Re: Ip handling

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, 19 Jun 2003 19:16:28 +0200, 
Pascal Italiaander <pc-secure@xxxxxxx> wrote in message 
<200306191916.29001.pc-secure@xxxxxxx>:

> Op donderdag 19 juni 2003 15:59, schreef Ramin Dousti:
> > Thanks, Julian, for the complement.

> 
> All we need to know is what spoofing is about ( not how it is done),
> for iptables to make rules against spoofing.

..the how is useful when testing your (clients etc) boxes, myself, I
portscanned my isp's poptop server this afternoon, yes, I was asked to,
and yes, I charge for such wee stunts.

 
> Julian,
> 
> No offend Julian, but by vieuwing someones e-mail , you can tell if
> someone is not a script-kiddy ?
> Whauw, how do you do that, teach me . :-)

..http://www.catb.org/~esr/faqs/hacker-howto.html

-- 
..med vennlig hilsen = with Kind Regards from Arnt... ;-)
...with a number of polar bear hunters in his ancestry...
  Scenarios always come in sets of three: 
  best case, worst case, and just in case.




[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux