17 May
2002
17 May
'02
11:38
On 17 May 2002 09:54:45 +0100
James Ogley
Contact the people responsible for the IP the attach originated from.
Check their website and WHOIS information, to see if they have an abuse contact.
Also, don't forget to include a log file of the attack and your timezone. Charles -- "Are [Linux users] lemmings collectively jumping off of the cliff of reliable, well-engineered commercial software?" (By Matt Welsh)