Blog Spam from Corporate Computing

Yesterday I actually thought that the blog spam I had grown accustom to had vanished. But it’s back with a vengeance today, leading me to one conclusion, spammers, or spam zombies were on holiday during the American Presidents day. And that could only mean that the zombie machines are located in corporate America and were turned off for the holiday yesterday.

Interesting, and frightening, as that does not reflect well on corporate infrastructure, Or that spam is an American corporate business model.

UPDATE: As I suspected US responsible for most hacking

Politics online

In the category of ‘Dud’ with all the censorship, poor biased reporting, or just plain NO reporting on politics. How could this be surprising. Americans embrace politics online! Especially from the Mass Media in America, owned primarily by Big Business, who are the last to challenge the status quo. How would you ever hear the real facts about politics?

Bye Bye BT Broadband

It looks like after the many exchanges of emails, I will have to drop BT as a broadband provider. They are either unable or unwilling to pursue the VPN issues I’ve been having.

When I can connect VPN to my office with a 28kbs dial-up, and can’t sustain VPN traffic on a 3MB/512kBs BT connection, it’s time to change providers. Mind you I still believe that Eircom is at the root of problem. So with that in mind, what are the options?

I’d love to hear of any good broadband providers in the Cork area!

Render all your opinions, please.

VPN tcpdump assistance required

I’m still battling L2TP VPN connection issues, and at the suggestion of one of my readers I’ve done a series of TCPDUMP runs and they all boil down to the one below.

tcpdump: listening on en1, link-type EN10MB (Ethernet), capture size 96 bytes
20:24:27.580117 IP (tos 0x0, ttl 64, id 17897, offset 0, flags [none], length: 188) 192.168.23.2.isakmp > vpn.office.com.isakmp: isakmp 1.0 msgid cookie ->: phase 1 I ident: [|sa]
20:24:27.803567 IP (tos 0x0, ttl 59, id 0, offset 0, flags [none], length: 164) vpn.office.com.isakmp > 192.168.23.2.isakmp: isakmp 1.0 msgid cookie ->: phase 1 R ident: [|sa]
20:24:28.094352 IP (tos 0x0, ttl 64, id 17898, offset 0, flags [none], length: 276) 192.168.23.2.isakmp > vpn.office.com.isakmp: isakmp 1.0 msgid cookie ->: phase 1 I ident: [|ke]
20:24:28.653665 IP (tos 0x0, ttl 59, id 0, offset 0, flags [none], length: 256) vpn.office.com.isakmp > 192.168.23.2.isakmp: isakmp 1.0 msgid cookie ->: phase 1 R ident: [|ke]
20:24:29.290106 IP (tos 0x0, ttl 64, id 17901, offset 0, flags [none], length: 1428) 192.168.23.2.ipsec-msft > vpn.office.com.ipsec-msft: UDP, length: 1400
20:24:30.224387 IP (tos 0x0, ttl 59, id 0, offset 0, flags [none], length: 1420) vpn.office.com.ipsec-msft > 192.168.23.2.ipsec-msft: UDP, length: 1392
20:24:30.657375 IP (tos 0x0, ttl 64, id 17903, offset 0, flags [none], length: 100) 192.168.23.2.ipsec-msft > vpn.office.com.ipsec-msft: UDP, length: 72
20:24:32.667205 IP (tos 0x0, ttl 64, id 17906, offset 0, flags [none], length: 1428) 192.168.23.2.ipsec-msft > vpn.office.com.ipsec-msft: UDP, length: 1400
20:24:34.824612 IP (tos 0x0, ttl 59, id 0, offset 0, flags [none], length: 1420) vpn.office.com.ipsec-msft > 192.168.23.2.ipsec-msft: UDP, length: 1392
20:24:35.829802 IP (tos 0x0, ttl 64, id 17910, offset 0, flags [none], length: 1428) 192.168.23.2.ipsec-msft > vpn.office.com.ipsec-msft: UDP, length: 1400
20:24:36.504857 IP (tos 0x0, ttl 59, id 0, offset 0, flags [none], length: 1420) vpn.office.com.ipsec-msft > 192.168.23.2.ipsec-msft: UDP, length: 1392
20:24:38.556036 IP (tos 0x0, ttl 64, id 17914, offset 0, flags [none], length: 1428) 192.168.23.2.ipsec-msft > vpn.office.com.ipsec-msft: UDP, length: 1400
20:24:41.270765 IP (tos 0x0, ttl 64, id 17918, offset 0, flags [none], length: 1428) 192.168.23.2.ipsec-msft > vpn.office.com.ipsec-msft: UDP, length: 1400
20:24:44.272501 IP (tos 0x0, ttl 64, id 17922, offset 0, flags [none], length: 1428) 192.168.23.2.ipsec-msft > vpn.office.com.ipsec-msft: UDP, length: 1400
20:24:47.276414 IP (tos 0x0, ttl 64, id 17926, offset 0, flags [none], length: 1428) 192.168.23.2.ipsec-msft > vpn.office.com.ipsec-msft: UDP, length: 1400
20:24:50.277506 IP (tos 0x0, ttl 64, id 17930, offset 0, flags [none], length: 1428) 192.168.23.2.ipsec-msft > vpn.office.com.ipsec-msft: UDP, length: 1400
20:24:53.285464 IP (tos 0x0, ttl 64, id 17934, offset 0, flags [none], length: 1428) 192.168.23.2.ipsec-msft > vpn.office.com.ipsec-msft: UDP, length: 1400
20:24:56.287335 IP (tos 0x0, ttl 64, id 17938, offset 0, flags [none], length: 1428) 192.168.23.2.ipsec-msft > vpn.office.com.ipsec-msft: UDP, length: 1400
20:24:59.290376 IP (tos 0x0, ttl 64, id 17942, offset 0, flags [none], length: 1428) 192.168.23.2.ipsec-msft > vpn.office.com.ipsec-msft: UDP, length: 1400

So if the there are any brainier geeks out there that can point to the problem, I’d be grateful.

Apple Mac OS-X L2TP VPN Sucks

I come to the conclusion that the L2TP VPN native to OS-X sucks. Besides the fact that it sucks, it doesn’t connect to anything. It doesn’t even make the attempt to connect. I have no idea what it’s doing when it spinning that wheel, but it sure doesn’t connect. I have removed routers, and taken down firewalls, standing naked on the internet and still nothing, even dialup, nothing.

It’s no wonder that Apple is never used in business, they won’t communicate with the windows, linux or unix systems.

If you have ideas, leave them in the comments.

Gay Pedophile Republicans are anti-Gambing

As for the “must have legislation” in the Republican congress GOP Gay Pedophile Tom Foley is less important than an Internet gambling ban bill in the eyes of the Republican Leadership.

Which do you rate higher, Child molesters, or poker players?

How do you like the Moral GOP pushing their morality on the american people?

UPDATE: Looks like the Republican morals are intack, they really only needed to be bribed with enought money or; How horse racing avoided new US internet betting law

UPDATE: If you need more reading look here THE LAW IS DOOMED – ONLY QUESTION IS HOW LONG IT TAKES!

Dublin in my future

Looks like Dublin is in my future, it’s a good thing that I only have to venture into the barest fringes, Dublin 12. Far enough out to be near the country, and near enough to test the waters of modern mass transit in the form of Luas. We will see if that coupled with the potential, and unrealized hourly high-speed trains to Cork will keep me sane while still exploiting Dublin work economics.

I hope my fellow Cork Bloggers do not disown me. And on that front, I will continue to blog during my weekends home in the Peoples Republic of Cork

The truth the press fails to publish

When the press complain about bloggers, they always claim that bloggers do no research, and fail to verify their information before publishing. In recent Pew research 58% of bloggers do, research. Witness the alternative, that ‘professional’ journalist do research, and verify their data, then do not publish the truth, to support corrupt politicians. New York Times’ Eavesdropping Story Wasn’t The Only One Squashed For Bush During 2004 Campaign

Make’s you wonder who to trust, bloggers who publish information when they find it, or professional journalist who suppress the truth for political gain?

Not a very hard decision, is it!

Blog stats and Irish internet access.

I have been noticing in my blog stats that the number of hits from ‘Irish’ sites, and ‘American’ sites is roughly the same. The interesting point is when they switch places. The Irish stats increase starting on Monday and pass the american ones, until friday when they get passed by the americans through the weekend. As I suspect most of the Irish readers only have internet access from places of work. Either that or the Irish have more fun in the real world on the weekends. 😉