Jussi Hirvi wrote: > On 17.8.2012 15.04, John Doe wrote: >> Maybe it is this: >> http://arstechnica.com/business/2012/03/how-anonymous-plans-to-use-dns-as-a-weapon/ > > Interesting idea. In that case the ip's in my logs would point to the > targets of the attact. I checked a few of them, and they look more like > hijacked victims, or ns query mediators like me. I don't see a common > factor. <snip> Thanks to John Doe for the link - very interesting read. mark _______________________________________________ CentOS mailing list CentOS@xxxxxxxxxx http://lists.centos.org/mailman/listinfo/centos