28 Feb
2003
28 Feb
'03
10:20 p.m.
Hi, NANOGers. ] and conversely, all attacks are not preceded by scanning. Very true. Most of the attack activity I monitor does not include scanning activity or any other reconnaissance. However, those who attack often enjoy monitoring their progress. This can be an interesting (albeit difficult) way to trace back the attack to the sources. Thanks, Rob. -- Rob Thomas http://www.cymru.com ASSERT(coffee != empty);