On Fri, 23 Jul 1999, Paul L. Lussier wrote:

> Using the logs as evidence though, combined with evidence of a break-in is 
> similar to the store owner having a security video monitoring tape of the same 
> guy "casing" the place 2 days earlier.
> -- 

Agreed.  As I said, I have no problem busting people that actually DO
something.  I see no problem with using evidence of a port scan as
establishing a pattern, once and ACTUAL BREAK-IN has occured, but it is
not in-and-of-itself harmful or dangerous to network security.



Derek D. Martin           |  UNIX System Administrator
[EMAIL PROTECTED] |  [EMAIL PROTECTED]

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to