> > What's the method? What does the traffic look like? How does it compare > to non-DDOS traffic, and how are you making the distinction? That's a good > starting point for deciding how it can be handled, at which levels of the > stack, and by whom.
_______________________________________________ To unsubscribe, edit your list preferences, or view the list archives, please visit: https://list.valvesoftware.com/cgi-bin/mailman/listinfo/hlds

