I've had the same problem with several customers in the last 6 months. It's
always someone playing games on Xbox live. I have one (extremely angry)
customer that we've blocked the Xbox live ports on, as somehow within
minutes of signing on he'd be the target of a >1 Gbps DDoS.
I'd never thought to
On Mar 13, 2014 7:37 PM, "Larry Sheldon" wrote:
>
> On 3/13/2014 8:22 AM, Sholes, Joshua wrote:
>>
>> On 3/13/14, 12:35 AM, "shawn wilson" wrote:
>>>
>>> A note on terminology - whether you know what you're doing, actually
break
>>> into a system, or obtain a thumb drive with data that you weren'
Basically anything. It works as a standard SCSI tape changer device using
mtx, my, and your favorite archiving software, tar, Amanda, bacula, arkeia,
many others.
On Thursday, March 13, 2014, Maxime Godonou Dossou
wrote:
> Hello all
> I just want to know someone here is using Dell Power Volt 124
AMANDA (http://amanda.org/) also supports the 124T
See here:
http://wiki.zmanda.com/index.php/Tapetype_definitions#Dell_PV124T_LTO3
-Original Message-
From: Maxime Godonou Dossou [mailto:godomu...@gmail.com]
Sent: Thursday, March 13, 2014 1:28 PM
To: nanog@nanog.org
Subject: Dell Power
Not that this is particularly network operations related, but...
A quick Google search
(https://www.google.com/search?q=Dell+Power+Volt+124T+red+hat+enterprise&oq=Dell+Power+Volt+124T+red+hat+enterprise&aqs=chrome..69i57.6018j0j7&sourceid=chrome&espv=2&es_sm=141&ie=UTF-8)
yielded the User's Guid
Has anyone been seeing voice degradation reports coming in from customers
using Comcast DIA? We have several complaints that have came in the last
week or so and the commonality is Comcast. Tracing out to the customer
sites we are directly peered with L3 which drops the traffic straight into
Comcas
On 3/13/2014 5:23 PM, Mark Andrews wrote:
If your customers are using BIND there is a flag you can supply to named
>to cause it to operate only in IPv4. That would avoid this problem
>altogether.
>
And is basically not needed as the IP stack (with the exception of
Solaris) informs named when th
Replied offlist.
Mehmet
> On Mar 13, 2014, at 18:11, Mike wrote:
>
> Hi,
>
>I can't seem to find a contact for microsoft / xbox security. I have some
> punks ddos'ing a customer of mine and I'd like to see if those folks from
> xbox could help us out here.
>
> Thank you.
> Mike
>
Hi,
I can't seem to find a contact for microsoft / xbox security. I
have some punks ddos'ing a customer of mine and I'd like to see if those
folks from xbox could help us out here.
Thank you.
Mike
In message <5321eab8.3010...@dougbarton.us>, Doug Barton writes:
> On 03/13/2014 12:35 AM, Anurag Bhatia wrote:
> > Hello there!
> >
> >
> > I am trying to troubleshoot a case of DNS failure issue with one of Indian
> > Govt's domain (nic.in). I can see that 1 out of 4 authoritative DNS server
> >
I’ve seen past employers contact the FBI for a similar issue, but we had
control of the network and logs in question so that made it easier. You may be
able to contact interpol or a similar agency in the EU. They will at least be
able to tell you the right agency to call.
You can also have a
On 3/13/2014 8:22 AM, Sholes, Joshua wrote:
On 3/13/14, 12:35 AM, "shawn wilson" wrote:
A note on terminology - whether you know what you're doing, actually break
into a system, or obtain a thumb drive with data that you weren't supposed
to have - it has the same end so I'd refer to it by the s
exabgp from ripe labs can inject flowspec routes.
typically some helper app would generate the policy for exabgp and then
exabgp would do the heavy lifting.
joel
On 3/13/14, 3:42 PM, Piotr wrote:
> Hi,
>
> There is some open source sflow collector wich can talk via flowspec
> with juniper route
On 3/13/2014 6:42 PM, Piotr wrote:
Hi,
There is some open source sflow collector wich can talk via flowspec
with juniper routers ? something like snort + nfdump ? I looking
something besides Arbor because itis too expensive for me.
thanks for help
Peter
I believe the goal of ExaDDOS is
Hi,
There is some open source sflow collector wich can talk via flowspec
with juniper routers ? something like snort + nfdump ? I looking
something besides Arbor because itis too expensive for me.
thanks for help
Peter
Hello,
You can use Bacula.
this is a CentOS 6 running bacula:
# mtx -f /dev/changer inquiry
Product Type: Medium Changer
Vendor ID: 'DELL'
Product ID: 'PV-124T '
Revision: '0086'
Attached Changer API: No
# mtx -f /dev/changer status
Storage Changer /dev/changer:1 Drives, 8 Slots
Hello all
I just want to know someone here is using Dell Power Volt 124T as tape backup.
I just get it but I would like to use Linux redhat 6.3 server as OS on my
backup server.
Can tell me if you know any open source software I can use to drive it .
Sent from IPad
On Mar 13, 2014, at 2:30 PM, James Downs wrote:
>
> On Mar 13, 2014, at 12:24 PM, William Herrin wrote:
>
>> I'm afraid my google-fu doesn't reach back to the 1960's. You don't
>> happen to have a handy reference do you?
>
> http://en.wikipedia.org/wiki/Hacker_%28term%29
>
http://www.catb.o
On Mar 13, 2014, at 3:24 PM, William Herrin wrote:
>
> On Thu, Mar 13, 2014 at 3:15 PM, James R Cutler
> wrote:
>> As of early 1960's - See history of WTBS, Ralph Zaorski, Dick Gruen,
>> Alan Kent, and many others - The then current usage of "hacker" was
>> simply one who produced a "hack" - an
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
On 3/13/2014 12:30 PM, James Downs wrote:
>
> On Mar 13, 2014, at 12:24 PM, William Herrin
> wrote:
>
>> I'm afraid my google-fu doesn't reach back to the 1960's. You
>> don't happen to have a handy reference do you?
>
> http://en.wikipedia.org/
On Mar 13, 2014, at 15:16 , Mike wrote:
> Problem identified. My domain is on hold... ugh, my eyes are tired, thanks to
> those who were able to help me (in email).
> Also my information hiding was a bit weak, I should have used 'example.org'
> to make it clear I was deleting the real info.
e
On Mar 13, 2014, at 12:24 PM, William Herrin wrote:
> I'm afraid my google-fu doesn't reach back to the 1960's. You don't
> happen to have a handy reference do you?
http://en.wikipedia.org/wiki/Hacker_%28term%29
Another use of 'hacking' has been around in software for awhile ...
Newsgroups: comp.lang.perl.misc
Subject: Re: Who is Just another Perl hacker?
From: mer...@stonehenge.com (Randal L. Schwartz)
Message-ID:
> "Juho" == Juho Cederstrom writes:
Juho> But when do I become Just another Perl
On Thu, Mar 13, 2014 at 3:15 PM, James R Cutler
wrote:
> As of early 1960's - See history of WTBS, Ralph Zaorski, Dick Gruen,
> Alan Kent, and many others - The then current usage of "hacker" was
> simply one who produced a "hack" - an unusual or unexpected design
> or configuration or action whic
Problem identified. My domain is on hold... ugh, my eyes are tired,
thanks to those who were able to help me (in email).
Also my information hiding was a bit weak, I should have used
'example.org' to make it clear I was deleting the real info.
Thanks all.
Mike-
On Mar 13, 2014, at 12:46 PM, William Herrin wrote:
>
> On Thu, Mar 13, 2014 at 11:45 AM, James R Cutler
> wrote:
>> And Bill documents yet another redefinition. Prior to that time, at MIT a
>> "hacker" produced a novel variation of technology using it in ways not
>> previously envisioned but
On 3/13/14, 11:09 AM, valdis.kletni...@vt.edu wrote:
> On Thu, 13 Mar 2014 12:46:06 -0400, William Herrin said:
> (Contemplate for a bit why Kirk
> wasn't bounced out on his butt from the Academy)
Apparently the thinking about hacking was a little more permissive in 1966.
>
>
signature.asc
On 3/13/14, 1:23 PM, "Barry Shein" wrote:
>A lot of us vowed to try to keep the "hackers" vs "crackers"
>distinction alive in the public's mind but I can't say it worked.
Yeah, that battle had already been lost by the time I entered the field
(even though I tried to fight it for a while anyway.)
On Mar 13, 2014, at 14:05 , Mike wrote:
> Hi,
>
> Sorry if there's another list for this, but Im observing a strange problem
> with a .org domain. Right now when I query dns, I am getting only a SOA for
> '.org' which looks like this:
Your example query is only checking your local recursive
time travel, they haz it.
On Thu, Mar 13, 2014 at 2:05 PM, Mike wrote:
> Hi,
>
> Sorry if there's another list for this, but Im observing a strange problem
> with a .org domain. Right now when I query dns, I am getting only a SOA for
> '.org' which looks like this:
>
>
>
> dig -t ns somedomain.o
On Thu, 13 Mar 2014 12:46:06 -0400, William Herrin said:
> Correct me if I'm wrong, but by the time "hacker" emerged as a word
> distinct from "hack" it already carried implications of mischief and
> disregard for the rules in addition to the original implication of
> creatively solving a technica
Hi,
Sorry if there's another list for this, but Im observing a strange
problem with a .org domain. Right now when I query dns, I am getting
only a SOA for '.org' which looks like this:
dig -t ns somedomain.org
; <<>> DiG 9.8.4-rpz2+rl005.12-P1 <<>> -t ns somedomain.org
;; global options:
On 03/13/2014 12:35 AM, Anurag Bhatia wrote:
Hello there!
I am trying to troubleshoot a case of DNS failure issue with one of Indian
Govt's domain (nic.in). I can see that 1 out of 4 authoritative DNS server
is IPv6 only. We have quite a few users running IPv4 only setup and hence
1/4 of these
Re: hackers vs crackers
I was at one of the early "Hackers Conferences" in the late 1980s,
organized by Stewart Brand (The Whole Earth Catalog, The Well.)
The attendees were quite impressive, not sure why I was invited :-)
Todd Rundgren, Jerry Pournelle, Ted Nelson, the founders of a number
of
>> I'm an ISP in Germany and a cracker (not a hacker :) ) has targeted a
>> customers of mine in the last days. The cracker was successful and caused
>> financial damage / was successful with data theft. I set a trap and finally
>> caught his real IP address - a Comcast user in the US (100% not
On Thu, Mar 13, 2014 at 11:45 AM, James R Cutler
wrote:
> And Bill documents yet another redefinition. Prior to that time, at MIT a
> "hacker" produced a novel variation of technology using it in ways not
> previously envisioned but not necessarily unlawful.
>
> Mating two different generations
On Mar 13, 2014, at 11:08 AM, William Herrin wrote:
>
> On Thu, Mar 13, 2014 at 10:13 AM, wrote:
>> On Thu, 13 Mar 2014 13:22:40 -, "Sholes, Joshua" said:
>>
>>> If one came up in this field with a mentor who was old school, or if one
>>> is old school oneself, one tends use the original (
On Thu, Mar 13, 2014 at 10:13 AM, wrote:
> On Thu, 13 Mar 2014 13:22:40 -, "Sholes, Joshua" said:
>
>> If one came up in this field with a mentor who was old school, or if one
>> is old school oneself, one tends use the original (as I understand it)
>> definitions--a "cracker" breaks security
On Thu, 13 Mar 2014 13:22:40 -, "Sholes, Joshua" said:
> If one came up in this field with a mentor who was old school, or if one
> is old school oneself, one tends use the original (as I understand it)
> definitions--a "cracker" breaks security or obtains data unlawfully, a
> "hacker" is some
On 3/13/14, 12:35 AM, "shawn wilson" wrote:
>A note on terminology - whether you know what you're doing, actually break
>into a system, or obtain a thumb drive with data that you weren't supposed
>to have - it has the same end so I'd refer to it by the same term -
>hacking. Trying to differentia
Hello there!
I am trying to troubleshoot a case of DNS failure issue with one of Indian
Govt's domain (nic.in). I can see that 1 out of 4 authoritative DNS server
is IPv6 only. We have quite a few users running IPv4 only setup and hence
1/4 of these DNS servers are non-reachable from the recursor
41 matches
Mail list logo