Point of order: To be a honeypot the vulnerability would have to be on a system that served no other purpose, despite what ISS would have you believe. Cory Altheide Computer Forensics Specialist NNSA Cyber Forensics Center [EMAIL PROTECTED] > > -----Original Message----- > > From: Myers, Marvin [mailto:[EMAIL PROTECTED] > > Sent: Thursday, July 24, 2003 11:44 AM > > To: Jennifer Bradley; [EMAIL PROTECTED] > > Subject: RE: Re: [Full-Disclosure] morning_wood should stop > > posting xss > > > > > > Jennifer, > > Did you ever think that there is even the slightest possibility > > that the wood has done this on purpose? Have you never heard of a > > honey-pot. Some people in this world do have the ability to learn by
> > observing others. So now I guess you are calling all of the > > honey-pot and honey-net operators moron's. Did you hear that Lance?? Consider then the concept of a 'Honey Token' http://securityfocus.com/infocus/1713 Thanks for your time, [EMAIL PROTECTED] "Got TANG?" _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
