.
> https://en.wikipedia.org/wiki/IPv4_address_exhaustion
>
> Thanks,
> Donald
> ===
> Donald E. Eastlake 3rd +1-508-333-2270 (cell)
> 2386 Panoramic Circle, Apopka, FL 32703 USA
> d3e...@gmail.com
>
> On Mon, Nov 25, 2019 at 10:34 AM Te
Nice!
Is this what I think it is?a historical moment for the internet
for the story books?
On Mon, 25 Nov 2019 at 15:59, Dmitry Sherman wrote:
>
> Just received a mail that RIPE is out of IPv4:
>
> Dear colleagues,
>
> Today, at 15:35 UTC+1 on 25 November 2019, we made our final /22 IPv4
>
On Tue, 15 Jan 2019 at 09:21, Bjørn Mork wrote:
..
> open protocols, just shut off SMTP completely. They'll
> probably "invent" something much better as an excuse... And the masses
> will love them for that, because it finally removed the spam "problem".
>
> And everyone has a gmail account anyway
Email for personal use is turning rare. And people need to use *bold*
in text more than not. So most clients are configured to send html by
default, and people have no reasons to change that.
I think LISTSERV software used to require plain text to send commands
like subscribe, but I think they mad
On 19 July 2018 at 07:06, Mark Tinka wrote:
>
>
> On 18/Jul/18 17:20, Julien Goodwin wrote:
>
>> Living in Australia this is an every day experience, especially for
>> content served out of Europe (or for that matter, Africa).
>>
>> TCP & below are rarely the biggest problem these days (at least w
Maybe a good balance for whois is to include organization information
so I know where a website is hosted, but not personal information, so
I can't show in their house and steal their dog.
I feel uneasy about having my phone available to literally everyone on
the internet.
--
--
ℱin del ℳensaje
On 23 February 2017 at 20:59, Ca By wrote:
> On Thu, Feb 23, 2017 at 10:27 AM Grant Ridder
> wrote:
>
> > Coworker passed this on to me.
> >
> > Looks like SHA1 hash collisions are now achievable in a reasonable time
> > period
> > https://shattered.io/
> >
> > -Grant
>
>
> Good thing we "secure
Users are crafty.
One user on a network I had to admin use to mail porn has Microsoft
Word documents to his Gmail account.
So if you want to stop porn, you have to ban file attachments and
monospace fonts.
Good luck with that.
On 20 December 2016 at 09:25, Jippen wrote:
> So, $20 tax on all co
On 18 September 2015 at 10:45, Marcin Cieslak wrote:
> On Fri, 18 Sep 2015, Tei wrote:
>
>> On 18 September 2015 at 04:48, Keith Medcalf wrote:
>> >
>> > Being blocked is probably a good thing ...
>>
>>
>> CGI forms that do the validation in the
On 18 September 2015 at 04:48, Keith Medcalf wrote:
>
>
> You mean to say that you have to enable blanket remote code execution
> authority in order to submit a problem report to Microsoft? What a crock of
> crap. Thus I will never recommend to anyone that they use Microsoft products
> for an
This stuff is soo cool :D
I understands less than half of it, but I have found this link that
give some light.
https://robert.sesek.com/2014/9/unraveling_nsa_s_turbulence_programs.html
It seems they had a system to backup 3 days of the internet, all data.
But such system failed because Internet g
imho this two staments are true:
- tomorrow a new product or service on the Internet can completely
change the ratio download/upload
- most probably, this will not happen
It may take a few days (hours for early adopters) for a new service to
become popular on the Internet, that make a intensive us
If anyone is interested, the Quake engine and variants have created a lot
of documentation and tools.Since Quake represent early phases of the
development of modern gaming systems, they are simple. As simple they can
be.
Many open source games can be studied, I suggest OpenArena because is
Current developing fads include messaging a server POST messages over http,
receiving JSON data. Both the request and answer are smallish small. A
interface update refresh may depend on this data arriving. So the less
latency, the more agile and snappy will feel the application.
This is less tra
I pled the Linux people to stay inside the unix philosophy to use text files.
Low newbies like me learn from reading config files, and fix thing by
reading log files, tryiing to make some sense of the error messages
there, and using the most suspicious line as the handle to google for
a solution (
(very unimportant contribution, please ignore)
any change to this things, must be done in the benefit of future
users, making the internet a less weird place, with less exceptions
everyone else have already learned a .edu domain is probably a USA
university, and some .mil domain is the usa milita
http://en.wikipedia.org/wiki/ISO_3166-1_alpha-2#Decoding_table
VR, GO, ON, NY, ...these seems to be free :D
Clearly New York must declare independence.
--
--
ℱin del ℳensaje.
Software is... herrr configurable.
Maybe Netflix could be convinced so their box had a switch from
complete catalog hosting / caching most used data. I get from this
discussion thread that small ISP feel having these box download the
whole catalog is more than what their customers (<1000) ne
*puts on trolling hat*
Maybe the solution can be to have the Netflix client support the
torrent protocol, so the upload from netflix is minimal. Maybe
pre-distribute files encripted, then distribute the de-crypt key once
the medias are distributed enough in different nodes. So netflix would
be d
On 5 April 2014 07:44, Larry Sheldon wrote:
> Offered for your amusement--no followup.
>
> http://kottke.org/14/04/the-anternet
> --
>>
A forager won't return to the nest until it finds food. If seeds are
plentiful, foragers return faster, and more ants leave the nest to
forage. If, however,
So
Suppose I configure my email to send a "Thanks, we have received your
email, we will reply shortly in office hours.". Whats the Holy Headers
so even poorly configured servers don't cause a AutoReply Storm?
Googling, I found "Precedence", "X-Auto-Response-Suppress",..? For
something like
Your post advocates a
(*) technical ( ) legislative ( ) market-based ( ) vigilante
approach to fighting spam. Your idea will not work. Here is why it
won't work. (One or more of the following may apply to your particular
idea, and it may have other flaws which used to vary from state to
state bef
On 24 March 2014 10:47, Joe Greco wrote:
>> Here in Illinois, we have been paying for the construction of our tollway in
>> perpetuity. When it was originally built the state promised to remove the
>> tolls as soon as construction costs were recovered. We are still waiting
>> and will be fore
On 14 March 2014 05:14, shawn wilson wrote:
> On Mar 13, 2014 7:37 PM, "Larry Sheldon" wrote:
..
>
> Sorry for my note. Didn't mean it to sidetrack the question (I probably
> should've).
>
> /me o_O
Social perception of hacking affect law-making.
Computing security is controlled by moral panic a
On 12 March 2014 14:56, William Herrin wrote:
>.. Who knows, U.S. authorities may already
> be investigating the same user which would make your job so much
> easier.
>
Also, if you just want a deterrent. Having a cop
visit the home of the cracker just making questions may send the
message "we k
On 24 January 2014 16:23, Chris Boyd wrote:
>
> On Jan 24, 2014, at 8:36 AM, Jared Mauch wrote:
>
>> You haven’t been able to get GTT/nLayer/TINet to track the traffic back?
>>
>> Details are welcome, either here or in private. There are plenty of people
>> who will chase and fix this stuff when
Casual comment:
This scheme, have a problem.
USA is friend of country A,and country B. A is spying on B, and share the
results with USA. B is spying on A and share the results with USA.
A and B can make a network, but will be all but private.
--
--
ℱin del ℳensaje.
On 7 September 2013 18:09, Dobbins, Roland wrote:
>
> On Sep 8, 2013, at 4:08 AM, Paul Ferguson wrote:
>
>> As a result, these transmissions expose Canadians to potential U.S.
>> surveillance activities – a violation of Canadian network sovereignty."
>
> Yes, far better to keep those communicatio
On 6 September 2013 10:52, Sam Moats wrote:
> The problem being is when you do have a provider that appears to be secure
> and out of reach, think lavabit, that provider will not survive for long.
> The CALEA requirements, and Patriot Act provisions will force them into
> compliance.
Only if are
On 6 September 2013 11:37, Eugen Leitl wrote:
>
> http://www.theguardian.com/commentisfree/2013/sep/05/government-betrayed-internet-nsa-spying
>
> The US government has betrayed the Internet. We need to take it back
>
Its like you have to abandon USA based encryptation systems that are
closed sou
I know the exact size:
Infinite.
When I was in the university I was downloading many things at the
night, while the whole internet bandwith was wasted (hehehehe).
Many times my wget -r -l 32 got stuck on things like CGI's that
point to itself creating a infinite loop. This was in 2002, but
pro
On 31 July 2013 16:46, Warren Bailey
wrote:
> Tin foil hat Wednesday, limited supplies.
>
> Revealed: NSA program collects 'nearly everything a user does on the internet'
>
> http://gu.com/p/3hy4h
>
- Have I read it correctly. Can then break into a vpn connection,
then leach documents that a ge
It would be fun to make a encryptation keyboard. A keyboard that add
the text you write to a buffer, and wen the buffer is full, output it
to the computer encrypted. Maybe with pgp. Such machine would
probably need a led with the text you are writing.
That way, you coud be using Google Docs or O
Whos doing the spyiing, anyway?, sounds like a colaboration betwen
Microsoft and the NSA. Sounds to me like Microsoft, and the NSA,are
doing the spyiing.If some judge declare this actions illegal, a
crime, Microsoft will be co-perpetrators.
Even if no judge declare this a crime, what about
I am only a lurker in this list. I am curious why nobody has
mentioned open source. Theres no way all these router-thingies would
have all his source code visible? a house made of glass?
--
--
ℱin del ℳensaje.
This is one of these "Save the forest by burning it" situations that
don't have any logic.
To save a forest firefighters often cut a few tree. Don't cut all the
trees in a forest to save it from a fire.
Exceptions must be made for police forces to violate rights (like
privacy). Exceptions can'
On 20 May 2013 01:58, Michael Painter wrote:
> http://arstechnica.com/security/2013/05/ddos-for-hire-service-works-with-blessing-of-fbi-operator-says/
>
More on the same topic.
http://krebsonsecurity.com/2013/05/ragebooter-legit-ddos-service-or-fed-backdoor/#more-19475
Maybe the FBI use this to
Standards can have "bugs", and a standard that is not compatible with
maybe 5% of the population is buggy.
Almost any standard that start "this is red and this is green" is
flawed this way. This mean any future standard created as to look
into this type of stuff (and i18n and localization and oth
On 27 August 2012 02:58, Suresh Ramasubramanian wrote:
> On Mon, Aug 27, 2012 at 2:54 AM, Andre Gironda wrote:
>> http://engineering.stanford.edu/news/stanford-biologist-computer-scientist-discover-anternet
>
> Looks like at least one component of unseen university's Hex is alive
> and kicking.
On 28 June 2012 14:48, Arturo Servin wrote:
...
>
> Think about sql injection, they are not only to specific platforms but
> to general bad programming practices.
If you are already a good programmer, writing code that is safe
against sql inyections is trivial. So is not a real problem,
On 27 June 2012 09:50, Stephane Bortzmeyer wrote:
>(specially for a Web site written in
> PHP)?
>
We software makers have a problem, when a customer ask for a
application, often theres a wen project that already do it ( for the
most part is a round peg on a round hole). So a natural solution is
If anyone have a really good idea how to fix this mess, It will be a
good idea to contact with Jeff Atwood (of codehorror.com and
stackoverflow.com fame). He and other people is working on a new
internet approach to discussions. Think forums 2.0. If this new pet
rock succeed, could change how t
Anonymity on the Internet is a feature, because a lot of the world
netcitizens come from countries where saying this or that is a crime,
and can get you in trouble.
Any asymetric cryptography solution that remove anonymity is a bad
thing. Making censorship easier on the internet is making it worse.
The problem:
- Modern internet users must have lots of different login/passwords around
the internet. Most of then in easy-to-break poorly-patched poorly-managed
servers, like linkedin.
The solution:
- Reduce the number of authentication. Allow anonymous posting in more
sites.
Imagine this.
I don't think this is the official nanog wiki, but anyway probably the
owners are on this mail list.
Spammers is wasting everyone time by filling it with crap.
http://nanog.cluepon.net/index.php/Special:RecentChanges
--
--
ℱin del ℳensaje.
.
.
.
.
.
Perhaps cell towers can be made to fail sooner, and enter some
emergency mode where only 911 calls get service.
--
--
ℱin del ℳensaje.
On 20 April 2012 17:16, Owen DeLong wrote:
>>>
>> exec ?
>> exceed ?
>>
>
> Not a lot of x's in hexidecimal numbers outside of C-style formatting
> (0x).
>
> IPv6 addresses are not generally notated in said style and certainly don't
> include said x in a suitable context for that to be part
It would be a very fast dictionary attack :D
accede
bade
dad
decade
face
axed
babe
deaf
bed
Abe
bee
Decca
exec
fade
bead
bedded
deed
exceed
Abba
deface
efface
feed
On 20 April 2012 09:08, Fernando Gont wrote:
> FYI
>
> Original Message
> Subject: IPv6 host scanning in IPv6
> D
On 2 April 2012 13:40, Tei wrote:
> On 2 April 2012 06:56, Robert Bonomi wrote:
>>
>> "Keith Medcalf" wrote:
>> {prior attributions lost}
>>> > > http://www.bbc.co.uk/news/uk-politics-17576745
>>>
>>> > > It's sad
On 2 April 2012 06:56, Robert Bonomi wrote:
>
> "Keith Medcalf" wrote:
> {prior attributions lost}
>> > > http://www.bbc.co.uk/news/uk-politics-17576745
>>
>> > > It's sad when you just can't tell with things like this..
>>
>> > I was hoping for something good, like maybe an extension of RFC 1149
On 23 March 2012 13:31, Aled Morris wrote:
> On 23 March 2012 11:53, Eugen Leitl wrote:
>
>> All three cables are being laid for the same reasons: Redundancy and speed.
>> As it stands, it takes roughly 230 milliseconds for a packet to go from
>> London to Tokyo; the new cables will reduce this b
On 12 March 2012 09:59, Carlos Martinez-Cagnazzo wrote:
> Hey!
>
> On 3/8/12 8:24 PM, Lamar Owen wrote:
>> On Monday, March 05, 2012 09:36:41 PM Jimmy Hess wrote:
>> ...
>>> (16) The default gateway's IP address is always 192.168.0.1
>>> (17) The user portion of E-mail addresses never conta
On 27 February 2012 23:23, Jay Ashworth wrote:
> - Original Message -
>> From: "Owen DeLong"
>
>> I think you're more likely to find a network engineer with (possibly
>> limited) programming skills.
>>
>> That's certainly where I would categorize myself.
>
> And you're the first I've seen
related to the topic:
http://slashdot.org/story/12/02/29/153226/microsofts-azure-cloud-suffers-major-downtime
--
--
ℱin del ℳensaje.
I am a mere user, so I all this stuff sounds to me like giberish.
The right solution is to capture the request to these DNS servers, and
send to a custom server with a static message "warning.html". Nothing
fancy. With a phone number to "get out of jail", so people can call
to "op-out" of this
On 23 January 2012 04:05, Jacob Taylor wrote:
..
>
> Tahoe-lafs can be fast. A grid I help out with is often capable of
> 600kilobyte/per/second downloads (or faster), and I personally have
> several files stored on there in excess of 500mb. Close enough to your
> 700mb movie example.
>
> I use th
On 20 January 2012 12:14, Alec Muffett wrote:
>
> On 20 Jan 2012, at 11:00, Tei wrote:
>
>> Fileshares can organize thenselves in sites based on a forum software
>> that is private by default (open with registration), then share some
>> "information" file tha
What sould fileshares must do, is to store files in these services in
a encrypted way, and anonimized name. So these services have
absolutelly no way to tell what are hosting.
Fileshares can organize thenselves in sites based on a forum software
that is private by default (open with registration),
On 5 January 2012 16:22, Jay Ashworth wrote:
> Vint Cerf says no: http://j.mp/wwL9Ip
>
> But I wonder to what degree that's dependent on how much our governments make
> Internet access the most practical/only practical way to interact with them.
>
> Understand: I'm not saying that FiOS should be a
I am php/javascript programmer.
The web used to be request/reply. With the request small (but not
small enough), and the reply long.
But the time for permanent connections is comming. Links from clients
to server that are permanent. Or look like that in the application
layer.
On one sense, this
>> On 12/20/2011 10:08 PM, andrew.wallace wrote:
>>>
>>> I just want to say happy xmas to everyone at NANOG.
>>>
>>> I'm about to sign off for the holidays.
>>>
>>>
>>> Andrew
>>
>> enjoy your chistmas, and you don't have to come back after the holidays,
>> we'll be fine without you.
>>
>
Has a ga
h. But with ssh is just can connect, with
browsers theres this ugly warning and "fuck you, self-signed certificate"
from the browsers. Please make the pain stop!.
--Tei
--
--
ℱin del ℳensaje.
62 matches
Mail list logo