I would say to roll your own binary hardcoded to only hit 1 IP address, and have it held on a law enforcement approved network under the supervision of a qualified agent. 0.02
On Sun, Jan 4, 2009 at 8:06 PM, Jeffrey Lyon <jeffrey.l...@blacklotus.net>wrote: > Say for instance one wanted to create an "ethical botnet," how would > this be done in a manner that is legal, non-abusive toward other > networks, and unquestionably used for legitimate internal security > purposes? How does your company approach this dilemma? > > Our company for instance has always relied on outside attacks to spot > check our security and i'm beginning to think there may be a more user > friendly alternative. > > Thoughts? > > -- > Jeffrey Lyon, Leadership Team > jeffrey.l...@blacklotus.net | http://www.blacklotus.net > Black Lotus Communications of The IRC Company, Inc. > > Look for us at HostingCon 2009 in Washington, DC on August 10th - 12th > at Booth #401. > >