Quote:
Originally posted by Betazep
>>Not true. If a hacker gets into your machine, he can use your ip
as a jump off to other sites where he will wreak his havoc. This
is commonly known as "bouncing," and provides one means
for the guilty one to cover his tracks.
Yes true and you are stating common knowlege. Do you only read the sections of posts that interest you?;)
My machine is a harder target than all of my neighbors. If you scanned past my ip, you wouldn't even see a reply from my computer (as if I didn't exist as all)... but people next to me have sendmail running, ftp, telnet, port 139 actively accepting connetctions, etc etc etc.
Why would a hacker bang their head on my firewall for an hour or two when they can be in one of my neighbor's computers in two minutes or less. Then they can 'bounce' away to their hearts content.
So I will rephrase... the loot isn't big enough for the task needed to break in when there are much easier targets that deliver the same outcome.
Is that better for you... :D
Not true. You're speculating. I disagree with your speculation.