Matthew Carpenter babbled on about:
> I've done a bit of "civil" using the standard chains of responsibility, but
> "nasty" has been very tempting... especially with the "SSH_Version_Mapper"
> crap... _______________________________________________

not "nasty" per say... just turning the attack around and using an IIS 
exploit to shutdown the machine that's attacking mine
-- 
Douglas J Hunley (doug at hunley.homeip.net) - Linux User #174778
Admin: Linux StepByStep - http://linux.nf

"She's gone! Oh my God, she used me. I was used. I was used! Cool"
_______________________________________________
Linux-users mailing list - http://linux.nf/mailman/listinfo/linux-users
Subscribe/Unsubscribe info, Archives,and Digests are located at the above URL.

Reply via email to