If you give me your IP address, I can ping *from* Columbia.edu to your
machine and see what I get, that should pretty much solve any issues
that may arise.
-- Jonathan
-
Jonathan Slivko - Voyager Internet - www.voyageri.net
Web Hosting - Web
[forwarded to -hackers]
---
Jonathan Slivko - 4EverMail.COM - www.4evermail.com
Web Hosting - Web Desgin - UNIX Shell Accounts
[EMAIL PROTECTED] - Phone: (212) 663-1109
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTEC
I'm saying without any intervention of any kind. -- Jonathan
--
Jonathan M. Slivko <[EMAIL PROTECTED]>
4EverMail Hosting Services
http://www.4evermail.com
"Are YOU ready for the new Internet?"
--
- Original Message -
From: "Bruce A. Mah" <[EMAIL P
Which just brings me to another point, why not just turn ssh on by default
and turn telnetd off by default, given the latest exploit. Thanks for
bringing up a point that I wanted to bring to the security team for awhile.
--
Jonathan M. Slivko <[EMAIL PROTECTED]>
4EverMail Hosting Service
e source?
-- Jonathan
--
Jonathan M. Slivko <[EMAIL PROTECTED]>
Blinx Networks
http://www.blinx.net/
To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message
Then whats the alternative, it just works out of thin air? Now i'm really
curious to find out how this is being done, although I have seen it done on
my own systems in the past, just not by me, so i'm intrigued to find out how
this is being accomplished. -- Jonathan
--
Jonathan M. Sliv
Yes, but what that snippet showed from ifconfig showed 2 networks, 2 from
public IP space and 1 from private IP space, and since it's working the
networking code must know/care about something that it's being fed. --
Jonathan
--
Jonathan M. Slivko <[EMAIL PROTECTED]>
Bli
--
Jonathan M. Slivko <[EMAIL PROTECTED]>
Blinx Networks
http://www.blinx.net/
- Original Message -
From: "Chris Dillon" <[EMAIL PROTECTED]>
To: "Terry Lambert" <[EMAIL PROTECTED]>
Cc: "Julian Elischer" <[EMAIL PROTECTED]>; &quo
8 matches
Mail list logo