Jan Luehr wrote: >topology before granting access to your secure server. (If you're server is >stolen and connected to the internet, you probably hop across different >routers to get there) - however, this requires some effort monitoring your >ISPs routes. > Checking the ip/net that the request came from should be enough, unless the attacker can change the global routing table. -- Dan