> > My concern lies in *not* being able to reliably trace exploits back to
> > their source!
>
> That's just how the internet works. If the hacker isn't source-routing
> their packets, you really have no way of knowing where they came from, as IP
[snip]
pn] As someone previously pointed out in the LRP list, it's even more dismal than
this! If the
intent is a DDOS, there is likely *NOTHING* that can be done about it the way "things"
(read:
technology, ISP attitudes, laws, law enforcement agency priorities) stand today-- even
if you
manage to identify the responsible individual!!
pn] Read http://grc.com/dos/grcdos.htm, all the way to the end.
=====
-----
Peter Nosko ([EMAIL PROTECTED])
This is a good place for a tagline.
__________________________________________________
Do You Yahoo!?
Spot the hottest trends in music, movies, and more.
http://buzz.yahoo.com/
_______________________________________________
Leaf-user mailing list
[EMAIL PROTECTED]
http://lists.sourceforge.net/lists/listinfo/leaf-user