Le dim 12/10/2003 à 17:35, Piotr P. a écrit : > Kazza jump over ports, and hosts (if yopu block destinations to > kazza.com, rr1.kazza.com & rr2.kazza.com kazza uses ip's of other users that > was cached during last downloading anything from anyone). The key is, kazza > use tah same word "KaZaA" inside an uupd datagram. Does any body know how to > block traffic with this word using iptables? You should have a look to string match that is available in patch-o-matic. It will allow you to match an arbitrary string within packet payload. -- http://www.netexit.com/~sid/ PGP KeyID: 157E98EE FingerPrint: FA62226DA9E72FA8AECAA240008B480E157E98EE