Re: Zayo Extortion

2016-08-17 Thread Jonathan Hall
as extortionists if we go by the actual definition. J > On 17 Aug 2016, at 15:01, valdis.kletni...@vt.edu wrote: > > On Wed, 17 Aug 2016 01:11:09 +0200, Jonathan Hall said: >> And either way, defamation requires some form of punitive damage be proven in >> order to act ually win that c

Re: Zayo Extortion

2016-08-16 Thread Jonathan Hall
Excuse me for chiming in, here… But, if I’m not mistaken (don’t worry, I’m not) - this doesn’t count as ‘slander’ in any way, shape or form. This mail thread is not any kind of valid FCC controlled or public communications device, as the internet was actually excluded from the public

Fwd: John McAfee: Massive DDoS attack on the internet was from smartphone botnet on popular app

2015-12-13 Thread Jonathan Hall
Stupid me forgot to CC the NANOG list. Begin forwarded message: From: Jonathan Hall <jh...@futuresouth.us<mailto:jh...@futuresouth.us>> Date: 13 December 2015 at 11:13:31 GMT+1 To: Jay Ashworth <j...@baylink.com<mailto:j...@baylink.com>> Subject: Re: John McA

Shellshock vulnerability research leads to WHAT?!

2014-10-06 Thread Jonathan Hall
While a little off-topic for the NANOG list, I figured some of you may want to know about this. I started researching and testing this vulnerability the day it was released, and once I started researching its usage/exploitation in the wild, I identified that a few major sites were actually

Re: looking for a tool...

2014-02-04 Thread Jonathan Hall
Have you considered wireshark or Ettercap? I¹m not entirely certain they¹ll monitor the throughput, but I know they can open PCAP'sŠ Jon On 2/3/14, 11:34 PM, Mike mike-na...@tiedyenetworks.com wrote: Hello, I was wondering if anyone could point me in the direction of a tool capable of