Re: 10.4 IDENTIFY Command II

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




Bruce_Kahn@notesdev.ibm.com wrote:

> If you determined that a hacker was attacking your system, would
> you first inform them:
>
> > 1: Network failure
> > 2: CS crash/shutdown
> > 3: "Im a bad boy"
> > 4: "Im not allowed to be the CFO of the company"
> > 5: "Sorry C&S Team AA, you are still not allowed to assume Bruces identity"
> > ...

Hmm, Im impressed that you alone have developed the means to make software clairvoyant and have imbued it with the ability to tell a hacker from a legitimate user who is retrying something they think should/will work.
I have made no such claim. I claimed that if I detect
a hacker - I am dropping the connection and I think
that is good protocol practice.

--

 Doug Royer                     |   http://INET-Consulting.com
 -------------------------------|-----------------------------
 Doug@Royer.com                 | Office: (208)612-INET
 http://Royer.com/People/Doug   |    Fax: (866)594-8574
                                |   Cell: (208)520-4044

                We Do Standards - You Need Standards

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature


[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Fedora Users]