nanog: by date

750 messages starting Jul 01 08 and ending Jul 31 08
Date index | Thread index | Author index


Tuesday, 01 July

REJECT-ON-SMTP-DATA (Re: Mail Server best practices - was: Pandora's Box of new TLDs) Jeroen Massar
Re: what problem are we solving? (was Re: ICANN opens up Pandora's Box of new TLDs) Roland Perry
Re: what problem are we solving? (was Re: ICANN opens up Pandora's Box of Roland Perry
Re: DNS and potential energy bmanning
Re: ICANN opens up Pandora's Box of new TLDs Stephane Bortzmeyer
TLDs and file extensions (Re: DNS and potential energy) David Conrad
Re: DNS and potential energy Marshall Eubanks
Re: what problem are we solving? (was Re: ICANN opens up Pandora's Box of new TLDs) Jay R. Ashworth
Re: what problem are we solving? (was Re: ICANN opens up Pandora's Joe Greco
RFC 1480 - does it generalize (was What Problem; was ICANN/Pandora) Jay R. Ashworth
Re: DNS and potential energy Jay R. Ashworth
Re: REJECT-ON-SMTP-DATA (Re: Mail Server best practices - was: Pandora's Box of new TLDs) Chris Owen
Re: DNS and potential energy Rob Pickering
RE: TLDs and file extensions (Re: DNS and potential energy) michael.dillon
Re: Mail Server best practices - was: Pandora's Box of new TLDs Jay R. Ashworth
Re: ICANN opens up Pandora's Box of new TLDs Tony Finch
Re: DNS and potential energy Tony Finch
Re: ICANN opens up Pandora's Box of new TLDs Phil Regnauld
Re: DNS and potential energy John Levine
Re: DNS and potential energy Valdis . Kletnieks
can all current nanog threads move to nanog-ot@ plz? Paul Vixie
Re: DNS and potential energy Daniel Hagerty
Re: TLDs and file extensions (Re: DNS and potential energy) Tony Finch
Re: ICANN opens up Pandora's Box of new TLDs Tony Finch
Re: DNS and potential energy Jay R. Ashworth
Re: TLDs and file extensions (Re: DNS and potential energy) Jay R. Ashworth
Re: DNS and potential energy Valdis . Kletnieks
Re: what problem are we solving? (was Re: ICANN opens up Pandora's Box of Jay R. Ashworth
Packetloss while transiting as7018 Brad Tarno
RE: what problem are we solving? (was Re: ICANN opens upPandora's Box of Tomas L. Byrnes
RE: what problem are we solving? (was Re: ICANN opens upPandora's Box of Gregory Hicks
Re: DNS and potential energy Laurence F. Sheldon, Jr.
Re: can all current nanog threads move to nanog-ot@ plz? Laurence F. Sheldon, Jr.
Re: REJECT-ON-SMTP-DATA (Re: Mail Server best practices - was: Pandora's Box of new TLDs) Justin Shore
SDH on the cheap Kerplunkity Moo
Re: TLDs and file extensions (Re: DNS and potential energy) Jean-François Mezei
Re: SDH on the cheap Yardiel Fuentes
Re: Possible explanations for a large hop in latency Sam Stickland
Re: SDH on the cheap Martin Hannigan
Re: Possible explanations for a large hop in latency Bruce Pinsky

Wednesday, 02 July

Charter nntp administrator Chris Scheller
Re: SDH on the cheap Yardiel Fuentes
Re: SDH on the cheap Martin Hannigan
APRICOT 2009 : Call for Papers Gaurab Raj Upadhaya

Thursday, 03 July

RIPE NCC will begin allocating from 188/8 Alex Le Heux
tacid.org Nick Shank
Replacement for Avaya CNA/RouteScience Drew Weaver
RE: Replacement for Avaya CNA/RouteScience Michienne Dixon
Re: RIPE NCC will begin allocating from 188/8 Steve Linford
IPv6 Prefix Policy Frank P. Troy
Re: IPv6 Prefix Policy Jeroen Massar
Re: IPv6 Prefix Policy Leo Bicknell
Re: Replacement for Avaya CNA/RouteScience Paul Wall
RE: Replacement for Avaya CNA/RouteScience Koch, Christian
RE: Replacement for Avaya CNA/RouteScience Eric Van Tol
Re: Replacement for Avaya CNA/RouteScience Robert E. Seastrom
Re: IPv6 Prefix Policy Jeroen Massar
Re: Replacement for Avaya CNA/RouteScience Christian Koch
RE: Replacement for Avaya CNA/RouteScience Eric Van Tol
Re: Replacement for Avaya CNA/RouteScience Christian Koch

Friday, 04 July

BGP Update Report cidr-report
The Cidr Report cidr-report
Re: Replacement for Avaya CNA/RouteScience Ross Vandegrift
Weekly Routing Table Report Routing Analysis Role Account
Re: REJECT-ON-SMTP-DATA (Re: Mail Server best practices - was: Pandora's Box of new TLDs) Phil Vandry
Re: REJECT-ON-SMTP-DATA (Re: Mail Server best practices - was: Pandora's Box of new TLDs) Justin Shore
RE: REJECT-ON-SMTP-DATA (Re: Mail Server best practices - was: Pandora's Box of new TLDs) Skywing
Re: REJECT-ON-SMTP-DATA (Re: Mail Server best practices - was: Pandora's Box of new TLDs) Justin Shore

Saturday, 05 July

Re: REJECT-ON-SMTP-DATA (Re: Mail Server best practices - was: Pandora's Box of new TLDs) Jean-François Mezei
Re: Replacement for Avaya CNA/RouteScience Rubens Kuhl Jr.
Re: Replacement for Avaya CNA/RouteScience Tom Sands
Re: REJECT-ON-SMTP-DATA (Re: Mail Server best practices - was: Pandora's Box of new TLDs) Justin Shore
RE: tacid.org Frank Bulk - iNAME
updating & checking DNS zone files travis+ml-nanog
Savvis route loop Craig Holland
a business opportunity? (was: Re: tacid.org) Randy Bush
[OT/NOOP] Re: tacid.org jamie
Re: a business opportunity? Paul Vixie
Sure, I'm game (was Re: a business opportunity?) Lynda
RE: a business opportunity? Tomas L. Byrnes
Re: a business opportunity? Paul Vixie
Re: a business opportunity? John Levine
Re: updating & checking DNS zone files Luke S Crawford
(OT) IANA and ICANN domains get hijacked Michael Painter
Re: updating & checking DNS zone files jbratton
Re: updating & checking DNS zone files Paul Bertain
Re: a business opportunity? Eric Brunner-Williams

Sunday, 06 July

apnic whois busted goemon
Re: Sure, I'm game (was Re: a business opportunity?) Suresh Ramasubramanian
Re: Sure, I'm game (was Re: a business opportunity?) Jon Lewis
RE: tacid.org Nick Shank
Re: updating & checking DNS zone files Jay R. Ashworth
Re: tacid.org Jim Popovitch
dns-operations@ mailing list? (Re: updating & checking DNS zone files) Paul Vixie
Re: updating & checking DNS zone files Jeroen Massar
Re: tacid.org Nick Shank
Re: tacid.org Jim Popovitch
[Idr] Configuration objects in BGP MIB v2: Call for consenus Jeffrey Haas

Monday, 07 July

Connectivity and local loop in Panama anybody? Mark Jeftovic
Sprint Core Router Powered Down in Orlando, Fl? Kraig Beahn
Re: Sprint Core Router Powered Down in Orlando, Fl? Scott Weeks

Tuesday, 08 July

Re: updating & checking DNS zone files Stephane Bortzmeyer
Cisco Security Advisory: Multiple Cisco Products Vulnerable to DNS Cache Poisoning Attacks Cisco Systems Product Security Incident Response Team
Multiple DNS implementations vulnerable to cache poisoning Buhrmaster, Gary
Re: Multiple DNS implementations vulnerable to cache poisoning Jay R. Ashworth
Re: Multiple DNS implementations vulnerable to cache poisoning Jay R. Ashworth
Re: Multiple DNS implementations vulnerable to cache poisoning Lynda
Re: Multiple DNS implementations vulnerable to cache poisoning Owen DeLong
Re: Multiple DNS implementations vulnerable to cache poisoning Christian Koch
Re: Multiple DNS implementations vulnerable to cache poisoning Lynda
Re: Multiple DNS implementations vulnerable to cache poisoning Jeffrey Ollie
Re: Multiple DNS implementations vulnerable to cache poisoning Jay R. Ashworth
Re: Multiple DNS implementations vulnerable to cache poisoning Jimmy Hess
Re: Multiple DNS implementations vulnerable to cache poisoning Jean-François Mezei
Re: Multiple DNS implementations vulnerable to cache poisoning Chris Adams
Re: Multiple DNS implementations vulnerable to cache poisoning Michael C. Toren

Wednesday, 09 July

Re: Multiple DNS implementations vulnerable to cache poisoning Jean-François Mezei
Re: Multiple DNS implementations vulnerable to cache poisoning Joe Greco
Re: Multiple DNS implementations vulnerable to cache poisoning Jay R. Ashworth
Re: Multiple DNS implementations vulnerable to cache poisoning Simon Waters
Re: Multiple DNS implementations vulnerable to cache poisoning Jay R. Ashworth
Building a BGP test network Jason Lewis
Re: Building a BGP test network Beavis
Re: Building a BGP test network Jason Lewis
RE: Building a BGP test network Borchers, Mark M.
Re: Building a BGP test network Howard Jones
Re: Building a BGP test network Fouant, Stefan
Re: Multiple DNS implementations vulnerable to cache poisoning Steven M. Bellovin
Re: Building a BGP test network Charles N Wyble
Re: Multiple DNS implementations vulnerable to cache poisoning Christopher Morrow
Re: Multiple DNS implementations vulnerable to cache poisoning Steven M. Bellovin
Re: Multiple DNS implementations vulnerable to cache poisoning Joe Abley
Re: Multiple DNS implementations vulnerable to cache poisoning David Conrad
Re: Multiple DNS implementations vulnerable to cache poisoning Christopher Morrow
Re: Building a BGP test network Ariel Biener
RE: Multiple DNS implementations vulnerable to cache poisoning michael.dillon
Re: Building a BGP test network William Waites
Re: Multiple DNS implementations vulnerable to cache poisoning Steven M. Bellovin
Re: Multiple DNS implementations vulnerable to cache poisoning Sean Donelan
Re: Multiple DNS implementations vulnerable to cache poisoning Paul Ferguson
Re: Multiple DNS implementations vulnerable to cache poisoning Jay R. Ashworth
RE: Multiple DNS implementations vulnerable to cache poisoning Martin Hannigan
Re: tacid.org Jo Rhett
Re: updating & checking DNS zone files Jo Rhett
Re: Multiple DNS implementations vulnerable to cache poisoning David Conrad
Bell Contact commo dore
Re: Multiple DNS implementations vulnerable to cache poisoning Fernando Gont
Re: Multiple DNS implementations vulnerable to cache poisoning Patrick W. Gilmore
RE: Multiple DNS implementations vulnerable to cache poisoning Eric Davis
Re: Multiple DNS implementations vulnerable to cache poisoning Randy Bush
Re: Multiple DNS implementations vulnerable to cache poisoning David Conrad
Re: Multiple DNS implementations vulnerable to cache poisoning Randy Bush
Re: Multiple DNS implementations vulnerable to cache poisoning David Conrad
Re: Multiple DNS implementations vulnerable to cache poisoning Randy Bush
Re: Multiple DNS implementations vulnerable to cache poisoning Eric Brunner-Williams
Re: Multiple DNS implementations vulnerable to cache poisoning Christopher Morrow
Re: Multiple DNS implementations vulnerable to cache poisoning Martin Hannigan
Re: Multiple DNS implementations vulnerable to cache poisoning Christopher Morrow

Thursday, 10 July

Linkedin Contacts Felix Bako
Re: Multiple DNS implementations vulnerable to cache poisoning Joao Damas
Re: Multiple DNS implementations vulnerable to cache poisoning Phil Regnauld
Big delays at Sprint or Verizon network? Nicolas Antoniello
Re: Multiple DNS implementations vulnerable to cache poisoning Christopher Morrow
Independent Testing for Network Hardware Brian Knoll (TT)
Re: Linkedin Contacts mark seiden-via mac
Re: Linkedin Contacts Suresh Ramasubramanian
Cogent problems in Chicago area? Brandon Galbraith
Cogent problems in Chicago area? (updated with info) Brandon Galbraith
Re: Cogent problems in Chicago area? Christian Koch
Re: Cogent problems in Chicago area? Darrell Hyde
Re: Cogent problems in Chicago area? Brandon Galbraith
Re: Multiple DNS implementations vulnerable to cache poisoning David Conrad
Re: Multiple DNS implementations vulnerable to cache poisoning David Conrad
Re: Multiple DNS implementations vulnerable to cache poisoning David Conrad
verizon.net abuse/support contacts? Bill
Re: Multiple DNS implementations vulnerable to cache poisoning Leo Bicknell
RE: Multiple DNS implementations vulnerable to cache poisoning Martin Hannigan
Re: Multiple DNS implementations vulnerable to cache poisoning Jay R. Ashworth
Re: Multiple DNS implementations vulnerable to cache poisoning Michael Sinatra
on Qwest transport, need service in Denver area neal rauhauser
RE: Multiple DNS implementations vulnerable to cache poisoning Andrews Carl 455
Re: Multiple DNS implementations vulnerable to cache poisoning Russ Mundy
Re: Multiple DNS implementations vulnerable to cache poisoning Russ Mundy
RE: Independent Testing for Network Hardware Frank P. Troy
Comcast routing issue Andrew D Kirch
Thanks Andrew D Kirch
[ot] Re: Thanks jamie

Friday, 11 July

BGP Update Report cidr-report
The Cidr Report cidr-report
Re: Multiple DNS implementations vulnerable to cache poisoning Tuc at T-B-O-H.NET
Weekly Routing Table Report Routing Analysis Role Account
Re: Building a BGP test network Richard Mortier

Sunday, 13 July

AS 54271 Marshall Eubanks
Re: AS 54271 Patrick W. Gilmore
Re: AS 54271 Fredy Kuenzler
Re: AS 54271 Jon Kibler
Re: AS 54271 Joel Jaeggli
Re: AS 54271 manolo
RE: AS 54271 Scott Morris
Re: AS 54271 Joel Jaeggli
Re: AS 54271 Christian Koch

Monday, 14 July

VLAN Management Tool Fisher, Shawn
Peer1 outage in Vancouver Duane Cook

Tuesday, 15 July

Analysing traces for performance bottlenecks Sam Stickland
Re: Analysing traces for performance bottlenecks Tim Eberhard
Re: Analysing traces for performance bottlenecks Sam Stickland
Re: Analysing traces for performance bottlenecks Kevin Oberman
Re: Analysing traces for performance bottlenecks rcheung
Re: Analysing traces for performance bottlenecks Matt Cable
Avg. Packet Size - Again? Sean Hafeez
RE: Avg. Packet Size - Again? Darryl Dunkin
Re: Avg. Packet Size - Again? Valdis . Kletnieks
First Call for Papers InfoSys 2009 [ICNS, ICAS, INTENSIVE], Valencia (Spain), April 21-25, 2009 Jaime Lloret Mauri

Wednesday, 16 July

Re: Avg. Packet Size - Again? Glen Turner
Re: Avg. Packet Size - Again? Randy Bush
[NANOG-announce] Reminder: Presentation materials for NANOG44/45 are welcomed Ren Provo
Re: Avg. Packet Size - Again? Jeff Kell
Transit providers in Sri Lanka Skeeve Stevens
Managed, cheap, DC power switches Brandon Bennett
Re: Avg. Packet Size - Again? Fred Baker
Enterprise VoIP Survey nanog
Re: Enterprise VoIP Survey Justin Ryburn
Data about IPv6 fragmentation Fernando Gont
RE: Managed, cheap, DC power switches Tim Sanderson
RE: Managed, cheap, DC power switches Paul Stewart
Re: Managed, cheap, DC power switches Jay R. Ashworth
Announcement : publicly available LISP and shim6 implementations Olivier Bonaventure
Re: Avg. Packet Size - Again? Wayne E. Bouchard
Re: Avg. Packet Size - Again? Iddo
Re: Managed, cheap, DC power switches Patrick Giagnocavo
Re: Managed, cheap, DC power switches Beavis

Thursday, 17 July

RE: Managed, cheap, DC power switches Jason Gurtz
Re: Managed, cheap, DC power switches Jay R. Ashworth
AUTO: Robbie Woodley is out of the office (returning Mon 07/21/2008) Robbie_Woodley
Re: Analysing traces for performance bottlenecks Sam Stickland
RE: Analysing traces for performance bottlenecks Bulger, Tim
Re: AUTO: Robbie Woodley is out of the office (returning Mon 07/21/2008) Laurence F. Sheldon, Jr.
Re: Analysing traces for performance bottlenecks Sean Donelan
RE: Managed, cheap, DC power switches Tim Sanderson
RE: Analyzing traces for performance bottlenecks Tim Sanderson
Re: Managed, cheap, DC power switches Matthew Crocker
Re: AUTO: Robbie Woodley is out of the office (returning Mon 07/21/2008) Colin Alston
weirdness with Extreme Andy Grosser
Re: Analyzing traces for performance bottlenecks Randy Bush
Line rate gigabit router/switch options Matthew Huff
RE: Line rate gigabit router/switch options Paul Kelly :: Blacknight
Re: Managed, cheap, DC power switches Jay R. Ashworth
RE: Line rate gigabit router/switch options Matthew Huff
Re: Managed, cheap, DC power switches Seth Mattinen
Re: Line rate gigabit router/switch options Brant I. Stevens
Re: Managed, cheap, DC power switches Jeff Kell
OT: GBIC compatibility and pricing (was Managed, cheap, DC power switches) Jay R. Ashworth
RE: GBIC compatibility and pricing (was Managed, cheap, DC power switches) Steve Dalberg
Re: Avg. Packet Size - Again? Scott Weeks
Re: GBIC compatibility and pricing (was Managed, cheap, DC power switches) Hyunseog Ryu
Re: Line rate gigabit router/switch options Kevin Oberman
Re: GBIC compatibility and pricing (was Managed, cheap, DC power switches) Kevin Oberman
Comcast issues anyone? Logan Rawlins
Re: Comcast issues anyone? Logan Rawlins
Looking for Network Solutions mail admin randal k
Re: Looking for Network Solutions mail admin Suresh Ramasubramanian
Force10 E300 vs. Juniper MX480 Joe Abley
Re: Looking for Network Solutions mail admin randal k
Re: Looking for Network Solutions mail admin Randy Bush
RE: Comcast issues anyone? Smith, Courtney
Real person @ Speakeasy Abuse Tomas L. Byrnes

Friday, 18 July

Re: Force10 E300 vs. Juniper MX480 Chris Marlatt
BGP Update Report cidr-report
The Cidr Report cidr-report
Re: Force10 E300 vs. Juniper MX480 Keith O'neill
Re: Force10 E300 vs. Juniper MX480 John Sweeting
Re: Force10 E300 vs. Juniper MX480 Chris Marlatt
RE: Force10 E300 vs. Juniper MX480 Eric Van Tol
Re: Force10 E300 vs. Juniper MX480 Chris Heighway
Cisco vs Adtran vs Juniper Paul Stewart
Re: Cisco vs Adtran vs Juniper Chris Heighway
Re: OT: GBIC compatibility and pricing (was Managed, cheap, DC power switches) Jay R. Ashworth
RE: Cisco vs Adtran vs Juniper Paul Stewart
RE: Cisco vs Adtran vs Juniper Eric Van Tol
RE: Cisco vs Adtran vs Juniper Eric Van Tol
RE: Cisco vs Adtran vs Juniper Paul Stewart
Bogon Filter Update Request Stan Barber
RE: Force10 E300 vs. Juniper MX480 Martin Hannigan
SBCglobal routing loop. Logan Rawlins
Re: SBCglobal routing loop. Justin Ream
Re: SBCglobal routing loop. Mike Lyon
Re: SBCglobal routing loop. Ren Provo
Weekly Routing Table Report Routing Analysis Role Account
Ubiquity<->Mzima routing loop William Pitcock
Re: Ubiquity<->Mzima routing loop Aaron Glenn
Re: Ubiquity<->Mzima routing loop William Pitcock
Re: Ubiquity<->Mzima routing loop Aaron Glenn
Re: Ubiquity<->Mzima routing loop William Pitcock
Re: Independent Testing for Network Hardware Sean Hafeez
Re: Ubiquity<->Mzima routing loop Joe Provo
Re: Looking for Network Solutions mail admin randal k
Re: SBCglobal routing loop. Paul Wall
Re: Ubiquity<->Mzima routing loop Paul Wall
Re: Ubiquity<->Mzima routing loop Guy_Shields
Re: SBCglobal routing loop. Aaron Glenn
Re: SBCglobal routing loop. Mike Lewinski
Re: Ubiquity<->Mzima routing loop Paul Wall
Re: Ubiquity<->Mzima routing loop Mike Lewinski
Re: Ubiquity<->Mzima routing loop Guy_Shields
Re: Ubiquity<->Mzima routing loop Sena, Rich
Re: Ubiquity<->Mzima routing loop Laurence F. Sheldon, Jr.

Saturday, 19 July

Re: Bogon Filter Update Request Rob Thomas
RE: SBCglobal routing loop. michael.dillon
Re: SBCglobal routing loop. Joel Jaeggli
Re: SBCglobal routing loop. Andrew D Kirch
RE: SBCglobal routing loop. michael.dillon
Re: SBCglobal routing loop. Simon Lockhart
Savvis Related Routing Issue Brendan Mannella
Re: Ubiquity<->Mzima routing loop Valdis . Kletnieks
Re: Line rate gigabit router/switch options Kevin Blackham
Re: Savvis Related Routing Issue Brendan Mannella

Sunday, 20 July

virtual aggregation in IETF Paul Francis
Re: virtual aggregation in IETF Alain Durand
RE: virtual aggregation in IETF Paul Francis
Re: virtual aggregation in IETF Joel Jaeggli
Re: virtual aggregation in IETF Adrian Chadd
Re: virtual aggregation in IETF Joel Jaeggli
Re: virtual aggregation in IETF Adrian Chadd
Re: virtual aggregation in IETF Joel Jaeggli
RE: virtual aggregation in IETF Paul Francis
Re: virtual aggregation in IETF Joel Jaeggli
Re: Cisco vs Adtran vs Juniper Doug McIntyre

Monday, 21 July

NMS for Carriers Adam Armstrong
Re: NMS for Carriers Neil J. McRae
Re: Cisco vs Adtran vs Juniper Matthew Elmore
Re: virtual aggregation in IETF Robert E. Seastrom
RE: Cisco vs Adtran vs Juniper Paul Stewart
connectivity to MSN Matt Liotta
Re: connectivity to MSN Paul Wall
Re: connectivity to MSN Nick Shank
RE: Independent Testing for Network Hardware Tomas L. Byrnes
Re: Line rate gigabit router/switch options Matthew Elmore
RE: virtual aggregation in IETF Paul Francis
Re: Independent Testing for Network Hardware Thomas Maufer
RE: Independent Testing for Network Hardware Tomas L. Byrnes

Tuesday, 22 July

SANS: DNS Bug Now Public? Jon Kibler
Re: SANS: DNS Bug Now Public? Christian Koch
Re: SANS: DNS Bug Now Public? Jorge Amodio
OIX Routeviews Jason Lewis
Re: OIX Routeviews David Meyer
Pretty Good BGP on Quagga Josh Karlin

Wednesday, 23 July

Re: SANS: DNS Bug Now Public? Steven M. Bellovin
Software router state of the art Zed Usser
Re: Software router state of the art Valdis . Kletnieks
Re: Software router state of the art Charles Wyble
Re: Software router state of the art William Herrin
Re: SANS: DNS Bug Now Public? Jorge Amodio
Re: Software router state of the art Adrian Chadd
Re: Software router state of the art Chris Marlatt
Re: Software router state of the art Adrian Chadd
Re: Software router state of the art Joel Jaeggli
Re: Software router state of the art randal k
Re: Software router state of the art Adam Armstrong
Re: Software router state of the art Naveen Nathan
Re: Software router state of the art Chris Adams
Re: Software router state of the art William Herrin
Re: SANS: DNS Bug Now Public? Joe Abley
Re: Software router state of the art Christopher Morrow
Re: Software router state of the art Wes Young
Re: SANS: DNS Bug Now Public? Darren Bolding
Re: Software router state of the art Jeffrey Ollie
Re: Software router state of the art Kevin Oberman
Re: Software router state of the art William Herrin
Re: SANS: DNS Bug Now Public? Jasper Bryant-Greene
Re: Software router state of the art Kevin Oberman
sizing router buffers (Re: Software router state of the art ) Mikael Abrahamsson
Exploit for DNS Cache Poisoning - RELEASED Robert D. Scott
Re: Exploit for DNS Cache Poisoning - RELEASED Joe Greco
RE: Exploit for DNS Cache Poisoning - RELEASED Robert D. Scott
Re: Exploit for DNS Cache Poisoning - RELEASED Mike Lewinski
Re: Exploit for DNS Cache Poisoning - RELEASED David Conrad
Re: Exploit for DNS Cache Poisoning - RELEASED Tuc at T-B-O-H.NET
Re: Exploit for DNS Cache Poisoning - RELEASED Kevin Day
Re: Exploit for DNS Cache Poisoning - RELEASED Joe Abley
Re: Exploit for DNS Cache Poisoning - RELEASED Paul Ferguson
Re: Exploit for DNS Cache Poisoning - RELEASED Jasper Bryant-Greene
Re: Exploit for DNS Cache Poisoning - RELEASED Paul Ferguson
Re: Exploit for DNS Cache Poisoning - RELEASED Joe Greco
Re: Exploit for DNS Cache Poisoning - RELEASED Tuc at T-B-O-H.NET
Re: Exploit for DNS Cache Poisoning - RELEASED William Herrin
Re: Exploit for DNS Cache Poisoning - RELEASED Patrick W. Gilmore
Re: Exploit for DNS Cache Poisoning - RELEASED Jared Mauch
Re: Exploit for DNS Cache Poisoning - RELEASED Mike Lewinski
RE: Exploit for DNS Cache Poisoning - RELEASED Skywing
Re: Exploit for DNS Cache Poisoning - RELEASED Matthew Kaufman
Re: Exploit for DNS Cache Poisoning - RELEASED Paul Ferguson
Emerging Threats SNORT [Was: Re: Exploit for DNS Cache Poisoning - REL EASED] Paul Ferguson
Re: XO contact William R. Lorenz
Re: XO contact Martin Hannigan
Re: Exploit for DNS Cache Poisoning - RELEASED Sean Donelan
Re: Avg. Packet Size - Again? k claffy
re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? Paul Vixie
Re: Exploit for DNS Cache Poisoning - RELEASED Paul Ferguson

Thursday, 24 July

https (was: Re: Exploit for DNS Cache Poisoning - RELEASED) Robert Kisteleki
Re: https (was: Re: Exploit for DNS Cache Poisoning - RELEASED) Steven M. Bellovin
Re: https (was: Re: Exploit for DNS Cache Poisoning - RELEASED) Jasper Bryant-Greene
Re: SANS: DNS Bug Now Public? Phil Regnauld
Re: https (was: Re: Exploit for DNS Cache Poisoning - RELEASED) William Pitcock
TLD servers with recursion was Re: Exploit for DNS Cache Poisoning - RELEASED Simon Waters
Re: https Sam Stickland
Re: Exploit for DNS Cache Poisoning - RELEASED Joe Greco
Re: Exploit for DNS Cache Poisoning - RELEASED Tony Finch
RE: XO contact Mort, Eric
RE: Software router state of the art Tim Sanderson
Re: https (was: Re: Exploit for DNS Cache Poisoning - RELEASED) Chris Adams
Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? Joe Greco
Re: TLD servers with recursion was Re: Exploit for DNS Cache Poisoning - RELEASED John Kristoff
RE: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? michael.dillon
Re: Exploit for DNS Cache Poisoning - RELEASED Jorge Amodio
Re: https Ken A
Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? Paul Vixie
Re: Exploit for DNS Cache Poisoning - RELEASED Sean Donelan
Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? Joe Greco
Re: Exploit for DNS Cache Poisoning - RELEASED Steven M. Bellovin
Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? Steve Tornio
OT: 2-post rack security covers Justin Shore
Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? Joe Greco
Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? Joe Abley
Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? Gadi Evron
Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? Sean Donelan
Re: TLD servers with recursion was Re: Exploit for DNS Cache Poisoning - RELEASED Gadi Evron
Re: TLD servers with recursion was Re: Exploit for DNS Cache Poisoning - RELEASED Gadi Evron
Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? William Pitcock
Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? Joe Greco
Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? William Herrin
RE: TLD servers with recursion was Re: Exploit for DNS Cache Poisoning- RELEASED Martin Hannigan
RE: TLD servers with recursion was Re: Exploit for DNS Cache Poisoning- RELEASED Gadi Evron
Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? Paul Vixie
[Fwd: CAU-EX-2008-0002: Kaminsky DNS Cache Poisoning Flaw Exploit] Stephen Williams
Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? Joe Abley
Re: TLD servers with recursion was Re: Exploit for DNS Cache Poisoning- RELEASED Steven M. Bellovin
Re: Exploit for DNS Cache Poisoning - RELEASED Jorge Amodio
Re: Exploit for DNS Cache Poisoning - RELEASED Paul Vixie
Re: Exploit for DNS Cache Poisoning - RELEASED Paul Vixie
Re: SANS: DNS Bug Now Public? Paul Vixie
Re: TLD servers with recursion was Re: Exploit for DNS Cache Poisoning - Paul Vixie
Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? Joe Greco
Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? Jorge Amodio
Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? Laurence F. Sheldon, Jr.
Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? Jorge Amodio
Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? Sean Donelan
Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? Tuc at T-B-O-H.NET
RE: TLD servers with recursion was Re: Exploit for DNS CachePoisoning- RELEASED Martin Hannigan
Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? Paul Vixie
Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? Tuc at T-B-O-H
Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? David W. Hankins
Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? Duane Wessels
Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? Jorge Amodio
Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? Steve Tornio
Re: SBCglobal routing loop. Jay R. Ashworth
2nd Exploit for DNS Cache Poisoning - RELEASED Tuc at T-B-O-H.NET
Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? Sean Donelan
Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? Paul Vixie
Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? Ken A
Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? Ken A
RE: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? Scott Berkman
Re: 2nd Exploit for DNS Cache Poisoning - RELEASED Paul Ferguson
Re: Independent Testing for Network Hardware Thomas Maufer
Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? Sean Donelan
Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? Hank Nussbacher
Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? Rubens Kuhl Jr.
RE: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? Justin M. Streiner
Re: 2nd Exploit for DNS Cache Poisoning - RELEASED Tuc at T-B-O-H.NET
Question: 2nd Exploit for DNS Cache Poisoning - RELEASED Jack Bates
RE: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? marcus.sachs
Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? Greg Skinner
Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? Richard Parker
Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? Deepak Jain
Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? Jason Frisvold
Re: Exploit for DNS Cache Poisoning - RELEASED Eric Brunner-Williams
Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? Jay R. Ashworth
Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? Paul Vixie
Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? Paul Vixie
RE: Exploit for DNS Cache Poisoning - RELEASED Tomas L. Byrnes
Re: https (was: Re: Exploit for DNS Cache Poisoning - RELEASED) Jeffrey Ollie
Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? Valdis . Kletnieks
Issues with testing tests (DNS randomization checks) Sean Donelan
Re: Exploit for DNS Cache Poisoning - RELEASED David Conrad
Re: Exploit for DNS Cache Poisoning - RELEASED Valdis . Kletnieks
Re: TLD servers with recursion was Re: Exploit for DNS Cache Poisoning- RELEASED Gadi Evron
[OT] 2008 Infrastructure Security Survey Danny McPherson
Re: Exploit for DNS Cache Poisoning - RELEASED Paul Vixie
Re: https (was: Re: Exploit for DNS Cache Poisoning - RELEASED) Hank Nussbacher
Re: Exploit for DNS Cache Poisoning - RELEASED Ganbold Tsagaankhuu
Re: Exploit for DNS Cache Poisoning - RELEASED Tuc at T-B-O-H.NET
Re: https (was: Re: Exploit for DNS Cache Poisoning - RELEASED) Jim Popovitch

Friday, 25 July

Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? Nathan Ward
Re: Multiple DNS implementations vulnerable to cache poisoning Brian Keefer
BGP Update Report cidr-report
The Cidr Report cidr-report
Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? Jorge Amodio
Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? Jared Mauch
Level3 newyork - london, anyone else seeing issues? Drew Weaver
Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? Jay R. Ashworth
Re: Level3 newyork - london, anyone else seeing issues? Craig Pierantozzi
Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? Jorge Amodio
Re: Exploit for DNS Cache Poisoning - RELEASED David Conrad
Federal Government Interest in your patch progress Jared Mauch
Re: Software router state of the art Justin Sharp
Re: Federal Government Interest in your patch progress Jorge Amodio
Re: Federal Government Interest in your patch progress Jared Mauch
Re: Federal Government Interest in your patch progress Steven M. Bellovin
Re: Federal Government Interest in your patch progress Paul Vixie
Re: Software router state of the art Joe Greco
Re: Federal Government Interest in your patch progress Sean Donelan
Re: Software router state of the art Sargun Dhillon
Re: Exploit for DNS Cache Poisoning - RELEASED Alexander Harrowell
Re: Software router state of the art Joe Greco
Re: Federal Government Interest in your patch progress brett watson
Weekly Routing Table Report Routing Analysis Role Account
Re: Federal Government Interest in your patch progress Sean Donelan
Re: Federal Government Interest in your patch progress chuck goolsbee
Re: Exploit for DNS Cache Poisoning - RELEASED Paul Vixie
Re: https (was: Re: Exploit for DNS Cache Poisoning - RELEASED) Matthew Petach
Re: Exploit for DNS Cache Poisoning - RELEASED Pete Carah
Re: Exploit for DNS Cache Poisoning - RELEASED Graeme Fowler
Re: Exploit for DNS Cache Poisoning - RELEASED Graeme Fowler
Re: https (was: Re: Exploit for DNS Cache Poisoning - RELEASED) Jim Popovitch
RE: Exploit for DNS Cache Poisoning - RELEASED Tomas L. Byrnes
Re: Level3 newyork - london, anyone else seeing issues? John Menerick
Re: Level3 newyork - london, anyone else seeing issues? Craig Pierantozzi

Saturday, 26 July

Re: Software router state of the art Florian Weimer
Re: Software router state of the art Florian Weimer
Re: Software router state of the art Adrian Chadd
Re: Software router state of the art Colin Alston
Re: Software router state of the art Adrian Chadd
Re: Software router state of the art Dorn Hetzel
Re: Software router state of the art Joe Greco
Re: Software router state of the art William Herrin
IPv6 nameserver glue chez netsol William Waites
Re: IPv6 nameserver glue chez netsol Jared
Re: Software router state of the art Petri Helenius
Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? Randy Bush
Re: IPv6 nameserver glue chez netsol Mike Leber
Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? Paul Vixie
Re: Exploit for DNS Cache Poisoning - RELEASED Florian Weimer
Re: Software router state of the art William Herrin
Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? Joe Greco
Re: Software router state of the art Florian Weimer
Re: Software router state of the art Florian Weimer
Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? bmanning
Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? Sean Donelan
Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? James Hess
Re: Software router state of the art Andrew D Kirch
Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? bmanning
Re: Software router state of the art Chris Adams
Re: Software router state of the art Seth Mattinen
So why don't US citizens get this? natalidel
Re: So why don't US citizens get this? Guy_Shields
RE: So why don't US citizens get this? natalidel
Re: So why don't US citizens get this? Laurence F. Sheldon, Jr.
Re: So why don't US citizens get this? bmanning
Re: So why don't US citizens get this? Mr. James W. Laferriere
Re: So why don't US citizens get this? Kameron Gasso
Re: So why don't US citizens get this? Joe Greco
Re: So why don't US citizens get this? Mark Foster
Re: So why don't US citizens get this? Chris Stebner
Re: So why don't US citizens get this? Tuc at T-B-O-H.NET
Re: So why don't US citizens get this? D'Arcy J.M. Cain
(exchange point) EP.net Chris Stebner
Re: Paul Vixie: Re: [dns-operations] DNS issue accidentally leaked? Martin Hannigan
Re: So why don't US citizens get this? Joe Greco
Deja Vu [Was: Re: So why don't US citizens get this?] Paul Ferguson
Re: Software router state of the art Petri Helenius
Re: So why don't US citizens get this? Fred Baker
Re: So why don't US citizens get this? Dave Crocker

Sunday, 27 July

Re: So why don't US citizens get this? Randy Bush
Re: So why don't US citizens get this? Jean-François Mezei
RE: So why don't US citizens get this? natalidel
Re: So why don't US citizens get this? Colin Alston
cogent bgp filtering policies? John van Oppen
Re: So why don't US citizens get this? Max Tulyev
Re: Deja Vu [Was: Re: So why don't US citizens get this?] Max Tulyev
Re: So why don't US citizens get this? John Peach
Re: OT: Free Market D'Arcy J.M. Cain
Re: So why don't US citizens get this? Joe Greco
Re: So why don't US citizens get this? D'Arcy J.M. Cain
Re: So why don't US citizens get this? Laurence F. Sheldon, Jr.
Re: So why don't US citizens get this? Alexander Harrowell
Re: Software router state of the art Tony Finch
Admin: Offtopic Political Threads Simon Lyall
Re: cogent bgp filtering policies? Paul Wall
RE: cogent bgp filtering policies? John van Oppen
Re: Admin: Offtopic Political Threads Paul Wall
Re: Admin: Offtopic Political Threads Simon Lyall
Re: Admin: Offtopic Political Threads Gadi Evron
Re: cogent bgp filtering policies? Joe Maimon
Re: TLD servers with recursion was Re: Exploit for DNS Cache Poisoning- RELEASED Steve Bertrand
Re: So why don't US citizens get this? Patrick W. Gilmore
Aid in bypassing DNS issue Steve Bertrand

Monday, 28 July

Re: Aid in bypassing DNS issue William Warren
Re: So why don't US citizens get this? Jorge Amodio
Re: So why don't US citizens get this? Tom Vest
RE: Software router state of the art Darden, Patrick S.
RE: [SPAM] Re: So why don't US citizens get this? Ray Plzak
Re: So why don't US citizens get this? Mikael Abrahamsson
RE: So why don't US citizens get this? michael.dillon
Re: So why don't US citizens get this? Michal Krsek
Re: So why don't US citizens get this? John Levine
Re: So why don't US citizens get this? Laird Popkin
Re: So why don't US citizens get this? Laurence F. Sheldon, Jr.
RE: So why don't US citizens get this? Rod Beck
Re: So why don't US citizens get this? Scott McGrath
Re: So why don't US citizens get this? Jack Bates
[Fwd: Admin: Offtopic Political Threads] S. Ryan
Re: [Fwd: Admin: Offtopic Political Threads] Scott McGrath
Re: So why don't US citizens get this? Hyunseog Ryu
Off topic - RE: So why don't US citizens get this? nancyp
Re: Arbitrary de-peering William Waites
Re: Arbitrary de-peering Patrick W. Gilmore
Re: Arbitrary de-peering Christian Koch
One Communications (Choice One) Brendan Mannella
Anyone from Charter Communications? Justin Ream
Re: Software router state of the art Sargun Dhillon
Re: Arbitrary de-peering William Waites
Re: Level3 newyork - london, anyone else seeing issues? up
Re: Software router state of the art Joe Greco
RE: So why don't US citizens get this? michael.dillon
RE: Arbitrary de-peering Randy Epstein
Re: Arbitrary de-peering Jon Lewis
RE: So why don't US citizens get this? Rod Beck
RE: Arbitrary de-peering michael.dillon
RE: So why don't US citizens get this? Rod Beck
Re: Arbitrary de-peering William Waites
Re: Arbitrary de-peering Jon Lewis
Re: Software router state of the art Seth Mattinen
RE: Software router state of the art michael.dillon
Re: So why don't US citizens get this? Jean-François Mezei
Re: So why don't US citizens get this? Josh Cheney
Re: So why don't US citizens get this? Jorge Amodio
Re: Software router state of the art Justin Sharp
Re: Software router state of the art Seth Mattinen
Re: Software router state of the art Charles Wyble
Re: So why don't US citizens get this? Chris Stebner
Re: Software router state of the art Joe Greco
Re: Software router state of the art Andrew D Kirch
Re: Software router state of the art Charles Wyble
Re: Software router state of the art Seth Mattinen
Great Suggestion for the DNS problem...? Jay R. Ashworth
Re: So why don't US citizens get this? Jay R. Ashworth
Re: So why don't US citizens get this? WWWhatsup
Re: Great Suggestion for the DNS problem...? Colin Alston
Re: Great Suggestion for the DNS problem...? Joe Greco
Re: Software router state of the art Deepak Jain
RE: Great Suggestion for the DNS problem...? Tomas L. Byrnes
Re: Software router state of the art Deepak Jain
Possible prod to people to upgrade DNS Tuc at T-B-O-H.NET
Re: Great Suggestion for the DNS problem...? Jay R. Ashworth
Re: Software router state of the art Rubens Kuhl Jr.
Re: Software router state of the art Chris Stebner
Re: Software router state of the art Jack Bates
Re: Great Suggestion for the DNS problem...? Colin Alston
Re: Arbitrary de-peering Jay Hennigan
RE: So why don't US citizens get this? Frank Bulk
Re: Software router state of the art Florian Weimer
Re: So why don't US citizens get this? Charles Wyble
Missing URL is here (was: So why don't US citizens get this?) michael.dillon
RE: Software router state of the art michael.dillon
Re: Software router state of the art Eugeniu Patrascu
Re: Software router state of the art Chris Stebner
Re: Software router state of the art Seth Mattinen
Re: Software router state of the art Rev. Jeffrey Paul
Re: So why don't US citizens get this? Jay R. Ashworth
Re: Software router state of the art Andrew D Kirch
Re: Software router state of the art Christopher Morrow
Re: Software router state of the art Seth Mattinen
Re: Software router state of the art Kevin Day
Re: Software router state of the art Joe Greco
Re: Software router state of the art Bill Nash
Re: Great Suggestion for the DNS problem...? Paul Vixie
Re: Great Suggestion for the DNS problem...? Michael Smith
Re: Great Suggestion for the DNS problem...? Matt F
Re: Great Suggestion for the DNS problem...? Brian Dickson
Re: Software router state of the art Aaron Glenn
Re: Off topic - RE: So why don't US citizens get this? Paul Wall

Tuesday, 29 July

Re: Software router state of the art Eugeniu Patrascu
Re: Great Suggestion for the DNS problem...? Randy Bush
Re: Great Suggestion for the DNS problem...? Florian Weimer
Re: Federal Government Interest in your patch progress Stephane Bortzmeyer
Re: Great Suggestion for the DNS problem...? Tony Finch
Re: Great Suggestion for the DNS problem...? Tony Finch
Re: Federal Government Interest in your patch progress Steven M. Bellovin
Re: Great Suggestion for the DNS problem...? Colin Alston
Re: Great Suggestion for the DNS problem...? Laurence F. Sheldon, Jr.
Re: Great Suggestion for the DNS problem...? Steven M. Bellovin
Re: Great Suggestion for the DNS problem...? Mohacsi Janos
Re: Software router state of the art David E. Smith
Re: Great Suggestion for the DNS problem...? Mikael Abrahamsson
Re: Great Suggestion for the DNS problem...? Laird Popkin
Remote Cisco IOS FTP exploit (fwd) Gadi Evron
Hardware capture platforms John A. Kilpatrick
Re: Hardware capture platforms Jared Mauch
Re: Hardware capture platforms Christian Koch
Re: Hardware capture platforms Christopher Morrow
Re: Hardware capture platforms Network Fortius
Re: Hardware capture platforms James Pleger
RE: Hardware capture platforms Darryl Dunkin
Re: Hardware capture platforms Manish Karir

Wednesday, 30 July

Re: Hardware capture platforms Leon Ward
Re: Hardware capture platforms Warren Kumari
Re: Hardware capture platforms Jon Kibler
Re: Hardware capture platforms Lynda
[NANOG-announce] NANOG44 updated agenda, so register already Todd Underwood
RE: Hardware capture platforms Matthew Huff
Re: [funsec] Subject line misleading. AT&T Pwned. Sweet Irony: Metasploit Creator a Victim of His Own Creation (fwd) Gadi Evron
Re: Hardware capture platforms nathan
Re: Hardware capture platforms David Newman
big DC -48V to AC inverters Andreas Ott
Re: Hardware capture platforms Roland Dobbins
Re: big DC -48V to AC inverters Tim Jackson
RE: big DC -48V to AC inverters Tomas L. Byrnes
Re: [funsec] Subject line misleading. AT&T Pwned. Sweet Irony: Metasploit Creator a Victim of His Own Creation (fwd) Suresh Ramasubramanian
Re: [funsec] Subject line misleading. AT&T Pwned. Sweet Irony: Metasploit Creator a Victim of His Own Creation (fwd) Martin Hannigan
RE: [funsec] Subject line misleading. AT&T Pwned. Sweet Irony:Metasploit Creator a Victim of His Own Creation (fwd) Tomas L. Byrnes
RE: [funsec] Subject line misleading. AT&T Pwned. Sweet Irony:Metasploit Creator a Victim of His Own Creation (fwd) Gadi Evron
RE: [funsec] Subject line misleading. AT&T Pwned. Sweet Irony: Metasploit Creator a Victim of His Own Creation (fwd) Skywing
Re: [funsec] Subject line misleading. AT&T Pwned. Sweet Irony: Metasploit Creator a Victim of His Own Creation (fwd) Suresh Ramasubramanian
Re: Hardware capture platforms Larry J. Blunk

Thursday, 31 July

Re: Hardware capture platforms Sam Stickland
Re: Hardware capture platforms Joel Jaeggli
Re: Hardware capture platforms Juuso Lehtinen
Re: [funsec] Subject line misleading. AT&T Pwned. Sweet Irony: Metasploit Creator a Victim of His Own Creation (fwd) Eric Brunner-Williams
Re: Hardware capture platforms Leon Ward
Level3 tries cell-phone style billing scam on customers Patrick Giagnocavo
Re: Level3 tries cell-phone style billing scam on customers Joel Esler
Re: https Patrick Giagnocavo
Re: Hardware capture platforms Jay R. Ashworth
RE: Level3 tries cell-phone style billing scam on customers Lorell Hathcock
RE: Level3 tries cell-phone style billing scam on customers David Hubbard
Re: Level3 tries cell-phone style billing scam on customers Jeffrey Lyon
Re: Hardware capture platforms Warren Kumari
Re: Level3 tries cell-phone style billing scam on customers Gadi Evron
Re: Level3 tries cell-phone style billing scam on customers Joe Maimon
Re: Level3 tries cell-phone style billing scam on customers Jean-François Mezei
Re: Level3 tries cell-phone style billing scam on customers Robert E. Seastrom
Re: Level3 tries cell-phone style billing scam on customers Gadi Evron
Re: Hardware capture platforms Jon Meek
Re: Level3 tries cell-phone style billing scam on customers Jamie A Lawrence
Re: Level3 tries cell-phone style billing scam on customers Patrick W. Gilmore
Re: Level3 tries cell-phone style billing scam on customers Wayne E. Bouchard
Re: Hardware capture platforms Nickola Kolev
Re: Level3 tries cell-phone style billing scam on customers Patrick W. Gilmore
Re: Level3 tries cell-phone style billing scam on customers Edward B. DREGER
Re: Level3 tries cell-phone style billing scam on customers Deepak Jain
Level3 BGP help Jon Lewis