On Sat, Oct 06, 2007 at 12:30:18AM -0500, Arthur Pemberton wrote: > > Because it's generally pretty easy to tell the operating system a given web > > site is running on. Note that they're talking about *phishing sites*, not > > the sites from which phishing spam or whatever originates. > The question still stands.... how do they know the attacks are from a > _rooted_ linux box? You don't need root to put put a phishing site, > esp. on a shared host. Fair enough. They're just using that term incorrectly. -- Matthew Miller mattdm@xxxxxxxxxx <http://mattdm.org/> Boston University Linux ------> <http://linux.bu.edu/>