To echo what others have said: I would suggest: Perform damage control, identify the vulnerability (e.g., weak password, browsing from a public terminal, etc.), take corrective action, and move on.
Trying to "catch" the offenders is a hopelessly proposition. They're usually impossible to trace. When it is possible, it's almost never cost-effective. If you do trace them, chances are you'll find they're in a jurisdiction where prosecution is difficult. Best case, you and others spend a lot of time, effort, and money prosecuting someone, they get hit with a $500 fine, and continue doing the same thing. Even if that individual sees the light, tens of thousands more will continue. The abuse desks at big services (MSN, Gmail, etc.) are perpetually deluged in a flood of reports. Contacting them with anything less than a major-network-news-worthy DoS attack is a waste of your time. -- Ben _______________________________________________ gnhlug-discuss mailing list gnhlug-discuss@mail.gnhlug.org http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss/