from the stop-drop-and-roll-doesn't-work dept.
badger.foo writes "When you're hit with a DDOS, what do you do? In his most recent column, Peter Hansteen narrates a recent incident that involved a DNS based DDOS against his infrastructure and that of some old friends of his. He ends up asking: should we actively publish or 'name and shame' DDOS participants (or at least their IP addresses)? How about scans that may or may not be preparations for DDOSes to come?"
Have you ever noticed that the people who are always trying to tell you
`there's a time for work and a time for play' never find the time for play?