That's what I mean by "nasty"...  Retaliation (albeit mild).  That's the
way to go IMHO.  Just haven't had the time to automate one. 


On Sun, 20 Jan 2002 23:31:23 -0500
"Douglas J Hunley" <[EMAIL PROTECTED]> wrote:

> Matthew Carpenter babbled on about:
> > I've done a bit of "civil" using the standard chains of
> > responsibility, but"nasty" has been very tempting... especially with
> > the "SSH_Version_Mapper" crap...
> > _______________________________________________
> 
> not "nasty" per say... just turning the attack around and using an IIS 
> exploit to shutdown the machine that's attacking mine
> -- 
> Douglas J Hunley (doug at hunley.homeip.net) - Linux User #174778
> Admin: Linux StepByStep - http://linux.nf
> 
> "She's gone! Oh my God, she used me. I was used. I was used! Cool"
> _______________________________________________
> Linux-users mailing list - http://linux.nf/mailman/listinfo/linux-users
> Subscribe/Unsubscribe info, Archives,and Digests are located at the
> above URL.
_______________________________________________
Linux-users mailing list - http://linux.nf/mailman/listinfo/linux-users
Subscribe/Unsubscribe info, Archives,and Digests are located at the above URL.

Reply via email to