The Wi-Fi MAC protocol has a pair of header bits that mean "from AP"
and "to AP." In ad-hoc mode, a designated station acts as an AP, so
that's nothing special. There are a couple of non-AP modes for direct
link exchanges and peer-to-peer exchances that probably don't set "from
AP" b
Adrian Chadd wrote:
>> As already said, wireless in infrastructure mode (with access points)
>> always sends traffic between clients through the access point, so a
>> decent AP can filter this.
> How does the client determine that the traffic came from the AP versus
> another client?
I'm not exa
Hi
I am requested to get not brand list switch
how can I test it? any software or methods
eg:
reliable
speed
or any need
Thank you so much
On Nov 6, 2009, at 12:04 PM, JC Dill wrote:
Owen DeLong wrote:
We could learn a lot about this from Aviation. Nowhere in human
history has
more research, care, training, and discipline been applied to
accident prevention,
mitigation, and analysis as in aviation. A few examples:
NTS
On 07/11/2009 18:21, Deric Kwok wrote:
Hi
I am requested to get not brand list switch
how can I test it? any software or methods
eg:
reliable
speed
or any need
Thank you so much
Hi,
Can you please make sentences that make sense ?
Are you seeking for advice or help ?
I think yes. So the l
And of course, a rogue RA station would _NEVER_ mess with that bit
in what it transmits...
Uh, yeah.
Owen
On Nov 7, 2009, at 2:41 AM, Richard Bennett wrote:
The Wi-Fi MAC protocol has a pair of header bits that mean "from AP"
and "to AP." In ad-hoc mode, a designated station acts as an AP
What I am gathering is that you are looking to by a off brand switch?
If this is the case, then I would argue reliability and speed aren't
important to you, but rather price, so go for what you can afford I
guess.
If you lack the knowledge to purchase a switch or test it properly, I
woul
Owen DeLong wrote:
On Nov 6, 2009, at 12:04 PM, JC Dill wrote:
Owen DeLong wrote:
We could learn a lot about this from Aviation. Nowhere in human
history has
more research, care, training, and discipline been applied to
accident prevention,
mitigation, and analysis as in aviation. A few
> -Original Message-
> From: Florian Weimer [mailto:fwei...@bfk.de]
> Sent: Friday, November 06, 2009 4:52 AM
> To: Stefan Fouant
> Cc: 'Jeffrey Lyon'; 'NANOG list'
> Subject: Re: Pros and Cons of Cloud Computing in dealing with DDoS
>
> Some companies have already suffered from this becau
> -Original Message-
> From: Florian Weimer [mailto:fwei...@bfk.de]
> Sent: Friday, November 06, 2009 4:55 AM
>
> Not all attacks involve saturated pipes.
>
> There used to be anti-DDoS vendors whose boxes didn't even have WAN
> links. Part of the problem is that operating systems come w
> -Original Message-
> From: Brian Feeny [mailto:bfe...@mac.com]
> Sent: Saturday, November 07, 2009 1:37 PM
>
> (packet sizes, features, etc). There are also some independent tests
> you can find such as miercom.
Come on... I don't know if I'd use "Miercom" and "independent" in the same
It's not all that easy unless the dude has hacked the device driver.
Owen DeLong wrote:
And of course, a rogue RA station would _NEVER_ mess with that bit
in what it transmits...
Uh, yeah.
Owen
On Nov 7, 2009, at 2:41 AM, Richard Bennett wrote:
The Wi-Fi MAC protocol has a pair of header
On Fri, 6 Nov 2009, Christopher Morrow wrote:
paragraph (1) shall be liable for any damages caused thereby, including
damages suffered by SIPC, if the Internet service provider--
Some phrases people might search in various combindations on Google
SIPC
Stratton Oakmont
Prodigy
47 USC 230
House
Device driver? Nah.
Just use a tool (like Scapy) to just arbitrarily, easily custom-craft any
packet he|she wants ... Yes, it is that easy.
Thanks!
/TJ
-Original Message-
From: Richard Bennett [mailto:rich...@bennett.com]
Sent: Saturday, November 07, 2009 15:37
To: Owen DeLong
Cc: Be
Hello, Jeffery and other NANOC members.
Sorry for making another thread - I'm not too experienced in mailgroups.
The problem is in structure of new generation advert or banner networks -
they allow to return other subject traffic to the partner's URL. And this
could also be used to redirect the
> Date: Mon, 2 Nov 2009 18:22:19 -0500
> From: Jon Meek
>
> I use iperf with packet capture on both sides, then analyze the packet
> capture for per-second throughput and re-transmits. I usually do 10
> TCP streams for 30 seconds.
>
> Note that on GigE with significant RTTs (5-15 ms) some TCP tu
On Nov 8, 2009, at 2:33 AM, Stefan Fouant wrote:
> if the discussion hasn't shifted from that of DDoS to EDoS, it
> should.
All DDoS is 'EDoS' - it's a distinction without a difference, IMHO.
DDoS costs opex, can cost direct revenue, can induce capex spends -
it's all about economics at bo
17 matches
Mail list logo