a good offense or a good deffense

Discussion in 'Security Software' started by a good offense is better, Aug 31, 2004.

  1. instead of sitting here waiting for a hacker to finally get me can't i do
    something to their attemps to get me, other than reporting to hacker watch,
    is there something i can install to give back to a hacker to make his life
    more miserable??
     
    a good offense is better, Aug 31, 2004
    #1
    1. Advertisements

  2. Don't be so sure that it's a person, and not a zombie/compromised computer.
    Don't get involved in revenge games...just head off attacks at the pass. If
    you're really interested, try finding out the IP address & the owner of that
    netblock, and report the issue to the abuse address listed.

    www.arin.net/whois may help.
     
    Lanwench [MVP - Exchange], Aug 31, 2004
    #2
    1. Advertisements

  3. "a good offense is better" <a good offense is
    > wrote in message
    No.
     
    Karl Levinson [x y] mvp, Aug 31, 2004
    #3
  4. a good offense is better

    Jeff Cochran Guest

    If you're asking this question, then you shouldn't. You don't
    understand the problem well enough to try. Hackers would rarely use
    their own systems, so you're attacking a system that got compromised.
    And likely in violation of a number of laws.

    Jeff
     
    Jeff Cochran, Aug 31, 2004
    #4
  5. Well on Star Trek you could send a Tachion Impulse Feedback burst through
    your Deflector Array and fry'em where they are sitting.


    --

    Phillip Windell [MCP, MVP, CCNA]
    www.wandtv.com


    "a good offense is better" <a good offense is
    > wrote in message
    news:...
     
    Phillip Windell, Sep 1, 2004
    #5
  6. Actually, I do understand the desire to do so. I feel the same about
    Spammers and Telemarketers. But the truth is, no..there isn't any real
    effective way. Don't let Hollywood give you ideas about what can really be
    done with a computer. Technologically speaking we are still using "two tin
    cans and a string" in real life when compared to the stuff they come up with
    in movies.


    --

    Phillip Windell [MCP, MVP, CCNA]
    www.wandtv.com


     
    Phillip Windell, Sep 1, 2004
    #6
  7. Everyone knows that only works with Mac OSX.

     
    Lanwench [MVP - Exchange], Sep 1, 2004
    #7
  8. You mean that part in Swordfish where the hacker dude cracked 256 AES encryption on
    his desktop in less than 24 hours was fake? --- Steve


     
    Steven L Umbach, Sep 1, 2004
    #8
  9. Wow! Let's all switch to MacOS X! I want a Deflector Array too! :)

    "Lanwench [MVP - Exchange]" wrote in message
     
    Lionel Fourquaux, Sep 1, 2004
    #9
  10. 24hours! Why so long? Usually it takes 1 minute and 58 seconds while bomb
    is ticking with 2 mintutes remaining! They always get it 2 seconds before
    for the timer runs out.


    --

    Phillip Windell [MCP, MVP, CCNA]
    www.wandtv.com


     
    Phillip Windell, Sep 2, 2004
    #10
  11. Ah!, that's right,...it's those bio-gelpacks things.

    --

    Phillip Windell [MCP, MVP, CCNA]
    www.wandtv.com

    "Lanwench [MVP - Exchange]"
     
    Phillip Windell, Sep 2, 2004
    #11
  12. a good offense is better

    S. Pidgorny Guest

    An interesting technique is netfilter's TARPIT. Here's a simple descrption:

    http://www.securityfocus.com/infocus/1723

    Confises the attacker and consumes her resources. That, however, works on a
    system which name starts with a L.
     
    S. Pidgorny, Sep 6, 2004
    #12
    1. Advertisements

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments (here). After that, you can post your question and our members will help you out.