[532] in Intrusion Detection Systems
Re: Intrusions
daemon@ATHENA.MIT.EDU (Fred Cohen)
Thu Feb 1 00:49:56 1996
From: fc@all.net (Fred Cohen)
To: ids@uow.edu.au
Date: Tue, 30 Jan 1996 22:34:36 -0500 (EST)
In-Reply-To: <Pine.SUN.3.91.960130100946.3826A-100000@tiger> from "Greg Foulds" at Jan 30, 96 10:25:11 am
Reply-To: ids@uow.edu.au
> On Sun, 28 Jan 1996, Paul G. Seldes wrote:
>
> > One thing to keep in mind is that it is often to ensure that intruders can't do
> > anything on a system rather than try to prevent them from intruding in the first place.
> > If you break into a safe, and there is nothing there....you leave.
> > This angle works for many businesses and users.
Why have a safe if there's nothing in it?
If the content of your computer is worthless, why have a computer?
-> See: Info-Sec Heaven at URL http://all.net/
Management Analytics - 216-686-0090 - PO Box 1480, Hudson, OH 44236