Security Incidents mailing list archives
Re: Port 555 scan
From: Robert van der Meulen <rvdm () LIN-GEN COM>
Date: Tue, 13 Feb 2001 01:28:58 +0100
Hi, Quoting John Paul (jpaul () kormanmarketing com):
By this line of logic you would feel it is acceptable for others to exploit things to gain access to your systems as long as they don't change anything, correct?
It is. I _appreciate_ it when people do this. The only thing i ask is that they don't change stuff, keep their ethics in line (no mail-reading etc.), and at least do their best to notify me. Why would i want to stop someone from trying to gain access ? The only thing that can happen is somebody who finds a hole. If i keep an open policy about stuff like that, chances are the people who find the hole will be open about that too. Greets, Robert -- Linux Generation
Current thread:
- Re: Port 555 scan Ryan Russell (Feb 10)
- <Possible follow-ups>
- Re: Port 555 scan Ryan Russell (Feb 10)
- Re: Port 555 scan me (Feb 12)
- Port 555 scan me (Feb 10)
- Re: Port 555 scan Rod Longanilla (Feb 10)
- Re: Port 555 scan Aaron (Feb 10)
- Re: Port 555 scan Alex Luketa (Feb 10)
- Re: Port 555 scan Robert G. Ferrell (Feb 12)
- Re: Port 555 scan John Paul (Feb 12)
- Re: Port 555 scan Robert van der Meulen (Feb 13)