To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
----------
Does anyone have pointers to either established precedent,
laws, or anecdotal information that one should consider before
monitoring botnet C&C activity - primarily from an Application
Layer perspective, as opposed to Network and Transport
Layer activity?

Same applies to actual instructing bots as well, for example
to disengage attacking hosts, etc..

I'm interested in information from any region..

Thanks in advance!

-danny


_______________________________________________
To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
All list and server information are public and available to law enforcement 
upon request.
http://www.whitestar.linuxbox.org/mailman/listinfo/botnets

Reply via email to