On 9 Mar 2004 07:22:39 -0800, [EMAIL PROTECTED] (Todd T. Fries) wrote: >Not when you're working on a system that is being attacked with packets >with source ip's in the list. >
I find that highly unlikely. greg -- You do a lot less thundering in the pulpit against the Harlot after she marches right down the aisle and kicks you in the nuts.