Group,

I am fully aware of what a Smurf Attack is and how it works, BUT,

Why is it refered to as a Smurf ? (I have my theorys but not sure if they are 
correct)

Steve

Steven Dangerfield, Network Engineer/Analyst
B.Eng, CCNA, CCSA

Email : [EMAIL PROTECTED]


Totalise - the Users ISP
---------------------------------------------
To become a member and a shareholder
visit http://www.totalise.net

-----------------------
Sell Art with GetSomeArt - FREE
register at http://www.getsomeart.com quoting reference TOTSEL



================================================================================
     To unsubscribe from this mailing list, please see the instructions at
               http://www.checkpoint.com/services/mailing.html
================================================================================

Reply via email to