[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
RE: [cobalt-security] OT: Mail to Windows Admins (WAS: Hacking m y Raq4i???)
- Subject: RE: [cobalt-security] OT: Mail to Windows Admins (WAS: Hacking m y Raq4i???)
- From: Dom Latter <DLatter@xxxxxxxxxxxxxxx>
- Date: Tue, 7 Aug 2001 13:45:07 +0200
- List-id: Mailing list for users to address network security on Cobalt products. <cobalt-security.list.cobalt.com>
> anyway im going to write a script to email the servers that
> hit us and advise them.
Please... DON'T.
> Does anyone know what email is likely to exist and/or be
> read i have no idea of how a windows server operates.
> ie should i send an email toadmin@ipaddress 0r root@ipaddress
I'll say it again, because it bears repeating: please... DON'T.
If you want to do it *manually*, well, that's your call, just
don't automate it. Imagine if everyone did the same: the amount
of traffic that a single Code Red infection would generate would
be increased by an order of magnitude. And increased traffic
is the only irritant to us non-IIS users. So you'd be making
*your* problem *worse*.
That is ONE good reason not to do what you're proposing.
There's many many more, but will one do, for now?
As an aside, not to you Wampy:
And to the top-posters on this list: for $DEITY's sake could you
please **trim** the quoted text? I read the digest form of this
list and it is incredibly annoying to have to scroll through
hundreds of lines of quoted logfile.