Sure, they think they’re doing a good job, and the right thing by checking every machine they can find on the net for smurf attack holes, but really, do they have to do it nightly?
I mean, it’s bad enough every other motherfscker on the ‘net is out to get me (and I got logs to prove it) but this takes the cake.
“concerned sysadmins” my left nut – if they were concerned, they’d email the sysadmin if their network was found vulnerable, warning them that this info would be made public. I mean, even ORBS has the common human decency to contact the mail admin when an open relay is found. It’s not like they randomly ping mail servers all over the net, and set up a database saying “Look! An open mail relay! Abuse! Abuse!” which is what, IMHO, these nasty bastards at netscan.org are doing by *NOT* informing the sysadmins of affected subnets.
Not that their disclaimer isn’t mostly right. But the final clause – you agree to this by viewing the pages even if you don’t read the disclaimer – is a cop-out. Even pr0n sites have the balls to put their disclaimers up front and in your face.
Argh.. Enough. back to my tea…