On 9 Mar 2004 07:22:39 -0800, [EMAIL PROTECTED] (Todd T. Fries) wrote:

>Not when you're working on a system that is being attacked with packets
>with source ip's in the list.
>

I find that highly unlikely. 



greg

-- 
You do a lot less thundering in the pulpit against the Harlot 
after she marches right down the aisle and kicks you in the nuts. 

Reply via email to