To echo what others have said: I would suggest: Perform damage
control, identify the vulnerability (e.g., weak password, browsing
from a public terminal, etc.), take corrective action, and move on.

  Trying to "catch" the offenders is a hopelessly proposition.
They're usually impossible to trace.  When it is possible, it's almost
never cost-effective.  If you do trace them, chances are you'll find
they're in a jurisdiction where prosecution is difficult.  Best case,
you and others spend a lot of time, effort, and money prosecuting
someone, they get hit with a $500 fine, and continue doing the same
thing.  Even if that individual sees the light, tens of thousands more
will continue.

  The abuse desks at big services (MSN, Gmail, etc.) are perpetually
deluged in a flood of reports.  Contacting them with anything less
than a major-network-news-worthy DoS attack is a waste of your time.

-- Ben
_______________________________________________
gnhlug-discuss mailing list
gnhlug-discuss@mail.gnhlug.org
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss/

Reply via email to