Point of order: To be a honeypot the vulnerability would have to be on a system that served no other purpose, despite what ISS would have you believe. Cory Altheide Computer Forensics Specialist NNSA Cyber Forensics Center [EMAIL PROTECTED] > > -----Original Message----- > > From: Myers, Marvin [mailto:[EMAIL PROTECTED] > > Sent: Thursday, July 24, 2003 11:44 AM > > To: Jennifer Bradley; [EMAIL PROTECTED] > > Subject: RE: Re: [Full-Disclosure] morning_wood should stop > > posting xss > > > > > > Jennifer, > > Did you ever think that there is even the slightest > > possibility that the wood has done this on purpose? Have you > > never heard of a honey-pot. Some people in this world do have > > the ability to learn by observing others. So now I guess you > > are calling all of the honey-pot and honey-net operators > > moron's. Did you hear that Lance??
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html