Slash Boxes
NOTE: use Perl; is on undef hiatus. You can read content, but you can't post it. More info will be forthcoming forthcomingly.

All the Perl that's Practical to Extract and Report

The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
More | Login | Reply
Loading... please wait.
  • I would assume that you'd want to have your ipchains/iptables/whatever inbound IP filters ready to be modified.


    • Well, the threats were a reaction to something on my site that this person objected to. I've removed that content so I'm pretty sure that the attacks won't happen. But I was just thinking that I've got this email, so I should probably do something with that - forward it to their ISP or something.
      • Depending on the ISP, it's not likely to do a lot, though that's probably still your best bet - just the threat might not be enough to get them nuked, though if they actually carried out the attack they'd certainly be in violation of their ToS. And if the cops there are like the FBI is here, unless you've got tens of thousands of dollars of damage to report, there's zilcho they'll do for you.