Complete.Org: Mailing Lists: Archives: discussion: April 2000:
[aclug-L] Re: To whom it may concern.
Home

[aclug-L] Re: To whom it may concern.

[Top] [All Lists]

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index] [Thread Index]
To: discussion@xxxxxxxxx
Subject: [aclug-L] Re: To whom it may concern.
From: John Goerzen <jgoerzen@xxxxxxxxxxxx>
Date: 08 Apr 2000 00:05:50 -0500
Reply-to: discussion@xxxxxxxxx

I submit that "attacking back" is not a wise, ethical, or legal course
of action in any case -- especially considering that the attack may
originate from an innocent location who has itself been attacked.

-- John

"Patrick R. Klee" <trekkie@xxxxxxxxxxxxx> writes:

> I borrowed a REALLY good book called Maximum Linux Security.  It covers what 
> to do
> in the event of an attack and how to attack back.  It sounds like someone was
> accessing your machine and erasing your hard disk.  But, I agree with John G.
> NEVER place anything in the / directory and/or download as /root
> 
> But, it sounds as though someone may have telneted into your Linux box.
> 
> 
> Patrick
> 
> 0 1 "My two bits"
> 
> 
> 
> 
> -- This is the discussion@xxxxxxxxx list.  To unsubscribe,
> visit http://tmp2.complete.org/cgi-bin/listargate-aclug.cgi
> 

-- 
John Goerzen   Linux, Unix consulting & programming   jgoerzen@xxxxxxxxxxxx |
Developer, Debian GNU/Linux (Free powerful OS upgrade)       www.debian.org |
----------------------------------------------------------------------------+
The 861,651st digit of pi is 2.

-- This is the discussion@xxxxxxxxx list.  To unsubscribe,
visit http://tmp2.complete.org/cgi-bin/listargate-aclug.cgi


[Prev in Thread] Current Thread [Next in Thread]