investigate and
recommend an intrusion detection system for our company.
We're a smaller outfit, less than 100 employees, entirely Apple-based. Macs,
iPhones, some Mac Mini servers, etc., and a fiber connection to the world. W
On Fri, 13 Feb 2015 10:28:25 -0500, William Herrin said:
> I have to disagree with you there. This particular ship sailed four decades
> ago when CONTU found computer software to be copyrightable and the
> subsequent legislation and litigation agreed.
The output of "craft" is copyrightable even i
Hi Beavis,
Just in case, there is a Lacnog mailing list.., the URL:
https://mail.lacnic.net/mailman/listinfo/lacnog
In case you don't get a response here you might want to try thee.
Alejandro,
El 2/13/2015 a las 11:32 AM, Beavis escribió:
> All,
>
> I'm looking for some general information o
All,
I'm looking for some general information of a dark fiber provider in latin
america countries namely Nicaragua and Costa Rica. Any info is greatly
appreciated.
Please contact me off list.
thanks,
-Beavis
--
() ascii ribbon campaign - against html e-mail
/\ www.asciiribbon.org - again
On Fri, Feb 13, 2015 at 8:54 AM, Skeeve Stevens <
ske...@eintellegonetworks.com> wrote:
> On Fri, Feb 13, 2015 at 8:55 PM, William Waites
wrote:
>> An engineer or architect in the usual setting, no matter how skilled,
>> is not doing art because the whole activity is pre-conceived. Even a
>
> Exce
More than one, but I found it here:
https://bugs.launchpad.net/ubuntu/+source/spamassassin/+bug/1412830
They did patch it after it finally became a problem, I don't know about
any other distributions.
On 02/12/2015 08:09 PM, Suresh Ramasubramanian wrote:
Which distro is it that has dnsbl fi
On Fri, 13 Feb 2015 11:43:14 +1100, Ahad Aboss said:
> In a sense, you are an artist as network architecture
> is an art in itself. It involves interaction with time,
> processes, people and things or an intersection between all.
This Friday's off-topic post for NANOG:
Doing art is
44 matches
Mail list logo