> The main one though is relating to the idea of giving any network > protection software a Strikeback capability. As has been very ably pointed > out by previous contributors the source of attacks cannot be reliably > established. Therefore it seems the ideal way to attack a well defended > network is to launch an attack against a Blitzkrieg Server, or similar, > that seems to come from the actual target network.... then stand well back > and watch the firefight. Even more fun, find two of them, and spoof one to attack the other... --------------------------------------- Mike Bresina (mikeat_private) System Administrator Intellicom Customer Service Center http://www.vsat.net/ v. (715) 720-1760 f. (715) 720-1762 ---------------------------------------
This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 12:58:59 PDT