On Sun, Aug 05, 2007 at 10:20:45PM -0700, ChronosWS wrote:
> Man asks for help, you lay into him, blaming him for the attacks.  Nice.

	And for good reason.  Years of good reason.

> Alternately, you could canvas the userlist of known servers or your past
> connection logs for valid playing IPs and whitelist them with your firewall.
> This might be a decent stopgap measure while you implement your security
> fix.

	Better then nothing, but it will not work for anyone on a
	dynamic connection.


"I'm sorry but our engineers do not have phones."
As stated by a Network Solutions Customer Service representative when asked to
be put through to an engineer.

"My other computer is your windows box."
                                     Ralf Hildebrandt
<sxem> trying to play sturgeon while it's under attack is apparently not fun.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
Url : http://mailman.us.netrek.org/pipermail/netrek-dev/attachments/20070806/e1e2bd2f/attachment.pgp