as extortionists if we go by the actual definition.
J
> On 17 Aug 2016, at 15:01, valdis.kletni...@vt.edu wrote:
>
> On Wed, 17 Aug 2016 01:11:09 +0200, Jonathan Hall said:
>> And either way, defamation requires some form of punitive damage be proven in
>> order to act ually win that c
Excuse me for chiming in, here… But, if I’m not mistaken (don’t worry, I’m not)
- this doesn’t count as ‘slander’ in any way, shape or form. This mail thread
is not any kind of valid FCC controlled or public communications device, as the
internet was actually excluded from the public
Stupid me forgot to CC the NANOG list.
Begin forwarded message:
From: Jonathan Hall <jh...@futuresouth.us<mailto:jh...@futuresouth.us>>
Date: 13 December 2015 at 11:13:31 GMT+1
To: Jay Ashworth <j...@baylink.com<mailto:j...@baylink.com>>
Subject: Re: John McA
While a little off-topic for the NANOG list, I figured some of you may want to
know about this. I started researching and testing this vulnerability the day
it was released, and once I started researching its usage/exploitation in the
wild, I identified that a few major sites were actually
Have you considered wireshark or Ettercap? I¹m not entirely certain
they¹ll monitor the throughput, but I know they can open PCAP'sŠ
Jon
On 2/3/14, 11:34 PM, Mike mike-na...@tiedyenetworks.com wrote:
Hello,
I was wondering if anyone could point me in the direction of a tool
capable of
5 matches
Mail list logo