[nsp-sec] Twitter DoS
Smith, Donald
Donald.Smith at qwest.com
Fri Aug 7 17:31:43 EDT 2009
I can tell you that you have 0 Qwest dsl customers so this bot net was probably built with a scan/exploit method not some type of client drive by. The NAT/PAT on our DSL modems protects MOST of our dsl customers from common scan/exploit bot net building:)
(coffee != sleep) & (!coffee == sleep)
Donald.Smith at qwest.com gcia
> -----Original Message-----
> From: nsp-security-bounces at puck.nether.net
> [mailto:nsp-security-bounces at puck.nether.net] On Behalf Of
> Darren Grabowski
> Sent: Friday, August 07, 2009 3:18 PM
> To: nsp-security at puck.nether.net
> Subject: [nsp-sec] Twitter DoS
>
> ----------- nsp-security Confidential --------
>
>
More information about the nsp-security
mailing list