Jussi Hirvi wrote:
> On 17.8.2012 15.04, John Doe wrote:
>> Maybe it is this:
>> http://arstechnica.com/business/2012/03/how-anonymous-plans-to-use-dns-as-a-weapon/
>
> Interesting idea. In that case the ip's in my logs would point to the
> targets of the attact. I checked a few of them, and they look more like
> hijacked victims, or ns query mediators like me. I don't see a common
> factor.
<snip>
Thanks to John Doe for the link - very interesting read.

      mark

_______________________________________________
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos

Reply via email to