I send a message to my transits (Qwest and Global Crossing) and ATT. Here
is the message
I got back from ATT.
James,
We're looking into the situation. We'll get back with you shortly.
Regards,
Angie Eborn
ATT IP COE
(866) 397-7309, option 1
[EMAIL PROTECTED]
-Original Message-
I am seeing 171K routes from my transits and looks like this has been fixed.
James
Routing and Security Administrator
At the Santa Fe Office: Cyber Mesa Telecom
[EMAIL PROTECTED] [EMAIL PROTECTED]
http://www.cybermesa.com/ContactCM
# 29 says Google plans to make the texts searchable and only allow excerpts
to be viewed. This should be legal under
Fair Use doctrine. Some seem to assume the full text will be available, that
seems not the case:
http://googleblog.blogspot.com/2005/09/google-print-and-authors-guild.html
Let's
Fiber would be my choice. Not only will it solve the lightening strike
problem; you will not have to worry about
ground potentials being different on each side of the cable run.
James
Routing and Security Administrator
At the Santa Fe Office: Cyber Mesa Telecom
[EMAIL PROTECTED] [EMAIL
I grew up in the Baton Rouge New Orleans area; mom and my brother live in
BR. Katrina
is playing out the dooms day senerio that is well known to people living in
this area.
http://hosted.ap.org/dynamic/stories/K/KATRINA_THE_BIG_ONE_LAOL-?SITE=LABATSECTION=HOMETEMPLATE=DEFAULT
James
And the list of vulnerable IOS versions is where?
I am not sure if this is the correct doc, but it is recent (April/May 05)
and does indicate
what IOS versions are being dropped and what IOS one should migrate to.
On Thu, 2005-07-28 at 12:58, Robert Crowe wrote:
This has nothing to do with the recent events.
- RC
james edwards wrote:
I am not sure if this is the correct doc, but it is recent (April/May 05)
and does indicate what IOS versions are being dropped and what IOS one
should migrate
First, thanks, all, for the quick replies with
regards to the AOL email situation. The update I got from my client's
email provider is that they have been blacklisted by AOL (reason not given), and
have asked for our assistance in solving the blacklist problem.
You **really** have to look
I am looking for a seller of outdoor Telephone pedestals. I plan to install
a DSLAM, post splitters
and associated cross connect gear in this enclosure. Can anyone suggest a
dealer for this sort of gear ?
James H. Edwards
Routing and Security Administrator
At the Santa Fe Office: Internet at
Expect ~20% less than rated speed for ATM overhead.
Expect 20-40 ms on first hop due to DSLAM interweaving.
James H. Edwards
Routing and Security Administrator
At the Santa Fe Office: Internet at Cyber Mesa
[EMAIL PROTECTED] [EMAIL PROTECTED]
http://www.cybermesa.com/ContactCM
(505) 795-7101
As long as they have a /24 that they can announce, two or more upstreams
that are able and willing to establish BGP sessions with them and a router
with enough memory to hold at least 2 full views (for a Cisco, you
probably want 256MB or more these days), they can multi (or dual) home.
They
- Original Message -
From: Matt Taber [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Thursday, February 24, 2005 2:15 PM
Subject: Re: AOL scomp
Postini is my friend too.
But the more we can do to get rid of spam on our own, the less we have
to pay Postini each month.
Postini's
On Sun, 2005-01-16 at 13:31, Elmar K. Bins wrote:
By chance - how is the press coverage of this incident? Has anybody
read anything in the (online) papers? Unfortunately I haven't been
able to follow the newsboards intensely this week-end, but Germany
seems very quiet about this.
Yours,
http://earthquake.usgs.gov/recenteqsww/Quakes/usslav.htm
http://earthquake.usgs.gov/recenteqsww/Maps/region/Asia_eqs.html
--
James H. Edwards
Routing and Security Administrator
At the Santa Fe Office: Internet at Cyber Mesa
[EMAIL PROTECTED]
[EMAIL PROTECTED]
(505) 795-7101
I am not saying that the proposal is intrinsically right or wrong, I am
saying it could have merit if just in waking up a brain-dead co-lo
facility operator to deal with spamming clients.
-mm
How would this method be more effective than the e-mails, faxes, blocklists,
and phonecalls
that
Thats an insane statement.
Are you saying, You are only wasting money on things if you aren't
profitable ?
/action shakes head.
No, I am not but my statement did sure sound like that was what I was
saying.
I do think it is apples or oranges comparing CPU % to total power used and
coming up
I need to select a router to install in each of our CO's to bring together a
network of T-1 between our colos.
This will be the primary network for management of our CBX'es, routers, 5ESS
switches, and other gear.
This network will be totally separate from our existing network. Here are my
Investigation is still ongoing, but from what they can tell, majority of
the attempted connections have been going over TCP port 22.
-jack
Agressive SSH scans have been well reported on the internet in the last
month or so.
James H. Edwards
Routing and Security Administrator
At the Santa
They do, did you test as Florian asked you?
Regards,
Daniel
Looks like someone did:
--- Additional Comment #5 From Carlos Morgado on 2004-09-27
15:05 ---
A tcpdump on queries from FC3t2 gave me
host
host.subdomain
A host
A host.subdomain
[EMAIL PROTECTED]:
The solution I am working toward is quickly identifying user
infections. We are almost there. I collect and record all traffic
Umm ... you mean you wire-tap all my email messages? (Anyone
still wonders why I don't trust my ISP?)
I wonder if my Teclo listens in on
This is the rudest, most arrogant abuse complaint I have seen. It is a
frigging dial up user.
james
- Original Message -
From: RBL
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED];
[EMAIL PROTECTED]; [EMAIL PROTECTED]
Sent: Sunday, September 19, 2004 12:32 PM
Subject:
Sheesh. Get over /yourself/. Your network is rude by its very existence,
if it lets spammers relay crud by way of it. Your own arrogance in
thinking it's not your problem to fix is astounding.
I did no say it is not my problem, we have a 10 year history of being
very pro-active for all abuse
Listed where? I don't see it jumping out anywhere on your web site or in
any common/free DNSBL and the way your rDNS is setup isn't doing anyone
any favors.
We were a MAPS customer/user for a number of years and were listed then and
I see we are not now.
We will be listed again, shortly.
The port 25 blocking seemed like a real good idea.
-M
I disagree. Port blocking does not change user behavior it is user
behavior that is causing this problem.
Blocking just hides it. I used to believe in port blocking as the solution
to many user problems but now I have 3 and 4 page ACL's
FWIW, I asked about MLFR on the cisco-nsp and one person responded
indicating he worked
for some time with Cisco on trying to get MLFR to work but never resolved
out of order and dropped packet
issues. What hardware are you considering using to do MLFR ? Please let me
know how things go as MLFR
Why can't you already tell if you aren't getting through to
major providers? Wouldn't your queues backup, or are you being
blocked and the messages are being rejected and you are trying
to track that?
It is all in the mail logs. Here is a quick hack to take a peak at your mail
queue (for
Not true. For those of us who host Akamai servers, we could download SP2
with no problems. We did not need P2P, or MSDN. In fact, I would be very
reluctant to trust a Windows update downloaded via P2P.
Have you heard of MD5 sum ?
--
James H. Edwards
Routing and Security Administrator
At
Thats SHA0.
Still a checksum is a checksum, cracked or not.
- Original Message -
From: Dan Hollis [EMAIL PROTECTED]
To: james edwards [EMAIL PROTECTED]
Cc: Byron L. Hicks [EMAIL PROTECTED]; Jeff Wheeler [EMAIL PROTECTED];
Henry Linneweh [EMAIL PROTECTED]; [EMAIL PROTECTED]
Sent: Monday
It seems to me all the court said is you cannot use the Wire Tap Act
in a case that the communication is not on the wire. The court did note
the they felt this Act needs updating. They indicated the Act was very specific
and they did not feel extending the Act to cover e-mail in the conditions
Can someone point out, please, that CPUs have kilometers of 'wires', ram
have 'wires', and if anybody does any copying of data, its on the WIRES
of the motherboard (or whatever applies) 'data (WIRE) BUS' ? :)
You should read the entire courts desicion, this issue is addressed. The
Wire Tap
Kinda depends on what you mean by NEBS DC powered box.
Literally, a DC powered box that is NEBS certified.
http://www.cymru.com/DNS/gtlddns-o.html
signature.asc
Description: This is a digitally signed message part
I have gotten quotes from alliancesystems crystalpc for a x86 NEBS DC
powered server. Can anyone suggest some other companies that sell x86 NEBS
servers ?
--
James H. Edwards
Routing and Security
At the Santa Fe Office: Internet at Cyber Mesa
[EMAIL PROTECTED]
[EMAIL PROTECTED]
(505) 795-7101
Sean Donelan wrote:
If you leave your lights on, the electric company will send you a bill.
If the neighbor taps into your power lines after the meter...?
Not a reasonable argument. It is expected that unpatched hosts will get
infected
and it has been well reported on how users should
My personal feeling was that for most systems its better to not have the
daemon running - i.e. the benefit of smaller more frequent clock
adjustments does not outweigh the cost of another service running,
especially as root or even as a jailed non-root user.
Well, present NTP drops to a
On Thu, 2004-05-20 at 15:33, Jared Mauch wrote:
I'm also wondering, how many people are using the ntp.mcast.net
messages to sync their clocks? what about providing ntp
to your customers via the ntp broadcast command on
serial links, etc..?
- jared
I have used NTP mcast for
On Sun, 2004-04-25 at 04:46, [EMAIL PROTECTED] wrote:
It certainly doesn't work between Cisco and Juniper, because the Juniper
always resets the session when you configure a new MD5 key.
Ah, that explains way I flapped sessions that were juniper/cisco
and not ones that were cisco/cisco when
On Tue, 2004-04-20 at 00:21, Alexei Roudnev wrote:
Hmnm, if you:
-- are in Russia or other East Europe country
- got Windows with a computer (so it is 90% pirated one)
- have not credit card
geez, they are giving the CD away for free !
james
signature.asc
Description: This is a digitally
http://www.slac.stanford.edu/grp/scs/net/talk03/tcp-slac-nov03.pdf
signature.asc
Description: This is a digitally signed message part
They have access into the TDM network at present.
Now they want VoIP.
--
James H. Edwards
Routing and Security
At the Santa Fe Office: Internet at Cyber Mesa
[EMAIL PROTECTED]
[EMAIL PROTECTED]
On Fri, 2004-03-12 at 21:17, Riley, Marty wrote:
10:17:16.416222 IP 192.168.1.1.1900 239.255.255.250.1900: udp 278
This is UPnP discovery. Take a look here:
http://www.nthelp.com/upnpscrewup.htm
http://www.linuxsa.org.au/mailing-list/2002-11/1134.html
I see a lot of unicast UPnP traffic
NO !
On Mon, 2004-03-08 at 05:52, [EMAIL PROTECTED] wrote:
ATTENTION!
A message you recently sent to a 0Spam.com user with the subject Re: Source address
validation (was Re: UUNet Offer... was not delivered because they are using the
0Spam.com anti-spam service. Please click the link
On Sun, 2004-03-07 at 11:08, fingers wrote:
just a question
why is DDoS the only issue mentioned wrt source address validation?
uRPF, strict mode, is how I control 1000+ DSL pvc's from leaking private
address space via broken NAT. Also, all other customer facing interfaces
run uRPF, strict
Here is a view from the west coast, This is via
Opentransit, which is my limited understanding of French
indicates is owned/part of FranceTelecom:
trace 216.250.128.12
Type escape sequence to abort.
Tracing the route to www.sco.com (216.250.128.12)
1 P12-0.PALBB2.Palo-alto.opentransit.net
45 matches
Mail list logo