Matthew Carpenter babbled on about: > I've done a bit of "civil" using the standard chains of responsibility, but > "nasty" has been very tempting... especially with the "SSH_Version_Mapper" > crap... _______________________________________________
not "nasty" per say... just turning the attack around and using an IIS exploit to shutdown the machine that's attacking mine -- Douglas J Hunley (doug at hunley.homeip.net) - Linux User #174778 Admin: Linux StepByStep - http://linux.nf "She's gone! Oh my God, she used me. I was used. I was used! Cool" _______________________________________________ Linux-users mailing list - http://linux.nf/mailman/listinfo/linux-users Subscribe/Unsubscribe info, Archives,and Digests are located at the above URL.