You can also propose to everyone who want to verify the integrity of
its system to check that himself. A script like chkrootkit which
search for the signature of a past ssh (or other) attack.
A simple reference in the doc of ssh could alarm lots of people. cron
ta run it periodically, and don't bother to find a contact address.

On Thu, 23 Dec 2004 13:31:27 -0800, Karsten M. Self
<kmself@ix.netcom.com> wrote:
> > Attacking people's boxen running ssh seems to be a popular passtime at
> > the moment, it would be good to have a way to fight back against this
> > trend, rather than just protecting our own machines.
> >
> > Maybe there's some good reason NOT to contact people, I can't think
> > why.  Might not want to use your canonical email address though!


-- 
Marc Demlenne
GPG : 768FA483 (http://pgp.mit.edu)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to