On Fri, 23 Jul 1999, Paul L. Lussier wrote: > Using the logs as evidence though, combined with evidence of a break-in is > similar to the store owner having a security video monitoring tape of the same > guy "casing" the place 2 days earlier. > -- Agreed. As I said, I have no problem busting people that actually DO something. I see no problem with using evidence of a port scan as establishing a pattern, once and ACTUAL BREAK-IN has occured, but it is not in-and-of-itself harmful or dangerous to network security. Derek D. Martin | UNIX System Administrator [EMAIL PROTECTED] | [EMAIL PROTECTED] - [To unsubscribe, send mail to [EMAIL PROTECTED] with "unsubscribe firewalls" in the body of the message.]
- Re: trial & charges Derek Martin
- Re: trial & charges Dave Gillett
- Re: trial & charges Derek Martin
- Re: trial & charges Dave Gillett
- Re: trial & charges Lamb Donald
- Re: trial & charges Matthew G . Harrigan
- RE: trial & charges Myllym�ki Sakari
- Re: trial & charges Paul Howell
- RE: trial & charges Derek Martin
- RE: trial & charges Randall, Mark
- Re: trial & charges Derek Martin
- Re: trial & charges Paul D. Robertson
- Re: trial & charges P L STEINBRUCH
- Re: trial & charges Paul D. Robertson
- Re: trial & charges P L STEINBRUCH
- Re: trial & charges Derek Martin
- Re: trial & charges Paul D. Robertson
- Re: trial & charges Bennett Todd
- Re: trial & charges Paul D. Robertson
- Re: trial & charges Michael H. Warfield
- Re: trial & charges Bennett Todd
