It's a good idea, granted, but isn't this covered by IPv6 administrative
scoping?
Lars
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
David G. Andersen
Sent: Thursday, August 14, 2003 8:33 AM
To: Christopher L. Morrow
Cc: Crist Clark; [EMAIL PROTECTED]
Better gas mileage?
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
Jerry Eyers
Sent: Friday, August 01, 2003 7:49 PM
To: [EMAIL PROTECTED]
Subject: Just a quick thought...
I haven't had time to look, but just for my clarification, why was IPv8
not pur
Joe,
While I agree with all of your points individually, I would say that
only one of them doesn't work for 'following the money'. This one being
the pump-and-dump. Everything else involves a sale of some sort -
Secondly, I had stated that a two-pronged approach needs to be followed.
Not only
I'd suggest a two pronged approach -
1) Technical, tracing the source/destination of such
2) Financial, going after whoever is paying the spammers
You'd need (1) to prosecute (2) -
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
Dan Hollis
Sent: Tuesday
Okay, but what's the trojan signature look like?
How should people be checking to see if they're compromised?
-Original Message-
From: John Brown [mailto:[EMAIL PROTECTED]
Sent: Tuesday, June 17, 2003 10:12 AM
To: Lars Higham
Cc: [EMAIL PROTECTED]
Subject: Re: Spam fro
It should be easy enough to 'follow the money' by seeing who's doing the
selling -
Whoever's paying for the advertising should be held accountable for the
spam generated - even by subcontractors.
- Lars
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
D
It would be useful if this exploit could be named and documented at
least for one known instance -
Regards,
Lars Higham
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of
Richard D G Cox
Sent: Monday, June 16, 2003 9:32 PM
To: [EMAIL PROTECTED]
Subject