piclist 2002\11\06\042952a >
Thread: Help identify major hackers / Identify recent threats ~~
face BY : Russell McMahon email (remove spam text)

> Umm, so the hackers who can't quite get into
> your system WILL be able to intercept your
> firewall data sent out afterward?? Sounds
> like a great way for hackers to fine-tune
> their efforts and see what's working...

Quite possibly:-)
The general thought did occur to me.

The broad choices, as in all such areas where one is under attack, is to
either hide in the dark behind closed doors (or hopefully closed firewalls)
and hope the baddies will go away, or join, albeit in ever so small a way,
with those taking action against them (Hamlet had a soliloquy on this *
:-) ).

The risk seems little enough in this case and the potential gains
(especially given the stream of would be invaders who seem to beat a path to
my door) to justify joining the contributors.




To be, or not to be: that is the question.
Whether 'tis nobler in the mind to suffer
The slings and arrows of outrageous fortune
Or to take arms against a sea of troubles
And by opposing end them.


Tube heat, or nog tube heat: data's congestion.
ladder tricks snow blur Hindu mine dew sulpher
Tes slinks endharrows have ow! Cages portion
Orc tube rake harms hay canst a Z oeuf bubbles
Ant ply cop posy kingdom

   Kenneth Koch from "One Thousand Avant-Garde Plays"

http://www.piclist.com#nomail Going offline? Don't AutoReply us!
email @spam@listservspam_OUTspamKILLspammitvma.mit.edu with SET PICList DIGEST in the body

<004401c28576$cb90e120$2301a8c0@Paradise> 7bit

See also: www.piclist.com/techref/index.htm?key=help+identify+major
Reply You must be a member of the piclist mailing list (not only a www.piclist.com member) to post to the piclist. This form requires JavaScript and a browser/email client that can handle form mailto: posts.
Subject (change) Help identify major hackers / Identify recent threats ~~

month overview.

new search...