Jussi Hirvi wrote:
On 17.8.2012 15.04, John Doe wrote:
Maybe it is this: http://arstechnica.com/business/2012/03/how-anonymous-plans-to-use-dns-as-a-...
Interesting idea. In that case the ip's in my logs would point to the targets of the attact. I checked a few of them, and they look more like hijacked victims, or ns query mediators like me. I don't see a common factor.
<snip> Thanks to John Doe for the link - very interesting read.
mark