Björn Persson wrote:
Your address will go on the "try other exploits" list anyway,
*If* they scan a port that is not DROP'd.
You're also assuming that the attacker doesn't already own any of the other machines in the local network, or café, or airport, or wherever you are at the moment. If he does, he'll be able to eavesdrop your established connections, and probably hijack them too. Even if those connections are encrypted and authenticated he'll still discover that your machine exists, despite all your stealthiness.
I'll let you spot the gaping flaw in this argument. I'm sick of this conversation.
-- Matthew Please do not quote my e-mail address unobfuscated in message bodies. -- "unsubscribe me plz!!" -- Newbies -- fedora-devel-list mailing list fedora-devel-list@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/fedora-devel-list