nanog mailing list archives
Re: Abuse procedures... Reality Checks
From: Douglas Otis <dotis () mail-abuse org>
Date: Wed, 11 Apr 2007 14:02:57 -0700
On Apr 11, 2007, at 10:32 AM, Warren Kumari wrote:
Perhaps you could write a nice, simple, friendly guide explaining how you ensure that your network is never the source of malicious traffic?
Identify your ownership, and ensure contact information is accurate and well attended. Inconsiderate anonymous behavior is a typical failing, where there is no excuse for remaining ignorant of abusive activity.
-Doug
Current thread:
- RE: Abuse procedures... Reality Checks, (continued)
- RE: Abuse procedures... Reality Checks michael.dillon (Apr 10)
- Re: Abuse procedures... Reality Checks Joseph S D Yao (Apr 10)
- Re: Abuse procedures... Reality Checks Stephen Satchell (Apr 10)
- Re: Abuse procedures... Reality Checks J. Oquendo (Apr 11)
- RE: Abuse procedures... Reality Checks michael.dillon (Apr 11)
- Re: Abuse procedures... Reality Checks Valdis . Kletnieks (Apr 11)
- Re: Abuse procedures... Reality Checks J. Oquendo (Apr 11)
- Re: Abuse procedures... Reality Checks Warren Kumari (Apr 11)
- Re: Abuse procedures... Reality Checks J. Oquendo (Apr 11)
- RE: Abuse procedures... Reality Checks michael.dillon (Apr 11)
- Re: Abuse procedures... Reality Checks Douglas Otis (Apr 11)
- RE: Abuse procedures... Reality Checks michael.dillon (Apr 10)
- RE: Abuse procedures... Reality Checks michael.dillon (Apr 11)
- Re: Abuse procedures... Reality Checks Warren Kumari (Apr 11)
- Re: Abuse procedures... Reality Checks Rich Kulawiec (Apr 11)
- RE: Abuse procedures... Reality Checks michael.dillon (Apr 11)