Anything for home user and not the technical one??

g geleem at
Mon Jul 26 04:25:22 UTC 2010

Gene Heskett wrote:

> Chuckle.  More likely the honeypot would have 'used' the attacker. ;-)

lol. could be.

next time i see him, i will ask if he has tried any more and if he set up
anything to log who "flies" were.

i do know that when they get attacker address with honeypot, never mentioned
how, that they do report to attackers isp and that many have been prosecuted.

> That was my view also.

only reason i have ever seen/or applied, to firewall all systems behind
a router is for business security.

after all, if you can not trust your family, it is time to start thinking
about getting a new family.

i do have one family of friends where a younger brother keep breaking into
his older sister's computer to read her emails.

i asked him one time if he ever found anything good and his replied nothing
but a bunch of 'girlie stuff'.

i asked why he kept looking and his reply was 'i can hope, can't i?'

i asked no more.


peace out.



in a free world without fences, who needs gates.
help microsoft stamp out piracy - give linux to a friend today.
to mess up a linux box, you need to work at it.
to mess up an ms windows box, you just need to *look* at it.
learn linux:
'Rute User's Tutorial and Exposition'
'The Linux Documentation Project'
'LDP HOWTO-index'

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 545 bytes
Desc: OpenPGP digital signature
Url : 

More information about the users mailing list