On Fri, 4 Jan 2002, Michael O'Donnell wrote:
> My understanding is that such traps don't pay off very often - you
> typically find that the dirtbags have simply connected from another
> compromised system.

  Worse still, if you do something wrong, you risk discovery and/or further
compromise of the system, including the attacker doing something nasty, like
zeroing your partition table.

  The only safe way to create a "honey pot" or "fly trap" is by creating a
duplicate system, with all important data removed or replaced, and isolated
from other systems.

> But I confess that I'd probably get a voyeuristic thrill watching some
> dirtbag script-kiddy doing his dirtbag script-kiddy thing.

  Read _The Cuckoo's Egg_ by Clifford Stoll.

-- 
Ben Scott <[EMAIL PROTECTED]>
| The opinions expressed in this message are those of the author and do not |
| necessarily represent the views or policy of any other person, entity or  |
| organization.  All information is provided without warranty of any kind.  |


*****************************************************************
To unsubscribe from this list, send mail to [EMAIL PROTECTED]
with the text 'unsubscribe gnhlug' in the message body.
*****************************************************************

Reply via email to