"Michael H. Warfield" wrote:
>
<big snip>
> This same technique can be used to immitate a port scan for the
> deliberate purpose of turning any of your reaction systems against you.
> It can always be done. It has been done. It will be done again, I'm
> sure...
>
> Don't provide them with the very tools they can use to use against
> you and embarass you.
>
Good points. This is precisely the reason that I would not automate the
entire process but only the lookup and building of the mail with the
offending log messages enclosed. The time to do this is the primary
reason that I don't send such letters as often as I should. port 111
for instance. What are the chances someone accidently directed their
nfs mount to my machine? Next to nil I would say.
Bret
_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list