[ale] Predicting "bad actor" actions WAS Re: Replacing shared host?

dev null zero two dev.null.02 at gmail.com
Thu Dec 20 17:38:51 EST 2018


"we’ll send a single ack back with payload."

what are you doing? you're "acking" a bruteforce? with a synack? what does
that accomplish? what payload are you sending?

On Thu, Dec 20, 2018 at 4:56 PM Leam Hall via Ale <ale at ale.org> wrote:

> On 12/20/18 4:04 PM, Simba via Ale wrote:
> > You should sell your method to hosting companies, if it's as great as
> > you say. I'm sure many of them would appreciate a plug-in appliance that
> > can do what you're talking about.
>
> The technology doesn't seem too difficult. The corporate kahonies to use
> it might be rare.
>
> _______________________________________________
> Ale mailing list
> Ale at ale.org
> https://mail.ale.org/mailman/listinfo/ale
> See JOBS, ANNOUNCE and SCHOOLS lists at
> http://mail.ale.org/mailman/listinfo
>
-- 
Sent from my mobile. Please excuse the brevity, spelling, and punctuation.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://mail.ale.org/pipermail/ale/attachments/20181220/5e404359/attachment.html>


More information about the Ale mailing list