> What is the best way to keep someone from finger-bombing > your site other than having fingerd cat /unix to stdout? > (other than hosts.deny. We have a person who fingers > a user at our site from different hosts hundreds of times > per hour) Why can't you use hosts.deny? A while back I found that a certain person was using ``xhtalk'' to finger my machine a lot. He had xhtalk in his .xinitrc, so if he logged into multiple machines I'd get double action. I adde this to my hosts.deny file: in.fingerd:.somehost.on.my.campus.edu:twist=/bin/nice -20 /usr/ucb/yes This causes xhtalk to die in a very interesting way, and quickly, so that the ``yes'' immediately stops on your machine, consuming no CPU time locally. xhtalk on the other hand begins to consume 90+% of the CPU. Yeh, I was in a bad mood when I did this. The real best solution is to email the remote admin and ask him to take care of it for you. -- | | | Rob Quinn | | rjq@phys.ksu.edu | | QuinnBob@KSUVM.BITNET |