The idiots at Cox Cable have decided that the proper technique to handle viruses is to close down various ports and internet services every time a new one shows up, and even make false DNS entries and claim they're valid.
With the MSBlaster worm the morons thought they'd be all l337 and $h17 and set their DNS servers to redirect windowsupdate.com to 127.0.0.1 and even set the "authoritative" flag (thus validating the idea that anything Cox does is untrustworthy.) The problem here is that the worm spoofs random IP's, so when the worm tried to execute a DoS attack on windowsupdate.com it instead gets reflected back to various users inside Cox's own network!
Now I've just discovered that they arn't allowing even a simple f'ing PING OR TRACERT any more! The incompetent fools have decided that nobody really needs ICMP access for any reason, so they're now blocking it too. Yeah, I feel so much safer knowing that I can't be pinged or send out pings.... jerks!
Their official stand on the issue is that their internet access is for web browsing only, any other uses (like online gaming even) arn't part of their service.
With the MSBlaster worm the morons thought they'd be all l337 and $h17 and set their DNS servers to redirect windowsupdate.com to 127.0.0.1 and even set the "authoritative" flag (thus validating the idea that anything Cox does is untrustworthy.) The problem here is that the worm spoofs random IP's, so when the worm tried to execute a DoS attack on windowsupdate.com it instead gets reflected back to various users inside Cox's own network!
Now I've just discovered that they arn't allowing even a simple f'ing PING OR TRACERT any more! The incompetent fools have decided that nobody really needs ICMP access for any reason, so they're now blocking it too. Yeah, I feel so much safer knowing that I can't be pinged or send out pings.... jerks!
Their official stand on the issue is that their internet access is for web browsing only, any other uses (like online gaming even) arn't part of their service.
Comment