On Tue, 14 Sep 2004, Chad Perrin wrote:
> Eben King wrote:
> > On Tue, 14 Sep 2004, Chad Perrin wrote:
> >
> >>Hmm. This makes me want to try an experiment. I should set up a
> >>virtual DMZ here with two sets of two computers in it: one is an
> >>out-of-box Linux distro with an out-of-box Linux firewall protecting it,
> >>and the other is an out-of-box Windows workstation with an out-of-box
> >>Windows server protecting it. Once that's done, I'd leave them alone,
> >>running 24/7. Logging the results could be fun.
> >
> > What's that called, a honeypot?
> It'd be a honeypot if it was a trap set for intruders. I wouldn't be
> trying to "catch" intruders, though -- just log the effects on the
> machines.
Right, a difference of intent.
> > I don't think the decision to leave them running overnight would come into
> > play; you should have a result in a few minutes.
> I might have a result in a few minutes, but I want extended results over
> the span of weeks. Of course, I might have to reinstall Windows a few
> times in the process, on either one of the Windows machines or both of
> them. It's just something that'll go in the log. . . .
Make sure that the Windows machine doesn't get used as a zombie or Typhoid
Mary to annoy or infect thousands of other people.
-- -eben ebQenW1@EtaRmpTabYayU.rIr.OcoPm home.tampabay.rr.com/hactar This message was created using recycled electrons.----------------------------------------------------------------------- This list is provided as an unmoderated internet service by Networked Knowledge Systems (NKS). Views and opinions expressed in messages posted are those of the author and do not necessarily reflect the official policy or position of NKS or any of its employees.
This archive was generated by hypermail 2.1.3 : Fri Aug 01 2014 - 17:40:17 EDT