Anything for home user and not the technical one??

g geleem at bellsouth.net
Mon Jul 26 04:25:22 UTC 2010


Gene Heskett wrote:
<snip>

> Chuckle.  More likely the honeypot would have 'used' the attacker. ;-)

lol. could be.

next time i see him, i will ask if he has tried any more and if he set up
anything to log who "flies" were.

i do know that when they get attacker address with honeypot, never mentioned
how, that they do report to attackers isp and that many have been prosecuted.

> That was my view also.

only reason i have ever seen/or applied, to firewall all systems behind
a router is for business security.

after all, if you can not trust your family, it is time to start thinking
about getting a new family.


i do have one family of friends where a younger brother keep breaking into
his older sister's computer to read her emails.

i asked him one time if he ever found anything good and his replied nothing
but a bunch of 'girlie stuff'.

i asked why he kept looking and his reply was 'i can hope, can't i?'

i asked no more.


-- 

peace out.

tc,hago.

g
.

****
in a free world without fences, who needs gates.
**
help microsoft stamp out piracy - give linux to a friend today.
**
to mess up a linux box, you need to work at it.
to mess up an ms windows box, you just need to *look* at it.
**
learn linux:
'Rute User's Tutorial and Exposition' http://rute.2038bug.com/index.html
'The Linux Documentation Project' http://www.tldp.org/
'LDP HOWTO-index' http://www.tldp.org/HOWTO/HOWTO-INDEX/index.html
'HowtoForge' http://howtoforge.com/
****

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 545 bytes
Desc: OpenPGP digital signature
Url : http://lists.fedoraproject.org/pipermail/users/attachments/20100726/d64de1cd/attachment.bin 


More information about the users mailing list