|
I0OJJ > SYSOP 14.05.19 15:25l 27 Lines 782 Bytes #999 (0) @ WW
BID : 000011I0OJJ0
Read: GUEST
Subj: attacks to i0ojj.ampr.org
Path: IZ3LSV<I3XTY<I0OJJ<I0OJJ
Sent: 190514/1419Z 3694@I0OJJ.ITA.EU [Rome] $:000011I0OJJ0
>From i0ojj%i0ojj.ita.eu@i0ojj.ampr.org Tue May 14 16:25:02 2019
Received: from i0ojj.ampr.org by i0ojj.ampr.org (JNOS2.0k.3b) with SMTP
id AA9982 ; Tue, 14 May 2019 16:25:02 +0200
Message-Id: <000011I0OJJ0@ir0rm.bbs>
>From: i0ojj@i0ojj.ita.eu
X-JNOS-User-Port: Telnet (ir0rm @ 44.134.32.240) -> Sending message
From: I0OJJ@I0OJJ.ITA.EU
To : SYSOP@WW
SICD project Rome Italy - Msg sent by I0OJJ : 05/14/2019 16:04
Hi all,
after a no-refined re-implementation of a router grapher
after the JNOSGRAPH recently documented by N1URO, arranged
this last night, just have now the proof of the never
ceased attacks to our ham infrastructures.
The above, was documented by the file 'attacks.zip' which
is just splitted on 7plus mails
--
73 and ciao, gustavo i0ojj/ir0aab/ir0eq
Read previous mail | Read next mail
| |