>
> What's the method?  What does the traffic look like?  How does it compare
> to non-DDOS traffic, and how are you making the distinction?  That's a good
> starting point for deciding how it can be handled, at which levels of the
> stack, and by whom.
_______________________________________________
To unsubscribe, edit your list preferences, or view the list archives, please 
visit:
https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds

Reply via email to