"Mark J. Roberts" wrote:

>     1) They can't change IPs that often. If node operators (and even
> people who aren't node operators) configured their systems to detect
> portscans, and then reported them somehow, we could use updated
> IP-banlists to block their scans.

Opens another hole: anyone could spill in a list of node IPs blackmailed as
"scanners", and shoot all down even faster than they originally hoped.

>     3) They have ISPs, too. When a portscan is reported, send an email to
> the ISP in question reporting it and demanding action.

Recently, some stock broker mag (financialtimes or so?) had a story on some
Scottish idiot .. err .. nah, really: some university professor who now runs a
company that does net policing in some way. They claim they created a map of
the whole internet, including all the non-web parts, and now can say where
each file first appeared and so on, so they can track down the sources of
viruses and such. Anyway, he claimed the Brit gov had given his company
fat-pipe access to Julia, the British university net backbone. That's your
sort of enemy.

> Etc. This is really some great Slashdot material. People would go nuts.

/.erz already are.

> Again, lead pipes in boxes.
> Make their lives difficult.

Or your own, heavy metals in improper containers, trouble with the
environmental authorities along.



_______________________________________________
Freenet-chat mailing list
[EMAIL PROTECTED]
http://lists.sourceforge.net/mailman/listinfo/freenet-chat

Reply via email to