On 03/01/29 12:01 -0800, H C wrote: > How does an ACK packet constitute an "attack"? Yes, I was using the term loosely... > Did you run netstat on your system to view the states > of connections on that system? I wasn't at home at the time, so no. But I'm pretty sure none of my linux machines would be autonomously opening connections to microsoft.com... :) > How did you determine that the packet had been > spoofed? Pure speculation! -- Michael Rowe <mroweat_private> IM - mroweat_private Prof - ACM, IEEE, Computer Soc. Web - http://www.mojain.com/ Vice - Barley malt, brewed or Key - http://mojain.com/keys/mrowe.asc distilled (hold the ice) ---------------------------------------------------------------------------- This list is provided by the SecurityFocus ARIS analyzer service. For more information on this free incident handling, management and tracking system please see: http://aris.securityfocus.com
This archive was generated by hypermail 2b30 : Thu Jan 30 2003 - 10:26:37 PST