![]() |
|
|
|
#1
|
|||
|
Wouldn't you just get the IP(s) of a zombie computer? Gonna go attack some innocents?
| ||
|
|
|||
|
#2
|
||||
|
Quote:
Most co-location providers will cooperate with you on this if you have packet traces and a list of offenders. According to Rogean most of the abuse traffic is UDP which makes it tricky, otherwise you could just dedicate a cheap machine to proxy your TCP connections for you, discarding illegitimate traffic.
__________________
Prexus: (00-04) <Clan nan Dreolan>
Cadiz (70 NEC) epic 1.0 Grumplescratch (65 WAR) epic 1.0 Tzartole (62 MNK) epic 1.0 | |||
|
|
||||
![]() |
|
|