Help identify major hackers / Identify recent threats ~~
Russell McMahon email (remove spam text)
> Umm, so the hackers who can't quite get into
> your system WILL be able to intercept your
> firewall data sent out afterward?? Sounds
> like a great way for hackers to fine-tune
> their efforts and see what's working...
The general thought did occur to me.
The broad choices, as in all such areas where one is under attack, is to
either hide in the dark behind closed doors (or hopefully closed firewalls)
and hope the baddies will go away, or join, albeit in ever so small a way,
with those taking action against them (Hamlet had a soliloquy on this *
The risk seems little enough in this case and the potential gains
(especially given the stream of would be invaders who seem to beat a path to
my door) to justify joining the contributors.
To be, or not to be: that is the question.
Whether 'tis nobler in the mind to suffer
The slings and arrows of outrageous fortune
Or to take arms against a sea of troubles
And by opposing end them.
Tube heat, or nog tube heat: data's congestion.
ladder tricks snow blur Hindu mine dew sulpher
Tes slinks endharrows have ow! Cages portion
Orc tube rake harms hay canst a Z oeuf bubbles
Ant ply cop posy kingdom
Kenneth Koch from "One Thousand Avant-Garde Plays"
http://www.piclist.com#nomail Going offline? Don't AutoReply us!
email mitvma.mit.edu with SET PICList DIGEST in the body listserv
See also: www.piclist.com/techref/index.htm?key=help+identify+major
You must be a member of the
piclist mailing list
(not only a www.piclist.com member) to post to the