On Sat, 22 Dec 2001, Craig White wrote: ---snip--- > --- > If you really don't trust the box, the solution is even simpler - back > up data - reload. I hope that what you meant to say was, if you are > suspicious. > --- Yeah, good point. For any host you care about, that really is the best/only way to go. You're right, I should have mentioned that too :) I was really focussing in on how to see what's listening though :) You're abosolutely right though, I'm glad you did bring that up :) ---snip--- > --- > a network voyeur 'eh? Sounds rather deprecated. > > Thanks Wes, for the great explanation, I am continually learning and > there are some really great resources on this list. Yeah, it is a rather twisted thing :) That's a big part of my job...sitting and staring at network traffic all the time, looking for problems/attacks. The difference though is that I'm asked to do it :) Well, actually to draw that analogy back to voyeurism...being asked to watch might be just as deviant. Hmm, I'll just drop it now, LOL ;) C ya :) Wes -- Wes Bateman, GCIA Chief Security Officer ManISec, Inc. - "Managed Internet Security Services" http://www.manisec.com wes@manisec.com