I've been holding off on responding to this thread but now....

I've dealth with security for some time on Unix/Linux systems. Some of my favorite products certainly have the ability to perform a counter attack however the author of those products always warn the user NOT to taunt happy fun ball. :-)

You will only annoy the attacker (presuming it's not a zombie) and you will become a target. Just a warning.



Daniel Staal wrote:

--As off Saturday, February 7, 2004 12:37 PM -0500, Wiggins d'Anconia is alleged to have said:

What is to stop a spammer or script kiddie finding out about your
ruse, possibly even listening in on the conversation, and rather
than trying to hack your system starts sending out mass emails to
people with a URL in it that directs them to your system and that
URL, all of a sudden your victims become his victims and he has
used you in a scheme to haunt the very users you wished to defend.


--As for the rest, it is mine.

Or, the more likely scenario: Launching his attack from a compromised computer in the first place. (That is, the first attempt to contact you is from some poor computer that the script kiddie has already compromised. Not their own computer. Not even someone who knows they are running the script kiddie's software.)

After all, that is the normal way they work...

Daniel T. Staal

---------------------------------------------------------------
This email copyright the author.  Unless otherwise noted, you
are expressly allowed to retransmit, quote, or otherwise use
the contents for non-commercial purposes.  This copyright will
expire 5 years after the author's death, or in 30 years,
whichever is longer, unless such a period is in excess of
local copyright law.
---------------------------------------------------------------



--
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]
<http://learn.perl.org/> <http://learn.perl.org/first-response>




Reply via email to