> My general question is just when do I need to do 
> something other than just check my firewall logs for
the
> source address and verify they weren't successful in

> gaining access anywhere vs. actually reporting an 
> incident.

Why do anything?  The general sense is that the return
doesn't really justify the time required to report
such things.  So, if the scans are unsuccessful, why
bother with them at all?  Seems like a colossal waste
of time...



__________________________________________________
Do you Yahoo!?
Yahoo! Mail Plus - Powerful. Affordable. Sign up now.
http://mailplus.yahoo.com

Reply via email to