S>> the first step is using udp sniffer.
UDP sniffer on what?
S>> after that you have tools you can find on the web to preform scans in the
S>> network of the victim.
How? Can you name one such tool?
S>> you must have direct connection to the user for that. (I think its ICQ
S>> default).
ICQ doesn't need any connection at all, except for sending files. But even
having direct connection, it's pretty hard for me to see how you can
portscan some host using it. Could you please elaborate?
--
[EMAIL PROTECTED] \/ There shall be counsels taken
Stanislav Malyshev /\ Stronger than Morgul-spells
phone +972-3-9316425 /\ JRRT LotR.
http://sharat.co.il/frodo/ whois:!SM8333
=================================================================
To unsubscribe, send mail to [EMAIL PROTECTED] with
the word "unsubscribe" in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]