On Fri, Sep 1, 2023 at 12:56 PM Bjørn Mork wrote:
> Nick Hilliard writes:
> > Bjørn Mork wrote on 01/09/2023 08:17:
> >> Sounds familiar.
> >>
> https://supportportal.juniper.net/s/article/BGP-Malformed-AS-4-Byte-Transitive-Attributes-Drop-BGP-Sessions?language=en_US
> >> You'd think a lot of
On Wed, Aug 30, 2023 at 4:04 PM William Herrin wrote:
> On Wed, Aug 30, 2023 at 4:50 AM Mike Lyon wrote:
> > Ran across this article today and haven't seen posts about it so i
> > figured I would share:
> >
> > https://blog.benjojo.co.uk/post/bgp-path-attributes-grave-error-handling
>
> Can you
On Mon, Aug 17, 2015 at 7:46 AM, Ramy Hashish ramy.ihash...@gmail.com
wrote:
Hello All,
We are planning to implement a multi-tenant FW/UTM and start providing
security as a service, I would like to hear if anybody had experience on
this, and if there are any recommendations for the UTM's
On Jun 26, 2015, at 2:41 PM, Rafael Possamai raf...@gav.ufsc.br wrote:
How does one fully utilize a gigabit link for home use? For a single
person
it is overkill. Similar to the concept of price elasticity in economics,
going from 50mbps to 1gbps doesn't necessarily increase your
On Sun, Jun 7, 2015 at 6:57 PM, Peter Kristolaitis alte...@alter3d.ca
wrote:
In many ways, certification tracks are something like getting a PhD.
Completely useless information (and very few skills) to anything you'll do
in the real world, but if it makes your clock tick, go for it. Just
On Sat, May 9, 2015 at 9:55 PM, Barry Shein b...@world.std.com wrote:
On May 9, 2015 at 00:24 char...@thefnf.org (char...@thefnf.org) wrote:
So I just crunched the numbers. How many pies could I cram in a rack?
For another list I just estimated how many M.2 SSD modules one could
On Thu, Apr 9, 2015 at 1:21 PM, Simon Brilus sbri...@blueyonder.co.uk
wrote:
Hi - I have a PCIDSs requirement to encrypt VoIP over a 3rd party VPLS
network. Has anyone dealt with this. I'd really not use VPN's over the VPLS
so am looking at hardware WAN encrypters.
SafeNet and Thales sell L2
On Mon, Feb 9, 2015 at 10:59 AM, Rich Kulawiec r...@gsp.org wrote:
On Sun, Feb 08, 2015 at 11:40:56AM -0200, BPNoC Group wrote:
Firewalls are firewalls. Routers are routers. Routers should do some very
basic filtering (stateles, ACLs, data plane protection...) and firewalls
should do basic
On Thu, Feb 5, 2015 at 4:10 PM, David Jansen da...@nines.nl wrote:
Hi,
We have used dynamic routing on firewall in the old days. We did
experience several severe outages due to this setup (OSPF en Cisco). As you
will understand i’m not eager to go back to this solution but I am curious
On Tue, Feb 3, 2015 at 5:41 PM, Michael Hallgren m.hallg...@free.fr wrote:
Le 03/02/2015 16:21, Eugeniu Patrascu a écrit :
On Mon, Feb 2, 2015 at 2:53 PM, Michael Hallgren m.hallg...@free.fr
wrote:
Hi,
Someone has positive or negative experience running
Checkpoint IPS cluster over
On Mon, Feb 2, 2015 at 2:53 PM, Michael Hallgren m.hallg...@free.fr wrote:
Hi,
Someone has positive or negative experience running
Checkpoint IPS cluster over ``long distance'' synch.
network? Real life limitations? Alternatives? Timers?
You can do stretched with Check Point as long as the
On Mon, Nov 10, 2014 at 10:39 PM, Max Clark max.cl...@gmail.com wrote:
Hi all,
DB9 ports seem to be a nearly extinct feature on laptops. Any suggestions
on a cheap laptop for use in field support (with an onboard DB9)?
You can look at older Dell Latitudes such as D620 or any Prolific based
On Tue, Oct 21, 2014 at 4:40 PM, valdis.kletni...@vt.edu wrote:
http://www.phoronix.com/scan.php?page=news_itempx=MTgwNzQ
When your init system is worrying about cursor rendering, you have truly
fallen victim to severe feature bloat. I guess Jamie Zawinski was right:
Every program attempts
On Tue, Aug 5, 2014 at 2:15 AM, Jay Ashworth j...@baylink.com wrote:
- Original Message -
From: Eugeniu Patrascu eu...@imacandi.net
In my neck of the woods, the city hall decided that no more fiber cables
running all over the poles in the city and somehow combined with some EU
On Tue, Aug 5, 2014 at 8:26 PM, Owen DeLong o...@delong.com wrote:
This one is a bad idea cause you have lots of people pushing fiber
through
pipes with active fiber in them... and their incentives not to screw up
other people's glass are... unclear? :-)
Not really, if one company
On Tue, Aug 5, 2014 at 9:26 PM, William Herrin b...@herrin.us wrote:
Hi Eugeniu,
The word you're searching for is microduct.
That's it, I wasn't sure about it.
I'm a big fan of Microduct. There's even some wicked cool equipment
which will force the core out of in-place coax plant,
On Tue, Jul 22, 2014 at 11:05 PM, Owen DeLong o...@delong.com wrote:
OTOH, if the municipality provides only L1 concentration (dragging L1
facilities
back to centralized locations where access providers can connect to large
numbers of customers), then access providers have to compete to
On Fri, May 16, 2014 at 6:18 AM, Chris hs.citi...@gmail.com wrote:
Hi all,
We are looking at doing a small FTTP deployment in a community of about 30
homes and I'm searching for options regarding access layer hardware.
Initially we thought of a simple point-to-point ethernet setup with
On Fri, May 2, 2014 at 10:44 PM, Deepak Jain dee...@ai.net wrote:
Between peering routers on a dual-stacked network, is it considered best
practices to have two BGP sessions (one for v4 and one for v6) between
them? Or is it better to put v4 in the v6 session or v6 in the v4 session?
On Sun, Apr 20, 2014 at 4:27 AM, Dobbins, Roland rdobb...@arbor.net wrote:
On Apr 20, 2014, at 2:32 AM, George William Herbert
george.herb...@gmail.com wrote:
I have 20-30,000 counterexamples in mind that I worked with directly in
the last decade.
People do stupid things all the time -
On Sat, Apr 19, 2014 at 2:03 AM, Matthew Kaufman matt...@matthew.at wrote:
Ignoring security, A is superior because I can change it to DNAT to the
new server, or DNAT to the load balancer now that said server needs 10
replicas, etc.
B requires re-numbering the server or *if* I am lucky
On Sat, Apr 19, 2014 at 5:04 AM, Jeff Kell jeff-k...@utc.edu wrote:
On 4/18/2014 9:53 PM, Dobbins, Roland wrote:
On Apr 19, 2014, at 1:20 AM, William Herrin b...@herrin.us wrote:
There isn't much a firewall can do to break it.
As someone who sees firewalls break the Internet all the time
On Thu, Apr 17, 2014 at 11:45 PM, George Herbert
george.herb...@gmail.comwrote:
On Thu, Apr 17, 2014 at 11:32 AM, Eugeniu Patrascu eu...@imacandi.netwrote:
...
It's a bigger risk to think that NAT somehow magically protects you
against
stuff on the Internet.
Also, if your problem
On Fri, Apr 18, 2014 at 6:02 PM, William Herrin b...@herrin.us wrote:
On Fri, Apr 18, 2014 at 3:31 AM, Eugeniu Patrascu eu...@imacandi.net
wrote:
On Thu, Apr 17, 2014 at 11:45 PM, George Herbert
george.herb...@gmail.com
wrote:
You are missing the point.
Granted, anyone who is IPv6
On Fri, Apr 18, 2014 at 10:49 PM, Jim Clausing jim.claus...@acm.org wrote:
And maybe I'm just dense, but ho one has been able to tell me how I
accomplish this in IPv6 without NAT, I have the requirement in certain
circumstances to transparently redirect all outbound DNS (well, on TCP or
UDP
On Thu, Apr 17, 2014 at 9:05 PM, William Herrin b...@herrin.us wrote:
Here's the drill: From an enterprise security perspective, deploying
IPv6 is high risk. I have to re-implement every rule I set on my IPv4
addresses all over again with my IPv6 addresses and hope I don't screw
it up in a
On Fri, Feb 21, 2014 at 7:37 PM, Phil Gardner phil.gardne...@gmail.comwrote:
On 02/19/2014 01:14 PM, Phil Gardner wrote:
Not sure if this list is the best place, but it is probably the only
list that I'm on that won't give me a bunch of grief about the chosen
technology.
I looked at
On Wed, Feb 19, 2014 at 10:06 PM, Jay Ashworth j...@baylink.com wrote:
- Original Message -
From: Eugeniu Patrascu eu...@imacandi.net
If you want block storage, just export an iSCSI device to the ESXi
machines
(tgtadm on RedHat is all you need and a few gigs of free space). VMFS
On Thu, Feb 20, 2014 at 8:16 PM, Jay Ashworth j...@baylink.com wrote:
- Original Message -
From: Eugeniu Patrascu eu...@imacandi.net
On Wed, Feb 19, 2014 at 10:06 PM, Jay Ashworth j...@baylink.com
wrote:
- Original Message -
My understanding of cluster-aware
On Thu, Feb 20, 2014 at 9:49 PM, Dan Shoop sh...@iwiring.net wrote:
On Feb 20, 2014, at 1:48 PM, Jimmy Hess mysi...@gmail.com wrote:
The locking restrictions are for your own protection. If the filesystem
inside your virtual disks is not a clustered filesystem;
two instances of a VM
On Wed, Feb 19, 2014 at 8:14 PM, Phil Gardner phil.gardne...@gmail.comwrote:
Not sure if this list is the best place, but it is probably the only list
that I'm on that won't give me a bunch of grief about the chosen technology.
I looked at VMware's site, and there are a ton of options. I'm
On Thu, Jan 2, 2014 at 10:01 AM, Saku Ytti s...@ytti.fi wrote:
On (2014-01-01 23:51 +0200), Eugeniu Patrascu wrote:
Is this legal? Can NSA walk in to US based company and legally coerce
to
install such backdoor? If not, what is the incentive for private
company to
cooperate
On Wed, Jan 1, 2014 at 11:55 AM, Saku Ytti s...@ytti.fi wrote:
On (2013-12-31 23:04 +), Warren Bailey wrote:
that RSA had a check cut for their participation (sell outs..), would it
be out of the realm of possibility cisco knowingly placed this into their
product line? And would it be
On Tue, Dec 31, 2013 at 5:38 AM, Sabri Berisha sa...@cluecentral.netwrote:
Hi Roland.
I don't know much about Juniper
gear, but it appears that the Juniper boxes listed are similar in nature,
albeit running FreeBSD underneath (correction welcome).
With most Juniper gear, it is actually
On Tue, Dec 31, 2013 at 7:31 PM, valdis.kletni...@vt.edu wrote:
On Tue, 31 Dec 2013 10:43:02 -0500, Jamie Gwatkin said:
Could be related to this?
http://kb.juniper.net/InfoCenter/index?page=contentid=TSB16290
Do I want to ask why *THIS*?
Estimated Fix Date:
Juniper engineering has root
On Tue, Dec 31, 2013 at 11:19 PM, valdis.kletni...@vt.edu wrote:
On Tue, 31 Dec 2013 23:09:58 +0200, Eugeniu Patrascu said:
We need an emergency fix because a piece of software unexpectedly hit
an end-of-life date? Didn't we learn anything 14 years ago??!?
Juniper just posted
On Fri, Dec 27, 2013 at 3:05 PM, Baldur Norddahl
baldur.nordd...@gmail.comwrote:
On the topic of building a software router for an ISP, has anyone tried it
using OpenFlow? The idea is to have a Linux server run BGP and a hardware
switch to move the packets. The switch would be programmed by
On Fri, Dec 27, 2013 at 10:00 PM, Baldur Norddahl baldur.nordd...@gmail.com
wrote:
On Fri, Dec 27, 2013 at 4:18 PM, Jon Sands fohdee...@gmail.com wrote:
On Dec 27, 2013 10:08 AM, Baldur Norddahl baldur.nordd...@gmail.com
wrote:
We are an upstart and just buying the fancy Juniper
On Tue, Dec 24, 2013 at 7:50 PM, Herro91 herr...@gmail.com wrote:
Hello J-NSP and Nanog members
Hopefully this is the right forum for this discussion - if not my apologies
for further clogging your inbox.
Here it goes:
Would you consider use of JSAM/WSAM to selectively proxy and tunnel
On Thu, Dec 19, 2013 at 10:30 PM, den...@justipit.com
den...@justipit.comwrote:
Just about every security, network and ADC vendor out there is claiming
anti-dos capabilities. Be careful when going that route and do your own
validation. I suggest looking at Radware and Arbor (both leaders in
On Sun, Dec 8, 2013 at 11:46 PM, Merike Kaeo
mer...@doubleshotsecurity.comwrote:
On Dec 6, 2013, at 11:55 AM, Eugeniu Patrascu eu...@imacandi.net wrote:
On Fri, Dec 6, 2013 at 9:48 PM, Jared Mauch ja...@puck.nether.net
wrote:
On Dec 6, 2013, at 1:39 PM, Brandon Galbraith
/Manual:User_Manager
http://wiki.mikrotik.com/wiki/User_Manager/Getting_started
http://www.youtube.com/watch?v=blEGv5i-aO4
Good Luck :)
Edy
On 12/6/2013 3:14 PM, Eugeniu Patrascu wrote:
Hi,
How do you handle captive portals in hotels and other venues where you
first have to login
On Fri, Dec 6, 2013 at 9:48 PM, Jared Mauch ja...@puck.nether.net wrote:
On Dec 6, 2013, at 1:39 PM, Brandon Galbraith brandon.galbra...@gmail.com
wrote:
If your flows are a target, or your data is of an extremely sensitive
nature (diplomatic, etc), why aren't you moving those bits over
Hi,
How do you handle captive portals in hotels and other venues where you
first have to login into the portal and then have Internet access ?
This is my biggest woe right now in this regards with any kind of proxy
settings I can push to users.
Thanks,
Eugeniu
On Thu, Dec 5, 2013 at 10:05 PM,
On Wed, Dec 4, 2013 at 5:53 PM, Herro91 herr...@gmail.com wrote:
Hi,
I'm doing some research on the Cisco Cloud Web Security offering, also
known as ScanSafe.
Has anyone on the lists explored Cisco's ScanSafe SaaS offering, now called
Cisco Cloud Web Security - as a means of providing
On Wed, Dec 4, 2013 at 7:57 PM, John Kreno john.kr...@gmail.com wrote:
One wonders if this is an industry trend.
Outsourcing the outsourcers to other outsourcers... and at the end of the
day everyone is congratulating everyone that the SLAs have been met :))
On Mon, Nov 25, 2013 at 9:43 AM, Michael Smith mksm...@mac.com wrote:
On Nov 24, 2013, at 10:36 PM, Eugeniu Patrascu eu...@imacandi.net wrote:
On Fri, Oct 11, 2013 at 8:27 PM, William Waites wwai...@tardis.ed.ac.uk
wrote:
I'm having a discussion with a small network in a part of the world
On Fri, Oct 11, 2013 at 8:27 PM, William Waites wwai...@tardis.ed.ac.ukwrote:
I'm having a discussion with a small network in a part of the world
where bandwidth is scarce and multiple DSL lines are often used for
upstream links. The topic is policy-based routing, which is being
described as
A bit late to the discussion, but we use a stack of EX switches which
terminate L2 connections from the providers and two routers which have BGP
sessions with them.
Each switch has ports provisioned so that in case one switch fails, we just
simply move the ethernet cable to the working switch and
Dropping everything at once may dilute the debate as I am sure your
government and every other government that may be proved to be involved
will try to focus the discussion on small and less damaging issues until
the bigger ones are forgotten.
Reveal something, wait a few weeks/months, reveal
Maybe people will now start turning on their encryption functions on any
device capable of doing it :)
On Sat, Jul 13, 2013 at 11:57 AM, Warren Bailey
wbai...@satelliteintelligencegroup.com wrote:
The entire idea of prism is hitting tier 1 providers and mass
communications providers. If they
Comcast's customers send money to Comcast in order to receive whatever they
want from other networks. With that money, Comcast should invest in
infrastructure so that it's network is not saturated anymore. Isn't this
how IPSs work ? :)
On Sat, Mar 2, 2013 at 8:07 PM, Vinod K vinod...@hotmail.com
the market.
On Thu, Mar 7, 2013 at 4:13 PM, Jamie Bowden ja...@photon.com wrote:
From: Eugeniu Patrascu [mailto:eu...@imacandi.net]
Comcast's customers send money to Comcast in order to receive whatever
they
want from other networks. With that money, Comcast should invest
On Mon, Jan 28, 2013 at 6:45 PM, Mukom Akong T. mukom.ta...@gmail.com wrote:
On Mon, Jan 28, 2013 at 7:27 PM, Eugeniu Patrascu eu...@imacandi.net
wrote:
I thought about running pure IPv6 inside and do 6to4, but it's too
much of a headache,
Nice call (skipping 6to4)
not to mention
On Mon, Jan 28, 2013 at 8:58 PM, Doug Barton do...@dougbarton.us wrote:
On 1/28/2013 7:27 AM, Eugeniu Patrascu wrote:
- configure IPv6 firewall rules (mostly a mirror of the IPv4 rulesets)
Hopefully that did not included filtering ICMPv6? :)
No, of course not :)
I did a bit (actually very
On Mon, Jan 28, 2013 at 9:54 PM, Owen DeLong o...@delong.com wrote:
On Jan 28, 2013, at 10:03 , Joe Maimon jmai...@ttec.com wrote:
Eugeniu Patrascu wrote:
On Sat, Jan 26, 2013 at 11:26 AM, Pavel Dimow paveldi...@gmail.com wrote:
As being personally involved deploying IPv6 on an enterprise
On Sat, Jan 26, 2013 at 11:26 AM, Pavel Dimow paveldi...@gmail.com wrote:
Hi,
I have read many of those ipv6 documents and they are great but I
still luck to find something like real word scenario.
What I mean is that for example I want to start implementation of ipv6
in my enterprise
On Tue, Jan 15, 2013 at 12:49 AM, Ronald F. Guilmette
r...@tristatelogic.com wrote:
After a careful investigation, I am of the opinion that each of the
following 18 ASNs was registered (via RIPE) with fradulent information
purporting to represent the identity of the true registrant, and that
You should give Apple a hint about designing a new Ethernet connector
:)) They'll give you few tens of million users wanting new network
equipment :))
On Sat, Nov 3, 2012 at 8:28 AM, Karl Auer ka...@biplane.com.au wrote:
- if you need to remember an IP address, you are doing it wrong
Because DNS always works flawlessly and you never need to remember IP
addresses, right ?
- cultural sensitivity and plain good sense suggest that many words or
On Fri, Nov 2, 2012 at 5:13 PM, Eric Germann egerm...@limanews.com wrote:
Colleagues,
I'm looking for a recommendation on a smallish 10G Ethernet switch for a
small virtualization/SAN implementation (4-5 hosts, 2 SAN boxes) over
iSCSI with some legacy boxes on GigE.
Preferably
- 8-16 10G
On Thu, Nov 1, 2012 at 7:31 AM, Crist J. Clark pum...@sonic.net wrote:
We're working out our dual stacked IPv4-IPv6 network. One
issue that recently has arisen is how to number the management
interfaces on the network devices themselves.
I have always been kind of partial to the idea of
On Thu, Aug 23, 2012 at 9:21 AM, Shahab Vahabzadeh
sh.vahabza...@gmail.com wrote:
Thanks about every ones speech in this topic but I think I can not describe
my problem clearly, let me explain it some how more:
You know I have two kind of ADSL services, Limited and Unlimited.
Limited Like:
On Tue, Aug 7, 2012 at 4:12 PM, Jim Ray j...@neuse.net wrote:
Sorry, I do not give verbose responses via iPhone on that small device
with my tired old eyes. I ran Wireshark this morning.
Without sniffing packets, the layman's description of problem is I
can't get to vendor web site,
On Sun, Jan 15, 2012 at 21:30, Ken King kk...@yammer-inc.com wrote:
I need to choose a wireless solution for a new office.
up to 600 devices will connect. most devices are mac books and mobile phones.
we can see hundreds of access points in close proximity to our new office
space.
what
If you also want to control where they go from the jump box, you might
want to look at http://www.xceedium.com/en/index.php as they claim to
add rules to what a remotely logged in user can do.
Juniper SA is very nice and get's intuitive after you familiriaze
yourself with it's workflow which is a
On Sun, Jun 12, 2011 at 22:48, Chris Adams cmad...@hiwaay.net wrote:
Once upon a time, Eugeniu Patrascu eu...@imacandi.net said:
I need 100Mbs at home because I want to see a streamed movie NOW, not
in a month because someone considers broadband a luxury :)
Pretty simple usage scenario I might
On Sun, Jun 12, 2011 at 01:16, Jeroen van Aart jer...@mompl.net wrote:
Randy Bush wrote:
some of us try to get work done from home. and anyone who has worked
and/or lived in a first world country thinks american 'broadband' speeds
are a joke, even for a home network.
I understand, but I
On Tue, Oct 26, 2010 at 21:19, Sven Olaf Kamphuis s...@cb3rob.net wrote:
On Tue, 26 Oct 2010, Randy Carpenter wrote:
- Original Message -
On 10/26/2010 12:04 PM, Nick Hilliard wrote:
In practice, the RIRs are implementing sparse allocation which makes
it
possible to aggregate
On Thu, Aug 19, 2010 at 03:16, Rogelio scubac...@gmail.com wrote:
Long story short, a really crappy vendor is being shoved down our
NOC's throat. They have a horrid CLI (if you can call it that).
People don't understand it (it's non-intuitive) and are screwing up
things all the time.
Would
On Wed, Nov 18, 2009 at 4:04 PM, Kinkie gkin...@gmail.com wrote:
On Thu, Nov 12, 2009 at 9:40 PM, Bulger, Tim tim_bul...@polk.com wrote:
If you use stackable switches, you can stack across cabinets (up to 3 with 1
meter Cisco 3750 Stackwise), and uplink on the ends. It's a pretty solid
Devangnp wrote:
Does Juniper firewall has same issue?
Nope. Just that you need to get an ISG 1000 or ISG 2000 to be able to
virtualize nowadays, as the old lower model NetScreen boxes are no
longer up for sale.
Roland Dobbins wrote:
On Apr 9, 2009, at 11:48 PM, Lee, Steven (NSG Malaysia) wrote:
Please share your thought and thanks in advance :)
No, IMHO. Most broadband operators don't insert firewalls inline in
front of their subscribers, and wireless broadband is no different.
Some operators
Chris wrote:
Now to look at very affordable layer 2, Gigabit 3com switches with good pps.
You should take a look at HP. They have very good gigabit switches and
also offer lifetime guarantee on them.
HP actually has a CLI to configure the switch, not the crap 3Com has.
Ingo Flaschberger wrote:
OS:
Freebsd:
pros: very stable, quagge runs very well, fastforwarding support,
simple traffic shaping, interrupt less polling supported
cons: only 1 route for each network, vrrp failover is not easy to
implement with quagga and ospf, no multipath routing
Linux:
Florian Weimer wrote:
* Eugeniu Patrascu:
You can also use a kernel with LC-Trie as route hashing algorithm to
improve FIB lookups.
Do you know if it's possible to switch of the route cache? Based on
my past experience, it was a major source of routing performance
dependency on traffic
Chris wrote:
Eugeniu: That's very useful. The Intel dual port NICs mentioned aren't any
good then I presume (please see my comment to David).
Actually it depends on the motherboard chipset. Some chipsets allocate
an interrupt per slot, and when you have lot's a traffic between two
ports on
ubaidali_abdul_raz...@3com.com wrote:
Have you tried 3Com's 6040 / MSR-50 routers?
No offense / no flame, but really, do you actually compare 3Com with
Juniper ?
[EMAIL PROTECTED] wrote:
My gripe was that I wanted to get an IPv6 allocation from
RIPE to start
testing how IPv6 would fit in the company that I work for and build a
dual stack network so that when the time comes, just switch
on IPv6 BGP
neighbors and update the DNS.
But at almost 10.000
Joe Abley wrote:
But surely he's not an end-user. He's an ISP, which means he's
(potentially) an LIR.
My gripe was that I wanted to get an IPv6 allocation from RIPE to start
testing how IPv6 would fit in the company that I work for and build a
dual stack network so that when the time
Florian Weimer wrote:
* Seth Mattinen:
4. Multihome.
Or get upstream from someone who does, and who is small enough to be
able to get additional upstream upon short notice. I know that this
solution isn't always cost-effective. 8-/
(Multihoming alone isn't a solution because it's hard to
JoeSox wrote:
Thanks for everyone's help on and offlist.
acsalaska.net told me just before I left the office 4 hours ago they
have corrected the issues and time to clear cache.
Why was it an issue that they had no A records for the domain name ?
Gadi Evron wrote:
On Mon, 8 Sep 2008, Scott Weeks wrote:
--- [EMAIL PROTECTED] wrote:
I am sure if I looked into it more I could find some exploits related
to the sites.
-
Why software piracy might actually be good for companies.
Folks should clean their
On Sep 3, 2008, at 6:52 PM, Tim Sanderson wrote:
Anybody not wanting to use their ISP email would notice it. I see
filtering 25 FROM the customer as something that is not likely to
happen because of this. When a customer buys bandwidth, they want to
be able to use it for whatever they
Aaron Glenn wrote:
On 7/28/08, Seth Mattinen [EMAIL PROTECTED] wrote:
Junpier's J-series is a BSD based platform as far as I understand it.
ImageStream is *much* more affordable for me, but is Linux-based, and I fear
...snip...
AFAIK, none of Juniper's Juniper kit rocks BSD outside of
Rubens Kuhl Jr. wrote:
You can use Linux without conntrack. You can either do rmmod
ip_conntrack (unload the module), rm /var/lib/modules/ip_conntrack
(or something like that to erase the file) or use the RAW queue to
forward some packets without connection tracking (-j NOTRACK) and some
others
86 matches
Mail list logo