Greg Stewart wrote:
> Hell, I'm so blind (and probably deaf, too) my co-workers think the only way
> I can see what's on a computer screen is by smelling the damned thing!
>
> --Greg
Sorry to butt in on this thread - Greg, but (sic), that takes "scratch and
sniff" to a whole new level!
PS Jus
Mark Weaver wrote:
>
> Definately! I'm all ears...rather I'm all eyes since I can't see with my
> ears. My wife would tell you that when I'm sitting in front of this
> monitor I can't hear with my ears either! :)
Mine used to say that too but she was always referring to the newpaper
or the road
> My wife would tell you that when I'm sitting in front of this
> monitor I can't hear with my ears either! :)
Hell, I'm so blind (and probably deaf, too) my co-workers think the only way
I can see what's on a computer screen is by smelling the damned thing!
--Greg
- Original Message -
Definately! I'm all ears...rather I'm all eyes since I can't see with my
ears. My wife would tell you that when I'm sitting in front of this
monitor I can't hear with my ears either! :)
--
Mark
/* I never worry about the to-jams.
* Once I've stuck my foot in my mouth
* it's al
A good start would be to report them to your ISP.
--
Mark
/* I never worry about the to-jams.
* Once I've stuck my foot in my mouth
* it's already too late...just make sure
* you chew them thoroughly before swallowing!
*/
Registered Linux user #182496
Greg Stewart wrote:
>
> If you do a whois on the network IP's and can actually resolve some owner of
> the network to which these IP's belong, you might drop them a note about
> their clients' broadcasting...if they belong to your ISP's subscribers,
> contact your technical support.
>
> You won'
If you do a whois on the network IP's and can actually resolve some owner of
the network to which these IP's belong, you might drop them a note about
their clients' broadcasting...if they belong to your ISP's subscribers,
contact your technical support.
You won't necessarily get anything done, bu
Greg Stewart wrote:
>
> > ?? What/why would a socks proxy port port be probed ??
>
> Socks is a network proxy protocol used to provide NAT access for one section
> of a network to another. It is possible that the machine from which the
> packets came is hitting you or everyone (I haven't seen yo
John Rye wrote:
>
> Greg Stewart wrote:
> >
> > Portsentry usually adds the offending host IP to the route tables, but this
> > isn't always the best option anymore. you can change the KILL_ROUTE command
> > in /usr/local/psionic/portsentry/portsentry.conf to the following and it
> > will add the
> ?? What/why would a socks proxy port port be probed ??
Socks is a network proxy protocol used to provide NAT access for one section
of a network to another. It is possible that the machine from which the
packets came is hitting you or everyone (I haven't seen your packet log
entry, so I can't d
Greg Stewart wrote:
>
> Portsentry usually adds the offending host IP to the route tables, but this
> isn't always the best option anymore. you can change the KILL_ROUTE command
> in /usr/local/psionic/portsentry/portsentry.conf to the following and it
> will add the host IP to your ipchains rule
Dan LaBine wrote:
>
> John; The sound was also used in "Hudson Hawk" with Bruce Willis. I remember
> the "Our Man Flint" movies as well ! Anyway the sound was used for the
> electronic handcuffs in the show. Maybe That info will help ? Have U tried "
> www.freethemes.com " ?? Check out the "Unix
Portsentry usually adds the offending host IP to the route tables, but this
isn't always the best option anymore. you can change the KILL_ROUTE command
in /usr/local/psionic/portsentry/portsentry.conf to the following and it
will add the host IP to your ipchains rules (if you're using
ipchains--wh
ot;Unix Themes" section, dude.
L 8 R,
- Original Message -
From: "John Rye" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Sunday, October 15, 2000 6:43 AM
Subject: [newbie] Portsentry traps
> During the past five days Portsentry has reported sev
During the past five days Portsentry has reported several probes
on port 1080 along with some DNS information.
I understand this is the Socks Proxy port.
Without disclosing (at this time) the origin of these probes,
could someone advise me on how (or if) I should deal with/to
them?
Also, out of
15 matches
Mail list logo