Hi all,
perhaps someone on this list interested in taking over binfiles.net?
From time-to-time we all run a wget with some binfiles to test our
peering-partners or transit uplinks. A central place to select some
binfiles matching those networks would be a nice feature, somewhat
similar to
does this; which seems to be in contradiction to RFC, and how everyone
else does it. The one thing that MS chooses to be different with...
Thanks,
Carlos M. Perez
Runcentral, LLC
On 10/23/2012 4:28 AM, Michiel Klaver wrote:
Carlos,
check the mail logs of your web-server, your domain might
Carlos,
check the mail logs of your web-server, your domain might have a primary
A-record pointing to something different than MX-records. When the MX
servers do something like greylisting and bounce with a temp-code (4xx)
hotmail servers will try alternative records (like @ IN A) and might find
At 01-05-2012 18:41, Hank Disuko wrote:
Hi folks,
I wonder if anyone can recommend a network diagram tool that can show
realtime link utilization via snmp?
Guess Observium is really up to your alley :)
www.observium.org
rejected: cannot find your
reverse hostname, [157.55.1.150]
(Verified this using various public DNS servers, to exclude potential local
issues)
Anyone here who has proper contacts to give them the clue-bat?
--
Michiel Klaver
IT Professional
At 21-03-2012 15:29, Jason Gurtz wrote:
Diagnostic-Code: smtp;450 4.7.1 Client host rejected: cannot find your
reverse hostname, [157.55.1.150]
(Verified this using various public DNS servers, to exclude potential
local
issues)
Anyone here who has proper contacts to give them the clue-bat?
At 22-07-2011 20:59, Eric J Esslinger wrote:
I'm not looking to monitor a massive infrastructure: 3 web sites, 2 mail
servers (pop,imap,submission port, https webmail), 4 dns servers (including
lookups to ensure they're not listening but not talking), and one inbound mx.
A few network
At 22-07-2011 20:59, Michael Painter wrote:
Fwiw, ol' Steve Gibson has written a small (167KB), .exe, DNS Benchmark.
It's easy to add 8.8.8.8 and 8.8.8.4 (or any nameserver) to the .ini file
from within the program .
http://www.grc.com/dns/benchmark.htm
--Michael
There's also namebench, does
At 11-10-2011 10:58, Michael Painter wrote:
Interesting choice of URLs.
I wonder how many folks are wasting their time chasing this ominous sounding
a.. www.paypal.com is hijacked: 173.0.88.34, 173.0.84.2, 173.0.84.34,
173.0.88.2
--Michael
I guess you selected the Alexa top1000 as
At 22-07-28164 20:59, Tei wrote:
*a random php programmer shows*
He, I just want to self-sign my CERT's and remove the ugly warning that
browsers shows. I don't want to pay 1000$ a year, or 1$ a year for that. I
just don't want to use cleartext for internet data transfer. HTTP is like
telnet,
At 22-07-2011 20:59, Peter Kranz wrote:
Anyone done a recent scan of newer looking glass software implementations
for apache? We've used cougar's for several years, but have been problems
with its SSH implementation lately.
Development of the Version6 LookingGlass can be found here, the
At 22-07-28164 20:59, Richard Barnes wrote:
Hi all,
What IPv6 prefix lengths are people accepting in BGP from
peers/customers? My employer just got a /48 allocation from ARIN, and
we're trying to figure out how to support multiple end sites out of
this (probably around 10). I was thinking
What other network operator groups are there around the world (besides NANOG)?
(I'd like to follow them to see what types of issues they see in their
countries)
NLNOG www.nlnog.net - The Netherlands
http://www.linkedin.com/groups?gid=2600071
Snort IDS with the
detection rules from EmergingThreats.net.
With kind regards,
Michiel Klaver
IT Professional
of being disconnected by them.
Commercial products that might assist you:
http://www.quarantainenet.nl/?language=en;page=product-qnet
Michiel Klaver
IT Professional
Justin Shore wrote:
Michiel Klaver wrote:
I would suggest to report that netblock to SpamHaus to have it
included at their DROP list, and also use that DROP list as extra
filter in addition to your bogon filter setup at your border routers.
The SpamHaus DROP (Don't Route Or Peer) list
of stolen 'hijacked' netblocks and netblocks controlled
entirely by professional spammers.
http://www.spamhaus.org/drop/
With kind regards,
Michiel Klaver
IT Professional
with that.
With kind regards,
Michiel Klaver
IT Professional
/List_of_Internet_exchange_points_by_size
http://www.internetworldstats.com/stats.htm
http://www.internetworldstats.com/stats1.htm
http://www.internetworldstats.com/stats4.htm
etc...
have fun with all that data!
Kind regards,
Michiel Klaver
IT Professional
an extraordinary claim,
so I'm not satisfied with the evidence provided. Is this not
the best droplist?
--
With kind regards,
Michiel Klaver BA.ict
GrafiX Internet B.V.
Stationsplein 20
2907 MJ Capelle aan den IJssel
The Netherlands
Web: http://grafix.nl/
Tel: +31-(0)10-2640210
Fax: +31
20 matches
Mail list logo