That's what I mean by "nasty"... Retaliation (albeit mild). That's the way to go IMHO. Just haven't had the time to automate one.
On Sun, 20 Jan 2002 23:31:23 -0500 "Douglas J Hunley" <[EMAIL PROTECTED]> wrote: > Matthew Carpenter babbled on about: > > I've done a bit of "civil" using the standard chains of > > responsibility, but"nasty" has been very tempting... especially with > > the "SSH_Version_Mapper" crap... > > _______________________________________________ > > not "nasty" per say... just turning the attack around and using an IIS > exploit to shutdown the machine that's attacking mine > -- > Douglas J Hunley (doug at hunley.homeip.net) - Linux User #174778 > Admin: Linux StepByStep - http://linux.nf > > "She's gone! Oh my God, she used me. I was used. I was used! Cool" > _______________________________________________ > Linux-users mailing list - http://linux.nf/mailman/listinfo/linux-users > Subscribe/Unsubscribe info, Archives,and Digests are located at the > above URL. _______________________________________________ Linux-users mailing list - http://linux.nf/mailman/listinfo/linux-users Subscribe/Unsubscribe info, Archives,and Digests are located at the above URL.