WANTED: ISPs with DDoS defense solutions

Rob Thomas robt at cymru.com
Thu Jul 31 00:42:46 UTC 2003


] Sure, trace my attacks to the linux box at UW, I didn't spoof the flood
] and you can prove I did the attacking how? You can't because I and 7 other
] hackers all are fighting eachother over ownership of the poor UW student
] schlep's computer...

Only seven?  Must be a lame box.  :)

-- 
Rob Thomas
http://www.cymru.com
ASSERT(coffee != empty);





More information about the NANOG mailing list