In Reply to: (longish) ;) posted by tapakah2001 on October 17, 2005 at 15:34:40:
Thanks for the detailed explanation, but I don't really buy that intelligent applications of Sniffer type tools couldn't isolate and trace these spoofs from whatever network nodes that they pass through and eventually isolate the ISP, if not the particular user from which this abuse emanates.
This post is made possible by the generous support of people like you and our sponsors:
Follow Ups
- Re: (longish) ;) - Tom Dawson 19:09:48 10/18/05 (2)
- Re: (longish) ;) - Jimmy 13:40:38 10/19/05 (1)
- The source of info? - tapakah2001 07:57:05 10/26/05 (0)