On Friday, June 13, 2003, 17:46:40, Travis Rabe wrote:
T> My understanding was that they got a list of IP addresses that they began
T> probing to see if they were secure or not.  Once they foundenough computers
T> that were *not* secure, they started installing their software.  ...

Probing  can  be done by sweeping thru a range of IP's too so I wouldn't
fault e-mail headers.

-- 
[EMAIL PROTECTED]     "The avalanche has already started, it is too
Rod Dorman              late for the pebbles to vote." � Ambassador Kosh


To Unsubscribe: http://www.ipswitch.com/support/mailing-lists.html
List Archive: http://www.mail-archive.com/imail_forum%40list.ipswitch.com/
Knowledge Base/FAQ: http://www.ipswitch.com/support/IMail/

Reply via email to