On 7/7/12, Keith Medcalf wrote:
>>"What's the problem with using 255.255.255.247 as a subnet mask if you
>>want to make a LAN subnet with 12 hosts?"
>> (5 word answer)
> Unemployment Office Is That Way ->
> Is the only 5 word answer I could come up with. The correct answer "invalid
> netmask", i
(now copied to list as well)
On Sat 07 July, 2012 at 20:32, Owen DeLong wrote:
>>> "What TCP destination port numbers should be allowed through the
>>> perimeter stateful firewall device to and from a mail server whose
>>> only purpose is to proxy SMTP mail from internal sources?"
>>> (one number
On Jul 7, 2012, at 5:44 PM, Keith Medcalf wrote:
>> "What's the problem with using 255.255.255.247 as a subnet mask if you
>> want to make a LAN subnet with 12 hosts?"
>> (5 word answer)
>
> Unemployment Office Is That Way ->
>
> Is the only 5 word answer I could come up with. The correct answ
Did hipcrime turn his talents to nanog?
On Sun, Jul 8, 2012 at 6:53 AM, NIG NOG wrote:
> The guard’s face
> reddened again, and the veins in his thick neck stood out. “I said take
> offyour pants, faggot!You can’t hide your tiny little cock any more!
--
Suresh Ramasubramanian (ops.li...@gmail
As his monstrous
dick began to balloon up to its full length and girth, Chris noticed
it start to poke out of the shower stall. Holy
crap! I’m too big to fit in the shower!Chris quickly leaned back against the
shower wall and cradled his
cock in both hands, lifting the massive shaft upwards rath
On Sat, 7 Jul 2012 valdis.kletni...@vt.edu wrote:
On Sat, 07 Jul 2012 18:03:43 -0700, Randy said:
"What's the problem with using 255.255.255.247 as a subnet mask if you
want to make a LAN subnet with 12 hosts?"
(5 word answer)
I'm not sure if that's a typo or excessive evil on the part of the
Chris began to
waddle slowly to his room, his huge, full balls hanging heavily
between his legs. His flaccid anaconda had begun to swell again, and
the added weight of his growing member was making it increasingly
more difficult to move quickly. After his ungainly shuffle to the
Tupelos, Chris wa
> > "What's the problem with using 255.255.255.247 as a subnet
> > mask if you want to make a LAN subnet with 12 hosts?"
> > (5 word answer)
> My response would be: Discontiguous subnet masks were allowed in the pre-CIDR
> era. If you so desire, give me about 2 hours since I do not have a scien
The guard’s face
reddened again, and the veins in his thick neck stood out. “I said take
offyour pants, faggot!You can’t hide your tiny little cock any more!” Chris
jumped
back, startled, and James began to chuckle. Chris could feel a slow
heat rising up from his neck. I’ll
show this guy.
“You
On Sat, 07 Jul 2012 18:03:43 -0700, Randy said:
> > "What's the problem with using 255.255.255.247 as a subnet mask if you
> > want to make a LAN subnet with 12 hosts?"
> > (5 word answer)
I'm not sure if that's a typo or excessive evil on the part of the questioner.
;)
> My response would be: D
As an intellectual exercise, I think this is interesting and worth the
effort. As an actual implementation, I think it's more effective to block
DNS traffic to the affected subnets. Let the breakage occur, and then let
the end users get their broken machines fixed rather than let them continue
hob
> "When a number received in an IP packet is presented in
> network byte
> order, and the host architecture is big endian, what
> must be done to
> convert the number into host byte order?"
> (one word answer)
My response would be to have a field-day with HR talking about MSB and LSB.
Cer
>"What's the problem with using 255.255.255.247 as a subnet mask if you
>want to make a LAN subnet with 12 hosts?"
> (5 word answer)
Unemployment Office Is That Way ->
Is the only 5 word answer I could come up with. The correct answer "invalid
netmask", is only two words.
> "What TCP destina
On the other thread i read that some ISP are running their own proxies
for infected host.
That sounded interesting, so i googled around to find out how to do
that and i could not find a HOWTO, so imagined up a solution myself,
tested it in VirtualBox, and wrote it down in case anyone finds it
usef
On 7/7/12, Matthew Palmer wrote:
> * We've already had mention made in this thread of the problems associated
> with HR attempting to record, verbatim, an answer provided by a candidate.
[snip]
Conversation should be recorded, then they don't have to write out
the full text :)
Asking a HR age
On Sat, Jul 7, 2012 at 2:13 PM, Matthew Palmer wrote:
> * If you're going to have to carefully examine each candidate's answers
> *anyway*, why not just get on the phone screen with them in the first
> place, and get HR out of the picture? At least that way you're not
> wasting money paying
On Jul 7, 2012, at 11:13 AM, Matthew Palmer wrote:
> On Sat, Jul 07, 2012 at 11:01:29AM -0700, JC Dill wrote:
>> On 06/07/12 9:06 PM, Matthew Palmer wrote:
Maybe it's more significant to ask what the difference between TCP and UDP
is.
>>> Yes, the difference between TCP and UDP is a
On Sat, Jul 07, 2012 at 11:01:29AM -0700, JC Dill wrote:
> On 06/07/12 9:06 PM, Matthew Palmer wrote:
> >>Maybe it's more significant to ask what the difference between TCP and UDP
> >>is.
> >Yes, the difference between TCP and UDP is a much better question to ask,
> >but having HR assess and act
On 06/07/12 9:06 PM, Matthew Palmer wrote:
Maybe it's more significant to ask what the difference between TCP and UDP is.
Yes, the difference between TCP and UDP is a much better question to ask,
but having HR assess and act on the answer to the question is a whole hell
of a lot harder.
The be
- Original Message -
> From: "Seth Mattinen"
> > On Fri, 06 Jul 2012 13:20:55 -0400, Andrew Fried said:
> >> The dns-ok.us site is getting crushed from all the sudden media
> >> interest.
> >
> > One wonders why it's so hard to get the media interested when it
> > would be *helpful*. DNS
> On 7/5/12, Joe Greco wrote:
> > It'll get real interesting when Cisco's cloud database is breached and
> > some weakness in the password encryption is discovered.
> [snip]
>
> Will the users' passwords even matter, if a compromise of the
> database allows an intruder to make a system-wide chan
21 matches
Mail list logo