11 Mar
2004
11 Mar
'04
5:04 p.m.
Petri Helenius wrote:
Maybe there is a lesson to be learned from many RBL operators. To make sure, just send packets to the whole /24 or /16 you got an "attack" packet from.
Which RBL operators flood /24's or /16's? What do they flood them with? -- Requiescas in pace o email