Hello Bryan,
Monday, September 8, 2003, 11:36:12 AM, you wrote:
BP Rikona, I fond a kind of nice little document that talks about IP
BP spoofing in general.
Thanks much for the document. It is a nice description. It also
contains a few references that have even more info relating to our
Hello Bryan,
Friday, September 5, 2003, 4:19:01 PM, you wrote:
BP Based on the headers I have seen on two of the virus messages,
BP both forwarded by someone on the list, I haven't seen it spoof any
BP IP addresses, only the From line.
I probably agree, but still have that nagging question
Hello Bryan,
Sunday, September 7, 2003, 6:53:13 PM, you wrote:
BP On Sunday 07 September 2003 08:18 pm, rikona wrote:
Agreed that there will be intermediate routers. Let's say, for
simplicity, there's your comp A, with the virus trying to spoof.
This is connected to intermediate router B
Hello Bryan (alias rikona supposedly at 66.32.127.184), :-)
Friday, September 5, 2003, 2:14:53 PM, you wrote:
If you get one from 'you', I'd like to see all the headers to shed
some light on how it spoofs 'you'.
r Like this.
Sorry - I guess I wasn't clear on this. I understand how to spoof