Actually a better option might be to turn the exploited system into a
honeypot to try to gain some information about the attackers, their
methods and so on.

-- 
bye,
pabs

http://wiki.debian.org/PaulWise


-- 
To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/caktje6e9mjcbafubyckn_f5jgea3qwt2pcmkuyegcdvnqwq...@mail.gmail.com

Reply via email to