j
k
j a
j l
0.0.0.0 10.0.4.0 127.0.0.0 255.255.255.0
These are pretty cool, I must say. Exactly how does the smurf attacker route their echo requests to them? Vern
Back to the thread
Back to the list