Actually a better option might be to turn the exploited system into a honeypot to try to gain some information about the attackers, their methods and so on.
-- bye, pabs http://wiki.debian.org/PaulWise -- To UNSUBSCRIBE, email to debian-security-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/caktje6e9mjcbafubyckn_f5jgea3qwt2pcmkuyegcdvnqwq...@mail.gmail.com