On Sun, 20 Jan 2002 23:31:23 -0500
Douglas J Hunley <[EMAIL PROTECTED]> wrote:

> Matthew Carpenter babbled on about:
> > I've done a bit of "civil" using the standard chains of
> > responsibility, but"nasty" has been very tempting... especially with
> > the "SSH_Version_Mapper" crap...
> > _______________________________________________
> 
> not "nasty" per say... just turning the attack around and using an IIS
> exploit to shutdown the machine that's attacking mine

Is that in your script Doug? If so, I'm gonna give it a whirl 'cause
I've got 6 or 7 IIS ...errm.. Users... contributing to excessivly large
http_access logs =(

-- 
Myles Green Calgary AB Canada
Alberta Linux Step by Step Mirror:
http://mylesg.homelinux.net/
--
USER, n.: The word computer professionals use 
when they mean "idiot".
_______________________________________________
Linux-users mailing list - http://linux.nf/mailman/listinfo/linux-users
Subscribe/Unsubscribe info, Archives,and Digests are located at the above URL.

Reply via email to