Gene Heskett wrote: <snip> > Chuckle. More likely the honeypot would have 'used' the attacker. ;-) lol. could be. next time i see him, i will ask if he has tried any more and if he set up anything to log who "flies" were. i do know that when they get attacker address with honeypot, never mentioned how, that they do report to attackers isp and that many have been prosecuted. > That was my view also. only reason i have ever seen/or applied, to firewall all systems behind a router is for business security. after all, if you can not trust your family, it is time to start thinking about getting a new family. i do have one family of friends where a younger brother keep breaking into his older sister's computer to read her emails. i asked him one time if he ever found anything good and his replied nothing but a bunch of 'girlie stuff'. i asked why he kept looking and his reply was 'i can hope, can't i?' i asked no more. -- peace out. tc,hago. g . **** in a free world without fences, who needs gates. ** help microsoft stamp out piracy - give linux to a friend today. ** to mess up a linux box, you need to work at it. to mess up an ms windows box, you just need to *look* at it. ** learn linux: 'Rute User's Tutorial and Exposition' http://rute.2038bug.com/index.html 'The Linux Documentation Project' http://www.tldp.org/ 'LDP HOWTO-index' http://www.tldp.org/HOWTO/HOWTO-INDEX/index.html 'HowtoForge' http://howtoforge.com/ ****
Attachment:
signature.asc
Description: OpenPGP digital signature
-- users mailing list users@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe or change subscription options: https://admin.fedoraproject.org/mailman/listinfo/users Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines