Hello,
If anyone is single homed via Savvis AS3561 that could spare a minute to
help with a couple of mtr/tcptraceroute/iperfs that would be great- trying
to drill down a peculiar and intermittent issue that has been occurring
since some time Thursday (packets indescriminately dropped on the
On 2010-03-18 19:35, Jared Mauch wrote:
http://www.google.com/search?q=1.2.3.4+site%3Acisco.com
I know that the University of Michigan utilize 1.2.3.4 for their
captive portal login/logout pages as recently as monday when I was
on the medical campus.
A lot of cheap, low-end devices
Dear Nanog
I am interested in IPtv solutions so Can anybody advice me what is the best
IPTv products/solutions that is wildly deployed in most of the Service
provider and if they have courses available ?
Thanks a lot
Rashed Alwarrag
Applied Technologies
Dear Nanog
I am interested in IPtv solutions so Can anybody advice me what is the best
IPTv products/solutions that is Widely deployed in most of the Service provider
and if they have courses available ?
Thanks a lot
Rashed Alwarrag
Applied Technologies
On 19/03/10 17:10 -0700, Mike wrote:
David W. Hankins wrote:
On Wed, Mar 17, 2010 at 09:22:06AM -0500, Dan White wrote:
The servers stop balancing their addresses, and one server starts to
exhibit 'peer holds all free leases' in its logs, in which case we need to
restart the dhcpd
On Fri, 19 Mar 2010, William Pitcock wrote:
On Fri, 2010-03-19 at 08:31 -0500, John Kristoff wrote:
An ongoing area of work is to build better closed,
trusted communities without leaks.
Have you ever considered that public transparency might not be a bad
thing? This seems to be the plight
On Sat, 2010-03-20 at 20:30 +0200, Hank Nussbacher wrote:
On Fri, 19 Mar 2010, William Pitcock wrote:
On Fri, 2010-03-19 at 08:31 -0500, John Kristoff wrote:
An ongoing area of work is to build better closed,
trusted communities without leaks.
Have you ever considered that public
On Sat, 20 Mar 2010, William Pitcock wrote:
What I mean is: why can't anyone contribute valuable information to the
security community? It is next to impossible to meet so-called 'trusted
people' if you're new to the game, which is counter-productive.
If you're a 15 year old kid and you just
On 03/20/2010 07:37 PM, William Pitcock wrote:
On Sat, 2010-03-20 at 20:30 +0200, Hank Nussbacher wrote:
On Fri, 19 Mar 2010, William Pitcock wrote:
On Fri, 2010-03-19 at 08:31 -0500, John Kristoff wrote:
An ongoing area of work is to build better closed,
trusted
If I was such a clever 15 year old I would go to Google and enter
contacting cisco ios security
which would lead me to -
http://www.cisco.com/en/US/products/products_security_advisories_listing.html
which would lead me to -
On Sat, 20 Mar 2010, William Pitcock wrote:
If you're a 15 year old kid and you just discovered a way to own the
latest IOS, for example, how do you know who to tell about it?
Read the manual? Most products and open source projects have a manual
which includes information about contacting
In a message written on Fri, Mar 19, 2010 at 05:10:04PM -0700, Mike wrote:
I am certainly not prepared to develop proof of concept code or go the
full route of developing such a server myself, however, I belive firmly
that a failover implementation in dhcp could be designed as a
On Sat, 2010-03-20 at 22:12 +0200, Gadi Evron wrote:
On 3/20/10 8:37 PM, William Pitcock wrote:
That is not what I mean and you know it.
What do you mean than? Hank made a good point on the type of traffic
normally going through these groups.
My point hasn't much to do with the NSP-SEC
On Sat, 20 Mar 2010, William Pitcock wrote:
What I mean is: why can't anyone contribute valuable information to the
security community? It is next to impossible to meet so-called 'trusted
people' if you're new to the game, which is counter-productive.
How do I break into show business?
On Sat, 20 Mar 2010, Hank Nussbacher wrote:
How exactly would being transparent for the following help Internet security:
I am seeing a new malware infection vector via port 91714 coming from the IP
range of 32.0.0.0/8 that installs a rootkit after visiting the web page
4**
Sent from my Windows Mobile® phone.
-Original Message-
From: nanog-requ...@nanog.org nanog-requ...@nanog.org
Sent: Saturday, March 20, 2010 8:00 AM
To: nanog@nanog.org nanog@nanog.org
Subject: NANOG Digest, Vol 26, Issue 106
Send NANOG mailing list submissions to
On 19/03/2010 06:04, Matt Shadbolt wrote:
I once had a customer who for some reason had all their printers on public
addresses they didn't own. Not advertising them outside, but internally
whenever a user browsed to a external site that happened to be one of the
addresses used, they would just
17 matches
Mail list logo