Google групе више не подржавају нове Usenet постове ни праћења. Претходни садржај остаје видљив.

Faites chier les FAI

0 прегледа
Пређи на прву непрочитану поруку

Zopilote

непрочитано,
28. 10. 2010. 08:16:3528.10.10.
Envoyez leur un max de relev�s de logs afin que leurs routeurs (en particulier les routeurs BGP)
black listent les connexions issues de ce pays de merde qu'est la Chine qui laisse ou encourage le
hacking, les attaques DOS etc.

exemple :
<132>TCP Packet - Source:58.218.199.147,12200 Destination:82.121.236.202,27977 - [DOS] 192.168.0.1 28/10 11:15:00.890
<132>TCP Packet - Source:58.218.199.147,12200 Destination:82.121.236.202,9090 - [DOS] 192.168.0.1 28/10 11:15:00.890
<132>TCP Packet - Source:58.218.199.147,12200 Destination:82.121.236.202,8090 - [DOS] 192.168.0.1 28/10 11:15:00.906
<132>TCP Packet - Source:58.218.199.147,12200 Destination:82.121.236.202,1080 - [DOS] 192.168.0.1 28/10 11:15:00.906
<132>TCP Packet - Source:58.218.199.147,12200 Destination:82.121.236.202,8000 - [DOS] 192.168.0.1 28/10 11:15:00.937
<132>TCP Packet - Source:58.218.199.147,12200 Destination:82.121.236.202,2301 - [DOS] 192.168.0.1 28/10 11:15:00.937
<132>TCP Packet - Source:58.218.199.147,12200 Destination:82.121.236.202,8118 - [DOS] 192.168.0.1 28/10 11:15:00.953
<132>TCP Packet - Source:58.218.199.147,12200 Destination:82.121.236.202,6588 - [DOS] 192.168.0.1 28/10 11:15:01.015
<132>TCP Packet - Source:58.218.199.147,12200 Destination:82.121.236.202,27977 - [DOS] 192.168.0.1 28/10 13:36:02.015
<132>TCP Packet - Source:58.218.199.147,12200 Destination:82.121.236.202,9090 - [DOS] 192.168.0.1 28/10 13:36:02.031
<132>TCP Packet - Source:58.218.199.147,12200 Destination:82.121.236.202,8090 - [DOS] 192.168.0.1 28/10 13:36:02.031
<132>TCP Packet - Source:58.218.199.147,12200 Destination:82.121.236.202,1080 - [DOS] 192.168.0.1 28/10 13:36:02.046
<132>TCP Packet - Source:58.218.199.147,12200 Destination:82.121.236.202,8000 - [DOS] 192.168.0.1 28/10 13:36:02.046
<132>TCP Packet - Source:58.218.199.147,12200 Destination:82.121.236.202,2301 - [DOS] 192.168.0.1 28/10 13:36:02.062
<132>TCP Packet - Source:58.218.199.147,12200 Destination:82.121.236.202,8118 - [DOS] 192.168.0.1 28/10 13:36:02.078
<132>TCP Packet - Source:58.218.204.110,12200 Destination:82.121.236.202,8088 - [DOS] 192.168.0.1 28/10 13:52:58.140
<132>TCP Packet - Source:58.218.204.110,12200 Destination:82.121.236.202,8008 - [DOS] 192.168.0.1 28/10 13:52:58.156
<132>TCP Packet - Source:58.218.204.110,12200 Destination:82.121.236.202,73 - [DOS] 192.168.0.1 28/10 13:52:58.156
<132>TCP Packet - Source:58.218.204.110,12200 Destination:82.121.236.202,7212 - [DOS] 192.168.0.1 28/10 13:52:58.171
<132>TCP Packet - Source:58.218.204.110,12200 Destination:82.121.236.202,6588 - [DOS] 192.168.0.1 28/10 13:52:58.171
<132>TCP Packet - Source:58.218.204.110,12200 Destination:82.121.236.202,8080 - [DOS] 192.168.0.1 28/10 13:52:58.187

Petit Volcan

непрочитано,
30. 10. 2010. 02:39:2630.10.10.


On 28/10/10 14:16, in article 4cc9...@news.x-privat.org, "Zopilote"
<ya...@no.mail> wrote:

> Envoyez leur un max de relevés de logs afin que leurs routeurs (en particulier


> les routeurs BGP)
> black listent les connexions issues de ce pays de merde qu'est la Chine qui
> laisse ou encourage le
> hacking, les attaques DOS etc.
>

Pauvre con. Parle un peu avec les chinois avant de raconter n'importe quoi !
Ces blocages sont illusoires !

0 нових порука