Al Rowland wrote:
The PIN is on your card ...
Not for any card I've ever owned. I've changed my PIN several times
over the years, and the bank has never re-encoded my card or sent me a
new card as a result of doing so.
Maybe some banks do store the PIN on the card, but I'm certain that
Joe Abley wrote:
You're using mixed tense in these sentences, so I can't tell whether you
think that syslog's network port is open by default on operating systems
today.
On FreeBSD, NetBSD, OpenBSD and Darwin/Mac OS X (the only xterms I
happen to have open right now) this is not the case,
So what exactly do people do in regards to Web spam? I block tcp/80
but would like to hear what others are doing.
Block or rate limit? I would assume that blocking port 80 in a
cybercafe wouldn't really work out in the long run.
One possible solution might be to force all traffic through a
Rajendra G. Kulkarni wrote:
I agree. Never underestimate power of a fringe lunatic group to
cause harm. Now, I am going to go out on a thin limb and
ask the following: When Experts say,
don't dismiss cyberattack warning, what can somebody like
me (just a regular user) or for that matter
Barry Shein wrote:
Before we get too, too, smug about this if you view the Manhattan
skyline, particularly downtown (e.g., SOHO/Tribeca) you'll see
house-sized water tanks on many, many buildings, particularly 3-10
story older buildings. I assume due to inadequate water pressure but I
honestly
Gawie Marais (Home) wrote:
Might be a simple question But... I've got no idea what the answer
could be...
In the early days, one only had a .com address space (amongst the most
popular ones). These days, there is .com(this) and .com(that) and any
kind of .(whatever) you can think of.
My
Stephen Sprunk wrote:
Thus spake Gil Cohen [EMAIL PROTECTED]
In an effort to protect the Internet from future hacking attacks, VeriSign
(Nasdaq: VRSN - news) has moved one of the Net's root servers to an
undisclosed physical and virtual location.
Maybe I'm missing something... J's virtual
Brad Knowles wrote:
B) KNOW WHO THE HELL YOU'RE GIVING ACCOUNTS TO so that (A) works. Get
a credit card or verify the phone number and other info (e.g., call
them back, insist on calling them back.)
Do you know how many credit cards are out there? Do you know how
many of them are
Rafi Sadowsky wrote:
AFAIK you can tunnel IP over(at least):
1) HTTP(not just use port 80 for non HTTP traffic)
2) ICMP ...
3) DNS queries(needs an external custom cooperating DNS)
E-mail: http://detached.net/mailtunnel
-- David
Chris Parker wrote:
It may be a bit higher, but the number who access multicast content
is decidedly tiny. More content would probably push it higher, as
much fun as it is watching the ISS live on Nasa TV, it does get a
bit dry. :)
I think this is a case of if you build it, they will
Leigh Anne Chisholm wrote:
The FCC prohibits communication using a cellular telephone while in an
aircraft in US airspace. In Canada, I don't believe there is such a
regulation.
The GTE airfones installed in most large planes have data ports if you
must connect a computer. But be prepared
Steven M. Bellovin wrote:
Mark Kent writes:
I recently claimed that, in the USA, there is a law that prohibits an
ISP from inspecting packets in a telecommunications network for
anything other than traffic statistics or debugging.
Was I correct?
No. Or at least you weren't; the
Dan Hollis wrote:
Its my box, my hardware, my property. No one has an inherent right
to force speech on an unwilling recipient.
If you're installing a blacklist on a mail server you keep at home for
yourself, then yes.
If you're running an ISP with thousands of customers, then you also
Dan Hollis wrote:
On Thu, 20 Jun 2002, David Charlap wrote:
Blackholing grandma because a spammer uses the same ISP isn't
going to be an easy thing to get your customers to accept.
if grandma is hosted on chinanet she is already blackholed by most
western civilization anyway
Who said
Vinny Abello wrote:
First off, you're right about moving parts generally being a bad
thing. However, it is not always necessary to eliminate the hard
drive. Two drives in a RAID-0 configuration may be reliable
enough. Especially if the failure of a single drive sets off
sufficient alarms
Rob Thomas wrote:
There is a huge increase in FTP scanning as well as the building of
warez botnets. The warez scanning is generally for anonymous FTP
servers with plentiful bandwidth, copious disk space, and generous
write permissions. ...
One things I know of that helps here is to
Jim Hickstein wrote:
My customers who reach me (a mail service) from Earthlink dialups
are affected by this. Apparently it's still happening. I run a
listener on another host and port, known only to this (so far)
small subset of people, to be able to serve them. In general, we
advise
Jim Hickstein wrote:
One clarification: Can these users relay through that host, using
SMTP AUTH, from anywhere, or only from within your network? I
observe, for instance, that the instructions for Outlook 2000
(Windows) does not have them check my [outgoing SMTP] server
requires
18 matches
Mail list logo