On Jul 12, 2005, at 4:09 PM, william(at)elan.net wrote:
On Tue, 12 Jul 2005, Dave Crocker wrote:
"Roaylty-free" does not mean it can be used by everyone.
it would probably help to debate the licensing details when folks
have
looked at the specific language of the licensing agreement(s
For those who like to keep abreast of security issues, there are
interesting developments happening at BlackHat with regards to Cisco
IOS and its vulnerability to arbitrary code executions.
I apologize for the article itself being brief and lean on technical
details, but allow me to say t
On Jul 27, 2005, at 1:26 PM, James Baldwin wrote:
http://blogs.washingtonpost.com/securityfix/2005/07/
mending_a_hole_.html
Further information:
http://www.crn.com/sections/breakingnews/breakingnews.jhtml?
articleId=166403096
On Jul 27, 2005, at 4:48 PM, J. Oquendo wrote:
On Wed, 27 Jul 2005, Dan Hollis wrote:
This is looking like a complete PR disaster for cisco. They would
have
been better off allowing the talk to take place, and actually
fixing the
holes rather than wasting money on a small army of razorblad
On Jul 28, 2005, at 3:29 AM, Neil J. McRae wrote:
I couldn't disagree more. Cisco are trying to control the
situation as best they can so that they can deploy the needed
fixes before the $scriptkiddies start having their fun. Its
no different to how any other vendor handles a exploit and
I'm s
On Jul 28, 2005, at 10:14 AM, Scott Morris wrote:
While I do think it's obnoxious to try to
censor someone, on the other hand if they have proprietary internal
information somehow that they aren't supposed to have to begin
with, I don't
think it is in security's best interested to commit a c
On Jul 28, 2005, at 1:50 PM, Joseph S D Yao wrote:
Given that it was clear that Lynn had NDA access to the Cisco source
code already, it seems pretty clear that the original poster wasn't
even
speculating that he had stolen it, but to potential exploiters' having
done so. Eh?
Lynn did not
I spoke with people with Lynn in Vegas and confirmed the following,
if anyone is watching the AP wire or Forbes you'll see that Cisco, et
al. and Lynn have settled the suit.
http://www.forbes.com/business/feeds/ap/2005/07/28/ap2163964.html
On Jul 28, 2005, at 8:40 PM, Randy Bush wrote:
I spoke with people with Lynn in Vegas and confirmed the following,
if anyone is watching the AP wire or Forbes you'll see that Cisco, et
al. and Lynn have settled the suit.
i missed the part where we, the likely actual injured parties, learn
to
On Aug 9, 2005, at 9:57 AM, J. Oquendo wrote:
Ironic the marketing and disinformation coming out of Cisco Systems
in relation to not disclosing what really occurred and labeling the
vulnerability as "IPv6 based but" after they initially stated
it as "IPv6 only!"
Its a half truth. The vuln
On Aug 9, 2005, at 11:11 AM, [EMAIL PROTECTED] wrote:
They are not "Lynn's exploit techniques". The techniques were
published by someone else in considerable more detail than
Lynn along with source code.
What techniques are you referencing? The technique Lynn demonstrated
has not been seen
On Aug 9, 2005, at 3:20 PM, [EMAIL PROTECTED] wrote:
On Tue, 09 Aug 2005 14:31:08 EDT, James Baldwin said:
What techniques are you referencing? The technique Lynn demonstrated
has not been seen anywhere in the wild, as far as I know. He, nor
ISS, ever made the source code available to
On Aug 10, 2005, at 6:13 AM, [EMAIL PROTECTED] wrote:
What techniques are you referencing? The technique Lynn demonstrated
has not been seen anywhere in the wild, as far as I know. He, nor
ISS, ever made the source code available to anyone outside of Cisco,
or ISS. What publication are you refe
On Aug 13, 2005, at 12:03 AM, Fergie (Paul Ferguson) wrote:
Good suggestions for Gadi. ,-)
- ferg
-- "Christopher L. Morrow" <[EMAIL PROTECTED]> wrote:
cool, among the 800k+ complaints we see a month (yes, 800k) there are
quite a few completely useless ones :( Anything sent in as a
compl
On Aug 17, 2005, at 11:03 PM, routerg wrote:
What if you are a transit provider that serves ebay, yahoo, and/or
google and the worm is propogating over TCP port 80?
No one is suggesting that anyone suspend reason when making a
decision to temporarily, or permanently for that matter, block
On Oct 3, 2005, at 5:52 PM, Joe Abley wrote:
before wielding your hyper-platinum amex card.
I believe what you're actually referring to is the black american
express centurion card.
---
James Baldwin
em in how machines
represent and execute code.
---
James Baldwin
"Tolerance is for the insincere"
, noting the registration of 5.1 million new domain
names during the quarter, the highest quarterly growth
in Internet history.
http://thewhir.com/marketwatch/ver120104.cfm
http://www.verisign.com/Resources/Naming_Services_Resources/
Domain_Name_Industry_Brief/index.html
---
James Baldwin
the consumer. This
cost reduction can be recouped through effective marketing and having
the customer realize those cost savings. If you reduce customer
rollover you can tolerate or encourage core infrastructure cost
increases as your bottom line can remain the same or increase.
---
James Bal
u are not entitled to unfiltered internet connectivity. If you want
to be entitled to unfiltered internet connectivity then petition your
local government to make transit a privatized utility with all the
government oversight and bureaucracy that entails.
---
James Baldwin
hkp://pgp.mit.edu/[
this adequate and
restricted service.
Please, stop making the assumption that all responsible users require
unfiltered internet access.
---
James Baldwin
hkp://pgp.mit.edu/[EMAIL PROTECTED]
"Syntatic sugar causes cancer of the semicolon."
PGP.sig
Description: This is a digitally signed message part
I'm looking for recommendations for network load balancers. These, at
this time, will primarily be used to attach to a cluster of webservers
although I would like a solution which can be repurposed to other
applications later. I am looking at F5's Big IP, Cisco's SLB, and
Foundry's ServerIron a
I'm looking for a contact in Level 3's Global Network Security
Operations team. If anyone can ping me offline with information, I'd be
grateful.
---
James Baldwin
On 3 Sep 2004, at 14:16, James Baldwin wrote:
I'm looking for a contact in Level 3's Global Network Security
Operations team. If anyone can ping me offline with information, I'd
be grateful.
Thanks to everyone who responded. I've gotten in touch with the correct
person on
I'm looking for a mail administrator or security contact at PSU.edu
(Penn State). Please ping me off list if you know anyone. Thanks
---
James Baldwin
ing of the system to handle it.
---
James Baldwin
Is anyone experiencing issues utilizing DNSRBL's spam/dun DNS servers? I
cannot resolve addresses for spam.dnsrbl.net, nor for dun.dnsrbl.net.
There also appears to be a misspelling in the SOA record for the
dnsrbl.net zone.
; <<>> DiG 9.2.3 <<>> +nocomment @ns1.namesystems.net dnsrbl.net
spam.dn
ystem settings and database backup utilities (both the
Administration Guide and the Command Reference came up short) over
its CLI. If you can suggest a more appropriate list to interrogate,
I'd also be appreciative.
---
James Baldwin
I'm soliciting recommendations for DNS based load balancers.
Currently, we have Cisco Global Site Selectors deployed buy have
reached a limit for the number of active HTTP HEAD checks we can
perform. This lack of scalability is restricting us severely with
regards to the number of custome
Doesn't appear to have affected many, if any, people on this list but
SunGard Austin experienced a partial power outage this morning. This
event began around 0530 CST and most power was restored by 0700 CST.
SunGard Austin is currently running without redundant UPS and does
not have an ET
Anyone else getting a 403 Forbidden when trying to access http://
cisco.com?
James Baldwin
Looks like certain portions of it are coming back... that recursive
chown is taking a while.
James Baldwin
On Jan 3, 2007, at 10:24 AM, James Baldwin wrote:
Anyone else getting a 403 Forbidden when trying to access http://
cisco.com?
James Baldwin
32 matches
Mail list logo