Depends on your acceptable use policy and terms of service.
If they won't or aren't able to respond effectively, I would say that
(depdning on the who and what of your
customer), shutting down the port may be a viable next step.
Hi mike
In our case, the AUP gives us the right to do so,
Dear all
In my network, I have a router in a middle only speaks OSPF.
is there any solution (without redistribute BGP into OSPF) for this kind of
problem?
thanks
--
Tarig Y. Adam
CTO - SUIN
www.suin.edu.sd
provide.
cheers
On Thu, Dec 23, 2010 at 1:18 PM, Tarig Yassin tariq198...@hotmail.com wrote:
Dear all
In my network, I have a router in a middle only speaks OSPF.
is there any solution (without redistribute BGP into OSPF) for this kind of
problem?
thanks
--
Tarig Y. Adam
CTO
Dear all
Greetings
I'm wondering why the software based router is not preferable in business even
if they have high featured Processers, and high capcity of memory.
What is the main deferent between Appliance router and Software based routers?
thank you all in adavance.
--
Deal all
I want to show you some obstacles that some countries face them every day.
For example when users from Sudan trying to access some web site they will get
a *Forbidden Access Error* message.
And some messages say: you are forbidden to access this web site because your
IP
And why not the ICCAN take this reponsibity as an International organization
not USA government?
From: tariq198...@hotmail.com
To: nanog@nanog.org
Subject: Who controlls the Internet?
Date: Sun, 25 Jul 2010 20:24:27 +0300
Deal all
I want to show you some obstacles that some
From: patr...@ianai.net
Subject: Re: Who controlls the Internet?
Date: Sun, 25 Jul 2010 13:55:56 -0400
To: nanog@nanog.org
On Jul 25, 2010, at 13:24, Tarig Yassin tariq198...@hotmail.com wrote:
I want to show you some obstacles that some countries face them every day
Hello every one
I am curious as to how others are documenting their network; both visually and
configurations.
Is there any a software offers a database with web-based front end that can
document in a very details.
thanks
--
Tarig Y. Adam
CTO - SUIN
www.suin.edu.sd
Dear janes
as I know many services use reverse lookup as a sender authentication technique.
e.g. Email server using this technique to reduce spams.( if the ip adress of
sending smtp server has no reverse lookup it's messages will be considered
spam).
regards,
Date: Tue, 20 Apr 2010 16:08:04
Hi Jul
Dkim , SPF ,and Domainkey are sender authentication methods for email system.
Which use Public Key Cryptography.
The mail server apends signiture to every outgoing message using private key.
the recepient mail server to verify needs the public key which placed in the
sender DNS
;
mso-fareast-theme-font:minor-fareast;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;}
-
Eng. Tarig Yassin Adam
Sudanese Universities' Information Network (SUIN)
T:
+249925659149
E: ta...@sustech.edu
11 matches
Mail list logo