Re: Megaupload.com seized

2012-01-20 Thread Joly MacFie
Technical nuances notwithsatnding, isn't the guts of the case that the megaupload team wilfully engaged in harbouring infringing files as evidenced by the email snooping, eg boasting to each other about having feature movies available prior to release etc. Similar evidence brought grokster down, a

Re: How are you doing DHCPv6 ?

2012-01-20 Thread Randy Carpenter
- Original Message - > > On Tue, Jan 17, 2012 at 4:04 PM, Randy Carpenter < > rcar...@network1.net > wrote: > > > We have a requirement for it to be a redundant server that is > centrally located. DHCPv6 will be relayed from each customer access > segment. > > We have been looking at

Re: Megaupload.com seized

2012-01-20 Thread Jay Ashworth
- Original Message - > From: "Ricky Beam" > On Fri, 20 Jan 2012 14:37:16 -0500, Paul Graydon > > wrote: > > ... Whenever they received a DMCA take-down they would remove the > > link, > > not the underlying file, so even though they knew that a file was > > illegally hosted, they never a

Re: How are you doing DHCPv6 ?

2012-01-20 Thread Jimmy Hess
On Tue, Jan 17, 2012 at 4:04 PM, Randy Carpenter wrote: > We have a requirement for it to be a redundant server that is centrally > located. DHCPv6 will be relayed from each customer access segment. > > We have been looking at using ISC dhcpd, as that is what we use for v4. > However, it currently

Re: Polling Bandwidth as an Aggregate

2012-01-20 Thread Jeff Gehlbach
Matt Addison wrote: >On this point (of nice aggregation UIs) is anyone here using Graphite >as a backend for their time series data stores? I'm not personally, but I know some of our support clients are happily using it along with OpenNMS' support for outboarding of data storage via TCP and

Re: Polling Bandwidth as an Aggregate

2012-01-20 Thread Matt Addison
On Jan 20, 2012, at 12:49, Nathan Eisenberg wrote: > The web interface allows for interface aggregation, and the code for doing > that could probably be reverse engineered easily enough for other reporting > mechanisms as well. On this point (of nice aggregation UIs) is anyone here using Graph

Re: Argus: a hijacking alarm system

2012-01-20 Thread Suresh Ramasubramanian
On Fri, Jan 20, 2012 at 10:45 PM, RijilV wrote: >> A suggestion: pick a different name.  There's already a network tool >> named Argus (it's been around for years): http://www.qosient.com/argus/ >> >> I suggest using the name of a different Wishbone Ash album: "Bona Fide". ;-) > Ha, there are alr

Re: juniper mx80 vs cisco asr 1000

2012-01-20 Thread Josh Hoppes
I certainly agree they have very different applications, and hopefully that will help those looking for this kind of insight. On Fri, Jan 20, 2012 at 3:54 PM, Saku Ytti wrote: > On (2012-01-20 09:50 -0700), PC wrote: > >> Juniper has some very aggressive pricing on mx80 bundles license-locked to

The Cidr Report

2012-01-20 Thread cidr-report
This report has been generated at Fri Jan 20 21:12:30 2012 AEST. The report analyses the BGP Routing Table of AS2.0 router and generates a report on aggregation potential within the table. Check http://www.cidr-report.org for a current version of this report. Recent Table History Date

BGP Update Report

2012-01-20 Thread cidr-report
BGP Update Report Interval: 12-Jan-12 -to- 19-Jan-12 (7 days) Observation Point: BGP Peering with AS131072 TOP 20 Unstable Origin AS Rank ASNUpds % Upds/PfxAS-Name 1 - AS34205 50143 3.1%5571.4 -- MRBD-AS OJSC Rostelecom 2 - AS840245021 2.8%

Re: juniper mx80 vs cisco asr 1000

2012-01-20 Thread Saku Ytti
On (2012-01-20 09:50 -0700), PC wrote: > Juniper has some very aggressive pricing on mx80 bundles license-locked to > 5gb, which are cheaper and blow the performance specifications of the > equivalent low end ASR1002 out of the water for internet edge BGP > applications. Unlike the ASR, a simple

Re: Megaupload.com seized

2012-01-20 Thread Marshall Eubanks
On Fri, Jan 20, 2012 at 3:02 PM, Leo Bicknell wrote: > In a message written on Fri, Jan 20, 2012 at 09:37:16AM -1000, Paul Graydon > wrote: >> From what I understand about MegaUpload's approach, they created a hash >> of every file that they stored.  If they'd already got a copy of the >> file th

Re: Megaupload.com seized

2012-01-20 Thread Roland Perry
In article <20120120200216.ga62...@ussenterprise.ufp.org>, Leo Bicknell writes Also, when using a hashed file store, it's possible that some uses are infringing and some are not. I might make a movie, put it on Megaupload, and then give the links only to the 5 people who bought it from them. O

Re: Megaupload.com seized

2012-01-20 Thread Vadim Antonov
"Without the permission of the copyright holder" _is_ contrary to statute, and thus 'against the law'. As such 'illegal' is _not_ an incorrect term to apply to the situation. It may not be a _criminal_ violation, but it is still proscribed by law. "Illegal" and "criminal" -- _these_

Re: Megaupload.com seized

2012-01-20 Thread Joly MacFie
Incidentally, some traffic stats on http://gigaom.com/2012/01/20/follow-the-traffic-what-megauploads-downfall-did-to-the-web/ MegaUpload was indeed one of the more popular sites on the web for storing > and sharing content. It ranked as .98 percent of the total web traffic in > the U.S. and 11.39

RE: accessing multiple devices via a script (Abdullah Al-Malki)

2012-01-20 Thread Bacon, Ricky
This is Expect's creator Don Libes' tool. I have been using it for years. http://expect.sourceforge.net/example/multixterm.man.html --RJ

Re: juniper mx80 vs cisco asr 1000

2012-01-20 Thread PC
Thank you, that is great to know and have for reference. Yeah, looking at this invoice from a a few months back, I have a "MX80 Promotional 5G Bundle for channels"... So I'm guessing that's now the MX5. (I had assumed it was a mx80 in my response). My first Juniper box ever, so forgive my confus

Re: Megaupload.com seized

2012-01-20 Thread Joly MacFie
aka "deduplication". In Viacom vs. YouTube it was pretty successfully argued that there was no way for YT to know that *every* instance of a work was illegally uploaded. However they *were* able to produce 'smoking gun' evidence of Viacom agents uploading material. j On Fri, Jan 20, 2012 at 2:37

Re: juniper mx80 vs cisco asr 1000

2012-01-20 Thread Skeeve Stevens
The MX80 license locked is not 5Gb The MX5 is 20Gb TP - 20 SFP ports card, only one MIC slot active The MX10 is 40Gb TP - 20 SFP ports card. both MIC slots active The MX40 is 60Gb TP - 20 SFP ports card, both MIC slots + 2 of the onboard 10GbE ports The MX80 is 80Gb TP - 20 SFP ports card, both MI

Re: Megaupload.com seized

2012-01-20 Thread Ricky Beam
On Fri, 20 Jan 2012 14:37:16 -0500, Paul Graydon wrote: ... Whenever they received a DMCA take-down they would remove the link, not the underlying file, so even though they knew that a file was illegally hosted, they never actually removed it. And that's where their safe harbour evaporated

Re: Megaupload.com seized

2012-01-20 Thread Administrator
- Original Message - > From: "Paul Graydon" > To: nanog@nanog.org > Sent: Friday, January 20, 2012 2:37:16 PM > Subject: Re: Megaupload.com seized > From what I understand about MegaUpload's approach, they created a > hash of every file that they stored. > So Megaupload did de-dupe.

Re: Megaupload.com seized

2012-01-20 Thread Leo Bicknell
In a message written on Fri, Jan 20, 2012 at 09:37:16AM -1000, Paul Graydon wrote: > From what I understand about MegaUpload's approach, they created a hash > of every file that they stored. If they'd already got a copy of the > file that was to be uploaded they'd just put an appropriate link i

Re: Megaupload.com seized

2012-01-20 Thread Tony McCrory
On 20 January 2012 19:37, Paul Graydon wrote: > From what I understand about MegaUpload's approach, they created a hash of > every file that they stored. If they'd already got a copy of the file that > was to be uploaded they'd just put an appropriate link in a users space, > saving them storage

Re: Megaupload.com seized

2012-01-20 Thread Paul Graydon
On 01/20/2012 09:11 AM, Ricky Beam wrote: On Thu, 19 Jan 2012 22:34:33 -0500, Michael Painter wrote: I quickly read through the indictment, but the gov't claims that when given a takedown notice, MU would only remove the *link* and not the file itself. That's actually a standard practice. I

Weekly Routing Table Report

2012-01-20 Thread Routing Analysis Role Account
This is an automated weekly mailing describing the state of the Internet Routing Table as seen from APNIC's router in Japan. The posting is sent to APOPS, NANOG, AfNOG, AusNOG, SANOG, PacNOG, LacNOG, TRNOG, CaribNOG and the RIPE Routing Working Group. Daily listings are sent to bgp-st...@lists.ap

Re: Megaupload.com seized

2012-01-20 Thread Ricky Beam
On Thu, 19 Jan 2012 22:34:33 -0500, Michael Painter wrote: I quickly read through the indictment, but the gov't claims that when given a takedown notice, MU would only remove the *link* and not the file itself. That's actually a standard practice. It allows the uploader to file a counte

Re: "Illegal content" (Re: Megaupload.com seized)

2012-01-20 Thread Valdis . Kletnieks
On Fri, 20 Jan 2012 12:46:51 CST, Robert Bonomi said: > Sorry, but the last sentence is simply _not_ true. If the making of the > copy was a violation of 17 USC 106 (1) or (2), it's existance is proscribed > by law. Nice try, but reading 17 USC 503 (b) we see: "As part of a final judgment or de

Re: US DOJ victim letter

2012-01-20 Thread Robert Bonomi
> From nanog-bounces+bonomi=mail.r-bonomi@nanog.org Fri Jan 20 08:11:24 > 2012 > Date: Fri, 20 Jan 2012 08:07:10 -0600 > From: -Hammer- > To: nanog@nanog.org > Subject: Re: US DOJ victim letter > > On a less serious note, did anyone notice the numbers on the fbi.gov > link? I'm pretty sure

Re: "Illegal content" (Re: Megaupload.com seized)

2012-01-20 Thread Robert Bonomi
Carsten Bormann wrote: >On Jan 20, 2012, at 11:25, Robert Bonomi wrote: > >> Public distribution without the permission of the copyright owner is >> illegal. > >This is veering off the purpose of this list, but maybe it is operationally s >This is veering off the purpose of this list, but maybe

RE: Polling Bandwidth as an Aggregate

2012-01-20 Thread Nathan Eisenberg
> RTG uses MySQL for it's backend, so you can basically setup queries > however you like and you can use RTGPOLL to graph multiple interfaces > as well. > > It's a super good tool and I think there is a group working on RTG2 at > googlecode (I think). Another RTG user! I didn't know many of us e

Re: Argus: a hijacking alarm system

2012-01-20 Thread RijilV
On 20 January 2012 07:53, Rich Kulawiec wrote: > On Fri, Jan 20, 2012 at 05:47:21PM +0800, Yang Xiang wrote: >> I build a system ?Argus? to real-timely alert prefix hijackings. > > A suggestion: pick a different name.  There's already a network tool > named Argus (it's been around for years): http

Re: juniper mx80 vs cisco asr 1000

2012-01-20 Thread PC
While the ASR1002 does offer more services, I generally disagree with some parts of this comparison. Juniper has some very aggressive pricing on mx80 bundles license-locked to 5gb, which are cheaper and blow the performance specifications of the equivalent low end ASR1002 out of the water for inte

Re: Why not to use RPKI (Was Re: Argus: a hijacking alarm system)

2012-01-20 Thread Richard Barnes
BBN has also released an initial version of their relying party software. Core features are basically the same as the other validators (namely, RPKI certificate validation), with -- more fine-grained error diagnostics and -- more robust support for the RTR protocol for distributing validated infor

Re: Polling Bandwidth as an Aggregate

2012-01-20 Thread Nick Hilliard
On 20/01/2012 15:48, Leo Bicknell wrote: > I find using MRTG is easier than Cacti for _automation_ purposes. It also has another slightly subtle but hugely useful advantage: the primary index reference of a graph does not refer to an interface name or a number, but can be defined as an arbitrary u

Re: Megaupload.com seized

2012-01-20 Thread Jay Ashworth
- Original Message - > From: "Robert Bonomi" > Mark Andrews wrote: > > I suspect most file sharing site don't have illegal content. Most > > would have some content that is there without the permission of the > > copyright holder. These are different things. > > > "Without the permissi

Re: Polling Bandwidth as an Aggregate

2012-01-20 Thread Keegan Holley
2012/1/20 Chris Adams > Once upon a time, Leo Bicknell said: > > To suggest Netflow is more accurate than rrdtool seems rather strange > > to me. It can be as accurate, but is not the way most people > > deploy it. > > Comparing Netflow to RRDTool is comparing apples to cabinets; one is a > so

Re: Polling Bandwidth as an Aggregate

2012-01-20 Thread Ian Goodall
On 20/01/2012 15:44, "Nick Hilliard" wrote: >No. This is one of cacti's major failings: there is no externally >accessible API. Not an external API but scripts have been available for some time now: http://www.cacti.net/downloads/docs/html/scripts.html Ian

Re: Polling Bandwidth as an Aggregate

2012-01-20 Thread Steve Clark
On 01/20/2012 10:53 AM, Chris Adams wrote: Once upon a time, Leo Bicknell said: To suggest Netflow is more accurate than rrdtool seems rather strange to me. It can be as accurate, but is not the way most people deploy it. Comparing Netflow to RRDTool is comparing apples to cabinets; one is a

Re: Polling Bandwidth as an Aggregate

2012-01-20 Thread Chris Adams
Once upon a time, Leo Bicknell said: > To suggest Netflow is more accurate than rrdtool seems rather strange > to me. It can be as accurate, but is not the way most people > deploy it. Comparing Netflow to RRDTool is comparing apples to cabinets; one is a source of information and one is a way

Re: Argus: a hijacking alarm system

2012-01-20 Thread Rich Kulawiec
On Fri, Jan 20, 2012 at 05:47:21PM +0800, Yang Xiang wrote: > I build a system ?Argus? to real-timely alert prefix hijackings. A suggestion: pick a different name. There's already a network tool named Argus (it's been around for years): http://www.qosient.com/argus/ I suggest using the name of a

Re: Polling Bandwidth as an Aggregate

2012-01-20 Thread Keegan Holley
Is there a plugin for MRTG that allows you to go back to specific times? I like MRTG better for this as well but cacti's graphs are much more flexible. 2012/1/20 Leo Bicknell > In a message written on Fri, Jan 20, 2012 at 10:36:38AM -0500, Keegan > Holley wrote: > > using cacti for this. My l

Re: Polling Bandwidth as an Aggregate

2012-01-20 Thread Leo Bicknell
In a message written on Fri, Jan 20, 2012 at 10:36:38AM -0500, Keegan Holley wrote: > using cacti for this. My last question is if there is any easy/automated > way to pull interfaces into cacti and configure graphs for them either via > SNMP or reading from a mysql DB. I suddenly remember how m

Re: Polling Bandwidth as an Aggregate

2012-01-20 Thread Nick Hilliard
On 20/01/2012 15:36, Keegan Holley wrote: > using cacti for this. My last question is if there is any easy/automated > way to pull interfaces into cacti and configure graphs for them either via > SNMP or reading from a mysql DB. I suddenly remember how much I hate > importing large routers into c

Re: Polling Bandwidth as an Aggregate

2012-01-20 Thread Keegan Holley
Thanks all for the responses. I think I'm going to use cacti and plugins to aggregate. Aggregated billing is kind of something that would be nice to have but wasn't required. It's nice to know there are concerns with using cacti for this. My last question is if there is any easy/automated way t

Re: Polling Bandwidth as an Aggregate

2012-01-20 Thread Leo Bicknell
In a message written on Fri, Jan 20, 2012 at 12:16:14AM -0600, Jimmy Hess wrote: > Except Cacti/RRDTOOL is really just a great visualization tool, while you > can build stacks, it is not something that accurately meters data for > billing purposes. The right kind of tool to use would be a netflow

Re: US DOJ victim letter

2012-01-20 Thread Mike Andrews
On Fri, Jan 20, 2012 at 08:07:10AM -0600, -Hammer- wrote: > On a less serious note, did anyone notice the numbers on the fbi.gov > link? I'm pretty sure they are implying those are IP addresses. > 123.456.789 and 987.654.321. Must be the same folks that do the Nexus > documentation for Cisco. A

Re: Why not to use RPKI (Was Re: Argus: a hijacking alarm system)

2012-01-20 Thread Alex Band
If you want to play around with RPKI Origin Validation, you can download the RIPE NCC RPKI Validator here: http://ripe.net/certification/tools-and-resources It's simple to set up and use: just unzip the package on a *NIX system, run ./bin/rpki-validator and browse to http://localhost:8080 EuroTr

Re: Megaupload.com seized

2012-01-20 Thread Valdis . Kletnieks
On Fri, 20 Jan 2012 12:00:15 +0100, Tei said: > What sould fileshares must do, is to store files in these services in > a encrypted way, and anonimized name. So these services have > absolutelly no way to tell what are hosting. http://freenetproject.org/ pgpQ1myO3UNxN.pgp Description: PGP signat

Re: Why not to use RPKI (Was Re: Argus: a hijacking alarm system)

2012-01-20 Thread Danny McPherson
On Jan 20, 2012, at 8:08 AM, Yang Xiang wrote: > > I think network operators are only careless, but not trust-less, > so black-hole hijacking is the majority case. This is aligned with the discussion on route leaks at the proposed interim SIDR meeting just after NANOG. Even with RPKI and BGPS

Re: US DOJ victim letter

2012-01-20 Thread -Hammer-
On a less serious note, did anyone notice the numbers on the fbi.gov link? I'm pretty sure they are implying those are IP addresses. 123.456.789 and 987.654.321. Must be the same folks that do the Nexus documentation for Cisco. -Hammer- "I was a normal American nerd" -Jack Herer On 1/19/20

RE: Polling Bandwidth as an Aggregate

2012-01-20 Thread Drew Weaver
RTG uses MySQL for it's backend, so you can basically setup queries however you like and you can use RTGPOLL to graph multiple interfaces as well. It's a super good tool and I think there is a group working on RTG2 at googlecode (I think). -Drew -Original Message- From: Keegan Holley

Re: Why not to use RPKI (Was Re: Argus: a hijacking alarm system)

2012-01-20 Thread Yang Xiang
2012/1/20 Arturo Servin > > On 20 Jan 2012, at 10:38, Yang Xiang wrote: > > > RPKI is great. > > > > But, firstly, ROA doesn't cover all the prefixes now, > > we need an alternative service to alert hijackings. > > Or to sign your prefixes. > Sign prefixes is the best way. Before sign al

RE: juniper mx80 vs cisco asr 1000

2012-01-20 Thread Drew Weaver
Isn't the ASR9001 closer to the MX80? Thanks, -Drew -Original Message- From: jon Heise [mailto:j...@smugmug.com] Sent: Thursday, January 19, 2012 3:10 PM To: nanog@nanog.org Subject: juniper mx80 vs cisco asr 1000 Does anyone have any experience with these two routers, we're looking to

Re: How are you doing DHCPv6 ?

2012-01-20 Thread Bjørn Mork
Randy Carpenter writes: > I am wondering how people out there are using DHCPv6 to handle > assigning prefixes to end users. > > We have a requirement for it to be a redundant server that is > centrally located. OK, so then you've already made your choice. Another solution is having the DHCPv6 s

Re: Why not to use RPKI (Was Re: Argus: a hijacking alarm system)

2012-01-20 Thread Arturo Servin
On 20 Jan 2012, at 10:38, Yang Xiang wrote: > RPKI is great. > > But, firstly, ROA doesn't cover all the prefixes now, > we need an alternative service to alert hijackings. Or to sign your prefixes. > > secondly, ROA can only secure the 'Origin AS' of a prefix, That's true.

Re: Why not to use RPKI (Was Re: Argus: a hijacking alarm system)

2012-01-20 Thread Yang Xiang
RPKI is great. But, firstly, ROA doesn't cover all the prefixes now, we need an alternative service to alert hijackings. secondly, ROA can only secure the 'Origin AS' of a prefix, while Argus can discover potential hijackings caused by anomalous AS path. After ROA and BGPsec deployed in the enti

Re: Argus: a hijacking alarm system

2012-01-20 Thread Yang Xiang
_ Yang Xiang . about.me/xiangyang Ph.D candidate. Tsinghua University Argus: argus.csnet1.cs.tsinghua.edu.cn 2012/1/20 Jeroen Massar > On 2012-01-20 12:01 , Yang Xiang wrote: > > > 2012/1/20 Suresh Ramasubramanian > > > > > > > Pleas

Why not to use RPKI (Was Re: Argus: a hijacking alarm system)

2012-01-20 Thread Arturo Servin
You could use RPKI and origin validation as well. We have an application that does that. http://www.labs.lacnic.net/rpkitools/looking_glass/ For example you can periodically check if your prefix is valid: http://www.labs.lacnic.net/rpkitools/looking_glass/rest/

Re: Argus: a hijacking alarm system

2012-01-20 Thread Jeroen Massar
On 2012-01-20 12:01 , Yang Xiang wrote: > 2012/1/20 Suresh Ramasubramanian > > > On Fri, Jan 20, 2012 at 4:09 PM, Yang Xiang > > wrote: > > Hope I can find enough v6 route-servers before Jun 6 :) > > Jer

Re: "Illegal content" (Re: Megaupload.com seized)

2012-01-20 Thread Marshall Eubanks
On Fri, Jan 20, 2012 at 5:48 AM, Carsten Bormann wrote: > On Jan 20, 2012, at 11:25, Robert Bonomi wrote: > >>  Public distribution without the permission of the copyright owner is >>  illegal. > > This is veering off the purpose of this list, but maybe it is operationally > significant to be abl

Re: Megaupload.com seized

2012-01-20 Thread Tei
On 20 January 2012 12:14, Alec Muffett wrote: > > On 20 Jan 2012, at 11:00, Tei wrote: > >> Fileshares can organize thenselves in sites based on a forum software >> that is private by default (open with registration), then share some >> "information" file that include the url to the files hosted,

Re: Megaupload.com seized

2012-01-20 Thread bmanning
On Fri, Jan 20, 2012 at 03:05:47AM -0800, Owen DeLong wrote: > > On Jan 20, 2012, at 2:25 AM, Robert Bonomi wrote: > > > > > Mark Andrews wrote: > >> > >> I suspect most file sharing site don't have illegal content. Most > >> would have some content that is there without the permission of the

Re: Megaupload.com seized

2012-01-20 Thread Alec Muffett
On 20 Jan 2012, at 11:00, Tei wrote: > Fileshares can organize thenselves in sites based on a forum software > that is private by default (open with registration), then share some > "information" file that include the url to the files hosted, and the > key to unencrypt these files, and some metad

Re: Megaupload.com seized

2012-01-20 Thread Owen DeLong
On Jan 20, 2012, at 2:25 AM, Robert Bonomi wrote: > > Mark Andrews wrote: >> >> I suspect most file sharing site don't have illegal content. Most >> would have some content that is there without the permission of the >> copyright holder. These are different things. > > > "Without the perm

Re: Argus: a hijacking alarm system

2012-01-20 Thread Yang Xiang
_ Yang Xiang . about.me/xiangyang 2012/1/20 Suresh Ramasubramanian > On Fri, Jan 20, 2012 at 4:09 PM, Yang Xiang > wrote: > > Hope I can find enough v6 route-servers before Jun 6 :) > > Jeroen is just the guy to suggest where you can find them :) > Till then, if

Re: Megaupload.com seized

2012-01-20 Thread Tei
What sould fileshares must do, is to store files in these services in a encrypted way, and anonimized name. So these services have absolutelly no way to tell what are hosting. Fileshares can organize thenselves in sites based on a forum software that is private by default (open with registration),

Re: Argus: a hijacking alarm system

2012-01-20 Thread Suresh Ramasubramanian
On Fri, Jan 20, 2012 at 4:09 PM, Yang Xiang wrote: > > Hope I can find enough v6 route-servers before Jun 6 :) Jeroen is just the guy to suggest where you can find them :) Till then, if google is an acceptable substitute - http://www.bgp4.net/wiki/doku.php?id=tools:ipv6_route_servers Enjoy - you

"Illegal content" (Re: Megaupload.com seized)

2012-01-20 Thread Carsten Bormann
On Jan 20, 2012, at 11:25, Robert Bonomi wrote: > Public distribution without the permission of the copyright owner is > illegal. This is veering off the purpose of this list, but maybe it is operationally significant to be able to use the right terms when a law enforcement officer is standin

Re: Megaupload.com seized

2012-01-20 Thread Roland Perry
In article <201201201025.q0kapdm5040...@mail.r-bonomi.com>, Robert Bonomi writes I suspect most file sharing site don't have illegal content. Most would have some content that is there without the permission of the copyright holder. These are different things. "Without the permission of th

Re: Argus: a hijacking alarm system

2012-01-20 Thread Yang Xiang
_ Yang Xiang . about.me/xiangyang Ph.D candidate. Tsinghua University Argus: argus.csnet1.cs.tsinghua.edu.cn 2012/1/20 Jeroen Massar > On 2012-01-20 10:47 , Yang Xiang wrote: > > Hi, > > > > I build a system ‘Argus’ to real-timely alert prefix hijackings. > > Ar

Re: Megaupload.com seized

2012-01-20 Thread Robert Bonomi
Mark Andrews wrote: > > I suspect most file sharing site don't have illegal content. Most > would have some content that is there without the permission of the > copyright holder. These are different things. "Without the permission of the copyright holder" _is_ contrary to statute, and th

Re: Argus: a hijacking alarm system

2012-01-20 Thread Jeroen Massar
On 2012-01-20 10:47 , Yang Xiang wrote: > Hi, > > I build a system ‘Argus’ to real-timely alert prefix hijackings. > Argus monitors the Internet and discovers anomaly BGP updates which caused > by prefix hijacking. > When Argus discovers a potential prefix hijacking, it will advertise it in > a ve

Re: juniper mx80 vs cisco asr 1000

2012-01-20 Thread Saku Ytti
On (2012-01-19 12:10 -0800), jon Heise wrote: > Does anyone have any experience with these two routers, we're looking to > buy one of them but i have little experience dealing with cisco routers > and zero experience with juniper. It might be because of your schedule/timetable, but you are compar