That would be the CSE, not CSIS ...
---
() ascii ribbon campaign against html e-mail
/\ www.asciiribbon.org
> -Original Message-
> From: Erik Soosalu [mailto:erik.soos...@calyxinc.com]
> Sent: Wednesday, 31 October, 2012 12:53
> To: jim deleskie; andy lam
> Cc: nanog@nanog.org
> Subje
> On Fri, Nov 2, 2012 at 2:38 PM, Kevin L. Karch
> wrote:
> > Andrew
> >
> > We offer several solutions that meet your initial requirements. Can you
> tell me if this is a multi rack deployment and a few more details?
> >
> > If you would like we could have a call with one of our applications
> en
Just got paged with a pbx alarm that had 1970 as the year. By the time I logged
in , it was showing 2012. Using GPS for time and date.
-Original Message-
From: Mark Andrews [mailto:ma...@isc.org]
Sent: Monday, November 19, 2012 8:42 PM
To: Van Wolfe
Cc: nanog@nanog.org
Subject: Re: NTP
link didn't work for me, I think http://www.cidr-report.org/as2.0/ is
the proper link
On 8/1/2014 5:00 PM, cidr-rep...@potaroo.net wrote:
This report has been generated at Fri Aug 1 21:13:59 2014 AEST.
The report analyses the BGP Routing Table of AS2.0 router
and generates a report on aggregat
Of couse such applications will be accepted. However, applicants are warned
that failure to include a donation will require alternate verification of the
requisite lack of morals and ethics.
>Will applications without a cancelled check for at least 100k in
>"donations" be considered?
>
>On Mon
>sc is Seychelles. Available s* include sf, sp, sq, su and sw. They should
>pick .sf, use .scot for in-country domains and sell all .sf domains to
>San Francisco residents.
Or Science Fiction productions. Lots more money there.
On Tuesday, 16 September, 2014, 19:28, Roland Dobbins said:
>On Sep 17, 2014, at 8:06 AM, Larry Sheldon wrote:
>> I think of this "paperless" idiocy every time I write "20 reams of
>>rinter paper" on the grocery list.
>While it should be mandatory that things like operational
>plans/procedures
And what, exactly, is it vulnerable to?
>-Original Message-
>From: NANOG [mailto:nanog-boun...@nanog.org] On Behalf Of Daniel Sterling
>Sent: Saturday, 20 September, 2014 12:06
>To: Bacon Zombie
>Cc: nanog@nanog.org
>Subject: Re: Saying goodnight to my GSR
>
>Again, you're focusing resent
gmail.com]
>Sent: Saturday, 20 September, 2014 14:57
>To: Keith Medcalf
>Cc: Daniel Sterling; Bacon Zombie; nanog@nanog.org
>Subject: Re: Saying goodnight to my GSR
>
>> And what, exactly, is it vulnerable to?
>
>Most of these, I'd imagine:
>http://www.cisco.com/c/
On Friday, 26 September, 2014 08:37,Jim Gettys said:
>For those of you who want to understand more about the situation we're
>all in, go look at my talk at the Berkman Center, and read the articles
>linked from there by Bruce Schneier and Dan Geer.
>http://cyber.law.harvard.edu/events/luncheon/
>> Unfortunately, that page contains near the top the ludicrous and
>> impossible assertion:
>> ""Familiarity Breeds Contempt: The Honeymoon Effect and the Role of
>> Legacy Code in Zero-Day Vulnerabilities", by Clark, Fry, Blaze and
>> Smith makes clear that ignoring these devices is foolhardy;
>
On Saturday, 27 September, 2014 20:49, Jimmy Hess said:
>On Sat, Sep 27, 2014 at 8:10 PM, Jay Ashworth wrote:
>> I haven't an example case, but it is theoretically possible.
>Qmail-smtpd has a buffer overflow vulnerability related to integer
>overflow which can only be reached when compiled on
This is another case where a change was made.
If the change had not been made (implement the new kernel) then the
vulnerability would not have been introduced.
The more examples people think they find, the more it proves my proposition.
Vulnerabilities can only be introduced or removed throug
On Saturday, 27 September, 2014 23:29, Kenneth Finnegan
said:
>> My original proposition still holds perfectly:
>>
>> (1) The vulnerability profile of a system is fixed at system
>> commissioning.
>> (2) Vulnerabilities do not get created nor destroyed except through
>> implementation o
On Sunday, 28 September, 2014 00:39, William Herrin said:
>On Fri, Sep 26, 2014 at 11:11 PM, Keith Medcalf
>wrote:
>> On Friday, 26 September, 2014 08:37,Jim Gettys
>>said:
>>>http://cyber.law.harvard.edu/events/luncheon/2014/06/gettys
>> ""Familiarit
On Sunday, 28 September, 2014 06:39, Jimmy Hess said:
>On Sat, Sep 27, 2014 at 11:57 PM, Keith Medcalf
>wrote:> This is another case where a change was made.
>> If the change had not been made (implement the new kernel) then the
>vulnerability would not have been introd
akes the systems more vulnerable. The systems are more vulnerable
>> because the rest of the world has learned more about how those systems
>> may be successfully attacked.
>Hopefully, Keith will admit that *THAT* qualifies as a "change" in his
>book as well. If att
more generally-accepted guideline than, "when the customers start leaving /
when you leave," I'm at least 5% ears.
Thanks,
Keith
dth guarantee?
> From: valdis.kletni...@vt.edu
> Date: Wed, 29 Oct 2014 19:02:53 -0400
> CC: nanog@nanog.org
>
> On Wed, 29 Oct 2014 15:24:46 -0700, keith tokash said:
>
> > Is there an industry standard regarding how much bandwidth an inter-carrier
> > circuit should g
I'm willing to recommend to sales people that they advertise the size of the
*usable* tube as well as the tube overall, but I'm fairly sure they won't care.
Ben rightly stated the order of operations: BS quote > disappointment > mea
culpa/level setting.
If that fails I'll at least make sure no
>> What would be the point in blocking them? They don't even have
>> electricity in the country, what would I worry about coming out
>> of their IP block that wouldn't be more interesting than dangerous.
>> Pretty obvious if it was really them behind the Sony hack, it
>> was outsourced.
>For the f
How is that a problem?
---
Theory is when you know everything but nothing works. Practice is when
everything works but no one knows why. Sometimes theory and practice are
combined: nothing works and no one knows why.
>-Original Message-
>From: NANOG [mailto:nanog-boun...@nanog.org]
German Shepherd Dogs are wonderful intrusion detection devices. In a lot of
cases they also server as excellent intrusion prevention devices as well.
(Must be Friday night)
:-)
---
Theory is when you know everything but nothing works. Practice is when
everything works but no one knows why.
Well now you have to share the answer.
On Sep 10, 2015, at 3:06 PM, Todd K Grand
mailto:tgr...@tgrand.com>> wrote:
The problem has been resolved.
Thanks to everybody that contributed.
---
Keith Stokes
> "Email Disclaimers: Legal Effect in American Courts"
> - http://www.rhlaw.com/blog/legal-effect-of-boilerplate-email-disclaimers/
Dark grey text on a black background is unreadable.
Plonk goes the website.
Or router bugs.
Or even inserting new NSA taps since some of the rest have been caught.
---
Keith Stokes
From: NANOG on behalf of Christopher Morrow
Sent: Wednesday, September 16, 2015 10:34 AM
To: Matt Hoppes
Cc: North American Network Operators
> On Thursday, 17 September, 2015 11:22, valdis.kletni...@vt.edu said:
> On Thu, 17 Sep 2015 13:14:21 -0400, Josh Luthman said:
> > Well it's not a form and it redirects you to the support home page...
> > https://support.microsoft.com/en-us
> You didn't have NoScript or similar in effect at
e have IP's that I can trace from the US
or UK that will show
1) jitter
2) packet loss
3) very far away (perhaps an IP on a sat. link). Pref over 2000 ms
TIA.
Dovid
---
Keith Stokes
that will show
1) jitter
2) packet loss
3) very far away (perhaps an IP on a sat. link). Pref over 2000 ms
TIA.
Dovid
---
Keith Stokes
---
Keith Stokes
I have a SmokePing machine sitting in AWS Oregon looking at a few of my sites.
It shows a bunch of ugliness starting around midnight Central and smoothing out
but still with higher latency continuing to some sites. The same site is
showing ugliness in the last hour.
--
Keith Stokes
> On
It works fine for me from Cox.
---
Keith Stokes
From: NANOG on behalf of Murat Kaipov
Sent: Monday, September 21, 2015 1:51 PM
To: nanog@nanog.org
Subject: cisco.com unavailable
Hi folks!
Is cisco.com <http://cisco.com/> unavailable or
a loud rock band,
IMO.
I personally use Bose noise-canceling headphones.
---
Keith Stokes
> Myth: blah blah blah social media is a bad way to get ahold of
> netops/abuse.
> Fact: Social media is an acceptable way to report abuse. My marketing
> department certainly knows how to get ahold of me when such an issue
> occurs. It's 2015, and if you and everyone you know isn't watching twit
Obviously this is designed so that the carrier knows what traffic to
"disregard" in their feed to the NSA ... That is the sole purpose of it.
> -Original Message-
> From: NANOG [mailto:nanog-boun...@nanog.org] On Behalf Of Owen DeLong
> Sent: Friday, 20 November, 2015 14:50
> To: Steve M
Why uncomfortable? How do you know this is not how the company executive that
came up with the idea did so? (So that he or she could watch unlimited
bestiality videos).
> -Original Message-
> From: NANOG [mailto:nanog-boun...@nanog.org] On Behalf Of nanog-
> i...@mail.com
> Sent: Sun
> I agree that a /48 or /56 being reserved for business
> customers/sites is reasonable. But for residential use, I'm having a hard
> time believing multi-subnet home networks are even remotely common outside
> of networking folk such as the NANOG members. A lot of recent IPv4
> devices
> s
You can lead a horse to water, but you cannot make it drink. If people choose
to be the authors of their own misfortunes, that is their choice. I know a
good many folks who are not members of NANOG yet have multiple separate L2 and
L3 networks to keep the "crap" isolated.
> -Original Mes
> to take you seriously. Also who here can honestly say you never pretended
> to power cycle your Windows 95 when asked by the support bot on the phone,
> while actually running Linux, because that is the only way to get passed
> on to second tier support?
I can honestly say that I have told suppo
On Sunday, 27 December, 2015 17:58, Larry Sheldon said:
> On 12/26/2015 23:49, Mike wrote:
>
> [snip]
>
> > Firstly, they are all junk. Every last one of them. Period. Broadband
> > routers are designed to be cheap and to appeal to people who don't know
> > any better, and who respond well (eg: m
On Sunday, 27 December, 2015 19:46, James Downs said:
> > On Dec 27, 2015, at 09:43, Hugo Slabbert wrote:
> > Hence: https://on.google.com/hub/
> The device looks cool, and sounds cool, but what data does google end up
> with, and what remote management can they do? Their policy pages aren’t
ncern is for
the safety of our customers and our employees. Please do not take
chances with the safety of your employees.
The IDC will remain open to customers unless weather conditions occur
that requires the building to be locked down. We will send out periodic
updates as the storm progresses.
--
Keith
WHo cares? TOG (your third party shooting what you loosly call un-authorized
video) is not a party to the contract and therefore does not give a flying fuck
what it says. Nor do the parties to the contract have anything to say about
the matter.
So in other words, TOG is free to do whatever h
ISP's should block nothing, to or from the customer, unless they make it clear
*before* selling the service (and include it in the Terms and Conditions of
Service Contract), that they are not selling an Internet connection but are
selling a partially functional Internet connection (or a limited
> We are in the process of considering adding some new ports to this block
> list right now, and one big suggestion is SSDP. If you have any others you
> wish to suggest please send them to me and the guy on the cc line (Nirmal
> Mody).
> On 2/26/16, 9:31 AM, "NANOG on behalf of
Hammett
> Intelligent Computing Solutions
> http://www.ics-il.com
>
> Midwest-IX
> http://www.midwest-ix.com
>
> - Original Message -
>
> From: "Keith Medcalf"
> To: "NANOG list"
> Cc: "Nirmal Mody"
> Sent: Friday, February 26, 20
Really? Consumer Narrowband Access Networks use these protocols all the time.
(I call them narrowband since that is what they are -- even though the common
euphamism is broadband, "broad" it certainly is not).
> -Original Message-
> From: NANOG [mailto:nanog-boun...@nanog.org] On Behal
mpletely work in
> lynx.
>
>
>
>
> -
> Mike Hammett
> Intelligent Computing Solutions
> http://www.ics-il.com
>
> Midwest-IX
> http://www.midwest-ix.com
>
> - Original Message -
>
> From: "Keith Medcalf"
> To: "NANOG lis
ip history form to go with it.
--
Mike Andrews, W5EGO
mi...@mikea.ath.cx<mailto:mi...@mikea.ath.cx>
Tired old sysadmin
---
Keith Stokes
Except for the fact that the FCC decided that they wanted to give up Title II
regulation of the internet because they were paid to do so by the telephants,
they would have alwAYS had this power.
The people who were bribed are simply dead and the current crop of "officials"
(they are not repres
You are forgetting that the Internet and ISPs where originally common carriers
and the FCC at the behest of the government decided to de-regulate so that they
could raid, arrest, charge, fine and torture ISPs if their customers visited
websites the governement did not like, sent email the gover
Robustness is desirable from a security perspective. Failure to be liberal in
what you accept and not being prepared to deal with malformed input leads to
such wonders as the Microsoft bug that led to unexpected/malformed IP datagrams
mishandled as "execute payload with system authority". Rat
>> It's reported by different customers in different locations so I don't
>> think it's password compromised
>Have you checked? If the routers had vty access open (ssh or telnet) and
>the passwords were easy to guess, then it's more likely that this was a
>password compromise. You can test this
It is called the Purdue Enterprise Reference Architecture ...
> -Original Message-
> From: NANOG [mailto:nanog-boun...@nanog.org] On Behalf Of
> nan...@roadrunner.com
> Sent: Monday, 4 May, 2015 20:56
> To: nanog@nanog.org
> Subject: Network Segmentation Approaches
>
> Possibly a bit off-
Ah. Security hole as designed. inline dispositions should be ignored unless
the recipient specifically "requests" to see them after viewing the text/plain
part. In fact, I would vote for ignoring *everything* except the text/plain
part unless the recipient specifically requests it after view
> On Saturday, 9 May, 2015, at 10:59 John Levine said:
> >> No test/plain? Delete without further ado.
> Sadly, it is no longer 1998.
No kidding. Web-Page e-mail. Lots of proprietary executable-embedded-in-data
file formats used for e-mail, and worst, gratuitous JavaScript everywhere
maki
Without a concomitant increase in "trustworthy", assigning greater levels of
trust is fools endeavour. Whatever this trusted network initiative is, I take
that it was designed by fools or government (the two are usually
indistinguishable) for the purpose of creating utterly untrustworthy netw
Use wireless. There are reasonably priced point to point bridges available.
--
Keith Stokes
> On Jun 26, 2015, at 11:18 PM, Peter Kristolaitis wrote:
>
>> On 6/26/2015 7:26 PM, Joe Abley wrote:
>>
>>> On 26 Jun 2015, at 15:04, Hank Disuko wrote:
>>>
>
Have they asked No-Such-Agency?
No-Such-Agency typically taps communication lines by "back-hoe accident" of
some sort on the path they are interested in tapping. That way they can
install a tap "over yonder" while the victim telecom is attempting to repair
the original damage. I guess this t
s strictly
necessary. (I have no non-public information on that event. There may
be good reasons, technical or otherwise, why that wasn't the chosen
solution.)
-- Brett
[1] You only have to configure them on the root; non-root bridges use
what root sends out, not what they ahve configured.
---
Keith Stokes
Internet in a box.
Wasn't that the Japanese thing with the Woody Woodpecker logo and the
(translated) English text: "Touch Woody, the Internet pecker"?
Didn't go over to well in English speaking parts as I recall ...
> Good to know.
>
> I was one of those insiders, And it's running on my laptop currently. It
> got the 10240 build a bit ago. Which removed the "insider preview" water
> marks, And appears to be the full release version.. So it would appear the
> "insiders" already have it. Or the ability to get
is there a hard
coded entry somewhere?
3. Do all U-Verse modem/routers behave the same way? This particular unit was a
Motorola but the friends I’ve seen with U-Verse use a Cisco unit.
---
Keith Stokes
to have to know how the technology of every ISP that every possible
SaaS customer may use to access your service is set up?
On Thu, Jul 30, 2015 at 04:02:06PM +, Keith Stokes wrote:
I’m wondering if some can share their experiences or maybe there’s an AT&T
person here who can confirm poli
t a few times I have noticed that it's changed. I
wouldn't trust it to be static forever.
--
James Hartig
---
Keith Stokes
It takes no effort at all. You just do the same thing as has been done with
every previous version of windows:
When it asks for a LOCAL account and password, give it one. When it asks if
you want to do a Microsoft Account", say no thank-you. Mind you, it does ask
you about 8 times if you ar
lliard [mailto:n...@foobar.org]
> Sent: Saturday, 1 August, 2015 06:05
> To: Keith Medcalf; nanog@nanog.org
> Subject: Re: Windows 10 Release
>
> On 01/08/2015 03:27, Keith Medcalf wrote:
> > It just means that you cannot use the crappy apps or the crappy app
> store.
>
>
> "Yahoo does not provide the government with
> direct access to its servers, systems, or network."
Ah, so you admit that you provide "indirect" access by interposing a firewall
and router between your datacenter network and the transport link to the NSA.
That is just normal sound security pra
Of course the access isn't direct -- there is a firewall and a router in
between. The access is indirect.
---
() ascii ribbon campaign against html e-mail
/\ www.asciiribbon.org
> -Original Message-
> From: Jason L. Sparks [mailto:jlspa...@gmail.com]
> Sent: Sunday, 09 June, 2013 04:
There is more than just y'all's in North America .
---
Sent from Samsung Mobile
Original message
From: Jeroen Massar
Date:
To: david peahi
Cc: NANOG list
Subject: Re: huawei (ZTE too)
> Maybe people will now start turning on their encryption functions on
> any device capable of doing it :)
Those that care did that many moons ago. The rest don't care.
Of course, if you do not have control of the endpoints doing the encryption
(ie, the untrustworthy sucker is in the middle som
> > There's still the much more minor point that when I tried to "self
> > serve" I ended up at a blank page on the Yahoo! web site, hopefully
> > they will figure that out as well.
> I'm continually amazed at the number of web designers that don't test
> their pages with NoScript enabled. Just s
The appropriate party to inform would be the FBI ... The word fraud comes to
mind, and millions of 50 centses puts company officers in prison for a long
long long time.
> -Original Message-
> From: Kee Hinckley [mailto:naz...@marrowbones.com]
> Sent: Thursday, 5 September, 2013 11:28
>
Look for TRACEROUTE by SRCGUARDIAN in the Play Store.
It needs network access only... Doesn't do TCP but does ICMP and UDP
traceroutes and displays ASN as well ...
Sure it does.
You have confidentiality between the parties who are speaking together against
third-parties merely passively intercepting the communication.
Authentication and Confidentiality are two completely separate things and can
(and are) implemented separately.
The only Authentication w
Why do you sell services to customers using iThings if you are incapable of
supporting them? Are you sure that it is not you yourself who have used to
much "bait and switch" selling a service you are unable to provide? What
actions do you take to discourage iThings on your network?
> -Or
Of course it is entirely possible that it was the rioters simply because they
wanted people to notice. And I guess it worked.
> -Original Message-
> From: Warren Bailey [mailto:wbai...@satelliteintelligencegroup.com]
> Sent: Wednesday, 25 September, 2013 18:43
> To: Tammy Firefly
> Cc:
>We're all getting far too conditioned for the "click OK to proceed"
>overload, and the sources aren't helping.
If one embarks with deliberation upon a course of action which may entertain
certain results then the intent to cause the result so obtained is, by
implication, proved.
Attendance is open to all, a registration form and more details will be
published over the next few weeks.
Keith Mitchell
OARC Programme Manager
hicago for another stimulating and
productive meeting, please let me know if you have any questions or need
more information.
Keith Mitchell
OARC Programme Manager
+1 650 423 1348
everywhere seems a little expensive and cumbersome.
Are there devices you can wire into breaker box to meter each AC
circuit?
Thanks in advance for any suggestions.
-Jay
We have a few of these running: http://www.emon.com/products_webmon.html
-Keith
I've had good luck with devices from DPS; http://www.dpstele.com/
-Keith
-Original Message-
From: Tom Beecher [mailto:tbeec...@localnet.com]
Sent: Friday, May 14, 2010 2:00 PM
To: nanog@nanog.org
Subject: SNMP Monitoring of a Transfer Switch relay
I'm presently doing som
I would stick with wire wrap, 66 blocks make an inferior connection. If
someone cannot deal with wire wrapping, they are not living in a telecom
world. Find a contractor who can do this properly. Both Telect and ADC
have good DSX panels in varying densities.
-Keith
-Original Message
ly. This email may be accurate, but
I'll pretend I'm an engineer for a moment and ask for something to back up
allegations before I believe them. Even with the internet's stellar reputation
for accuracy via intuition.
---
Keith Tokash, CCIE #21236
Network blah blah blah, My
While I still have a bunch of MGE Comet systems running, we did take one
electrical room and replace them with Symmetra PX's, It did require some
conduit work as they were moved from the wall to the center (but they are not
as deep as a Comet) , to give the required cleareances. These are not y
> ... Dont know what web 2.0 is but the new portal is a web based
> object management system complete
> with "recommended" changes and inconsistency lists.
> We just added prefix allocation check with backend information
> from PCH (prefix checker tool).
Web 2.0 is marketroid drivel-speak for a m
new problems we may be
replacing our old ones with. Hopefully nothing serious. :)
Keith Tokash
_
Windows Live: Keep your friends up to date with what you do online.
http://windowslive.com/Campaign/SocialNetworking?ocid=PID23285::T:W
> and then that's PART of the MTA. Otherwise, it's an add-on
> of some sort.
> Given that the point I was making was about capabilities *included* in
> the MTA, and given that I *said* you could add on such functions, it's
> kind of silly to try to confuse the issue in this manner.
CommuniGate P
addition to Verizon Business ip issues, we lost an AT&T private line at the
same time, but it has come back up. Fiber cut or power somewhere?
This was at 15:17 Eastern..
-Keith
I have tried contacting PALM through their listed contact phone numbers and by
email to their postmaster, all to no avail.
I am having problems with their SMTP servers being unable to communicate with
my domain configured SMTP server using Mxed addessing (ie, to
kmedc...@dessus.com) although s
> Free speech doesn't include the freedom to shout fire in a crowded theatre.
It most certainly does! There is absolutely nothing to prevent one from
shouting "FIRE" in a crowded theatre. In fact, any attempt to legislate a
prohibition against such behaviour would, in all civilized countries
Your scholar is wrong -- or he is giving the simplified explanation for
children and others incapable of rational though and understanding, and you are
believing the summary because it is simpler for you than understanding the
underlying rational.
Notice that in both cases your presumption of
Open source netlow collector NTOP: http://www.ntop.org
-Original Message-
From: Mills, Charles [mailto:[EMAIL PROTECTED]
Sent: Friday, October 10, 2008 12:46 PM
To: Lee, Steven (NSG Malaysia); nanog@nanog.org
Subject: RE: Help needed - Cisco Netflow
Lee,
The question would be do
Looks ok from Boston-
3 core2.po1-bbnet1.bsn.pnap.net (63.251.128.18) 2.590 ms 3.988 ms
3.181 ms
4 207.88.182.33.ptr.us.xo.net (207.88.182.33) 26.636 ms 7.651 ms
11.977 ms
5 207.88.182.18.ptr.us.xo.net (207.88.182.18) 7.603 ms 8.174 ms
7.405 ms
6 216.239.49.217 (216.239.49.217) 8.219
and in some cases, entire cities. Any telecom/datacom
manager who has done their homework should be able to map out their
paths back to critical diverse infrastructure.
-Keith
ease contact me if you can assist with any of the above or need
further information.
Keith Mitchell
OARC Programme Manager
___
NANOG mailing list
NANOG@nanog.org
http://mailman.nanog.org/mailman/listinfo/nanog
The iTrackers just helps the nodes to talk to each other in a more
efficient way, all the iTracker does is talk to another p2p tracker and
is used for network topology, has no caching or file information or user
information..
Keith O'Neill
Pando Networks
Mike Gonnason wrote:
> On Thu
Morgan,
Fixed Orbit is broken, I doubt it has ever worked and I wouldn't use it
for anything meaningful.
Keith O'Neill
Pando Networks
Morgan Miskell wrote:
> Anyone have any contacts at Fixed Orbit or know anything about their
> setup? We have one peer that doesn't
s, if you have or know
of material relevant to DNS Operator or Researchers to present, it would
be very welcome. Please let me know ASAP, or feel free to discuss with
me at NANOG.
Keith Mitchell
OARC Programme Manager
://public.oarci.net/dns-operations/workshop-2008/
Keith Mitchell
OARC Programme Manager
301 - 400 of 417 matches
Mail list logo