> Depends on your acceptable use policy and terms of service.
> If they won't or aren't able to respond effectively, I would say that
> (depdning on the who and what of your
> customer), shutting down the port may be a viable next step.
>
Hi mike
In our case, the AUP gives us the right to do
n answer i can
provide.
cheers
On Thu, Dec 23, 2010 at 1:18 PM, Tarig Yassin wrote:
Dear all
In my network, I have a router in a middle only speaks OSPF.
is there any solution (without redistribute BGP into OSPF) for this kind of
problem?
thanks
--
Tarig Y. Adam
CTO - SUIN
www.suin.edu.sd
Dear all
In my network, I have a router in a middle only speaks OSPF.
is there any solution (without redistribute BGP into OSPF) for this kind of
problem?
thanks
--
Tarig Y. Adam
CTO - SUIN
www.suin.edu.sd
> From: patr...@ianai.net
> Subject: Re: Who controlls the Internet?
> Date: Sun, 25 Jul 2010 13:55:56 -0400
> To: nanog@nanog.org
>
> On Jul 25, 2010, at 13:24, Tarig Yassin wrote:
>
> > I want to show you some obstacles that some countries face them every day
And why not the ICCAN take this reponsibity as an International organization
not USA government?
From: tariq198...@hotmail.com
To: nanog@nanog.org
Subject: Who controlls the Internet?
Date: Sun, 25 Jul 2010 20:24:27 +0300
Deal all
I want to show you some obstacles that some countrie
Deal all
I want to show you some obstacles that some countries face them every day.
For example when users from Sudan trying to access some web site they will get
a *Forbidden Access Error* message.
And some messages say: you are forbidden to access this web site because your
IP address
Dear all
Greetings
I'm wondering why the software based router is not preferable in business even
if they have high featured Processers, and high capcity of memory.
What is the main deferent between Appliance router and Software based routers?
thank you all in adavance.
--
Tari
Hello every one
I am curious as to how others are documenting their network; both visually and
configurations.
Is there any a software offers a database with web-based front end that can
document in a very details.
thanks
--
Tarig Y. Adam
CTO - SUIN
www.suin.edu.sd
Dear janes
as I know many services use reverse lookup as a sender authentication technique.
e.g. Email server using this technique to reduce spams.( if the ip adress of
sending smtp server has no reverse lookup it's messages will be considered
spam).
regards,
> Date: Tue, 20 Apr 2010 16:08:04
Hi Jul
Dkim , SPF ,and Domainkey are sender authentication methods for email system.
Which use Public Key Cryptography.
The mail server apends signiture to every outgoing message using private key.
the recepient mail server to verify needs the public key which placed in the
sender DNS s
latin;
mso-fareast-font-family:"Times New Roman";
mso-fareast-theme-font:minor-fareast;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;}
-
Eng. Tarig Yassin Adam
Sudanese Universities' Information Network (SUIN)
T:
+249925659149
E: ta...@sustech.edu
11 matches
Mail list logo