Hi Brandon,Your next actions are to level up the security of your network, your organization, and your team. I’ll craft up a post with a checklist you can use. If you don’t do this, then people on your team, your company, and your customers will continue to be “danger do not go there” listed. Spamh
> On Apr 11, 2019, at 10:08, Patrick McEvilly
> wrote:
> They are refusing to remove the tcp port 1900 filter without dispensation
> from the DDoS security gods. I understand blocking UDP 1900, what is the
> purpose of Level3 filtering tcp port 1900?
Filtering Exploitable Ports and Minimi
Hi Todd,
What you are describing is uRPF VRF mode. This was phase 3 of the uRPF work.
Russ White and I worked on it while at Cisco.
Given that you are setting up prefix filters with your peers, you can add to
the peering agreement that you will only accept packets whose source addresses
match
The “private sector will fix” expectation will be normal for today’s
governments. The challenge with climate chaos, is that Puerto Rico was another
step to the new normal.
> On Apr 16, 2018, at 04:05, Sean Donelan wrote:
>
>
> In the U.S. disaster response system, the primary responsbility
Hey!
New message, please read <http://urbanfoodstrategies.com/help.php?ku2xd>
Barry Raveendran Greene
The best training available on the Net for a small ISP to learn from the
best is available . At www.nanog.org!
All the NANOGs are on VOD. Just go to the presentation archive:
http://www.nanog.org/presentations/archive/. Put in a keyword to search (say
"BGP Tutorial"), cook some popcorn, and s
> > I think the need for someone being able to call 911 from their VoIP
> > outweighs your right to claim that they should be disconnected from
> > the Internet.
>
> Again, I don't disagree, but I see it as a technical issue
> which is solvable. I don't see why this is THE issue. It's
> rea
Hi Team,
For those who are looking for more regulation on the Internet and Telecom,
here is your new team "NOC."
http://news.cnet.com/8301-13578_3-10117856-38.html
http://www.csis.org/media/csis/pubs/081208_securingcyberspace_44.pdf
For those who do not want more regulation, send this to your c
Before everyone goes off and re-invents the wheel, please heed the advice
already provide by Randy, Steve, and Valdis. Community instigated RTBH is
used by a variety of Operational Security Communities. _Experience_ has
demonstrated caution. _Experience_ has pointed to the ways you use these
tools
FYI - I think Paul knows exactly what you are talking about.
Hint - review the seminar:
http://www.nanog.org/meetings/nanog36/abstracts.php?pt=Mzk5Jm5hbm9nMzY=&nm=n
anog36
> -Original Message-
> From: Jack Bates [mailto:jba...@brightok.net]
> Sent: Friday, February 13, 2009 9:23 AM
>
Visit the authority: http://www.confickerworkinggroup.org/wiki/
> -Original Message-
> From: Joe Blanchard [mailto:jbfixu...@gmail.com]
> Sent: Sunday, March 29, 2009 4:43 PM
> To: nanog@nanog.org
> Subject: The Confiker Virus.
>
>
> Anyone have a copy of this? Would like to analyze i
The nice thing about NANOG is that we have YEARS of on-line Video training
to help you get up to speed.
1. Go to http://www.nanog.org/subjects.html (Index of Talks)
2. Look for materials on BGP.
3. Have fun learning from the best.
My suggestion would be to watch last NANOG's BGP Tutorial. Th
The Conficker data would be one empirical source you can look at. You have a
break down by ASN and Country:
http://www.shadowserver.org/wiki/pmwiki.php/Stats/Conficker
> -Original Message-
> From: Steven Bellovin [mailto:s...@cs.columbia.edu]
> Sent: Wednesday, January 27, 2010 3:08 PM
>
I use all the testing tools out there for DDOS testing (you name it I've
most likely have used or currently have in the lab). The only way I've been
able to whack anti-DDOS solutions is by build a couple of racks of servers
to emulate a DDOS Botnet.
14 matches
Mail list logo