[29800] in North American Network Operators' Group
Re: scripts kiddie sites
daemon@ATHENA.MIT.EDU (John Payne)
Fri Jul 7 11:18:47 2000
Date: Fri, 7 Jul 2000 08:16:33 -0700
From: John Payne <john@sackheads.org>
To: nanog@merit.edu
Message-ID: <20000707081633.F26769@haybaler.sackheads.org>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <Pine.LNX.4.10.10007062350360.2042-100000@redhat1.mmaero.com>; from jlewis@lewis.org on Thu, Jul 06, 2000 at 11:51:56PM -0400
Errors-To: owner-nanog-outgoing@merit.edu
On Thu, Jul 06, 2000 at 11:51:56PM -0400, jlewis@lewis.org wrote:
>
> On Thu, 6 Jul 2000, Hal Murray wrote:
>
> > The other type is systems that have been broken into because their
> > adiministrators either don't care or don't know how to run a secure
> > system. This type of system can be used as a springboard to cause
> > more mischief.
>
> Even if you know how to run a secure system, all it takes is one
> previously unknown hole and a well connected script kiddie, and you're a
> springboard...at least briefly.
Once you were notified, you did something, tho right?
The problem isn't so much brief springboards as providers that flatout
refuse to accept that there's either a problem, or that its their problem.
--
John Payne http://www.sackheads.org/jpayne/ john@sackheads.org
http://www.sackheads.org/uce/ Fax: +44 870 0547954
340% tax? http://www.boycott-the-pumps.com/