> Suppose we set up a firewall that, when it detects > a port scan, would spoof the source address and > perform a port scan against the port scanner's ISP? > That way, the ISP would see a port scan coming > from one of his own customers and would be more > likely to take an active interest in putting a > stop to it. Heh... I like it. :-) - [To unsubscribe, send mail to [EMAIL PROTECTED] with "unsubscribe firewalls" in the body of the message.]
- RE: Dealing with port scanners / attackers sethw
- RE: Dealing with port scanners / attackers Parker, Gary W
- Re: Dealing with port scanners / attackers Randall, Mark
- Re: Dealing with port scanners / attackers Marc Renner
- Re: Dealing with port scanners / attackers Marc Renner
- RE: Dealing with port scanners / attackers Parker, Gary W
- Re: Dealing with port scanners / attackers John Stewart
- RE: Dealing with port scanners / attackers Ron DuFresne
- RE: Dealing with port scanners / attackers Mullen, Patrick
- Re: Dealing with port scanners / attackers Nuno Guarda
- RE: Dealing with port scanners / attackers Lee, Dana-Renee
- Re: Dealing with port scanners / attackers guja02
- Re: Dealing with port scanners / attackers Davis Ford
