>> I've worked with enough penetration test teams and different pen testers to identify that each attacker/intruder definitely has identifiable "styles," habits and other traits that could be identifiable give-aways.
If you're experienced enough to recognize them, are you also able to mimic them, perhaps throwing off an investigation? Larry Seltzer Contributing Editor, PC Magazine [email protected] http://blogs.pcmag.com/securitywatch/ _______________________________________________ Fun and Misc security discussion for OT posts. https://linuxbox.org/cgi-bin/mailman/listinfo/funsec Note: funsec is a public and open mailing list.
