Bad idea to set that dns entry to loopback, you are still DoS'ing yourself. The worm try to syn flood 127.0.0.1 with spoofed addresses, resulting in lotta of RST packets back from loopback.
Just create a fake empty zone, no need here of loopback addresses. >>> ***A*R** Seq: 0x0 Ack: 0x57810001 Win: 0x0 TcpLen: 20 _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
