On Friday, June 13, 2003, 17:46:40, Travis Rabe wrote: T> My understanding was that they got a list of IP addresses that they began T> probing to see if they were secure or not. Once they foundenough computers T> that were *not* secure, they started installing their software. ...
Probing can be done by sweeping thru a range of IP's too so I wouldn't fault e-mail headers. -- [EMAIL PROTECTED] "The avalanche has already started, it is too Rod Dorman late for the pebbles to vote." � Ambassador Kosh To Unsubscribe: http://www.ipswitch.com/support/mailing-lists.html List Archive: http://www.mail-archive.com/imail_forum%40list.ipswitch.com/ Knowledge Base/FAQ: http://www.ipswitch.com/support/IMail/
