reply to jjjacer
Re: Multiple supported properties Huh?
"Bots" float around on the internet, and "stick" to a vulnerability.
Traced to you? Prove it. Traceroute. Ping. Finger. Ook, they did!
Port 2180 is for LAN. It "could" be on your LAN.
If it is your job, Make the flow chart: clean the data stream.
I was thinking more what I said: if you do write a proposal, I would suggest you present it as better than hiring an outside consultant, which costs more, and if they want to hire an outside consultant, then fine. But if they want you to do the same job as an outside consultant, then pay for the job and when, you have achieved it, return to your salary. Unless, of course, they feel you are worth more money! But the short-term in-house consultant fee is a better deal for them, if you can do the job. They have the written proposal, in handwriting is okay, and you say you think you can do the job.
If not, suggest an outside consultant: be a hero for the suggestion.
However, I really think you can do this.
BotHunter, a free program from SRI International, works with Unix, Linux, Mac OS, Windows XP, and Vista. Though designed for networks, it can also run on stand-alone desktops and laptops.
Do not discount "disgruntled employees" doing this to the hotels.
"Bots" are good for "side money". It could be the guy working in the parking garage. Use the software to track it down, if it is an "inside job".