Or it's possibly an university student testing all the things he's
learning about tcp/ip, sockets and ports and it's really quite harmless.
>From what I saw in the log report did not really demonstrate anything I
would be inclined to call a serious attempt at hacking.

Ken Wilson
First Law of Optimisation: The speed of a non-working program is
irrelevant
(Steve Heller, 'Efficient C/C++ Programming')

-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]]On Behalf Of John Aldrich
Sent: Friday, October 08, 1999 10:01 AM
To: [EMAIL PROTECTED]
Subject: Re: [newbie] How do I turn in a hacker?


On Fri, 08 Oct 1999, you wrote:
> Here You Go My Friend...  I queried him for you.... all the info i
have
> found is below, i suggest emailing the following person with your
complaint:
> [EMAIL PROTECTED] (the admin from which he subscribes "ripe.net")
>
Actually, the person you need to email is
"[EMAIL PROTECTED]"
This is a university computer, so it sounds like someone
has hacked their mainframe and is using it to find "open"
redhat boxes. :-)
        John

Reply via email to