Pierre,

Most attacks are for the purpose of gaining access to the system.  Buffer
overflows and similar attacks.  James should be relatively immune to them.

Now, assuming that you could break into James, what would you gain?  That
depends upon the OS, and the administrator.  For example, under linux you
need to be signed in as root in order to bind to privileged ports.  However,
a clever linux admin might use port forwarding so that James can run as a
non-privileged user.

Other attacks are denial of service attacks.  And the most common attack on
mail servers is probably just trying to find out how to use them for
spamming.

        --- Noel


--
To unsubscribe, e-mail:   <mailto:[EMAIL PROTECTED]>
For additional commands, e-mail: <mailto:[EMAIL PROTECTED]>

Reply via email to