On Fri, 7 Apr 2000, Ask Bjoern Hansen wrote: |And the other way around, there is three gazillion open proxies you can |abuse to make requests from different ip addresses. | |Or a determined attacker might have a lot of different local ip addresses |at his disposal he can make requests from. Let's be realistic on this one: if the idea is to prevent brute force attacks, the fact that the attacker might use a few dozens or for that matter a few hundreds IPs won't matter much.
- Re: THREE STRIKES... Gunther Birznieks
- Re: THREE STRIKES... Mark Imbriaco
- Re: THREE STRIKES... Gunther Birznieks
- Re: THREE STRIKES... Mark Imbriaco
- Re: THREE STRIKES... Gunther Birznieks
- Re: THREE STRIKES... Nicolas MONNET
- Re: THREE STRIKES... Mark Imbriaco
- Re: THREE STRIKES... Nicolas MONNET
- Re: THREE STRIKES... Gunther Birznieks
- Re: THREE STRIKES... Ask Bjoern Hansen
- Re: THREE STRIKES... Nicolas MONNET
- Re: THREE STRIKES... Jeffrey W. Baker
- Re: THREE STRIKES... Vivek Khera
- Re: THREE STRIKES... Ken Williams
- Re: THREE STRIKES... Eric L. Brine
- Re: THREE STRIKES... Ken Williams