Sure it is something I should know, but I keep hitting dead ends.
What is current state on botnet reporting procedures?
A minor irritation currently, but clearly well resource botnet is pestering
one of our services, only a couple of thousand IP addresses in use, but I'd
like to mop up as much
On Friday 03 December 2010 13:22:19 Frank Bulk wrote:
> I guess the USG's cyberwar program does work (very dryly said).
They missed ;)
http://wikileaks.ch
http://twitter.com/wikileaks
On Sunday 05 December 2010 15:50:32 Gadi Evron wrote:
>
> I withhold comment... "discuss amongst yourselves".
Since it is an uncommon but occasional complaint that someones site is indexed
in Google by IP address not domain name, I assume simply that since wikileaks
were redirecting to URLs with
On Monday 06 December 2010 09:47:43 Jay Mitchell wrote:
>
> "The Cloud" went down? I think not.
It did for at least one customer.
> Having ones account terminated as opposed to an outage caused by DDoS are
> two very different things.
Although not for all DNS providers.
There are operational le
> Or have had any luck with abuse@ contacts in
> the past? Who's good and who isn't?
http://www.rfc-ignorant.org/tools/submit_form.php?table=abuse
On 19/12/10 18:51, Paul Ferguson wrote:
> Not for nothing, but Spamhaus wasn't the only organization to warn about
> Heihachi:
>
> http://blog.trendmicro.com/wikileaks-in-a-dangerous-internet-neighborhood/
All the domains listed by Trend Micro as neighbours appear to be down.
Have to say as someo
On Tuesday 11 January 2011 14:58:51 Marshall Eubanks wrote:
>
> On twitter right now there are frequent claims that all https is blocked
> (presumably a port blocking).
A quick search pulls up.
http://www.cpj.org/internet/2011/01/tunisia-invades-censors-facebook-other-accounts.php
Since Gmail def
On Tuesday 18 January 2011 11:46:53 Ken Gilmour wrote:
>
> Obviously they know about them because google has the information.
I'm not sure this is a reasonable deduction.
On Monday 13 October 2008 15:30:07 Konstantin Poltev wrote:
>
> and Spamhaus itself claims not to be
> subject to any US laws, where it clearly does business.
The Spamhaus website lists addresses in the UK and Switzerland.
They appear to operate from the UK, and they claim to be subject to UK l
On Wednesday 12 November 2008 21:52:12 Nick Newman wrote:
>
> Let's compare these two scenarios:
>
> 1. The world-wide community of people who essentially run the Internet have
> had enough with a nasty webhosting company in California. They've
> determined that the majority of spam world-wide ori
On Thursday 13 November 2008 13:13:17 Revolver Onslaught wrote:
>
> Did you enconuter the same problem ?
The view here is see McColo thread.
Spamcop and DCC report significant drop coincident with McColo going offline.
I just wish I could say the same about local spam volumes.
We were blockin
On Friday 28 November 2008 16:41:45 Craig Holland wrote:
> Just me, or is showing the floorplan not the typical behavior of a
> super-secure anything?
I'm not sure anyone but the press are claiming anything is super secure there.
I can't imagine being in a bunker makes physical security worse (al
On Sunday 07 December 2008 14:10:02 Drew Linsalata wrote:
>
> Drop me a note off-list if possible.
We have a business line from them
Urm no Wikipedia this morning - hmm - I think the IWF is self destructing.
On Wednesday 12 September 2007 16:54, you wrote:
>
> My mail servers return 5xx on NXDOMAIN. If my little shop can spend not
> too much money for three-9s reliability in the DNS servers, other shops
> can as well.
You get NXDOMAIN when an authoratitive servers says there is no such domain,
it
On Thursday 15 May 2008 16:23, Jay Hennigan wrote:
> Someone via nanog@nanog.org spammed:
> > Tired of
>
> [snip]
>
> Can anyone suggest a faster way to get yourself blackholed than to spam
> this list?
Spammers still spam our abuse address, that might do it.
_
On Friday 27 June 2008 17:13:10 Marshall Eubanks wrote:
>
> .localhost is already reserved through RFC 2606, so this should not be
> a problem.
.localdomain shouldn't cause a problem, since most Unix systems that use it
put it in the name resolution before the DNS is invoked (i.e. /etc/hosts).
On Monday 30 June 2008 17:24:45 John Levine wrote:
> >> In the usual way. Try typing this into your browser's address bar:
> >>
> >> http://museum/
> >
> > That was amusing. Firefox very handily took me to a search
> > results page listing results for the word "museum", none of
> > which was th
On Wednesday 09 July 2008 14:16:53 Jay R. Ashworth wrote:
> On Wed, Jul 09, 2008 at 04:39:49AM -0400, Jean-Fran?ois Mezei wrote:
> > My DNS server made the various DNS requests from the same port and is
> > thus vulnerable. (VMS TCPIP Services so no patches expected).
>
> Well, yes, but unless I've
On Thursday 24 July 2008 05:17:59 Paul Ferguson wrote:
>
> Let's hope some very large service providers get their act together
> real soon now.
>
> http://www.hackerfactor.com/blog/index.php?/archives/204-Poor-DNS.html
It isn't going to happen without BIG political pressure, either from users, or
On Wednesday 03 September 2008 18:07:22 Stephen Sprunk wrote:
>
> When port 25 block was first instituted, several providers actually
> redirected connections to their own servers (with spam filters and/or
> rate limits) rather than blocking the port entirely. This seems like a
> good compromise f
On Friday 05 September 2008 00:33:54 Mark Foster wrote:
>
> *rest snipped*
>
> Is the above described limitation a common occurrance in the
> world-at-large?
If the ISP blocks port 25, then the ISP is taking responsibility for
delivering all email sent by a user, and they have to start applying r
21 matches
Mail list logo