From firstname.lastname@example.org Wed Nov 29 11:17:46 2000 Date: Tue, 28 Nov 2000 16:51:18 -0700 (MST) From: email@example.com To: firstname.lastname@example.org Subject: http://www.azstarnet.com/~bhance/mayday/texts/89-feb8.html Data Express... This data is from the Form located at the URL: http://www.azstarnet.com/~bhance/mayday/texts/89-feb8.html ++++++++++++++ email=xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx clue=What is your estimate on the probability that the ones who know are ip spoofing into the ua system? Could explain why the logs are so topheavy with the local server. If they worry about leaving a pattern that would be a way to handle it. name=cynic 2
Plus, if I were a Freak, and could ip spoof from anywhere I pleased, I'd probably pick something a little more interesting than the UA library, ya know?