So, I see that it is important to have a good firewall on the net. I must
tell some of my more innocent friends.
PS. I am planning on doing those things you suggested, but it may take me a
while. So if you don't hear from me for don't think I've disappeared, just
very slow and time limited.
Shelagh
On Wed, 28 Apr 2004 13:25:03 -0400, jludwig <wralphie(a)comcast.net> wrote:
On Wed, 2004-04-28 at 10:57, Steve Searle wrote:
> Around 03:49pm on Wednesday, April 28, 2004 (UK time), Jay Daniels
> scrawled:
>
> > > On Wed, Apr 28, 2004 at 08:05:09AM -0400, jludwig wrote:
> > > On Wed, 2004-04-28 at 07:40, Steve Searle wrote:
> > > > Around 05:14am on Wednesday, April 28, 2004 (UK time), Rodolfo J.
> Paiz scrawled:
> > > > > > > > and origin. This is, for example, how "Denial
of Service"
> (DoS) attacks are > > > > performed... hack 1,000 innocent bystanders,
> then use their machines to > > > > attack your target while *never*
> showing your face directly. And, of > > > > course, the innocent
> bystanders get blacklisted, banned, and sometimes > > > > prosecuted. As
> if that weren't enough, some hackers use networks to spread > > > >
> >
> Have you a cite for the prosecution of someone who was hacked into?
> > > > While I agree with you that protection is very important
> regardless of
> > > > the value of any data on the PC, and that unprotected PCs have
> often
> > > > been used for DoS attacks, I would have thought that claiming
> people
> > > > have been prosecuted is scaremongering. As ever, I could well be
> wrong
> > > > 'though.
> > > > > > > Cheers
> > > > > > > Steve
> > > In any case it's not worth some law enforcement officials showing up
> at
> > > your door and "borrowing" your hard drive(s) for several months.
> > > I think they take everything you own and it's up to you to prove
> your
> > innocence. Even if you are innocent, how do you get compensated for
> > such actions. This could go on for months or years and you may never
> > get your property or your life back.
>
> I suspect in this heavy handed law enforcement scenario, having a
> properly configure firewall is not going to be much use. I still would
> like to see some evidence of people being prosecuted because they have
> allowed their computer to be hacked.
>
> Steve
There are sites that deal with computer forensics. The issue here is
that your computer or hard drive becomes "evidence". They upon
inspection of your system would/could quickly determine that your system
was a "zombie". But a knife, car, etc., used in a crime becomes evidence
and might never be returned.
-- jludwig <wralphie(a)comcast.net>
--
"First, do no harm" J.Holt