[29783] in North American Network Operators' Group
Re: scripts kiddie sites
daemon@ATHENA.MIT.EDU (jlewis@lewis.org)
Fri Jul 7 01:13:52 2000
Date: Thu, 6 Jul 2000 23:51:56 -0400 (EDT)
From: jlewis@lewis.org
To: Hal Murray <murray@pa.dec.com>
Cc: nanog@merit.edu
In-Reply-To: <200007070103.SAA16614@quatre.pa.dec.com>
Message-ID: <Pine.LNX.4.10.10007062350360.2042-100000@redhat1.mmaero.com>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Errors-To: owner-nanog-outgoing@merit.edu
On Thu, 6 Jul 2000, Hal Murray wrote:
> The other type is systems that have been broken into because their
> adiministrators either don't care or don't know how to run a secure
> system. This type of system can be used as a springboard to cause
> more mischief.
Even if you know how to run a secure system, all it takes is one
previously unknown hole and a well connected script kiddie, and you're a
springboard...at least briefly.
----------------------------------------------------------------------
Jon Lewis *jlewis@lewis.org*| I route
System Administrator | therefore you are
Atlantic Net |
_________ http://www.lewis.org/~jlewis/pgp for PGP public key_________