| TIP: Click on subject to list as thread! | ANSI |
| echo: | |
|---|---|
| to: | |
| from: | |
| date: | |
| subject: | Re: another backupexec exploit |
From: "Geo"
No, it appears they were doing some upgrades and probably was either a
cisco IOS behavior change they weren't aware of or someone copied the wrong
config back or they just created a bad route table somehow. My guess is it
was pretty complex setup and someone just hosed it, the change was spread
by bgp or ospf and it took out their whole network and parts of verio
within minutes.
We use them for national dialup service (we lease dialup service from them)
so all kinds of alarms started going off soon as they went down. Soon as I
realised it wasn't us I went back to bed .
Geo.
"Frank Haber" wrote in message
news:435a5a73{at}w3.nls.net...
> Bravo.
>
> This 2 a.m. Level 3 thing was just a sleepy operator? No backup? Had zip
to
> do with the Cogent spat?
>
>
> >It's all in the timing .
>
> Remember when CompuServe shut down for maintainance every morning at 5,
> Eastern?
>
--- BBBS/NT v4.01 Flag-5
* Origin: Barktopia BBS Site http://HarborWebs.com:8081 (1:379/45)SEEN-BY: 633/267 270 5030/786 @PATH: 379/45 1 106/2000 633/267 |
|
| SOURCE: echomail via fidonet.ozzmosis.com | |
Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.