Scanning is always a precursor to an attack, or to determine if any obvious 
methodology can be used to attack. At least that's how it has been 
historically viewed.

In my opinion there is no legitimate reason to scan a remote host or network
without the permission of the owners. Otherwise it is in fact excessive 
behaviour.



Andy Dills wrote:

[alot of interesting points deleted]

> You don't have to. This is why I never understood why people care so much
> about probing. If you do a good job with your network, probing will have
> zero affect on you. All the person probing can do (regardless of their
> intent) is say "Gee, I guess there aren't any vulnerabilities with this
> network."
> Andy
> Andy Dills                              301-682-9972
> Xecunet, LLC                            www.xecu.net

Reply via email to