Good Day Team CentOS
Please find formal announcement of a new CentOS mirror on the network in Kenya
Location: East Africa Datacenter, Nairobi, Kenya HTTP: http://mirror.liquidtelecom.com/centos http://mirror.liquidtelecom.com/centos FTP: http://mirror.liquidtelecom.com/centos http://mirror.liquidtelecom.com/centos RSYNC: http://mirror.liquidtelecom.com/centos http://mirror.liquidtelecom.com/centos
Bandwidth: 1Gbps+ Sponsor: Liquid Telecom (mirror@liquidtelecom.com mailto:mirror@liquidtelecom.com) - http://www.liquidtelecom.com http://www.liquidtelecom.com/ Updates: Every 4 hours
IPv6 Capable: YES
IP’s to Whitelist Msync: 197.155.77.1, 2c0f:fe40:8001:10::1 (we are presently syncing from UKservers pending activation of whitelist)
This Mirror has excellent connectivity to nearly all of East Africa in particular and also Southern Africa. So could become a good target for any GeoLookups for the region/Continent.
Anthony Somerset | Systems Engineer
T +263 8677 177 177 | D +263 8677 033 306 | M +263 772 822 306 E anthony@teamzol.co.zw
3rd Floor, Green Bridge, Eastgate, Harare www.zol.co.zw
How am I doing? Please help me improve by rating me at http://tell.zol.co.zw/email/anthony@teamzol.co.zw
----- This e-mail (and any attachments) is for the designated recipient(s) only and may contain privileged and/or confidential information. If you are not an addressee or otherwise authorised to receive this message, you should not use, copy, disclose or take any action based on this e-mail or any information contained in the message. If you have received this material in error, please advise the sender immediately by reply e-mail and delete this message. Opinions, conclusions and other information in this message that do not relate to the official business of Zimbabwe Online (Pvt) Ltd, ZOL Zimbabwe, shall be understood as neither given nor endorsed by the firm and we do not accept liability for such.
ZOL will *NEVER* ask for your password. Please ignore and delete any such requests as they are NOT from ZOL and are designed to trick you into giving up your security information which will lead to abuse of your private information.