Try this http://www.incidents.org/ .
-----Original Message----- From: Kim Longenbaugh [mailto:[EMAIL PROTECTED]] Sent: Tuesday, November 20, 2001 8:46 AM To: [EMAIL PROTECTED] Subject: [FW-1] list of ports used in exploits/hacks Is there a listing of ports used in hacks/exploits available? That would come in pretty handy and might be more useful for anyone trying to find out if they're being attacked than the regular list of ports. =============================================== To unsubscribe from this mailing list, please see the instructions at http://www.checkpoint.com/services/mailing.html =============================================== =============================================== To unsubscribe from this mailing list, please see the instructions at http://www.checkpoint.com/services/mailing.html ===============================================
