I don't think you understand what you are about to get yourself into!
Lets say someone does crack it and not tell you! No they have a host they
can trojan and use to attack other hosts! Or worse yet post it on some
hacker web site and let their buddies use it also to do the same thing!
Depending on the OS I would look into a good penetration testing from a
know source.....Rhino9....L0pht......etc...
Christopher Witter
MCSE, MCP +Internet, ICIS, IIAE
Windows NT Crashed.
I am the Blue Screen of Death.
No one hears your screams.
On Tue, 30 Mar 1999, Joshua Chamas wrote:
> Hi,
>
> I have been spending a lot of time on system security
> prior to going live with a www service, and I was interested
> in the prospect of running a hacking contest with a
> cash reward for breaking in, and visibly modifying
> the www site.
>
> I believe the conditions of winning the prize would be:
>
> ) documenting the hack
> ) forbidding hacking systems of upstream ISPs
> ) proposals for fixing the found security holes
> ) a finite timeline for the hack to occur in, say a week
> ) preservation of the system logs, so I can observe and learn
> from hacking strategies
>
> The upside of course is seeing what system vulnerabilities
> that I may have overlooked by having a hacker uncover them.
> I fear the potential downside of drawing too much unwanted
> attention in the future to the site from would be hackers,
> after the contest is over.
>
> What do you all think about this?
>
> If I should choose to proceed, how should I best advertise
> this contest?
>
> Thanks,
>
> Joshua
> -
> [To unsubscribe, send mail to [EMAIL PROTECTED] with
> "unsubscribe firewalls" in the body of the message.]
>
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]