[148621] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: US DOJ victim letter

daemon@ATHENA.MIT.EDU (Chris Adams)
Thu Jan 19 16:20:09 2012

Date: Thu, 19 Jan 2012 15:19:22 -0600
From: Chris Adams <cmadams@hiwaay.net>
To: "nanog@nanog.org" <nanog@nanog.org>
Mail-Followup-To: Chris Adams <cmadams@hiwaay.net>,
 "nanog@nanog.org" <nanog@nanog.org>
In-Reply-To: <76F24853-BBF7-4627-8417-CF53B3D6C70C@quantcast.com>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

Once upon a time, Andrew D. Dibble <adibble@quantcast.com> said:
> FBI seems to have a list of netblocks hosting rogue DNS servers here:
> https://forms.fbi.gov/check-to-see-if-your-computer-is-using-rogue-DNS

So should I try to type in all the IPs on my network, one at a time?  Oh
wait, that page requires Javascript to check an IP; like I'm going to
allow the FBI to run JS on my computer.

-- 
Chris Adams <cmadams@hiwaay.net>
Systems and Network Administrator - HiWAAY Internet Services
I don't speak for anybody but myself - that's enough trouble.


home help back first fref pref prev next nref lref last post