<html><head><meta http-equiv="content-type" content="text/html; charset=utf-8"></head><body dir="auto"><div><div style="direction: inherit;">Curious - what factors would these be that you identified?</div><br>--srs</div><div><br>On 27-Aug-2016, at 2:00 PM, ox <<a href="mailto:andre@ox.co.za">andre@ox.co.za</a>> wrote:<br><br></div><blockquote type="cite"><div><span>On Sat, 27 Aug 2016 13:41:28 +0530</span><br><span>Suresh Ramasubramanian <<a href="mailto:ops.lists@gmail.com">ops.lists@gmail.com</a>> wrote:</span><br><blockquote type="cite"><span>Worth a read </span><br></blockquote><blockquote type="cite"><span><a href="http://krebsonsecurity.com/2016/08/inside-the-attack-that-almost-broke-the-internet/">http://krebsonsecurity.com/2016/08/inside-the-attack-that-almost-broke-the-internet/</a></span><br></blockquote><blockquote type="cite"><span></span><br></blockquote><span>Yes, the actual logs that Brian Krebs publishes, of the conversations,</span><br><span>underlines and serves as clear proof of those factors which serves to</span><br><span>obtuse anti abuse efforts. </span><br><span></span><br><span>Until this is resolved, Internet abuse will continue to be difficult to</span><br><span>manage. This makes it difficult for anyone one the Internet,</span><br><span>including the Cyber Criminals themselves, to deal with Internet abuse</span><br><span>effectively anyway.</span><br><span></span><br><span>2c</span><br><span></span><br><span>Andre</span><br><span></span><br><span></span><br></div></blockquote></body></html>