On Mon, 28 May 2001 10:48:17 EDT, Patrick Andry <pandryat_private> said: > Assuming we can find some form of correlation between the time of > the attack on both the target computer and the source computer, the possible Remember to remove automated tools from your correlation. A *large* percentage of the hacking activity these days seems to be various worms and automated scanners, which can be doing their work even while the perpetrator is asleep or otherwise engaged... -- Valdis Kletnieks Operating Systems Analyst Virginia Tech
This archive was generated by hypermail 2b30 : Tue May 29 2001 - 17:50:31 PDT