Helllo Pui,
Thanks for the pointers but I think you misunderstood my question. I know
how to set up a captive portal for WiFi access.
What I wanted to know is how are users logging into captive portals when
the browser has a proxy set and it tries to send all requests to the proxy
server which un
On 12/5/2013 2:52 PM, Scott Weeks wrote:
> :: QualiSystems team met you during the 2011 Nanog
> :: Conference in Denver.
>
> No you didn't.
--- i...@kjro.se wrote:
From: Kelly John Rose
You didn't quite play this one right.
You need to see if you can use them to get a ticket to the next
conf
On 12/5/13 7:35 PM, Phil Karn wrote:
On 12/05/2013 02:00 PM, Owen DeLong wrote:
If AT&T has capped me, then, I haven’t managed to hit the cap as yet.
Admittedly, the connection isn’t always as reliable as $CABLECO, but
when it works, it tends to work at full speed and it does work the
vast majo
http://www.wired.com/threatlevel/2013/12/bgp-hijacking-belarus-iceland/
Someone’s Been Siphoning Data Through a Huge Security Hole in the Internet
BY KIM ZETTER12.05.136:30 AM
Hijacked traffic went all the way to Iceland, where it may have been copied
before being released to its intended desti
On Dec 6, 2013, at 12:38 PM, Eugen Leitl wrote:
>
> http://www.wired.com/threatlevel/2013/12/bgp-hijacking-belarus-iceland/
>
> Someone’s Been Siphoning Data Through a Huge Security Hole in the Internet
> ...
> In 2008, two security researchers at the DefCon hacker conference
> demonstrated a
I will accept all Schwag that does not involve consuming food (cups etc) or
clothing. I still randomly get amazon gift cards, but I suspect they are
catching on to the fact that their money is being spent on toys for a 4 year
old "engineer" (my daughter).
I'm happy to accept free money.. I just
This is an automated weekly mailing describing the state of the Internet
Routing Table as seen from APNIC's router in Japan.
The posting is sent to APOPS, NANOG, AfNOG, AusNOG, SANOG, PacNOG, LacNOG,
TRNOG, CaribNOG and the RIPE Routing Working Group.
Daily listings are sent to bgp-st...@lists.ap
If your flows are a target, or your data is of an extremely sensitive
nature (diplomatic, etc), why aren't you moving those bits over
something more private than IP (point to point L2, MPLS)? This doesn't
work for the VoIP target mentioned, but foreign ministries should most
definitely not be trust
That didn¹t seem to work for google.. ;)
On 12/6/13, 9:39 AM, "Brandon Galbraith"
wrote:
>If your flows are a target, or your data is of an extremely sensitive
>nature (diplomatic, etc), why aren't you moving those bits over
>something more private than IP (point to point L2, MPLS)? This doesn't
An attacker who can "only" attack BGP is different than someone who
can splice into your undersea cables undetected. Prepare for the worst
appears to be the best SOP now.
On Fri, Dec 6, 2013 at 12:44 PM, Warren Bailey
wrote:
> That didn¹t seem to work for google.. ;)
>
> On 12/6/13, 9:39 AM, "Bra
On Dec 5, 2013, at 16:35 , Phil Karn wrote:
> On 12/05/2013 02:00 PM, Owen DeLong wrote:
>
>> If AT&T has capped me, then, I haven’t managed to hit the cap as yet.
>> Admittedly, the connection isn’t always as reliable as $CABLECO, but
>> when it works, it tends to work at full speed and it doe
...but you've got to love the headlines it creates. :-)
http://news.techeye.net/business/black-hole-found-in-the-internet
- ferg
On 12/6/2013 10:05 AM, Jared Mauch wrote:
On Dec 6, 2013, at 12:38 PM, Eugen Leitl wrote:
http://www.wired.com/threatlevel/2013/12/bgp-hijacking-belarus-icelan
On Dec 6, 2013, at 1:39 PM, Brandon Galbraith
wrote:
> If your flows are a target, or your data is of an extremely sensitive
> nature (diplomatic, etc), why aren't you moving those bits over
> something more private than IP (point to point L2, MPLS)? This doesn't
> work for the VoIP target ment
On Fri, Dec 6, 2013 at 2:48 PM, Jared Mauch wrote:
>
> On Dec 6, 2013, at 1:39 PM, Brandon Galbraith
> wrote:
>
>> If your flows are a target, or your data is of an extremely sensitive
>> nature (diplomatic, etc), why aren't you moving those bits over
>> something more private than IP (point to
On Fri, Dec 6, 2013 at 9:48 PM, Jared Mauch wrote:
>
> On Dec 6, 2013, at 1:39 PM, Brandon Galbraith
> wrote:
>
> > If your flows are a target, or your data is of an extremely sensitive
> > nature (diplomatic, etc), why aren't you moving those bits over
> > something more private than IP (point
On Fri, Dec 06, 2013 at 06:38:31PM +0100,
Eugen Leitl wrote
a message of 357 lines which said:
> http://www.wired.com/threatlevel/2013/12/bgp-hijacking-belarus-iceland/
Except the remarks from Kapela, it has very little content above what
was in the Renesys paper, discussed here two weeks ago
On Fri, Dec 06, 2013 at 01:05:54PM -0500,
Jared Mauch wrote
a message of 36 lines which said:
> I've detected 11.6 million of these events since 2008 just looking at the
> route-views data. Most recently the past two days 701 has done a large MITM
> of
> traffic.
The big novelty in the Rene
--- brandon.galbra...@gmail.com wrote:
From: Brandon Galbraith
someone who can splice into your undersea cables undetected.
-
Or detected and others framed?
SE-WE-ME-4, FLAG, EASSy, SEACOM, etc... {;-)
The above is a tin foil hat smiley
On Fri, Dec 06, 2013 at 12:39:16PM -0600,
Brandon Galbraith wrote
a message of 43 lines which said:
> If your flows are a target, or your data is of an extremely
> sensitive nature (diplomatic, etc), why aren't you moving those bits
> over something more private than IP (point to point L2,
An
We have a customer that purchased a domain through a reseller of
register.com.
The Whois records only point to the actual company and the originating
accredited registrar: register.com.
Does anyone know of any hints to find out who the reseller is? Apparently
Register.com can't supply us with tha
why bother getting rcom to grovel through the records they should have
kept (it happens to reseller model registrars, occasionally i'm asked
if i can help a core registrant find their member (reseller)), just do
a transfer request to another registrar (i'm not volunteering) and get
the registrar-of
This report has been generated at Fri Dec 6 21:13:57 2013 AEST.
The report analyses the BGP Routing Table of AS2.0 router
and generates a report on aggregation potential within the table.
Check http://www.cidr-report.org for a current version of this report.
Recent Table History
Date
BGP Update Report
Interval: 28-Nov-13 -to- 05-Dec-13 (7 days)
Observation Point: BGP Peering with AS131072
TOP 20 Unstable Origin AS
Rank ASNUpds % Upds/PfxAS-Name
1 - AS754561106 2.5% 112.1 -- TPG-INTERNET-AP TPG Telecom
Limited
2 - AS84025
On 12/6/13, 1:14 PM, e...@abenaki.wabanaki.net wrote:
> why bother getting rcom to grovel through the records they should have
> kept (it happens to reseller model registrars, occasionally i'm asked
> if i can help a core registrant find their member (reseller)), just do
> a transfer request to ano
On 12/06/2013 05:54 AM, Mark Radabaugh wrote:
I realize most of the NANOG operators are not running end user
networks anymore. Real consumption data:
Monthly_GBCountPercent
<100GB 3658 90%
100-149 368 10%
150-199 173 4.7%
200-249 97 2
On Dec 6, 2013 5:16 PM, "Michael Thomas" wrote:
>
> On 12/06/2013 05:54 AM, Mark Radabaugh wrote:
>>
>>
>> I realize most of the NANOG operators are not running end user networks
anymore. Real consumption data:
>>
>> Monthly_GBCountPercent
>> <100GB 3658 90%
>> 100-149
On 12/6/13 8:14 PM, Michael Thomas wrote:
Thanks for the stats, real life is always refreshing :)
It seems to me -- all things being equal -- that the real question is
whether Mr. Hog is impacting your
other users. If he's not, then what difference does it make if he
consumes the bits, or if
On Fri, Dec 6, 2013 at 4:34 PM, Robert L Mathews wrote:
> > now you know the (gaining) r-of-r, and the (gaining) reseller (if any),
> > and you're free to do whatever else you want.
>
ICANN is one potential recourse against the registrar, if non-cooperative
with the registrant; another one is th
29 matches
Mail list logo