What "methods" are being used

From: Meritt James (meritt_jamesat_private)
Date: Wed May 02 2001 - 09:26:27 PDT

  • Next message: McCammon, Keith: "Re: What "methods" are being used"

    A variety of web defacements reportedly originating with the Chinese are
    being reported.  Anyone know what method(s) are being used?  This may be
    an indication of the number of discrete attackers (may not, but gotta
    make a guess.  Spoofed and bounced IPs are pretty much useless.)
    
    Thanks!
    
    V/R
    
    James W. Meritt, CISSP, CISA
    Booz, Allen & Hamilton
    phone: (410) 684-6566
    



    This archive was generated by hypermail 2b30 : Wed May 02 2001 - 10:35:08 PDT