> The obvious techniques I can see include > 1) Filter on IP address (e.g. German attack on XS4ALL) > 2) Filter on DNS Name > 3) Filter on Patterns in URL > 4) Filter on Patterns in PUT/GET Requests > 5) Filter on Patterns in Response. > 6) Traffic Analysis on reading patterns 7) Punish all those accessing forbidden web sites with caning or forced labor.