Jan Luehr wrote: >topology before granting access to your secure server. (If you're server is >stolen and connected to the internet, you probably hop across different >routers to get there) - however, this requires some effort monitoring your >ISPs routes. > Checking the ip/net that the request came from should be enough, unless the attacker can change the global routing table.
-- Dan -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]