Scott, Matt and Jeff, Thannks for the replys to my questions about my firewall logs. Scott, http://www.echogent.com/cgi-bin/fwlog.pl is really cool. It really helps me to make sense of the log entries.
I see a fair number of the entries involving the code red worm. I was not able to actually contact ant of the IP's responsible. How tough would it be for someone to write a hunter/ killer progam that would propagate like the worm, find it on infected servers then kill it by rewriting its code. Then remove itself on a specified date? I wish I had the skills. Thanks again, Kory _______________________________________________ Leaf-user mailing list [EMAIL PROTECTED] https://lists.sourceforge.net/lists/listinfo/leaf-user