Bruce_Kahn@notesdev.ibm.com wrote:
> If you determined that a hacker was attacking your system, would
> you first inform them:
>
> > 1: Network failure
> > 2: CS crash/shutdown
> > 3: "Im a bad boy"
> > 4: "Im not allowed to be the CFO of the company"
> > 5: "Sorry C&S Team AA, you are still not allowed to assume Bruces identity"
> > ...
Hmm, Im impressed that you alone have developed the means to make software clairvoyant and have imbued it with the ability to tell a hacker from a legitimate user who is retrying something they think should/will work.
I have made no such claim. I claimed that if I detect a hacker - I am dropping the connection and I think that is good protocol practice. -- Doug Royer | http://INET-Consulting.com -------------------------------|----------------------------- Doug@Royer.com | Office: (208)612-INET http://Royer.com/People/Doug | Fax: (866)594-8574 | Cell: (208)520-4044 We Do Standards - You Need Standards
Attachment:
smime.p7s
Description: S/MIME Cryptographic Signature