I've finished my program to detect these. It's available on J2O:
http://www.jazz2online.com/downloads...p?levelid=2639
It was made quite quickly, and I would say I may have rushed a bit, so there are probably still some bugs in it. It's also my first major program coded in C. But it gets the job done, so hopefully we may all have some more insight into who is behind these.
(It's also a good server logging utility, because it records all joins, not just suspicious ones)
__________________
With our extreme gelatinous apology,
We beg to inform your Imperial Majesty,
Unto whom be dominion and power and glory,
There still remains that strange precipitate
Which has the quality to resist
Our oldest and most trusted catalyst.
It is a substance we cannot cremate
By temperatures known to our Laboratory.
~ E.J. Pratt
|