813 is in charge of the shuttles.




















More here on page 8: http://s34.photobucket.com/albums/d115/ ... reenshots/
Moderator: Moderators




















Taken from the SVR website.galvanize wrote:Wouldn't it of been better if a DMU service was run if it was just a Bewdley-Kidderminster shuttle service?![]()
No need to stop steam just because the line has been temporarily shortenedThe SVR is a full-size standard-gauge railway line running regular steam-hauled passenger trains
That statement doesn't mean they don't run diesels though...OdneyManor wrote:Taken from the SVR website.galvanize wrote:Wouldn't it of been better if a DMU service was run if it was just a Bewdley-Kidderminster shuttle service?
No need to stop steam just because the line has been temporarily shortenedThe SVR is a full-size standard-gauge railway line running regular steam-hauled passenger trains
I know that, they may run diesels... but I don't!kieranhardy wrote:That statement doesn't mean they don't run diesels though...OdneyManor wrote:Taken from the SVR website.galvanize wrote:Wouldn't it of been better if a DMU service was run if it was just a Bewdley-Kidderminster shuttle service?
No need to stop steam just because the line has been temporarily shortenedThe SVR is a full-size standard-gauge railway line running regular steam-hauled passenger trains
OdneyManor wrote:I know that, they may run diesels... but I don't!kieranhardy wrote:That statement doesn't mean they don't run diesels though...OdneyManor wrote: Taken from the SVR website. No need to stop steam just because the line has been temporarily shortened![]()
Hithammond12 wrote:Yes I can - how weird?


As everything appears to be OK on your wifes laptop, can I suggest you check your desktop.SYN-flood is a simple attack method on computers on the Internet. The technique makes the hosting server so busy that it can´t provide service to the legitimate users.
Unfortunately SYN-flood is both difficult to detect and avoid. It is based on the fundamental technique for transfer of data on the internet, the TCP-protocol. The attack exploits the way TCP-connections are established between two computers on the internet.
- When a user connects to a host computer (server) the user´s computer sends a request containing a packet with a setting, a so called SYN-flag.
- The server receives the request and returns a response, the response is called a SYN/ACK packet.
The user´s computer receives the SYN/ACK and sends a packet, a ACK that establishes the connection.
The transaction takes approximately 1 minute and the host computer waits for the ACK to be returned from the users computer. The attacker utilizes this time slot for the attack.
The attacker creates a program that generates a huge number of SYN requests, which makes the server respond with SYN/ACK and then waits without returning the expected ACK-packet which would establish the connection between the server and user. Most servers has a limited number of simultaneous connections so it is rather easy to lock a server using this technique.
The attackers make the request look valid but unreachable by using non-existing IP-addresses and this makes the attack difficult to trace. Software for creating such attacks is easily available on the net.


Anti Virus may not always pick up Malware. You might want to google for SYN FLOOD and check out the some of the cures.Hi
Thanks Pete........I'll check it out.
Standard Anti-Virus is up to-date on the Desktop.
Would it only effect the one internet IP address though?
Watching the connection no information is moving during the 'block', unless thats the router stopping the attack?
Luckily for me the main forums, and file library are uneffected.
Cheers
Jon