The appropriate party to inform would be the FBI ... The word fraud comes to
mind, and millions of 50 centses puts company officers in prison for a long
long long time.
> -Original Message-
> From: Kee Hinckley [mailto:naz...@marrowbones.com]
> Sent: Thursday, 5 September, 2013 11:28
>
Look for TRACEROUTE by SRCGUARDIAN in the Play Store.
It needs network access only... Doesn't do TCP but does ICMP and UDP
traceroutes and displays ASN as well ...
Sure it does.
You have confidentiality between the parties who are speaking together against
third-parties merely passively intercepting the communication.
Authentication and Confidentiality are two completely separate things and can
(and are) implemented separately.
The only Authentication w
Why do you sell services to customers using iThings if you are incapable of
supporting them? Are you sure that it is not you yourself who have used to
much "bait and switch" selling a service you are unable to provide? What
actions do you take to discourage iThings on your network?
> -Or
Of course it is entirely possible that it was the rioters simply because they
wanted people to notice. And I guess it worked.
> -Original Message-
> From: Warren Bailey [mailto:wbai...@satelliteintelligencegroup.com]
> Sent: Wednesday, 25 September, 2013 18:43
> To: Tammy Firefly
> Cc:
>We're all getting far too conditioned for the "click OK to proceed"
>overload, and the sources aren't helping.
If one embarks with deliberation upon a course of action which may entertain
certain results then the intent to cause the result so obtained is, by
implication, proved.
> ... Dont know what web 2.0 is but the new portal is a web based
> object management system complete
> with "recommended" changes and inconsistency lists.
> We just added prefix allocation check with backend information
> from PCH (prefix checker tool).
Web 2.0 is marketroid drivel-speak for a m
> and then that's PART of the MTA. Otherwise, it's an add-on
> of some sort.
> Given that the point I was making was about capabilities *included* in
> the MTA, and given that I *said* you could add on such functions, it's
> kind of silly to try to confuse the issue in this manner.
CommuniGate P
I have tried contacting PALM through their listed contact phone numbers and by
email to their postmaster, all to no avail.
I am having problems with their SMTP servers being unable to communicate with
my domain configured SMTP server using Mxed addessing (ie, to
kmedc...@dessus.com) although s
> Free speech doesn't include the freedom to shout fire in a crowded theatre.
It most certainly does! There is absolutely nothing to prevent one from
shouting "FIRE" in a crowded theatre. In fact, any attempt to legislate a
prohibition against such behaviour would, in all civilized countries
Your scholar is wrong -- or he is giving the simplified explanation for
children and others incapable of rational though and understanding, and you are
believing the summary because it is simpler for you than understanding the
underlying rational.
Notice that in both cases your presumption of
> On Wed, Sep 03, 2008 at 12:58:53PM -0400, Nicholas Suan wrote:
> > On Sep 3, 2008, at 12:49 PM, Jay R. Ashworth wrote:
> > >You're forgetting that 587 *is authenticated, always*.
> > I'm not sure how that makes much of a difference since the
> > usual spam vector is malware that has (almost) c
> Correct, you need a validating, security-aware stub resolver, or the
> ISP needs to validate the records for you.
That would defeat the entire purpose of using DNSSEC. In order for DNSSEC to
actually provide any improvement in security whatsoever, the ROOT ZONE (.)
needs to be signed, and ev
> > That would defeat the entire purpose of using DNSSEC. In order for
> >DNSSEC to actually provide any improvement in security whatsoever,
> >the ROOT ZONE (.) needs to be signed, and every delegation up the
> >chain needs to be signed. And EVERY resolver (whether recursive or
> >local on host
> > Just because YOU check the digital signature on an email
> and forward that email to me (either with or without the
> > signature data), if I do not have the capability to verify
> the signature myself, I sure as hell am not going to trust your
> > mere say-so that the signature is valid!
> >
> Autoneg is a required part of the gig E specification so you'd only be
> causing yourself trouble by turning it off. (I don't know if
> it'll also break automatic MDI/MDI-X (crossover) configuration, for
> an example of something that's nice to have.)
At least on 450x series enhanced linecards,
> Reportedly started by someone operating under the name "Flyman," RBN is
> known as the mother of cybercrime among online investigators. François
> Paget, senior expert for the McAfee company, says that RBN began as an
> Internet provider and offered "impenetrable" hosting for $600 a month.
> Thi
>>> Reportedly started by someone operating under the name
>>> "Flyman," RBN is known as the mother of cybercrime among
>>> online investigators. François Paget, senior expert for
>>> the McAfee company, says that RBN began as an Internet
>>> provider and offered "impenetrable" hosting for $600 a
>Personally I was amused at people adding cement to USB ports to mitigate
>against the "removable media threat". The issue I see is people forget
>that floppies posed the same threat back in the day.
Do you mean the "AutoRun" threat, since this sort of thing is usually done by
people who (a) ru
Operator to prove
their allegations of misfeasance. The result will be that the Network
Operators will lose, and lose big time. After all, it is the Network Operators
who are the accusers -- not the media mafia.
> Each member state creates its own law, according to the directive. In
> Portuga
litarian and
> oppressive governments.
I believe the United States was the first with that idea.
--- Keith Medcalf
() ascii ribbon campaign against html e-mail
/\ www.asciiribbon.org
301 - 321 of 321 matches
Mail list logo