Looking for examples of network attacks, counterattacks, and protections.

David Kramer david at thekramers.net
Mon Sep 11 15:11:57 EDT 2006


On Sat, September 9, 2006 10:14 pm, James R. Van Zandt wrote:
>
> David -
>
> I have a boatload of auth.log entries like this:

I got more clarification from my coworker, and he's more interested in larger networks
than individual machines.  Thanks anyway.



-- 
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.




More information about the Discuss mailing list