Slash Boxes
NOTE: use Perl; is on undef hiatus. You can read content, but you can't post it. More info will be forthcoming forthcomingly.

All the Perl that's Practical to Extract and Report

The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
More | Login | Reply
Loading... please wait.
  • I would assume that you'd want to have your ipchains/iptables/whatever inbound IP filters ready to be modified.


    • Well, the threats were a reaction to something on my site that this person objected to. I've removed that content so I'm pretty sure that the attacks won't happen. But I was just thinking that I've got this email, so I should probably do something with that - forward it to their ISP or something.