> -----Original Message-----
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED]]On Behalf Of Kory Krofft
> Sent: Thursday, 15 November 2001 13:42
> To: [EMAIL PROTECTED]
> Subject: [Leaf-user] Dachstein Firewall statu
> 
> 
> Scott, Matt and Jeff,
> 
> Thannks for the replys to my questions about my firewall logs. Scott,
> http://www.echogent.com/cgi-bin/fwlog.pl is really cool. It really helps
> me to make sense of the log entries.
> 
> I see a fair number of the entries involving the code red worm. I was
> not able to actually contact ant of the IP's responsible.
> 
> How tough would it be for someone to write a hunter/ killer progam that
> would propagate like the worm, find it on infected servers then kill it
> by rewriting its code. Then remove itself on a specified date? I wish I
> had the skills.
> 
> Thanks again,
> 
> Kory

Ahhhh - that's illegal.

Regards,
Hilton

_______________________________________________
Leaf-user mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user

Reply via email to