We could almost pretend it was because of the NXDOMAIN signs that got
plastered on their HQ :)
From
http://slashdot.org/article.pl?sid=03/10/01/212231mode=nocommenttid=126tid=15
wednesday:
Verisign seems to have issues
On Thu, Sep 18, 2003 at 11:42:19AM +0100, [EMAIL PROTECTED] wrote:
And you can get SSL certs from alternative sources such as GeoTrust
http://www.geotrust.com/
Bzzz, geotrust is Verisign
http://www.google.com/search?sourceid=mozclientie=utf-8oe=utf-8q=Thawte+was+b
ought+by+Verisign
Marc
--
On Thu, Sep 18, 2003 at 11:11:12AM -0500, Dominic J. Eidson wrote:
On Thu, 18 Sep 2003, Marc MERLIN wrote:
On Thu, Sep 18, 2003 at 11:42:19AM +0100, [EMAIL PROTECTED] wrote:
And you can get SSL certs from alternative sources such as GeoTrust
http://www.geotrust.com/
Bzzz
On Fri, May 10, 2002 at 11:27:10AM +1000, Terence Giufre-Sweetser wrote:
Now there's a good idea, and it works, I have several sites running a
port 25 trap to stop smtp abuse.
To stop port 25 abuse at some schools, the firewall grabs all outgoing
port 25 connections from !the mail server,
On Tue, May 07, 2002 at 01:13:34AM -0400, Mike Joseph wrote:
The major problem I see with this is the need to verify that the
spamvertised site actually requested or paid for the spam. After all,
what's to prevent me from spamming in the name of xyz.com just so I can
see them shutdown?