In article <CAP-JHpmJc=vLFuyfeTf2iKTn4j43PHm9QnaDDhVVypz3MVzB-A(a)mail.gmail.com>om>,
John <phoenixoverride(a)gmail.com> writes:
One thing that might work (wouldnt be 100%) would be a
method for
identifying IP ranges of know abuse where legit collateral is minimal and
keeping a database of these and auto-blocking them.
The problem with all these schemes of identifying perpetrators is that
they often operate through botnets and the IP address doing the edit
has nothing at all to do with the perpetrator.
--
"The Direct3D Graphics Pipeline" free book
<http://tinyurl.com/d3d-pipeline>
The Computer Graphics Museum <http://computergraphicsmuseum.org>
The Terminals Wiki <http://terminals.classiccmp.org>
Legalize Adulthood! (my blog) <http://legalizeadulthood.wordpress.com>