[aclug-L] Re: To whom it may concern.
[Top] [All Lists]
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index] [Thread Index]
I submit that "attacking back" is not a wise, ethical, or legal course
of action in any case -- especially considering that the attack may
originate from an innocent location who has itself been attacked.
-- John
"Patrick R. Klee" <trekkie@xxxxxxxxxxxxx> writes:
> I borrowed a REALLY good book called Maximum Linux Security. It covers what
> to do
> in the event of an attack and how to attack back. It sounds like someone was
> accessing your machine and erasing your hard disk. But, I agree with John G.
> NEVER place anything in the / directory and/or download as /root
>
> But, it sounds as though someone may have telneted into your Linux box.
>
>
> Patrick
>
> 0 1 "My two bits"
>
>
>
>
> -- This is the discussion@xxxxxxxxx list. To unsubscribe,
> visit http://tmp2.complete.org/cgi-bin/listargate-aclug.cgi
>
--
John Goerzen Linux, Unix consulting & programming jgoerzen@xxxxxxxxxxxx |
Developer, Debian GNU/Linux (Free powerful OS upgrade) www.debian.org |
----------------------------------------------------------------------------+
The 861,651st digit of pi is 2.
-- This is the discussion@xxxxxxxxx list. To unsubscribe,
visit http://tmp2.complete.org/cgi-bin/listargate-aclug.cgi
|
|