Linux in Government: How Security Exploits Threaten Government Infrastructures

Showing government offices and agencies how Linux and open-source software provide better security.


Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

Follow up from our ISP

tadelste's picture

It is disappointing they do not police their home subscribers, but at the same time, it is hardly a surprise. You will find a list of blocks attached that belong to them in the event you wish to filter traffic from them in a different fashion.

If this occurs again, open a ticket with a summary along the lines of, "Abuse from PacBell IP <x>", attach text logs to the ticket, and we will report the issue to them immediately and see what response we garner. If it is not favorable, I have some other options for contacting someone with PacBell that will be more responsive.

I am closing this ticket, but again, please open another if the abuse continues.

Latest response from PacBell

tadelste's picture

If you have followed this article, you might enjoy this latest piece.

PacBell wrote me:


"This is to acknowledge receipt of your complaint. All complaints
received are investigated. However, individual responses to these
complaints are not always possible due to the volume received.

"Please be assured we will investigate this issue and take appropriate

"Please do not hesitate to write again if you have any questions or if
you wish to report instances of abuse by SBC Internet customers.

"Thank you,

"The SBC Internet Abuse Security Department"

I responded to them and received this immediately:

"User's mailbox is full:
Unable to deliver mail."

oh... PacBell cares now

Ben LeMasurier's picture

It's funny that PacBell all of a sudden seems to care a little more about this problem...
- Ben

SBC response

Doug Morris's picture

I am constantly reporting abuse through e-mail to SBC. I like to add a 'CC' to But recently, SBC's email server tends to refuse relays to the email server. Suprising, huh?

One Click, Universal Protection: Implementing Centralized Security Policies on Linux Systems

As Linux continues to play an ever increasing role in corporate data centers and institutions, ensuring the integrity and protection of these systems must be a priority. With 60% of the world's websites and an increasing share of organization's mission-critical workloads running on Linux, failing to stop malware and other advanced threats on Linux can increasingly impact an organization's reputation and bottom line.

Learn More

Sponsored by Bit9

Linux Backup and Recovery Webinar

Most companies incorporate backup procedures for critical data, which can be restored quickly if a loss occurs. However, fewer companies are prepared for catastrophic system failures, in which they lose all data, the entire operating system, applications, settings, patches and more, reducing their system(s) to “bare metal.” After all, before data can be restored to a system, there must be a system to restore it to.

In this one hour webinar, learn how to enhance your existing backup strategies for better disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible bare-metal recovery solution for UNIX and Linux systems.

Learn More

Sponsored by Storix