Brandon Kim Tippte am 2010-12-09T19:24-0500:
>
> Hey guys:
[snip]
>
> I want to know if there's software out there that will encrypt files on
> win2k3, winxp, win7, so that if someone
> decides to steal the computer and plug the harddrive into a USB external
> case, they won't be able to read
On Mon, 22 Nov 2010, Greg Whynott wrote:
osx-gwhynott:~ gwhynott$ ping 10.010.10.1
PING 10.010.10.1 (10.8.10.1): 56 data bytes
You're entering land of weird, misdocumentation and bugs.
http://seclists.org/nanog/2010/Feb/285
-
typedef struct me_s {
char name[] = { "Thomas Habets
> From nanog-bounces+bonomi=mail.r-bonomi@nanog.org Wed Dec 8 15:36:44
> 2010
> Date: Wed, 08 Dec 2010 15:34:47 -0600
> From: Jack Bates
> To: David Conrad
> Subject: Re: Start accepting longer prefixes as IPv4 depletes?
> Cc: NANOG list
>
> On 12/8/2010 3:12 PM, David Conrad wrote:
> > C
In article <476364.37472...@web59605.mail.ac4.yahoo.com>, andrew.wallace
writes
>>Dutch authorities have arrested a 16-year old "hacker" in connection
>>with
Mastercard.
http://news.cnet.com/8301-31921_3-20025215-281.html
It was a quick arrest wasn't it?
Dutch authorities have a sligh
I've been using these and they work great as long as you are using BIOS boot,
they don't work with out additional software, with the Mac EFI boot.
Johno
On Dec 9, 2010, at 20:20, William Herrin wrote:
> On Thu, Dec 9, 2010 at 7:24 PM, Brandon Kim
> wrote:
>> I want to know if there's softwa
* Brandon Kim:
> I know windows has bitlocker, but I don't know if that is available
> for Win2003?
I believe EFS is available in Windows XP and Windows 2003 Server, too.
Software-based solutions have the advantage that they are somewhat
more testable and reviewable. If it's all in the disk, yo
On 12/10/2010 8:21 AM, Florian Weimer wrote:
I believe EFS is available in Windows XP and Windows 2003 Server, too.
Software-based solutions have the advantage that they are somewhat
more testable and reviewable. If it's all in the disk, you can't
really be sure that the data is encrypted with
On Thu, Dec 9, 2010 at 1:12 PM, Randy Bush wrote:
>> And if I ever find the genius who came up with the "we are not the
>> internet police" meme ...
>
> he died over a decade ago
He also said "The Internet works because a lot of people cooperate to
do things together"
Remove the "together" and t
> After some research, I find that recovery of EFS (available for Win
> 2000/2003/XP/Vista/7) encrypted files in the case of disaster can be
> problematic. It has to do with keys, file ownerships, etc., etc.,
> etc. Plan for disaster and know how to recover before you encrypt
> with EFS.
This i
On Dec 10, 2010, at 12:30 , Robert Bonomi wrote:
>> From nanog-bounces+bonomi=mail.r-bonomi@nanog.org Wed Dec 8 15:36:44
>> 2010
>> Date: Wed, 08 Dec 2010 15:34:47 -0600
>> From: Jack Bates
>> To: David Conrad
>> Subject: Re: Start accepting longer prefixes as IPv4 depletes?
>> Cc: NANOG
Our organization does exactly this. The requirements we have run into are:
1. The block needs to be at least a /24 and registered with SWIP
2. You will need LOAs from the owner of the block. This used to take months to
get, now it seems the isps have streamlined this operation
3. You cannot trust
On 12/10/2010 9:33 AM, Michael Holstein wrote:
After some research, I find that recovery of EFS (available for Win
2000/2003/XP/Vista/7) encrypted files in the case of disaster can be
problematic. It has to do with keys, file ownerships, etc., etc.,
etc. Plan for disaster and know how to recove
On 12/10/2010 10:01 AM, Dylan Ebner wrote:
3. You cannot trust the second isp to advertise the SWIP block correctly if
they are not a tier 1. Even though they may advertise it for you to their
upstream, they don't always have the appropriate procedures in place to get the
LOAs to the upstream
Could someone from Videotron contact me off-list?
--
Jeff S Wheeler
Sr Network Operator / Innovative Network Concepts
On Fri, Dec 10, 2010 at 8:21 AM, Florian Weimer wrote:
> Software-based solutions have the advantage that they are somewhat
> more testable and reviewable. If it's all in the disk, you can't
> really be sure that the data is encrypted with a static key, and the
> passphrase is used for access con
On Thursday, December 09, 2010 01:26:30 pm Dobbins, Roland wrote:
> On Dec 10, 2010, at 1:19 AM, Michael Smith wrote:
> > "front lines of this "cyberwar"?
> Warfare isn't the correct metaphor.
> Espionage/covert action is the correct metaphor.
In reality DoS threats/execution of those threats/ '
On 12/10/2010 11:08 AM, Lamar Owen wrote:
>
> In reality DoS threats/execution of those threats/ 'pwning' / website
> vandalism are all forms of terrorism. An easily pronounceable version with a
> 'net-' 'e-' or even 'cyber-' prefix. is difficult.
I thought "e-*" was so yesterday, wouldn'
On Fri, Dec 10, 2010 at 10:08 AM, Lamar Owen wrote:
> On Thursday, December 09, 2010 01:26:30 pm Dobbins, Roland wrote:
>> On Dec 10, 2010, at 1:19 AM, Michael Smith wrote:
>> > "front lines of this "cyberwar"?
>> Warfare isn't the correct metaphor.
>
>> Espionage/covert action is the correct meta
On 10/12/10 8:08 AM, Lamar Owen wrote:
On Thursday, December 09, 2010 01:26:30 pm Dobbins, Roland wrote:
On Dec 10, 2010, at 1:19 AM, Michael Smith wrote:
"front lines of this "cyberwar"?
Warfare isn't the correct metaphor.
Espionage/covert action is the correct metaphor.
In reality DoS thre
On 12/10/2010 10:44 AM, William McCall wrote:
To the folks out there that presently work for an SP, if someone
called you (or the relevant department) and gave you a list of
end-user IPs that were DDoSing this person/entity, how long would you
take to verify and stop the end user's stream of cra
On Fri, Dec 10, 2010 at 11:46 AM, JC Dill
> We *really* don't need Homeland Security and TSA deciding that
> cyber-vandalism falls into the realm of terrorism and thus comes under their
> purview to "protect us against". Their security theater at the airport is
> too much already, I can't begin
On Fri, 10 Dec 2010 11:08:00 EST, Lamar Owen said:
> In reality DoS threats/execution of those threats/ 'pwning' / website
> vandalism are all forms of terrorism.
Let's not dilute the meaning of terrorism to the point where graffiti, cyber
or otherwise, is classifed as terrorism.
The USA Patriot
On Friday, December 10, 2010 11:46:43 am JC Dill wrote:
> On 10/12/10 8:08 AM, Lamar Owen wrote:
> > In reality DoS threats/execution of those threats/ 'pwning' / website
> > vandalism are all forms of terrorism.
> No one was "terrorized" because they couldn't reach MasterCard or
> because Mas
> -Original Message-
> From: Bret Clark
> Sent: Friday, December 10, 2010 7:08 AM
> To: nanog@nanog.org
> Subject: Re: BGP multihoming question.
>
> On 12/10/2010 10:01 AM, Dylan Ebner wrote:
> > 3. You cannot trust the second isp to advertise the SWIP block
> correctly if they are not
On 12/10/2010 11:06 AM, valdis.kletni...@vt.edu wrote:
The USA Patriot act says: "activities that (A) involve acts dangerous to human
life that are a violation of the criminal laws of the U.S. or of any state,
that (B) appear to be intended (i) to intimidate or coerce a civilian
population, (ii
On 12/10/2010 11:37 AM, Jack Bates wrote:
assassination, or kidnapping, and (C) occur primarily within the
At most, B ii applies, but if I'm not mistaken, A, B, and C must all
occur by that statute (the giveaway is C, as it doesn't make sense as a
single condition).
err, or one could just
On Fri, 10 Dec 2010 12:14:20 EST, Lamar Owen said:
> Identity theft can cause loss of life due to the stress of mopping up
> afterwards.
Oh, give me a *break*. This is well off the end of the slippery slope.
My car got totaled in a rear-end collision a few weeks ago. If I get so
stressed dealin
> From: William McCall
> Sent: Friday, December 10, 2010 8:45 AM
> To: Lamar Owen
> Cc: nanog@nanog.org
> Subject: Re: [Operational] Internet Police
> To the folks out there that presently work for an SP, if someone
> called you (or the relevant department) and gave you a list of
> end-user IPs
On 12/10/2010 11:45 AM, George Bonser wrote:
If
an ISP were to actively disconnect clients who were infected with a bot
(intentionally infected or not), the end users themselves might be a
little more vigilant at keeping their systems free of them.*But* any
ISP doing that would also have to be p
On 12/10/2010 07:45 AM, George Bonser wrote:
From: William McCall
Sent: Friday, December 10, 2010 8:45 AM
To: Lamar Owen
Cc: nanog@nanog.org
Subject: Re: [Operational] Internet Police
To the folks out there that presently work for an SP, if someone
called you (or the relevant department) and g
> Not to mention the risk of lost business for customers that just can't
> be bothered to fix broken machines.
>
> Paul
That supposes that another ISP would accept their bot-infected machine.
It would require some cooperation among the providers. And should some
ISP get the reputation of being
On 12/10/2010 07:59 AM, George Bonser wrote:
Not to mention the risk of lost business for customers that just can't
be bothered to fix broken machines.
Paul
That supposes that another ISP would accept their bot-infected machine.
It would require some cooperation among the providers. And shoul
http://xkcd.com/538/
On Fri, Dec 10, 2010 at 9:58 AM, William Herrin wrote:
> On Fri, Dec 10, 2010 at 8:21 AM, Florian Weimer wrote:
> > Software-based solutions have the advantage that they are somewhat
> > more testable and reviewable. If it's all in the disk, you can't
> > really be sure th
On 12/10/2010 12:07 PM, Paul Graydon wrote:
Unless you can get every company to sign up to an agreement it will
never work. Even then you'll still find unscrupulous companies that are
far more interested in revenue than reputation. There are a number of
hosting companies I'm sure most network p
"Just a day after Dutch police arrested a 16-year-old boy in connection with
Wikileaks-related denial-of-service attacks,
websites belonging to the Netherlands computer crime cops and
prosecutors have been struck with a similar assault."
http://nakedsecurity.sophos.com/2010/12/10/dutch-police-w
On 12/10/10 9:06 AM, valdis.kletni...@vt.edu wrote:
> On Fri, 10 Dec 2010 11:08:00 EST, Lamar Owen said:
>
> I believe the word you wanted was "hooliganism". And we have a legal system
> that has about 3,000 years of experience in dealing with *that*, thank you
> very
> much.
The code of hamurab
Hello,
Could a Cogeco MX/SMTP admin contact me off list please, we seem to be
suffering from the same fate as these individuals;
http://www.dslreports.com/forum/r24888256-Email-sent-to-AOL-is-timing-out
Thanks,
Chris Conn
B2B2C.ca
Upstream providers generally have a hard time allowing you to write routes that
you don't own into their table(s).
thanks,
-Drew
-Original Message-
From: Chris Boyd [mailto:cb...@gizmopartners.com]
Sent: Wednesday, December 08, 2010 2:19 PM
To: NANOG
Subject: Re: Over a decade of DDOS-
Ah,
Honestly we can usually point to the exact cause of the attacks once we have
time to triage the situation.
Recently it has been stuff like:
-Made someone in Asia angry.
-Running a runescape server and made someone angry
-Made someone on IRC angry
It has been pretty rare to see an attack th
I should've "qualified" my question by saying "What valid application which
traverses the Internet and could be seen at the edge of a network actually uses
UDP 80?"
I can't imagine there is too much Cisco NAC client for macs carrying on over
the Internet, although I have been wrong in the past.
Nobody has really driven the point home that yes you can purchase a system from
Arbor, RioRey, make your own mitigation system; what-have you, but you still
have to pay for the transit to digest the attack, which is probably the main
cost right now.
-Drew
-Original Message-
From: Dobb
This is an automated weekly mailing describing the state of the Internet
Routing Table as seen from APNIC's router in Japan.
The posting is sent to APOPS, NANOG, AfNOG, AusNOG, SANOG, PacNOG, LacNOG,
CaribNOG and the RIPE Routing Working Group.
Daily listings are sent to bgp-st...@lists.apnic.net
Yes, and I have no problem with this in theory, I just wish that some of the
larger ones could proactively monitor their networks to avoid crushing the
smaller ones but maybe this is intentional.
I have seen a huge increase in the number of attacks originating from other
"hosting" companies rec
On 12/9/2010 8:20 PM, William Herrin wrote:
> On Thu, Dec 9, 2010 at 7:24 PM, Brandon Kim
> wrote:
>> I want to know if there's software out there that will encrypt files on
>> win2k3, winxp, win7, so that if someone
>> decides to steal the computer and plug the harddrive into a USB external
>
BGP Update Report
Interval: 02-Dec-10 -to- 09-Dec-10 (7 days)
Observation Point: BGP Peering with AS131072
TOP 20 Unstable Origin AS
Rank ASNUpds % Upds/PfxAS-Name
1 - AS17974 114160 8.0% 79.3 -- TELKOMNET-AS2-AP PT
Telekomunikasi Indonesia
2 - AS17908
This report has been generated at Fri Dec 10 21:11:47 2010 AEST.
The report analyses the BGP Routing Table of AS2.0 router
and generates a report on aggregation potential within the table.
Check http://www.cidr-report.org for a current version of this report.
Recent Table History
Date
On 12/10/10 12:33 PM, Drew Weaver wrote:
> Nobody has really driven the point home that yes you can purchase a
> system from Arbor, RioRey, make your own mitigation system; what-have
> you, but you still have to pay for the transit to digest the attack,
> which is probably the main cost right now.
On Dec 11, 2010, at 5:51 AM, Joel Jaeggli wrote:
> Paying for DOS mitigation you rarely if ever use is quite expensive.
Some operators offer 'Clean Pipes' commercial DDoS mitigation services; they
have various fee models, and they charge their end-customers for it. It's
positioned as a form o
48 matches
Mail list logo