Eddy,

Rather than redirect to a reporting agency, there is an inexpensive solution
out there (approx. 3K+) that will do just what you ask.  ManTrap ( by recourse
technologies) works with your existing firewall and any violations to your
security policy that you wish to be investigated will be redirected to a
prototype environment (hopefully one that mimics your real site - only
difference is the infrastructure behind the site is a dynamic model to appease
the hacker).  Meanwhile, every key stroke he makes and the source of his
origin is being recorded and derived respectively.

Just a thought...

Eddy Kalem wrote:

> Does anyone know if there's a host or an organization I can redirect
> non-permitted port connections to. For example, say someone's trying to
> exploit port 1080 at my firewall--which I'm currently blocking at my
> firewall--and lets say instead of blocking the address, I redirect it,
> keeping the originating IP address, to the G men's web server or some other
> organization that logs this type of activity. Is there such a site?
>
> Eddy Kalem
> Phyve, formerly Digital Medical Systems
>
> -
> [To unsubscribe, send mail to [EMAIL PROTECTED] with
> "unsubscribe firewalls" in the body of the message.]

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to