Looking for examples of network attacks, counterattacks, and protections.
David Kramer
david at thekramers.net
Mon Sep 11 15:11:57 EDT 2006
On Sat, September 9, 2006 10:14 pm, James R. Van Zandt wrote:
>
> David -
>
> I have a boatload of auth.log entries like this:
I got more clarification from my coworker, and he's more interested in larger networks
than individual machines. Thanks anyway.
--
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.
More information about the Discuss
mailing list