On Sat, 22 Dec 2001, Craig White wrote:
---snip---
> ---
> If you really don't trust the box, the solution is even simpler - back
> up data - reload. I hope that what you meant to say was, if you are
> suspicious.
> ---
Yeah, good point. For any host you care about, that really is the
best/only way to go. You're right, I should have mentioned that too :) I
was really focussing in on how to see what's listening though :) You're
abosolutely right though, I'm glad you did bring that up :)
---snip---
> ---
> a network voyeur 'eh? Sounds rather deprecated.
>
> Thanks Wes, for the great explanation, I am continually learning and
> there are some really great resources on this list.
Yeah, it is a rather twisted thing :) That's a big part of my
job...sitting and staring at network traffic all the time, looking for
problems/attacks. The difference though is that I'm asked to do it
:) Well, actually to draw that analogy back to voyeurism...being asked to
watch might be just as deviant. Hmm, I'll just drop it now, LOL ;)
C ya :)
Wes
--
Wes Bateman, GCIA
Chief Security Officer
ManISec, Inc. - "Managed Internet Security Services"
http://www.manisec.com
wes@manisec.com