17 Dec
2003
17 Dec
'03
11:17 p.m.
The obvious techniques I can see include 1) Filter on IP address (e.g. German attack on XS4ALL) 2) Filter on DNS Name 3) Filter on Patterns in URL 4) Filter on Patterns in PUT/GET Requests 5) Filter on Patterns in Response. 6) Traffic Analysis on reading patterns
7) Punish all those accessing forbidden web sites with caning or forced labor.