plays
out, or how you *want* that to play out, is something you cannot
predict. But sometimes other people will have advise about whom to
contact within Law Enforcement, other people will chime in, other
people have direct contact with clueful people etc.
But first and foremost; you try to pr
pecially
since you get L2 and L3, whereas with J you'd need to go with the
(very new) MX960, whose L2 featureset still eludes me, or the proven
6509's (with beefy sup's) from C...
Kind regards,
JP Velders
d modify iperf such that they used mmap's to gain more of
a zero-copy behaviour, depending on drivers this can also give much
better performance, akin to say Myricom's claims for Myrinet...
Kind regards,
JP Velders
Not that was specificly mentioned for this test I believe...
Kind regards,
JP Velders
pipes they used also carry other
research traffic throughout most of the year... This year was even
more cumbersome because of some issues with the OC192's between
Amsterdam and the USA...
Kind regards,
JP Velders
ck out what's
built every year for the SC Conference: https://scinet.supercomp.org/
Given the huge list of sponsors, equipment usually isn't the problem,
getting everything/one to play nice is another thing though ... ;)
Diagram (1.5MB): http://scinet.supercomp.org/2006/SCinet_2006_Public.pdf
Kind regards,
JP Velders
(disclaimer: bottom left hand corner of the banner ;D)
good protection and bicyle helmets... Now if I were a
head of state or something, I'd probably have people to get me that
tank... Note the "have people"...
> Gadi.
Regards,
JP Velders
[*] it happened with ssh.com versus OpenSSH... (though the
license played a role, people did vote with their feet)
be seen each and every time.
The main strength of Qnet is the detection, and even better, the way
of allowing people to clean themselves, and then get back on the net.
Having a helpdesk tell (different) people the same line over and over
again gets tedious. Putting the effort into making a nice explanatory
webpage get so much more "return on investment"... ;)
Kind regards,
JP Velders
ts every hour, have ten times as
much storage at hand, and a whole army of people to handle all the
complaints of people drowning in Spam... (I can dream, can I ? ;D)
> -M<
Kind regards,
JP Velders
7;t think any AV vendor
would consider themselves more "evil" then Spammers, Phishers or
scriptkiddies, but they will be if they don't act more responsibly.
Regards,
JP Velders
is turned off???
When the brits decide that it's a mainland historical quirk ;D
> Regards
> Ben
Kind regards,
JP Velders
thing everyone can use. And if vendors have
issues with their listprices being public, then why set them in the
first place !?
> Matt
Regards,
JP Velders
g. A | grep 'IN A
'
1.0.0.127.cbl.abusat.org. 591 IN A 198.65.115.93
I think I have to talk my boss out of taking all my vacation days...
He "urged" me to dip in to my (half a year worth) reserve... ;D
Kind regards,
JP Velders
Rome wasn't built in a day...
(though some argue it was destroyed in one ;D)
> -- Niels.
Regards,
JP Velders
only be
used in such a way that it would *have* to treat it differently.
Regards,
JP Velders
mmunicate our willingness to help in the fight against spam.
Replace spam with abuse and you have something like the IRT object. ;D
No doubt someone on NANOG knows what's happening with the ARIN version ;)
(or if there will be one, if people want it, etc.)
Regards,
JP Velders
extra-site.
Just because you only allow port 80 inbound to the machines which are
supposed to be running webservers doesn't mean you only allow outbound
port 80 traffic to those same machines ? You would allow outbound port
80 traffic to the whole world...
> Nils
Regards,
JP Velders
er on port 587 from
anywhere in the world, I should also allow guests over here to do the
same to their mailserver on port 587. It works both ways after all ;)
> Nils
Kind regards,
JP Velders
pdated aka special images are being
pushed to resellers and support partners. And that a formal advisory
is probably planned for late january or early february. BTW, this is
Nth hand info...
As to what the problem is, well, current info is too vague...
Regards,
JP Velders
(a potential Juniper customer, who's updating his RFP security section)
uce the load of the
CPU to allow the machine to actually process the packets it has
captured ;)
The ntop website has some papers:
http://www.ntop.org/documentation.html
> tia,
> tr
Kind Regards,
JP Velders
p://www.xs4all.nl/uk/allediensten/experimenteel/ipv6.php
I do believe XS4All is one of the larger consumer ISP's over here.
> [ ... ]
> Nils
Kind regards,
JP Velders
omething for the larger carriers. But for all ISP's of
Network Operators (getting back to the 'NOG'-part of NANOG) it's
definitely worth keeping tabs on. To quote Erik-Jan Bos of SURFnet:
"The Paradigm Shift is upon us".
Kind Regards,
JP Velders
(working at a GigaPort NG partner ;D)
xs.net/tools/grh/compare/?when=current&format=html&a=2001:503:a83e::/48&b=2001:500::/48
(not much sense, since the AS's differ ;D)
SixXS.net actively welcomes Ghost Route Hunter peers:
http://www.sixxs.net/tools/grh/peering/
Regards,
JP Velders
t; BCP38 implementation/filtering, or what?
*pro*
but by showing that without *valid* arguments for not implementing
you are plain irresponsible by not implementing... (more or less)
> - ferg
Regards,
JP Velders
to BCP38 of the form "but my customer has a good reason to spoof"
> or "but my equipment can't do wire speed SAV" or "but BCP38 will not solve
> all DDoS problems single-handedly" are small minded, provincial, and wrong.
> ... it's just "but if man was meant to fly he'd have wings" all over again.
Thinking outside of the box or about "The Greater Good" is something
of a quaint idea nowadays :( Think I'll go dust off my wings... ;D
Regards,
JP Velders
ing 2.5 meter tall fences around my house because I don't want my
neighbour's plants in my garden. No, we come to an understanding that
whenever his plants get out of control in my garden I can cut them
back, but that he will also trim them more often.
In most cases it will go like that, the minority of when it doesn't
go like that, you start filtering / whatever, just like we do now.
Regards,
JP Velders
ion is in a completely different class as someone
bombarding you with a bunch of forged BGP packets to close down a
session. Without that MD5 checksum you are quite vulnerable to that. I
haven't seen a vendor come up with a solution to that, because the
problem is on a much more vendor-neutral le
ely amongst the larger ISP's who've
been part of that 'I' in their name since the very early beginning.
Regards,
JP Velders
28 matches
Mail list logo