On Sun, Aug 05, 2007 at 10:20:45PM -0700, ChronosWS wrote: > Man asks for help, you lay into him, blaming him for the attacks. Nice. And for good reason. Years of good reason. > Alternately, you could canvas the userlist of known servers or your past > connection logs for valid playing IPs and whitelist them with your firewall. > This might be a decent stopgap measure while you implement your security > fix. Better then nothing, but it will not work for anyone on a dynamic connection. John -- "I'm sorry but our engineers do not have phones." As stated by a Network Solutions Customer Service representative when asked to be put through to an engineer. "My other computer is your windows box." Ralf Hildebrandt <sxem> trying to play sturgeon while it's under attack is apparently not fun. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 189 bytes Desc: not available Url : http://mailman.us.netrek.org/pipermail/netrek-dev/attachments/20070806/e1e2bd2f/attachment.pgp