28 Sep 13, 07:43AM
Ah, since you mentioned the ACWC clients : none of the checks are disruptive.
When something suspect is detected, it's reported and collected. For example :
When something suspect is detected, it's reported and collected. For example :
[SELECT ALL] Code:
01/09/2013 20:03:55 Server "81.169.205.5": 95.92.55.110 .LeXuS'' triggered msg 3 (wrong client auth response),
03/09/2013 17:13:35 Server "81.169.205.5": 95.92.55.110 .LeXuS'' triggered msg 3 (wrong client auth response),
03/09/2013 17:13:55 Server "81.169.205.5": 95.92.55.110 .LeXuS'' triggered msg 4 (sent auth response too early),