PS. I am planning on doing those things you suggested, but it may take me a while. So if you don't hear from me for don't think I've disappeared, just very slow and time limited.
Shelagh
On Wed, 28 Apr 2004 13:25:03 -0400, jludwig <wralphie@xxxxxxxxxxx> wrote:
On Wed, 2004-04-28 at 10:57, Steve Searle wrote:Around 03:49pm on Wednesday, April 28, 2004 (UK time), Jay Daniels scrawled:
> > On Wed, Apr 28, 2004 at 08:05:09AM -0400, jludwig wrote:
> > On Wed, 2004-04-28 at 07:40, Steve Searle wrote:
> > > Around 05:14am on Wednesday, April 28, 2004 (UK time), Rodolfo J. Paiz scrawled:
> > > > > > > and origin. This is, for example, how "Denial of Service" (DoS) attacks are > > > > performed... hack 1,000 innocent bystanders, then use their machines to > > > > attack your target while *never* showing your face directly. And, of > > > > course, the innocent bystanders get blacklisted, banned, and sometimes > > > > prosecuted. As if that weren't enough, some hackers use networks to spread > > > > > > Have you a cite for the prosecution of someone who was hacked into?
> > > While I agree with you that protection is very important regardless of
> > > the value of any data on the PC, and that unprotected PCs have often
> > > been used for DoS attacks, I would have thought that claiming people
> > > have been prosecuted is scaremongering. As ever, I could well be wrong
> > > 'though.
> > > > > > Cheers
> > > > > > Steve
> > In any case it's not worth some law enforcement officials showing up at
> > your door and "borrowing" your hard drive(s) for several months.
> > I think they take everything you own and it's up to you to prove your
> innocence. Even if you are innocent, how do you get compensated for
> such actions. This could go on for months or years and you may never
> get your property or your life back.
I suspect in this heavy handed law enforcement scenario, having a properly configure firewall is not going to be much use. I still would like to see some evidence of people being prosecuted because they have allowed their computer to be hacked.
SteveThere are sites that deal with computer forensics. The issue here is that your computer or hard drive becomes "evidence". They upon inspection of your system would/could quickly determine that your system was a "zombie". But a knife, car, etc., used in a crime becomes evidence and might never be returned. -- jludwig <wralphie@xxxxxxxxxxx>
-- "First, do no harm" J.Holt