[NTLUG:Discuss] Red Worm flood on port 80
Fred James
fredjame at concentric.net
Sat Aug 4 23:08:02 CDT 2001
I am not very good at this, but I was once given these two questions,
which I have found helpful when I can remember them:
(1) To decide if it is ethical, ask what it would be like if everyone
did it.
(2) To decide if it is moral, ask what it would be like if it were done
to you.
Additionally, I understand that the attacks are often mounted from
unwitting servers which have themselves be compromised.
And then I have to admit that the "blast back" approach has crossed my
mind, too, and not without relish at the thought.
>
> Is there anything that I could do to create havok with the systems scanning
> me? What about creating a default.ida file and filling it with some data?
> (I know...that just fills up more bandwidth...)
>
> But there has to be some organization doing counter-'terrorist' hacking.
--
...make every program a filter...
More information about the Discuss
mailing list