On Fri, 4 Jan 2002, Michael O'Donnell wrote: > My understanding is that such traps don't pay off very often - you > typically find that the dirtbags have simply connected from another > compromised system.
Worse still, if you do something wrong, you risk discovery and/or further compromise of the system, including the attacker doing something nasty, like zeroing your partition table. The only safe way to create a "honey pot" or "fly trap" is by creating a duplicate system, with all important data removed or replaced, and isolated from other systems. > But I confess that I'd probably get a voyeuristic thrill watching some > dirtbag script-kiddy doing his dirtbag script-kiddy thing. Read _The Cuckoo's Egg_ by Clifford Stoll. -- Ben Scott <[EMAIL PROTECTED]> | The opinions expressed in this message are those of the author and do not | | necessarily represent the views or policy of any other person, entity or | | organization. All information is provided without warranty of any kind. | ***************************************************************** To unsubscribe from this list, send mail to [EMAIL PROTECTED] with the text 'unsubscribe gnhlug' in the message body. *****************************************************************
