> > My concern lies in *not* being able to reliably trace exploits back to
> > their source!
> 
> That's just how the internet works.  If the hacker isn't source-routing
> their packets, you really have no way of knowing where they came from, as IP
[snip]

pn] As someone previously pointed out in the LRP list, it's even more dismal than 
this!  If the
intent is a DDOS, there is likely *NOTHING* that can be done about it the way "things" 
(read:
technology, ISP attitudes, laws, law enforcement agency priorities) stand today-- even 
if you
manage to identify the responsible individual!!

pn] Read http://grc.com/dos/grcdos.htm, all the way to the end.


=====

-----
Peter Nosko ([EMAIL PROTECTED])
This is a good place for a tagline.

__________________________________________________
Do You Yahoo!?
Spot the hottest trends in music, movies, and more.
http://buzz.yahoo.com/

_______________________________________________
Leaf-user mailing list
[EMAIL PROTECTED]
http://lists.sourceforge.net/lists/listinfo/leaf-user

Reply via email to