To report a botnet PRIVATELY please email: [EMAIL PROTECTED] ---------- Does anyone have pointers to either established precedent, laws, or anecdotal information that one should consider before monitoring botnet C&C activity - primarily from an Application Layer perspective, as opposed to Network and Transport Layer activity?
Same applies to actual instructing bots as well, for example to disengage attacking hosts, etc.. I'm interested in information from any region.. Thanks in advance! -danny _______________________________________________ To report a botnet PRIVATELY please email: [EMAIL PROTECTED] All list and server information are public and available to law enforcement upon request. http://www.whitestar.linuxbox.org/mailman/listinfo/botnets