[nsp-sec] Twitter DoS

Smith, Donald Donald.Smith at qwest.com
Fri Aug 7 17:31:43 EDT 2009


I can tell you that you have 0 Qwest dsl customers so this bot net was probably built with a scan/exploit method not some type of client drive by. The NAT/PAT on our DSL modems protects MOST of our dsl customers from common scan/exploit bot net building:)


(coffee != sleep) & (!coffee == sleep)
Donald.Smith at qwest.com gcia   

> -----Original Message-----
> From: nsp-security-bounces at puck.nether.net 
> [mailto:nsp-security-bounces at puck.nether.net] On Behalf Of 
> Darren Grabowski
> Sent: Friday, August 07, 2009 3:18 PM
> To: nsp-security at puck.nether.net
> Subject: [nsp-sec] Twitter DoS
> 
> ----------- nsp-security Confidential --------
> 
> 


More information about the nsp-security mailing list