[530] in Intrusion Detection Systems
Re: Intrusions
daemon@ATHENA.MIT.EDU (Kent Dahlgren)
Thu Feb 1 00:38:17 1996
Date: Wed, 31 Jan 1996 08:26:37 -0800 (PST)
From: Kent Dahlgren <kent@trouble.WV.TEK.COM>
To: ids@uow.edu.au
In-Reply-To: <199601292236.OAA08634@olympics.West.Sun.COM>
Reply-To: ids@uow.edu.au
On Mon, 29 Jan 1996, Brad Powell wrote:
> Paul writes:
> >If you break into a safe, and there is nothing there....you leave.
> >This angle works for many businesses and users.
>
> I disagree strongly with this analogy Paul.
> It doesn't work in cyberspace or Internet today.
It can also be used as a future base of operations. I.e, a "jumping off
point."
"Any ideas expressed here may not reflect those of my employers"
______________________________________________________________________________
______ T E K T R O N I X _ C P I D _ T E C H N I C A L _ S U P P O R T _______
/
Voice: 1.800.835.6100 E-mail: support@colorprinters.tek.com
Fax: 1.503.685.3063 WWW: www.tek.com
BBS: 1.503.685.4504 E-World: Keyword Tektronix
HAL: 1.503.682.7450 AOL: Keyword Tektronix
Service: 1.800.835.6100 FTP: ftp.tek.com
______________________________________________________________________________