On Mon, 11 Jun 2001, Roy Rapoport wrote:
> a well-configured SSH server and you break into it because you used EM
> snooping to listen to my keystrokes, I'm obviously not at fault for what

Are there any cases of private individuals hacking sites through
EM snooping. How would you catch them if there is no logs, no
trace of the intrusion???



[EMAIL PROTECTED]
"Blessed are those who have not seen and yet have faith." - John 20:29

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to